Patents by Inventor Ketan Shah
Ketan Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10949676Abstract: An aerial monitoring system and method for identification and location of object features is disclosed. The aerial monitoring system and method includes training an image processing engine to identify predefined object features in images. Training involves the image processing engine generating a model for identifying predefined object features in images. Identifying the predefined object features includes using a drone outfitted with a drone camera to capture and geotag monitoring images of target objects. The monitoring images are both infrared and non-infrared. The image processing engine applies the model to the monitoring images to determine whether the monitoring images include object features that fit within one of multiple categories. The image processing engine uses a fuzzy clustering process to group objects into cluster locations. The image processing system outputs the identification and location of the object features. The output is used for maintenance planning related to the objects.Type: GrantFiled: April 9, 2018Date of Patent: March 16, 2021Assignee: Accenture Global Solutions LimitedInventors: Ketan Shah, Chandan Kumar, Sanjay Rawat
-
Patent number: 10925196Abstract: The description relates to devices, such as computing devices that can include dimensionally-constrained shielded circuit board assemblies. One example can include a circuit board that includes an upwardly extending fence. The example can also include a heat generating component positioned within the fence and a thermal module defining a major planar surface positioned over the heat generating component. The thermal module can include a downwardly extending frame that overlaps with the fence. The gasket can be compressed between the fence and the frame in a direction parallel to the major planar surface.Type: GrantFiled: August 9, 2019Date of Patent: February 16, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Todd David Pleake, John Terpsma, Ketan Shah, David Carter Vandervoort, Keith Walter Kaatz
-
Publication number: 20210045264Abstract: The description relates to devices, such as computing devices that can include dimensionally-constrained shielded circuit board assemblies. One example can include a circuit board that includes an upwardly extending fence. The example can also include a heat generating component positioned within the fence and a thermal module defining a major planar surface positioned over the heat generating component. The thermal module can include a downwardly extending frame that overlaps with the fence. The gasket can be compressed between the fence and the frame in a direction parallel to the major planar surface.Type: ApplicationFiled: August 9, 2019Publication date: February 11, 2021Applicant: Microsoft Technology Licensing, LLCInventors: Todd David Pleake, John Terpsma, Ketan Shah, David Carter Vandervoort, Keith Walter Kaatz
-
Publication number: 20190354874Abstract: Embodiments herein disclose a computerized method for goal-driven conversation. The method includes training a conversation agent using a conversation catalog and receiving configurations for the conversation agent. The configurations include task configurations, a goal plan, and event conditions. Further, the method includes receiving by the conversation agent input from a user. Further, the method includes checking a system for inputs for given user input. Further, the method includes processing the input through one or more stages from the group. The stages include objective analysis to analyze to identify objective of the input, event analysis to evaluate event conditions and check for goal triggers for matching event conditions, and goal analysis to determine next conversation based on the goal plan. Further, the method includes making conversational interaction with the user based on analysis.Type: ApplicationFiled: May 16, 2019Publication date: November 21, 2019Applicant: Agentz, IncInventors: Ketan Shah, Arunkumar Sivakumar
-
Patent number: 10464244Abstract: An improved injection mold for forming an injection molded component. The injection mold includes a main cavity block and a main core block that are moveable with respect to one another. The main cavity block has a cavity block mating face that includes a first mold surface and the main core block has a core block mating face that includes a second mold surface. A plurality of induction heating coils extend within the main cavity block and a plurality of gas inlet channels extend through the main core block. The second mold surface includes a plurality ridges that cooperatively form a continuous gas flow path that is disposed in fluid communication with the plurality of as inlet channels. The continuous gas flow path follows a serpentine shape to provide even and uninterrupted gas flow across the second mold surface.Type: GrantFiled: February 15, 2017Date of Patent: November 5, 2019Assignee: FCA US LLCInventors: Daniel Aquilina, Gregory J Finn, Ketan Shah, David V Olar, David E Compeau
-
Publication number: 20190311203Abstract: An aerial monitoring system and method for identification and location of object features is disclosed. The aerial monitoring system and method includes training an image processing engine to identify predefined object features in images. Training involves the image processing engine generating a model for identifying predefined object features in images. Identifying the predefined object features includes using a drone outfitted with a drone camera to capture and geotag monitoring images of target objects. The monitoring images are both infrared and non-infrared. The image processing engine applies the model to the monitoring images to determine whether the monitoring images include object features that fit within one of multiple categories. The image processing engine uses a fuzzy clustering process to group objects into cluster locations. The image processing system outputs the identification and location of the object features. The output is used for maintenance planning related to the objects.Type: ApplicationFiled: April 9, 2018Publication date: October 10, 2019Inventors: Ketan Shah, Chandan Kumar, Sanjay Rawat
