Patents by Inventor Hemant Kumar

Hemant Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230280982
    Abstract: Real-time resource deployment and integration can include determining one or more performance priorities for a user computer system based on a plurality of system-generated processing metrics. Based on the one or more performance priorities, a candidate cloud-based service can be determined among one or more previously unanalyzed cloud-based services identified by an automated watcher configured to search a plurality of communication network sites. The current performance of the user computer system can be compared to a potential performance of the user computer system were the candidate cloud-based service deployed. A script can be generated in response to determining, based on the comparing, that deploying the candidate cloud-based service improves performance of the user computer system with respect to the performance priorities. The script reconfigures the user computer system in real-time by automatically deploying the candidate cloud-based service.
    Type: Application
    Filed: March 7, 2022
    Publication date: September 7, 2023
    Inventors: Preethi Balakrishnan, Shikhar Kwatra, Hemant Kumar Sivaswamy, Venkata Vara Prasad Karri
  • Patent number: 11750459
    Abstract: Computer technology for helping to ensure various types of compliance for a first user on a multi-cloud platform, the technology including the following operations: (i) receiving an initial version of a compliance template for use with a multi-cloud computer system; (ii) applying corrective ensemble modelling under a recommender and reinforcement framework to dynamically update the compliance template to obtain an updated version of the compliance template; (iii) applying corrective ensemble modelling under a recommender and reinforcement framework to dynamically select a recommended set of compliance tools for the first user; and (iv) validating multi-cloud compliance using the template and tools.
    Type: Grant
    Filed: April 13, 2022
    Date of Patent: September 5, 2023
    Assignee: International Business Machines Corporation
    Inventors: Venkata Vara Prasad Karri, Shikhar Kwatra, Shailendra Moyal, Hemant Kumar Sivaswamy
  • Patent number: 11741489
    Abstract: An embodiment for generating an electronic coupon based on user preferences is provided. The embodiment may include receiving real-time and historical data relating to one or more reward coupons. The embodiment may also include identifying a contextual situation of the user and one or more preferences of the user regarding a coupon reward type. The embodiment may further include identifying one or more vendors that match with the one or more preferences of the user. The embodiment may also include generating one or more electronic coupons and presenting the one or more generated electronic coupons to the user. The embodiment may further include in response to determining the one or more generated electronic coupons match at least one preference of the user, adding the one or more generated electronic coupons that match the at least one preference of the user to an account of the user.
    Type: Grant
    Filed: August 11, 2021
    Date of Patent: August 29, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Venkata Vara Prasad Karri, Hemant Kumar Sivaswamy, Shikhar Kwatra, Naga Srinivasa Reddy Padala
  • Patent number: 11743344
    Abstract: A method for managing edge resource processing includes identifying a plurality of data sources, wherein each sensor from a plurality of sensors associated with the plurality of data sources produce data for processing by a plurality of edge devices. In response to sampling a data feed from each data source form the plurality of data sources to establish context, the method also includes determining contextual priority for each data source. The method also includes identifying the plurality of edge devices at the location for performing computations on the data produced by the plurality of data sources. In response to identifying a type of computation for the plurality of edge devices, the method also includes determining a computation plan for the edge devices based on the contextual priority for each data source from the plurality of data sources and deploying the computation plan for the plurality of edge devices.
    Type: Grant
    Filed: March 15, 2022
    Date of Patent: August 29, 2023
    Assignee: International Business Machines Corporation
    Inventors: Hemant Kumar Sivaswamy, Sri Harsha Varada, Venkata Vara Prasad Karri, Sarbajit K. Rakshit
  • Patent number: 11729296
    Abstract: Dynamically scaling control plane for ingress services for large numbers of applications with minimal traffic disruption includes receiving an estimate of a number of applications to be executed by multiple clusters implemented by an orchestrator platform. Each cluster includes multiple containers. The multiple clusters implement a centralized controller that control execution of the applications by the multiple clusters. The centralized controller is sharded into a variable number of controllers that collectively control the estimated number of applications based on the estimate of the number of applications and a pre-determined number of applications that each controller can control. Each controller of the variable number of controllers controls an execution of a respective subset of the applications. In response to a change in the number of applications over time, the number of controllers is modified based on a number of applications to be executed by the multiple clusters at any given time.
    Type: Grant
    Filed: August 4, 2021
    Date of Patent: August 15, 2023
    Assignee: VMware, Inc.
    Inventors: Sudipta Biswas, Monotosh Das, Hemant Kumar Shaw
  • Publication number: 20230239400
    Abstract: Computer-implemented methods, computer program products, and computer systems for detecting and resolving fraudulent calls. The computer-implemented methods include one or more processors configured for receiving voice call data corresponding to an incoming telephone call placed to a user device, wherein the voice call data comprises caller voice data. Further, the computer-implemented methods may include one or more processors configured for converting the caller voice data to caller text data comprising one or more text phrases. Further embodiments of the computer-implemented method include processors configured for determining that the one or more text phrases satisfies a first condition, and responsive to determining that the one or more text phrases satisfies the first condition, transmitting a user alert to the user device.
