Patents by Inventor KUMAR

KUMAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240419565
    Abstract: A method and system for generating an activity report for testbench components in a test environment is disclosed. In some embodiments, the method includes retrieving a unique ID associated with each of a plurality of registered testbench components. The method further includes selectively configuring the ATU associated with one or more testbench components from the plurality of registered testbench components to generate an activity tracking report at an end of a simulation, based on a user requirement. The method further includes fetching the activity tracking report corresponding to the one or more testbench components based on the associated unique ID. The method further includes generating a summarized activity report corresponding to the one or more testbench components based on the activity tracking report received from the respective ATU. The method further includes rendering at least one of the activity tracking report and the summarized activity report to a user.
    Type: Application
    Filed: June 15, 2023
    Publication date: December 19, 2024
    Inventors: MANICKAM MUTHIAH, KARTHIKEYAN KEELAPANDAL SUNDARAM, NISHA RAVICHANDRAN, SATHISH KUMAR KRISHNAMOORTHY, RAZI ABDUL RAHIM
  • Publication number: 20240419794
    Abstract: Methods, apparatus, and processor-readable storage media for identifying vulnerabilities across software code repositories are provided herein. An example computer-implemented method includes maintaining at least one database associated with a plurality of code repositories; in response to detecting a build process associated with a first code repository of the plurality of code repositories, extracting and storing metadata related to the first code repository in the at least one database; identifying at least one vulnerability associated with the first code repository of the plurality of code repositories; determining whether an additional code repository of the plurality of code repositories is impacted by the at least one vulnerability based at least in part on the metadata stored in the at least one database for the additional code repository; and initiating one or more automated actions to at least partially remediate the at least one vulnerability in the additional code repository.
    Type: Application
    Filed: June 16, 2023
    Publication date: December 19, 2024
    Inventors: Girish Murthy, Venkata Nagendra Purushotham Musti, Dhilip S. Kumar, Shishir Kumar Parhi, Sambasivarao Gaddam, Abhishek Jaiswal, Ashwin Kumar Reddy Kantam, Anusha Shetty
  • Publication number: 20240421874
    Abstract: Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may receive signaling indicating a transition from a first type of channel state information (CSI) processing to a second type of CSI processing at the UE, wherein at least one of the first type of CSI processing or the second type of CSI processing is a machine-learning-based CSI processing type. The UE may transition from the first type of CSI processing to the second type of CSI processing in accordance with the signaling and a timeline for the transition. Numerous other aspects are described.
    Type: Application
    Filed: June 14, 2023
    Publication date: December 19, 2024
    Inventors: Pavan Kumar VITTHALADEVUNI, Krishna Kiran MUKKAVILLI, Hung Dinh LY, Jay Kumar SUNDARARAJAN
  • Publication number: 20240419878
    Abstract: A method, system, and circuit arrangement involve synthesizing a circuit design specified in a register transfer level (RTL) specification into a netlist. The RTL specification includes an assert statement that specifies a conditional expression involving one or more signals specified in the circuit design to be checked during simulation, and the synthesizing includes synthesizing the assert statement into netlist elements. The design tool places and routes the netlist into a circuit design layout and generates implementation data from the layout.
    Type: Application
    Filed: June 19, 2023
    Publication date: December 19, 2024
    Applicant: Xilinx, Inc.
    Inventors: Anil Kumar A V, Alok Mistry
  • Publication number: 20240422537
    Abstract: The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Embodiments herein provide a method for managing aerial information of an UUAA context in a wireless network (1000) by a network device (600). The method includes storing an UUAA Mobility Management (UUAA-MM) context or UUAA Session Management (UUAA-SM) context when an UAV (100) is authenticated and authorized for an Uncrewed Aerial System (CAS) service in the wireless network. Further, the method includes detecting an event associated with an UAV (100) in the wireless network. Further, the method includes removing the stored UUAA-MM context or UUAA-SM context for the UAS service for the UAV (100) in response to detecting the event. Further, the method includes transmitting a message to an UASNF device (300) to unsubscribe for the UAS service for the UAV or to remove the UUAA-MM context or UUAA-SM context stored at the UASNF device (300) for the CAS service for the UAV.
