Patents by Inventor Koduvayur P. Subbalakshmi
Koduvayur P. Subbalakshmi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240023876Abstract: Three artificial intelligence (AI) linguistic processing architectures are proposed for early detection of Alzheimer's Disease based entirely on a patient's language abilities. Three C-Attention network architectures are presented: one that uses only PoS features, one that uses only the latent features (e.g., language embeddings) and a unified architecture, which uses both features. (FIG. 3).Type: ApplicationFiled: August 24, 2021Publication date: January 25, 2024Applicant: THE TRUSTEES OF THE STEVENS INSTITUTE OF TECHNOLOGYInventors: Koduvayur P. Subbalakshmi, Mingxuan Chen, Ning Wang
-
Patent number: 10548021Abstract: Various embodiments of systems, architecture, and/or methods are described for negotiating accesses to wireless spectrum of heterogeneous networks (e.g., Wifi, cellular 3G, cellular LTE, cellular 5G etc.) among multiple users, service providers, and services. As such, a software defined architecture is disclosed. In some embodiments, the disclosed software defined architecture can include establishing a (dedicated) logical control path from a central controller remotely located from an end device of a user. Such a logical control path is agnostic to the type and/or number of underlying wireless networks and is supplemental to conventionally known data paths, i.e., paths for exchanging data.Type: GrantFiled: May 21, 2018Date of Patent: January 28, 2020Assignee: MISRAM LLCInventors: Vidya Sagar, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi
-
Publication number: 20180338247Abstract: Various embodiments of systems, architecture, and/or methods are described for negotiating accesses to wireless spectrum of heterogeneous networks (e.g., Wifi, cellular 3G, cellular LTE, cellular 5G etc.) among multiple users, service providers, and services. As such, a software defined architecture is disclosed. In some embodiments, the disclosed software defined architecture can include establishing a (dedicated) logical control path from a central controller remotely located from an end device of a user. Such a logical control path is agnostic to the type and/or number of underlying wireless networks and is supplemental to conventionally known data paths, i.e., paths for exchanging data.Type: ApplicationFiled: May 21, 2018Publication date: November 22, 2018Inventors: Vidya SAGAR, Rajarathnam CHANDRAMOULI, Koduvayur P. SUBBALAKSHMI
-
Patent number: 9292493Abstract: An apparatus and method for determining whether text is deceptive has a computer programmed with software that automatically analyzes text in digital form by at least one of statistical analysis of psycho-linguistic cues, IP geo-location, gender analysis, authorship analysis, and analysis to detect coded/camouflaged messages. The computer has truth data against which the text message can be compared and a graphical user interface. The computer may be connectable to the Internet and may obtain the text automatically. Speech-to-text software may be used to convert verbal messages to text for analysis. The system may be made available on a webpage, web service, on a computer or by a wireless device. The text may be emails, website content, tweets. In one embodiment, the system detects coded messages.Type: GrantFiled: April 26, 2011Date of Patent: March 22, 2016Assignee: The Trustees of The Stevens Institute of TechnologyInventors: Rajarathnam Chandramouli, Xiaoling Chen, Koduvayur P. Subbalakshmi, Rohan Perera
-
Patent number: 9116877Abstract: An apparatus and method for determining whether a text is deceptive may comprise analyzing a body of textual content known to be one of text containing true content and text containing deceptive content; identifying psycho-linguistic cues that are indicative of a text being deceptive; statistically analyzing, via a computing device, a given text based upon the psycho-linguistic cues to determine if the text is deceptive. The apparatus and method may further comprise weighting the psycho-linguistic cues and statistically analyzing based on the weighted psycho-linguistic cues. The statistically analyzing step may be performed using one of a cue matching analysis, a weighted cue matching analysis, a Markov chain analysis, and a sequential probability ratio testing binary hypothesis analysis. The psycho-linguistic cues may be separated into categories, including increasing trend cues and decreasing trend cues and analyzed according to presence in a category from within the categories.Type: GrantFiled: January 6, 2011Date of Patent: August 25, 2015Assignee: The Trustees of the Stevens Institute of TechnologyInventors: Rajarathnam Chandramouli, Xiaoling Chen, Koduvayur P. Subbalakshmi
-
Patent number: 8555052Abstract: A steganographic message/advertisement embedding method is presented that can be used for contextual and targeted advertising supporting unobtrusive and on-demand message/advertisement delivery. The present invention presents over two client devices, the method includes receiving, on a first client device, a primary multimedia presentation with a plurality of steganographic codes embedded therein; whereby the steganographic code is not perceivable during a rendering of the multimedia presentation and the steganographic code is associated with at least one secondary multimedia presentation. Next; the primary multimedia presentation is rendered on the first client device. The first client device receives a user selection to select at least one of the steganographic codes.Type: GrantFiled: August 21, 2007Date of Patent: October 8, 2013Assignee: The Trustees of The Stevens Institute of TechnologyInventors: Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi, Helena S. Wisniewski