-
Publication number: 20190091060Abstract: Maxillary and mandibular appliances can be mounted to a user's upper and lower jaws. The appliances can include a palatal pad, buccal tubes, hamular notch tubes, and an anterior deprogrammer. The various portions of the appliances can provoke beneficial reactions by muscles in the tongue and jaw area, massage the same muscles, or provide other beneficial effects.Type: ApplicationFiled: September 20, 2018Publication date: March 28, 2019Inventor: Mamta Ketan Shah
-
Publication number: 20190018399Abstract: A telemetry master (TM) system provides automatic monitoring and maintenance of equipment by automatically generating predictive actions of a certain confidence threshold to backend systems which maintain a full duplex communication channel with the TM system. Data entries including context information that are generated by applications corresponding to the backend systems during the functioning of the backend systems are collected, analyzed and actionable items such as alerts, alarms of particular messages cause the telemetry master system to generate a predictive action of a minimum confidence threshold using a pre-trained first data model. A second data model is employed to identify particular equipment from the backend systems that is to implement the action. Results from implementing the action are collected and again used to train the data models. Certain applications can include intelligent agents which enable automatic execution of the actions.Type: ApplicationFiled: July 11, 2018Publication date: January 17, 2019Applicant: ACCENTURE GLOBAL SOLUTIONS LIMITEDInventors: Ketan Shah, Abhijit Ekre, Chandan Kumar, Tanmay Dalal, Anupriya Munjal, Giffy Jerald Chris, Sanjay Rawat, Rajeev S. Kumar, Lukish Rajesh Yadav
-
Publication number: 20180229411Abstract: An improved injection mold for forming an injection molded component. The injection mold includes a main cavity block and a main core block that are moveable with respect to one another. The main cavity block has a cavity block mating face that includes a first mold surface and the main core block has a core block mating face that includes a second mold surface. A plurality of induction heating coils extend within the main cavity block and a plurality of gas inlet channels extend through the main core block. The second mold surface includes a plurality ridges that cooperatively form a continuous gas flow path that is disposed in fluid communication with the plurality of as inlet channels. The continuous gas flow path follows a serpentine shape to provide even and uninterrupted gas flow across the second mold surface.Type: ApplicationFiled: February 15, 2017Publication date: August 16, 2018Inventors: Daniel Aquilina, Gregory J. Finn, Ketan Shah, David V. Olar, David E. Compeau
-
Publication number: 20180232791Abstract: Embodiments herein provide a method and system provide a method and system for guiding users to choose and connect to business and services based on existing search results. The method includes providing a customised list of most suitable/relevant services to the user. Further, the method includes enabling search engines, directories and advertising agencies with guiding user behaviour and connect the user to specific local service to maximise revenue and other benefits as well as better targeting for businesses.Type: ApplicationFiled: February 15, 2018Publication date: August 16, 2018Inventor: Ketan Shah
-
Patent number: 9900330Abstract: The disclosed computer-implemented method for identifying potentially risky data users within organizations may include (1) monitoring computing activity of a member of an organization with respect to the member's access to data related to the organization, (2) generating, based at least in part on the member's computing activity, a baseline representation of the member's access to the data, (3) detecting at least one attempt by the member to access at least a portion of the data, (4) determining that the member's attempt to access the portion of data represents an anomaly that is suspiciously inconsistent with the baseline representation, and then in response to determining that the member's attempt to access the portion of data represents the anomaly, (5) classifying the member as a potential risk to the security of the data. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: November 13, 2015Date of Patent: February 20, 2018Assignee: Veritas Technologies LLCInventors: Shailesh Dargude, Anand Athavale, Harshit Shah, Ketan Shah
-
Patent number: 9021429Abstract: Various embodiments of systems and methods for recommending applications to portable electronic devices are described herein. Initially a context change of an application identification parameter is detected. Based on the detected context change, a target application, from a plurality of applications, may be identified. A similarity value is then computed between the identified target application and another application. Finally, an application to be recommended to a portable electronic device is determined based on the computed similarity value and a rate value of another application.Type: GrantFiled: October 16, 2013Date of Patent: April 28, 2015Assignee: Sybase Inc.Inventors: Anand Agrawal, Dinesh Kumar, Ketan Shah
-
Publication number: 20150106801Abstract: Various embodiments of systems and methods for recommending applications to portable electronic devices are described herein. Initially a context change of an application identification parameter is detected. Based on the detected context change, a target application, from a plurality of applications, may be identified. A similarity value is then computed between the identified target application and another application. Finally, an application to be recommended to a portable electronic device is determined based on the computed similarity value and a rate value of another application.Type: ApplicationFiled: October 16, 2013Publication date: April 16, 2015Inventors: Anand Agrawal, Dinesh Kumar, Ketan Shah
