Patents by Inventor Hemant Kumar
Hemant Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190320445Abstract: This disclosure relates generally to telecommunication networks, and more particularly to a method and system for delay aware uplink scheduling in a communication network. The telecommunication network performs data uplink and data downlink associated with data communication between multiple transmitter-receiver pairs connected to the network, by using specific scheduling schema as part of the data processing. Disclosed are method and system for performing a delay-aware uplink scheduling in the communication network. For an uplink request received from a transmitter, the system estimates downlink delay at the corresponding receiver side. The system further estimates a processing delay for the received uplink request. Based on the estimated downlink delay and the processing delay, the system determines an uplink delay budget for the transmitter. Further, based on the uplink delay budget and an achievable data rate computed for the transmitter, the system schedules uplink for the transmitter.Type: ApplicationFiled: December 11, 2018Publication date: October 17, 2019Applicant: Tata Consultancy Services LimitedInventors: Bighnaraj PANIGRAHI, Hemant Kumar RATH, Arpan PAL, Samar SHAILENDRA
-
Patent number: 10439890Abstract: This disclosure relates to managing Fog computations between a coordinating node and Fog nodes. In one embodiment, a method for managing Fog computations includes receiving a task data and a request for allocation of at least a subset of a computational task. The task data includes data subset and task constraints associated with at least the subset of the computational task. The Fog nodes capable of performing the computational task are characterized with node characteristics to obtain resource data associated with the Fog nodes. Based on the task data and the resource data, an optimization model is derived to perform the computational task by the Fog nodes. The optimization model includes node constraints including battery degradation constraint, communication path loss constraint, and heterogeneous computational capacities of Fog nodes. Based on the optimization model, at least the subset of the computational task is offloaded to a set of Fog nodes.Type: GrantFiled: July 18, 2017Date of Patent: October 8, 2019Assignee: Tata Consultancy Services LimitedInventors: Ajay Kattepur, Hemant Kumar Rath, Anantha Simha
-
Patent number: 10425954Abstract: This disclosure relates generally to distributed robotic networks, and more particularly to communication link-prediction in the distributed robotic networks. In one embodiment, robots in a robotic network, which are mobile, can establish communication with a cloud network through a fog node, wherein the fog node is a static node. A robot can directly communicate with a fog node (R2F) if the fog node is in the communication range of the robot. If there is no fog node in the communication range of the robot, then the robot can establish communication with another robot (R2R) and indirectly communicate with the fog node through the connected robot. Communication link prediction is used to identify one or more communication links that can be used by a robot for establishing communication with the cloud network. A link that satisfies requirements in terms of link quality and any other parameter is used for communication purpose.Type: GrantFiled: January 10, 2018Date of Patent: September 24, 2019Assignee: Tata Consultancy Services LimitedInventors: Jyotirmoy Karjee, Sipra Behera, Hemant Kumar Rath, Anantha Simha
-
Publication number: 20190289032Abstract: Systems and methods for mitigating DDoS attacks utilizing NTP are provided. According to one embodiment, a tracking table is maintained by a network security device protecting a private network. The tracking table contains information regarding NTP requests originated by clients of the private network and observed by the network security device. An NTP request sent from a client to an NTP server external to the private network is intercepted by the network security device. An NTP request flooding attack on the NTP server by the first client is mitigated by the network security device by: (i) determining based on the tracking table whether a prior NTP request directed to the NTP server and for which an NTP response has yet to be received was sent by the client within a predetermined or configurable time period of the NTP request; and (ii) when said determining is affirmative, dropping the NTP request.Type: ApplicationFiled: March 19, 2018Publication date: September 19, 2019Applicant: Fortinet, Inc.Inventor: Hemant Kumar Jain
-
Patent number: 10419490Abstract: Methods and systems for a scalable solution to behavioral Distributed Denial of Service (DDoS) attacks targeting a network are provided. According to one embodiment, a method to determine the scaling treatment is provided for various granular layer parameters of the Open System Interconnection (OSI) model for communication systems. A hardware-based apparatus helps identify packet rates and determine packet rate thresholds through continuous and adaptive learning with multiple DDoS attack mitigation components. The system can be scaled up by stacking multiple DDoS attack mitigation components to provide protection against large scale DDoS attacks by distributing load across these stacked components.Type: GrantFiled: June 30, 2017Date of Patent: September 17, 2019Assignee: Fortinet, Inc.Inventor: Hemant Kumar Jain