    Type: Application
    Filed: January 11, 2023
    Publication date: December 19, 2024
    Inventors: Ashok Kumar NAYAK, Dongyeon KIM, Jungshin PARK
  • Publication number: 20240419910
    Abstract: A method includes receiving an indication of a first coverage value corresponding to a desired overlap between a dataset of natural language phrases and a training dataset for training a machine learning model; determining a second coverage value corresponding to a measured overlap between the dataset of natural language phrases and the training dataset; determining a coverage delta value based on a comparison between the first coverage value and the second coverage value; modifying, based on the coverage delta value, the dataset of natural language phrases; and processing, utilizing a machine learning model including the modified dataset of natural language phrases, an input dataset including a set of input features. The machine learning model processes the input dataset based at least in part on the dataset of natural language phrases to generate an output dataset.
    Type: Application
    Filed: August 29, 2024
    Publication date: December 19, 2024
    Applicant: Oracle International Corporation
    Inventors: Thanh Long Duong, Vishal Vishnoi, Mark Edward Johnson, Elias Luqman Jalaluddin, Tuyen Quang Pham, Cong Duy Vu Hoang, Poorya Zaremoodi, Srinivasa Phani Kumar Gadde, Aashna Devang Kanuga, Zikai Li, Yuanxu Wu
  • Publication number: 20240419886
    Abstract: A data corpus is partitioned into text strings for header classification. A group characteristic is computed for a text string, and whether the group characteristic satisfies a group characteristic criterion is determined. The text string may be disqualified from header classification if the group characteristic criterion is not satisfied, or one or more font characteristics may be determined for the text string if the group characteristic criterion is satisfied. A font characteristic that meets one or more prevalence criteria may be identified and evaluated to determine whether the font characteristic meets at least one font characteristic criterion. The text string may be disqualified from header classification if the font characteristic criterion is not satisfied, or if the font characteristic meets the font characteristic criterion, the text string is classified as a header, and tagged content is generated by applying a header tag to the text string.
    Type: Application
    Filed: April 30, 2024
    Publication date: December 19, 2024
    Applicant: Oracle International Corporation
    Inventors: Sagar Gollamudi, Vishank Bhatia, Xu Zhong, Thanh Long Duong, Mark Johnson, Srinivasa Phani Kumar Gadde, Vishal Vishnoi
  • Publication number: 20240420192
    Abstract: An example methodology includes analyzing a data set onboarded to a data marketplace service for quality, deriving a static price depreciation coefficient based on the quality of the data set, and applying the static price depreciation coefficient to a price of the data set to determine a first new price of the data set, wherein the price of the data set is specified by a data provider that provided the data set to the data marketplace service. The method may also include analyzing error reports and feedbacks about the data set to determine a density of errors in the data in the data set, deriving a dynamic price depreciation coefficient based on the density of errors in the data in the data set, and applying the dynamic price depreciation coefficient to the price of the data set to determine a second new price of the data set.
    Type: Application
    Filed: June 16, 2023
    Publication date: December 19, 2024
    Applicant: Dell Products L.P.
    Inventors: Dhilip Kumar, Shibi Panikkar, Vibha Pandey
  • Publication number: 20240421875
    Abstract: Methods, systems, and devices for wireless communication are described. A user equipment (UE) may select a non-Discrete Fourier Transform (non-DFT) codebook of a set of non-DFT codebooks associated with a channel state feedback message. The UE may determine a set of singular vectors associated with the non-DFT codebook based on a first machine learning model, where the set of singular vectors corresponds to a subspace associated with the non-DFT codebook. The UE may compress the non-DFT codebook, the set of singular vectors, or both, based on a second machine learning model. The UE may transmit the channel state feedback message including the compressed non-DFT codebook, the compressed set of singular vectors, or both.