-
Patent number: 8914412Abstract: File management systems and methods are presented. In one embodiment, implementation of a method for determining the accurate ownership of a file within a data system includes: identifying a first plurality of access events for a file, wherein the file is associated with a directory of related files; identifying a second plurality of access events for the related files within the directory, wherein access events in the first and second plurality of access events occur within a period; determining a pool of users accessing files within the directory within the period; and selecting a user from the pool of users as an inferred owner of the file based on access metrics related to the plurality of access events.Type: GrantFiled: April 7, 2011Date of Patent: December 16, 2014Assignee: Symantec CorporationInventors: Neha Shirish Deodhar, Jitendra Pore, Ketan Shah
-
Patent number: 8903860Abstract: A system and method of identifying a data owner examining a plurality of criterion including access type, number of accesses at a given time and over the period of time selected, recentness of access, and permission levels of users. The method of file owner identification comprises collecting a plurality of samples including usage of a file by a plurality of users. A plurality of factors is calculated based on said plurality of users, wherein a respective factor is calculated for each of said plurality of users, wherein each factor is based on a plurality of use elements. Based on said plurality of factors, a file owner is determined of said file from among said plurality of users. The file owner may be communicated and/or displayed e.g., in a graph.Type: GrantFiled: March 15, 2010Date of Patent: December 2, 2014Assignee: Symantec CorporationInventors: Nikhil Marathe, Parag V. Thakur, Ganesh Vasantrao Gaikwad, Mayank Shekhar, Ketan Shah, Sharad Srivastava
-
Publication number: 20120259849Abstract: File management systems and methods are presented. In one embodiment, implementation of a method for determining the accurate ownership of a file within a data system includes: identifying a first plurality of access events for a file, wherein the file is associated with a directory of related files; identifying a second plurality of access events for the related files within the directory, wherein access events in the first and second plurality of access events occur within a period; determining a pool of users accessing files within the directory within the period; and selecting a user from the pool of users as an inferred owner of the file based on access metrics related to the plurality of access events.Type: ApplicationFiled: April 7, 2011Publication date: October 11, 2012Applicant: SYMANTEC CORPORATIONInventors: Neha Shirish Deodhar, Jitendra Pore, Ketan Shah
-
Patent number: 8050261Abstract: Embodiments according to the invention relate to frame redirection, which includes methods to intercept and re-route traffic between an initiator and a target. When a frame is redirected, an initiator issues a frame to the target, but the frame is received by a virtual target in a redirection switch by allowing the redirection switch to use the WWN of the actual target. From the perspective of the initiator, the target resides on the redirection switch. From the redirection switch, the frame is sent to the actual target by allowing the redirection switch to use the identity of the initiator. In other words, the redirection switch presents the WWN of the initiator to the target when the redirected frame is sent to the target. From the perspective of the target, the frame is received as if it originated at the initiator.Type: GrantFiled: June 17, 2008Date of Patent: November 1, 2011Assignee: Brocade Communications Systems, Inc.Inventors: Amr Sabaa, Bao Vu, Tarak Parekh, Lucy Yan, Qingyuan Ma, Ketan Shah, Richard L Hammons
-
Publication number: 20110225199Abstract: A system and method of identifying a data owner examining a plurality of criterion including access type, number of accesses at a given time and over the period of time selected, recentness of access, and permission levels of users. The method of file owner identification comprises collecting a plurality of samples including usage of a file by a plurality of users. A plurality of factors is calculated based on said plurality of users, wherein a respective factor is calculated for each of said plurality of users, wherein each factor is based on a plurality of use elements. Based on said plurality of factors, a file owner is determined of said file from among said plurality of users. The file owner may be communicated and/or displayed e.g., in a graph.Type: ApplicationFiled: March 15, 2010Publication date: September 15, 2011Applicant: SYMANTEC CORPORATIONInventors: Nikhil Marathe, Parag V. Thakur, Ganesh Vasantrao Gaikwad, Mayank Shekhar, Ketan Shah, Sharad Srivastava
-
Patent number: 7925542Abstract: The present invention relates to a method and apparatus for connecting wish lists to users, thus making wish lists accessible to such user attributes as buddy lists, or the equivalent. The invention attaches a wish list to an instant messaging name and therefore makes it available to all persons on the user's buddy list. In a further embodiment of the invention, the wish list is attached to an account, such as a wallet. As a result, various conveniences are provided. For example, a member of the user's buddy list can give a gift to the user from the wish list; a group can contribute incrementally to the giving of a gift to the user; an individual can add incremental amounts to his or her wish list to pay for an item on time (as a type of layaway); and relatives and friends can give gifts that they know will be appreciated because the gifts are on the user's wish list.Type: GrantFiled: October 24, 2008Date of Patent: April 12, 2011Assignee: AOL Inc.Inventor: Ketan Shah
-
Patent number: D921002Type: GrantFiled: May 6, 2019Date of Patent: June 1, 2021Assignee: GOOGLE LLCInventors: Rohan Ketan Shah, Jorim Dorian Jaggi, Arif Huda, Adrian Roos, Michael Adam Cohen