-
Patent number: 10405191Abstract: The present application provides a method and system for sharing of unlicensed spectrum. The disclosed method and system when implement improves the spectral efficiency of LTE users and also improves the overall performance of LAA and Wi-Fi users. A BS senses the channel for any ongoing transmissions for a CCA period which is equal to DIFS time period of Wi-Fi. If the channel is busy (CCA-busy), it enters into back-off stage by selecting a uniform random number from [0, C0?1] as the back-off counter, where C0 is the fixed congestion window size. If the channel is free for a CCA period (CCA-idle), the back-off counter gets decremented by unity until it reaches zero. Once the back-off counter reaches zero, LAA again senses and schedules its down-link transmissions for a maximum channel occupancy period, provided the channel is free.Type: GrantFiled: February 8, 2018Date of Patent: September 3, 2019Assignee: Tata Consultancy Services LimitedInventors: Visali Mushunuri, Bighnaraj Panigrahi, Hemant Kumar Rath, Anantha Simha
-
Patent number: 10394915Abstract: Architectures and techniques to store and search logging information are provided. In some embodiments, statements included in the logging information can be categorized according to respective unique identifiers. A category of statements can be retained in one or more files within a directory associated with a unique identifiers representative of the category. The directory can be included in a distributed storage system. In addition, metadata including the unique identifier and a defined searchable field or another defined discrete amount of information pertaining to a statement associated with the unique identifier can provide an indexation of an available category of statements. In addition or in other embodiments, an interface unit can permit querying the logging information via programmatic queries or other queries received via a user interface.Type: GrantFiled: August 24, 2016Date of Patent: August 27, 2019Assignee: Amazon Technologies, Inc.Inventors: Bharath Raghavendran, Hemant Kumar Gupta, Mohit Gupta, Naman Chhabra
-
Publication number: 20190260830Abstract: Internet of Things (IoT) devices (101A) continuously capture raw data over a regular interval of time. The captured raw data is transmitted to gateway devices (101B) deployed in an environment, for example, a warehouse. Continuous transmission of such data leads to data redundancy, continuous channel utilization and bandwidth usage, etc. To overcome this problem, present disclosure implements a Compressive Sensing based Data Prediction (CS-DP) model that predicts data at the gateway devices by learning the data pattern received from IoT devices, estimates and computes, using a Compressive Sensing based Data Estimation (CS-DE) model, optimal data instead of considering the overall data captured at the gateway devices and reconstructs, using a Compressive Sensing based Data Reconstruction (CS-DR) model, missing data and/or corrupted data using the partial information received at the gateway devices.Type: ApplicationFiled: June 14, 2018Publication date: August 22, 2019Applicant: Tata Consultancy Services LimitedInventors: Jyotirmoy KARJEE, Hemant Kumar RATH, Arpan PAL
-
Publication number: 20190253475Abstract: Conventional protocols for live media streaming are not lightweight and hence not suitable for constrained video transmitting devices. The protocols are poor in terms of delay performance under lossy conditions and need to maintain a lot of states at the constrained transmitting end leading to load on the memory and draining energy of the devices. The conventionally used protocols do not perform well for intermittent connectivity. Usually the existing streaming solutions act either in completely reliable manner, using reliable transport protocol like TCP, or in completely unreliable manner using best effort unreliable transport protocol like UDP. The present disclosure provides a single streaming solution which can change the protocol semantics and maintains a balance between reliability and delay-performance, thereby optimizing the overall system goodput. The protocol does this intelligently by inferring the criticality of the segment in flight and enable live video streaming for Internet of Things (IoT).Type: ApplicationFiled: August 22, 2018Publication date: August 15, 2019Applicant: Tata Consultancy Services LimitedInventors: Abhijan BHATTACHARYYA, Suvrat AGRAWAL, Hemant Kumar RATH, Arpan PAL
-