    Type: Application
    Filed: June 15, 2023
    Publication date: December 19, 2024
    Inventors: Pavan Kumar VITTHALADEVUNI, Jay Kumar SUNDARARAJAN, Taesang YOO, Krishna Kiran MUKKAVILLI, Naga BHUSHAN
  • Publication number: 20240422107
    Abstract: In general, techniques are described for deploying and managing a virtual router having Data Plane Development Kit (DPDK) functionality to a computing device. In an example, a method includes creating, by a container orchestration platform executing on a computing device, a virtual router custom resource instance of a virtual router custom resource definition, the virtual router custom resource instance for a virtual router to execute on the computing device; based on configuration data for the virtual router custom resource instance, by the container orchestration platform, modifying the virtual router custom resource instance with the configuration data and deploying a first virtual computing instance comprising a virtual router configured according to the modified virtual router custom resource instance; and executing, by the computing device, the virtual router to process a packet.
    Type: Application
    Filed: June 14, 2023
    Publication date: December 19, 2024
    Inventors: Shailender Sharma, Vinod Nair, Kiran K N, Kirankumar Kashinath Raikar, Rakesh Kumar Reddy Varimalla
  • Publication number: 20240421980
    Abstract: Methods for updating ephemeral keys on quick boot of a computing device, including determining, by a processor of the computing device, that a power-on transition is from a quick boot and generating, in a secure portion of the processor, a new ephemeral key for use in wrapping one or more encryption keys of a key ring for use in an unsecure portion of the processor in response to the quick boot. The secure portion of the processor may unwrap each of the one or more encryption keys of the key ring with a prior ephemeral key before wrapping the one or more encryption keys with the new ephemeral key.
    Type: Application
    Filed: June 14, 2023
    Publication date: December 19, 2024
    Inventors: Nishant RAJ, Ananda Kishore PARASA, Bedatrayee GHOSH, Santosh Pavan Kumar DRONAMRAJU, Neeraj Kumar SONI
  • Publication number: 20240419790
    Abstract: A system can receive a request that is associated with a user account to perform an operation on the system. The system can evaluate the request based on a security breach policy to produce a security result. The system can, in response to determining that the security result indicates that there is a possible security breach, determine not to perform the operation, and perform a mitigating action regarding the possible security breach. The system can, in response to the security result indicating that the possible security breach does not exist, perform the operation.
    Type: Application
    Filed: June 15, 2023
    Publication date: December 19, 2024
    Inventors: Anurag Chandra, Shiv Kumar, Kaushik Gupta
  • Publication number: 20240418775
    Abstract: A method for tracking and managing activities of testbench components in a test environment during a simulation is disclosed. In some embodiments, the method includes receiving a first Activity Tracking Unit (ATU) message from an ATU pre-installed within each of a plurality of testbench components. The method further includes registering each of the plurality of testbench components in response to receiving the first ATU message from the corresponding ATU. The method further includes selecting one or more configuration settings corresponding to the ATU of each of the plurality of testbench components based on one or more user requirements. The method further includes receiving at least one second ATU message from the corresponding ATU based on the one or more configuration settings, at an end of the simulation. The method further includes utilizing the at least one second ATU message to drive one or more outcomes corresponding to the simulation.
    Type: Application
    Filed: June 14, 2023
    Publication date: December 19, 2024
    Inventors: MANICKAM MUTHIAH, KARTHIKEYAN KEELAPANDAL SUNDARAM, NISHA RAVICHANDRAN, SATHISH KUMAR KRISHNAMOORTHY, RAZI ABDUL RAHIM
  • Publication number: 20240420384
    Abstract: Embodiments may include a computing device configured with a display device, a display processor configured to identify a region of interest and a remainder region in a frame for display by the display device, and a composer module, coupled to the display device and the display processor, and configured to apply a night mode color process to the remainder region and not to the region of interest, and to provide a composition of the remainder region and the region of interest to the display device for presentation.