    Type: Application
    Filed: January 25, 2022
    Publication date: July 27, 2023
    Inventors: Craig M. Trim, Shikhar Kwatra, Hemant Kumar Sivaswamy, Joyce Miryam Habbouche
  • Publication number: 20230235495
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining clothing article data stream data from one or more internet of things (IoT) device disposed in a computing environment, wherein the computing environment is collocated with a residence of a user, the clothing article data stream data representing one or more clothing article of the user; examining data of the clothing article data stream data to determine at least one clothing article parameter value of the one or more clothing article; in dependence at least one clothing article parameter value of the one or more clothing article, and providing user profile data that specifies predicted behavior of the user.
    Type: Application
    Filed: January 25, 2022
    Publication date: July 27, 2023
    Inventors: Caleb MILES, Shikhar KWATRA, Hemant Kumar SIVASWAMY, Sachin Suhas PATWARDHAN
  • Publication number: 20230237177
    Abstract: A pending data migration is detected, that is related to a set of one or more data blobs. The set of data blobs are stored on a source cloud object data store. The set of data blobs are retrieved, from the source cloud object data store. A security requirement for the set of data blobs is identified based on the set of data blobs and based on the source cloud object data store. A set of one or more potential target cloud object data stores from a set of additional cloud object data stores is determined. The set of data blobs is assigned, in response to the determination, to a first potential target cloud object data store of the set of potential target cloud object data stores. The assignment is based on the security requirement.
    Type: Application
    Filed: January 24, 2022
    Publication date: July 27, 2023
    Inventors: Shikhar Kwatra, Afroz Khan I, Hemant Kumar Sivaswamy, Piyush Shivam
  • Publication number: 20230231933
    Abstract: Some embodiments provide a method that identifies a first number of requests received at a first application. Based on the first number of requests received at the first application, the method determines that a second application that processes requests after processing by the first application requires additional resources to handle a second number of requests that will be received at the second application. The method increases the amount of resources available to the second application prior to the second application receiving the second number of requests.
    Type: Application
    Filed: April 26, 2022
    Publication date: July 20, 2023
    Inventors: Sudipta Biswas, Monotosh Das, Hemant Kumar Shaw, Shubham Chauhan
  • Publication number: 20230232195
    Abstract: Some embodiments provide a method for scaling a service chain that includes multiple services, each of which is provided by one or more instances of the service. The method identifies that a first service in the service chain has received a number of requests. For each service in the service chain, the method (i) identifies a scaling factor that estimates a portion of requests received at the first service that will be subsequently received at the service and (ii) deploys a number of additional instances of the service based on the identified scaling factor for the service and the number of requests received at the first service.
    Type: Application
    Filed: April 26, 2022
    Publication date: July 20, 2023
    Inventors: Sudipta Biswas, Monotosh Das, Hemant Kumar Shaw, Shubham Chauhan
  • Publication number: 20230225313
    Abstract: The present invention relates to biocide-composites providing high retention of biocides in glueline-treated glued-wood products that are hot-pressed or hot-pressed and block-stacked during manufacture.
    Type: Application
    Filed: June 28, 2021
    Publication date: July 20, 2023
    Inventors: Christopher Edmond Rowse, Kristina Maree England, Peter James Hayward, Christopher Molloy, André Frederik Siraa, Steven John Foggo, Hemant Kumar
  • Publication number: 20230214848
    Abstract: In an approach to verifying and flagging negative feedback, one or more computer processors monitor one or more websites for product feedback associated with a failed component of a product. One or more computer processors determine the product feedback is detected. One or more computer processors determine the product feedback is negative. One or more computer processors determine whether the failed component is present in a corresponding blockchain ledger. In response to determining the failed component is not present in a corresponding blockchain ledger, one or more computer processors refute the product feedback.
    Type: Application
    Filed: January 5, 2022
    Publication date: July 6, 2023
    Inventors: Hemant Kumar Sivaswamy, Venkata Vara Prasad Karri, Shikhar Kwatra, Afroz Khan, I
  • Publication number: 20230215311
    Abstract: A method to automatically adjust a user interface of a mobile device for readability is provided. A processor retrieves an external capture of a display of a mobile device. A processor converts text in the external capture to a computer readable format. A processor determines a readability index of the external capture based on a comparison of the text in the external capture to user interface data of the mobile device. A processor, in response to the readability index being below a threshold value, adjusts at least one display parameter of a user interface of the mobile device.
    Type: Application
    Filed: January 4, 2022
    Publication date: July 6, 2023
    Inventors: Hemant Kumar Sivaswamy, Vijay Ekambaram, Sarbajit K. Rakshit
  • Publication number: 20230215067
    Abstract: A computer-implemented method for avatar rendering of virtual presentations is disclosed. The computer-implemented method includes extracting visual content from a presentation. The computer-implemented method further includes extracting audio content from the presentation. The computer-implemented method includes correlating the visual content with the audio content of the presentation. The computer-implemented method includes generating a virtual avatar to dynamically render a virtual presentation to a viewer, based at least in part, on the correlated visual content and audio content of the presentation.