Patent number: 10367701Abstract: This disclosure relates generally to provisioning network services in a cloud computing environment, and more particularly to framework for provisioning network services in a heterogeneous cloud computing environment. In one embodiment, the disclosure includes a network as a service (NaaS) layer under a cloud provisioning platform. The NaaS layer can be interfaced with any cloud provisioning platform. The NaaS layer serves the networking needs of the heterogeneous cloud environment. It provides network services like monitoring, notifications, QoS policies, network topology and other services. For example, the cloud provisioning platform defines a virtual network and attaches a plurality of virtual machines to it. All the communications related to creation/deletion/update of virtual networks, virtual subnets, virtual ports, virtual router, virtual interfaces etc., are sent to the NaaS layer.Type: GrantFiled: August 31, 2016Date of Patent: July 30, 2019Assignee: Tata Consultancy Services LimitedInventors: Shameemraj M Nadaf, Hemant Kumar Rath, Arun Kumar A V, Samar Shailendra, Anantha Simha
-
Patent number: 10311110Abstract: A system and a method, the method including receiving a set of documents, the set including at least one instance of an unstructured document; parsing the set of documents to obtain information regarding the set of documents; determining a map of a map for the set of documents based on the information obtained by the parsing; generating a hierarchical semantic representation of the set of documents based on the map of the map; and storing the hierarchical semantic representation of the set of documents.Type: GrantFiled: December 28, 2015Date of Patent: June 4, 2019Assignee: SAP SEInventor: Hemant Kumar
-
Publication number: 20190142900Abstract: The present disclosure provides methods for generating myokines in vitro and compositions comprising myokines. Such compositions may be used for treatment of diseases such as cancer and fatty liver disease.Type: ApplicationFiled: May 10, 2017Publication date: May 16, 2019Inventor: Hemant Kumar Roy
-
Patent number: 10291474Abstract: A method and system is provided for distributed optimal caching for information centric networking. The system and method disclosed herein enables each router/node in the network to make an independent decision to solve the optimization problem based upon a cost feedback from its neighbors. Content is received by a first router which determines if it should store the content in its cache based on a Characterizing Metrics (CM) value or send it to a neighbor router j, where the neighbor router j is selected based on a transaction cost determination. The node j on receiving the content shared with itself again performs similar computation to determine if the content should be stored in its cache. The method is performed iteratively for optimal distributed caching.Type: GrantFiled: November 21, 2016Date of Patent: May 14, 2019Assignee: Tata Consultancy Services LimitedInventors: Samar Shailendra, Bighnaraj Panigrahi, Senthilmurugan Sengottuvelan, Hemant Kumar Rath, Anantha Simha
-
Publication number: 20190141620Abstract: This disclosure provides systems, devices, apparatus and methods, including computer programs encoded on storage media, for receiving scanning information from a second wireless communication device over a wireless link associated with a first wireless communications protocol, the scanning information identifying one or more wireless frequency channels associated with a second wireless communications protocol; selecting a subset of wireless channels associated with the second wireless communications protocol based on the scanning information; and scanning one or more wireless frequency channels of only the selected subset of wireless frequency channels.Type: ApplicationFiled: November 7, 2017Publication date: May 9, 2019Inventors: Sunit PUJARI, Imran Ansari, Sougat Ray, Hemant Kumar Sahoo
-
Publication number: 20190118436Abstract: An injection molding machine includes a stationary platen and a moving platen mounted on a machine base, and a rotary apparatus for rotatably supporting a center mold section. The rotary apparatus includes a carriage body including a carriage upper portion supported by first and second carriage rails, and a carriage lower portion extending downward from the carriage upper portion laterally intermediate the first and second carriage rails. The rotary apparatus further includes a rotary table mounted atop the carriage body for rotatably supporting the center mold section. The rotary table is mounted to the carriage body by a rotary table bearing having a combination of bearing elements to bear axial, rotational, and moment loads. The machine further includes a plurality of tie bars extending between the moving platen and the stationary platen. The tie bars are free from engagement by the rotary apparatus.Type: ApplicationFiled: December 7, 2018Publication date: April 25, 2019Applicant: Niigon Machines Ltd.Inventors: Robert D. Schad, Carsten Link, Hemant Kumar
-