    Type: Application
    Filed: June 15, 2023
    Publication date: December 19, 2024
    Inventors: Sumit GEMINI, Nikhil Kumar KANSAL
  • Publication number: 20240417749
    Abstract: Synthetic endornaviral satellite RNA molecules and satellite particles containing the same are disclosed. The synthetic endornaviral satellite RNA molecules can include coding and/or non-coding cargo sequences, and are heritable through generations of plants. Also disclosed are methods of using the endornaviral satellite RNA molecules and satellite particles containing the same to change plant phenotypes, improve plant stress resistance, and improve plant pest and pathogen resistance.
    Type: Application
    Filed: October 31, 2022
    Publication date: December 19, 2024
    Inventors: Arjun Devang Khakhar, Barry Andrew Martin, Yajie Niu, Daniel Alexander Sprague, Fu Chyun Chu, Elizabeth Jane Antonelli Dennis, Mehmet Ali Halac, Yumeng Hao, Kevin Klicki, James Michael Kremer, Jayashree Kumar, Chien-Yuan LIN, Shankar Raj Pant, Derek Thomas Rothenheber, Michka Gabrielle Sharpe, Aditya Sushil Kumar Singh
  • Publication number: 20240420057
    Abstract: Systems and methods for collecting and displaying business insights in a cloud-based system. Steps include obtaining data from a cloud-based system associated with any of applications, infrastructure, and employees of an organization, wherein the cloud-based system includes a plurality of organizations with the applications, infrastructure, and employees each assigned thereto; processing the data associated with the organization to determine a plurality of insights; and displaying the plurality of insights on a per-organization basis based on the processing.
    Type: Application
    Filed: June 11, 2024
    Publication date: December 19, 2024
    Applicant: Zscaler, Inc.
    Inventors: Umamaheswaran Arumugam, Varun Singh, Jun Xue, Chakkaravarthy Periyasamy Balaiah, Jasbir Kaushal, Abhishek Bathla, Shankar Vivekanandan, Santhosh Kumar, Anoma Dhurka, Raj Krishna, Valentin Khechinashvili, Pranab Sharma
  • Publication number: 20240420218
    Abstract: This document describes techniques, apparatuses, and systems for secured access management of shared storage resources. A first user issues a command to create a shared storage resource that is capable of saving an indication of products available for acquisition on a platform for later acquisition using a billing account with which the first user is authorized to acquire products. The first user issues a command to provide a second user a set of permissions that enables the second user to issue commands to add an indication of one or more products to the storage resource. Using the permission, the second user issues commands to add the indication of the one or more products to the storage resource. The one or more products can be acquired using the billing account based on the indication of the one or more products in the storage resource.
    Type: Application
    Filed: June 15, 2023
    Publication date: December 19, 2024
    Inventors: John C. Linari, Amit Kumar Mannur, Beth Ellen Turtle
  • Publication number: 20240421931
    Abstract: Methods and apparatus in a fifth-generation wireless communications, including an example method, in a wireless device, that includes receiving a downlink signal comprising an uplink access configuration index, using the uplink access configuration index to identify an uplink access configuration from among a predetermined plurality of uplink access configurations, and transmitting to the wireless communications network according to the identified uplink access configuration. The example method further includes, in the same wireless device, receiving, in a first subframe, a first Orthogonal Frequency-Division Multiplexing (OFDM) transmission formatted according to a first numerology and receiving, in a second subframe, a second OFDM transmission formatted according to a second numerology, the second numerology differing from the first numerology. Variants of this method, corresponding apparatuses, and corresponding network-side methods and apparatuses are also disclosed.