-
Publication number: 20130138428Abstract: An apparatus and method for determining whether text is deceptive has a computer programmed with software that automatically analyzes text in digital form by at least one of statistical analysis of psycho-linguistic cues, IP geo-location, gender analysis, authorship analysis, and analysis to detect coded/camouflaged messages. The computer has truth data against which the text message can be compared and a graphical user interface. The computer may be connectable to the Internet and may obtain the text automatically. Speech-to-text software may be used to convert verbal messages to text for analysis. The system may be made available on a webpage, web service, on a computer or by a wireless device. The text may be emails, website content, tweets. In one embodiment, the system detects coded messages (FIG. 19).Type: ApplicationFiled: April 26, 2011Publication date: May 30, 2013Applicant: The Trustees of the Stevens Institute of TechnologyInventors: Rajarathnam Chandramouli, Xiaoling Chen, Koduvayur P. Subbalakshmi, Rohan Perera
-
Publication number: 20130046531Abstract: An apparatus and method for determining whether a text is deceptive may comprise analyzing a body of textual content known to be one of text containing true content and text containing deceptive content; identifying psycho-linguistic cues that are indicative of a text being deceptive; statistically analyzing, via a computing device, a given text based upon the psycho-linguistic cues to determine if the text is deceptive. The apparatus and method may further comprise weighting the psycho-linguistic cues and statistically analyzing based on the weighted psycho-linguistic cues. The statistically analyzing step may be performed using one of a cue matching analysis, a weighted cue matching analysis, a Markov chain analysis, and a sequential probability ratio testing binary hypothesis analysis. The psycho-linguistic cues may be separated into categories, including increasing trend cues and decreasing trend cues and analyzed according to presence in a category from within the categories.Type: ApplicationFiled: January 6, 2011Publication date: February 21, 2013Applicant: THE TRUSTEES OF THE STEVENS INSTITUTE OF TECHNOLOGYInventors: Rajarathnam Chandramouli, Xiaoling Chen, Koduvayur P. Subbalakshmi
-
Publication number: 20120254333Abstract: A method and apparatus for automatically identifying harmful electronic messages, such as those presented in emails, on Craigslist or on Twitter, Facebook and other social media websites, features methodology for discriminating unwanted garbage communications (spam) and unwanted deceptive messages (scam) from wanted, truthful communications based upon patterns discernable from samples of each type of electronic communication. Methods are proposed that enable discrimination of wanted from unwanted communications in short electronic messages, such as on Twitter and for multilingual application.Type: ApplicationFiled: April 25, 2012Publication date: October 4, 2012Inventors: Rajarathnam Chandramouli, Xiaoling Chen, Koduvayur P. Subbalakshmi, Peng Hao, Na Cheng, Rohan Perera
-
Publication number: 20100325413Abstract: A steganographic message/advertisement embedding method is presented that can be used for contextual and targeted advertising supporting unobtrusive and on-demand message/advertisement delivery. The present invention presents over two client devices, the method includes receiving, on a first client device, a primary multimedia presentation with a plurality of steganographic codes embedded therein; whereby the steganographic code is not perceivable during a rendering of the multimedia presentation and the steganographic code is associated with at least one secondary multimedia presentation. Next; the primary multimedia presentation is rendered on the first client device. The first client device receives a user selection to select at least one of the steganographic codes.Type: ApplicationFiled: August 21, 2007Publication date: December 23, 2010Inventors: Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi, Helena S. Wisniewski
-
Patent number: 7529384Abstract: A product and process for extracting hidden data from a stego-image that has been subjected to scaling attacks are disclosed. The hidden data extraction method of the present invention retains the one-to-one mapping of the stego-image blocks to the corresponding blocks in the scaled image. When the stego-image is scaled down, the block size for extracting the hidden data is reduced proportionally. When the stego-image is scaled up, the block size for extracting the hidden data is increased proportionally. The total overall number of blocks of pixels to be examined is kept constant between the scaled image and the stego-image. The hidden data extraction method can be combined with any existing block-DCT based data hiding method to provide an overall method for dealing with scaling attacks. Both the extraction method and the combined method can be implemented in software and stored within a machine-readable medium.Type: GrantFiled: August 10, 2005Date of Patent: May 5, 2009Assignee: The Trustees of Stevens Institute of TechnologyInventors: Koduvayur P. Subbalakshmi, Palak K. Amin