Publication number: 20190114683Abstract: A system and method to determine and accept discount for a plurality of invoices, has been described. Initially, a vendor request is received to initiate a bidding session to place a bid for earlier processing of the plurality of pending invoices by a consumer. Based on the received vendor request, a discount is determined for each of the plurality of invoices based on at least one of a vendor information, the consumer information, and a bidding pattern in previous session. Next the plurality of invoices and the determined discount corresponding to the plurality of pending invoices are displayed to the consumer. Finally, one or more pending invoices from the plurality of pending invoices are auto-selected based on at least one of the vendor information, the consumer information, and the bidding session specific information.Type: ApplicationFiled: October 16, 2018Publication date: April 18, 2019Inventors: Devang Mundhra, Manish Kumar, Anurag Jain, Hemant Kumar Joshi
-
Method and system for optimally allocating warehouse procurement tasks to distributed robotic agents
Patent number: 10235642Abstract: This disclosure relates generally to autonomous devices, and more particularly to method and system to optimally allocate warehouse procurement tasks to distributed autonomous devices. The method includes obtaining, at a coordinating agent, a global task associated with the warehouse and information associated with the robotic agents. The information includes a count and status of the robotic agents. The global task is profiled to obtain a set of sub-tasks and constraints associated with the set of sub-tasks are identified. The constraints include utilization constraint and/or pricing constraints. A distributed, decentralized optimal task allocation is performed amongst the robotic agents based on constraints to obtain optimal performance of robotic agents.Type: GrantFiled: November 30, 2017Date of Patent: March 19, 2019Assignee: Tata Consultancy Services LimitedInventors: Ajay Kattepur, Hemant Kumar Rath, Anantha Simha, Arijit Mukherjee -
METHOD AND SYSTEM FOR OPTIMALLY ALLOCATING WAREHOUSE PROCUREMENT TASKS TO DISTRIBUTED ROBOTIC AGENTS
Publication number: 20190049975Abstract: This disclosure relates generally to autonomous devices, and more particularly to method and system to optimally allocate warehouse procurement tasks to distributed autonomous devices. The method includes obtaining, at a coordinating agent, a global task associated with the warehouse and information associated with the robotic agents. The information includes a count and status of the robotic agents. The global task is profiled to obtain a set of sub-tasks and constraints associated with the set of sub-tasks are identified. The constraints include utilization constraint and/or pricing constraints. A distributed, decentralized optimal task allocation is performed amongst the robotic agents based on constraints to obtain optimal performance of robotic agents.Type: ApplicationFiled: November 30, 2017Publication date: February 14, 2019Applicant: Tata Consultancy Services LimitedInventors: Ajay KATTEPUR, Hemant Kumar RATH, Anantha SIMHA, Arijit MUKHERJEE -
Publication number: 20190053074Abstract: Robotic applications are important in both indoor and outdoor environments. Establishing reliable end-to-end communication among robots in such environments are inevitable. Many real-time challenges in robotic communications are mainly due to the dynamic movement of robots, battery constraints, absence of Global Position System (GPS), etc. Systems and methods of the present disclosure provide assisted link prediction (ALP) protocol for communication between robots that resolves real-time challenges link ambiguity, prediction accuracy, improving Packet Reception Ratio (PRR) and reducing energy consumption in-terms of lesser retransmissions by computing link matrix between robots and determining status of a Collaborative Robotic based Link Prediction (CRLP) link prediction based on a comparison of link matrix value with a predefined covariance link matrix threshold. Based on determined status, robots either transmit or receive packet, and the predefined covariance link matrix threshold is dynamically updated.Type: ApplicationFiled: March 5, 2018Publication date: February 14, 2019Applicant: Tata Consultancy Services LimitedInventors: Sipra BEHERA, Hemant Kumar Rath, Jyotirmoy Karjee, Anantha Simha
-
Patent number: 10192056Abstract: A computer-implemented method for authenticating whole disk encryption systems may include (i) detecting, by a computing device, an attempt to initiate a boot process on the computing device, (ii) verifying, by the computing device, an initial decryption key, (iii) decrypting, by the computing device, an initial set of software required to boot crucial functions of the computing device using the initial decryption key, (iv) detecting, by the computing device, a secondary device running an authentication application, (v) receiving, by the computing device, a second decryption key from the authentication application on the secondary device, and (vi) completing the boot process on the computing device based on a security policy associated with the second decryption key. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 6, 2016Date of Patent: January 29, 2019Assignee: Symantec CorporationInventors: Vipul Goel, Hemant Kumar