    Type: Application
    Filed: January 4, 2022
    Publication date: July 6, 2023
    Inventors: Zachary A. Silverstein, Nadiya Kochura, Tiberiu Suto, Hemant Kumar Sivaswamy
  • Publication number: 20230196490
    Abstract: Using machine logic (for example artificial intelligence (AI) software) to assemble emergency equipment during an emergency, with the help of UAVs for transport. Also, using machine logic to design purpose built emergency equipment during an emergency.
    Type: Application
    Filed: December 17, 2021
    Publication date: June 22, 2023
    Inventors: Hemant Kumar Sivaswamy, Kiruthikalakshmi Periasamy, Venkata Vara Prasad Karri, Shikhar Kwatra
  • Publication number: 20230177305
    Abstract: A method, computer system, and a computer program product for artificial intelligence-based virtual meeting presentation oversight are provided. A stream of a virtual meeting having a first computer designated for screen sharing control is received. A broadcast hindrance update from the first computer is received. The broadcast hindrance update is input into a machine learning model. As output from the machine learning model a recommendation regarding switching of the screen sharing control is received. In response to the receiving and to the recommendation indicating that the screen sharing control should be switched, a control switching signal is sent to a second computer participating in the virtual meeting.
    Type: Application
    Filed: December 7, 2021
    Publication date: June 8, 2023
    Inventors: Hemant Kumar Sivaswamy, Sri Harsha Varada, Ramesh Naidu Yamalapalli, Tirumala Vasu Padisetti
  • Publication number: 20230169734
    Abstract: A computer-implemented method, a computer system and a computer program product enhance user interaction with a virtual or augmented environment. The method includes obtaining a user profile. The user profile includes a constraint of a user. The method also includes identifying a plurality of objects in the augmented reality environment. In addition, the method includes determining an intent of the user with respect to navigating the augmented reality environment. The method further includes calculating a probability of interaction between the user and an identified object based on the intent. Lastly, the method includes generating an enhancement threshold for each of the identified objects based on the probability of interaction and the constraint of the user.
    Type: Application
    Filed: December 1, 2021
    Publication date: June 1, 2023
    Inventors: Lincoln A Alexander, Laura Janet Rodriguez, Robert E. Loredo, Jaclyn Wakin, Hemant Kumar Sivaswamy
  • Patent number: 11663781
    Abstract: A computer-implemented method, a computer system and a computer program product enhance user interaction with a virtual or augmented environment. The method includes obtaining a user profile. The user profile includes a constraint of a user. The method also includes identifying a plurality of objects in the augmented reality environment. In addition, the method includes determining an intent of the user with respect to navigating the augmented reality environment. The method further includes calculating a probability of interaction between the user and an identified object based on the intent. Lastly, the method includes generating an enhancement threshold for each of the identified objects based on the probability of interaction and the constraint of the user.
    Type: Grant
    Filed: December 1, 2021
    Date of Patent: May 30, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lincoln A Alexander, Laura Janet Rodriguez, Robert E. Loredo, Jaclyn Wakin, Hemant Kumar Sivaswamy
  • Publication number: 20230153108
    Abstract: Disclosed herein are various embodiments a code simplification system. An embodiment operates by determining that a software version of a coordinator node is different from a software version of one or more worker nodes, Commits by the one or more worker nodes to a database are disabled based on the determination that the software versions differ. An update is performed on each of the one or more worker nodes. An acknowledgement that the update on each of the one or more worker nodes has completed is received, and the commits to the database by the one or more worker nodes is enabled.
    Type: Application
    Filed: November 17, 2021
    Publication date: May 18, 2023
    Inventors: Hemant Kumar SHUKLA, Tanay Jayant KAYASTHA, Siddharth KUMAR, Nandan MARATHE
  • Patent number: 11651119
    Abstract: An approach for maintaining pipeline infrastructure based on graphical images is disclosed. The approach receives a plurality of parameters in a pipeline infrastructure by using a plurality of sensors. The approach generates a digital twin of the determined one or more susceptible and/or vulnerable points/areas/joints in the pipeline infrastructure. The approach simulates the determined susceptible areas/points/joints in the pipeline infrastructure for determining one or more damages and/or defects. The approach predicts one or more proactive maintenance actions based on the determined damage and/or defect in the pipeline infrastructure to prevent the users from being near the susceptible area/joints/portions and prioritizing the proactive maintenance actions based on the level and extent of damage and/or defect.
    Type: Grant
    Filed: September 23, 2020
    Date of Patent: May 16, 2023
    Assignee: International Business Machines Corporation
    Inventors: Venkata Vara Prasad Karri, Hemant Kumar Sivaswamy