    Type: Application
    Filed: January 2, 2024
    Publication date: December 19, 2024
    Inventors: Stefan Parkvall, Janne Peisa, Gunnar Mildh, Robert Baldemair, Stefan Wager, Jonas Kronander, Karl Werner, Richard Abrahamsson, Ismet Aktas, Peter Alriksson, Junaid Ansari, Shehzad Ali Ashraf, Henrik Asplund, Fredrik Athley, Håkan Axelsson, Joakim Axmon, Johan Axnäs, Kumar Balachandran, Gunnar Bark, Jan-Erik Berg, Andreas Bergström, Håkan Björkegren, Nadia Brahmi, Cagatay Capar, Anders Carlsson, Andreas Cedergren, Mikael Coldrey, Icaro L. J. da Silva, Erik Dahlman, Ali El Essaili, Ulrika Engström, Mårten Ericson, Erik Eriksson, Mikael Fallgren, Rui Fan, Gabor Fodor, Pål Frenger, Jonas Fridén, Jonas Fröberg Olsson, Anders Furuskär, Johan Furuskog, Virgile Garcia, Ather Gattami, Fredrik Gunnarsson, Ulf Gustavsson, Bo Hagerman, Fredrik Harrysson, Ning He, Martin Hessler, Kimmo Hiltunen, Songnam Hong, Dennis Hui, Jörg Huschke, Tim Irnich, Sven Jacobsson, Niklas Jaldén, Simon Järmyr, Zhiyuan Jiang, Martin Johansson, Niklas Johansson, Du Ho Kang, Eleftherios Karipidis, Patrik Karlsson, Ali S. Khayrallah, Caner Kilinc, Göran N. Klang, Sara Landström, Christina Larsson, Gen Li, Lars Lindbom, Robert Lindgren, Bengt Lindoff, Fredrik Lindqvist, Jinhua Liu, Thorsten Lohmar, Qianxi Lu, Lars Manholm, Ivana Maric, Jonas Medbo, Qingyu Miao, Reza Moosavi, Walter Müller, Elena Myhre, Karl Norrman, Bengt-Erik Olsson, Torgny Palenius, Sven Petersson, Jose Luis Pradas, Mikael Prytz, Olav Queseth, Pradeepa Ramachandra, Edgar Ramos, Andres Reial, Thomas Rimhagen, Emil Ringh, Patrik Rugeland, Johan Rune, Joachim Sachs, Henrik Sahlin, Vidit Saxena, Nima Seifi, Yngve Selén, Eliane Semaan, Sachin Sharma, Cong Shi, Johan Sköld, Magnus Stattin, Anders Stjernman, Dennis Sundman, Lars Sundström, Miurel Isabel Tercero Vargas, Claes Tidestav, Sibel Tombaz, Johan Torsner, Hugo Tullberg, Jari Vikberg, Peter von Wrycza, Thomas Walldeen, Pontus Wallentin, Hai Wang, Ke Wang Helmersson, Jianfeng Wang, Yi-Pin Eric Wang, Niclas Wiberg, Emma Wittenmark, Osman Nuri Can Yilmaz, Ali Zaidi, Zhan Zhang, Zhang Zhang, Yanli Zheng
  • Publication number: 20240422018
    Abstract: Devices, systems, methods, and processes for conducting sustainability-aware virtual meetings are described herein. When establishing virtual meetings, each of the participants can have various devices, locations, histories, and other data associated with them. This data can be packaged together as a user profile which can be transmitted to a virtual meeting service or a host that can receive the various user profiles and generate a meeting profile that can be utilized to maximize the overall sustainability of the virtual meeting. The meeting profile can include configuration suggestions that can be transmitted out to each corresponding device of the participants to either prompt or automatically adjust one or more settings, features, or other configuration, such as energy-saving features, that can increase the overall sustainability. These conditions can be monitored during the meeting and adjusted dynamically in response to changing conditions.
    Type: Application
    Filed: June 15, 2023
    Publication date: December 19, 2024
    Inventors: Carlos Pignataro, Nagendra Kumar Nainar
  • Publication number: 20240420523
    Abstract: Sensor data may be received from a plurality of sensors installed on a vehicle and characterizing driving conditions of the vehicle. The sensor data may be continuously stored in a ring buffer implemented using a random access memory (RAM). A recording trigger to record event data related to a driving event of the vehicle may be received. A subset of sensor data may be extracted from the ring buffer, based on the recording trigger. The subset of the sensor data may be recorded in an event file in a second memory.
    Type: Application
    Filed: October 27, 2022
    Publication date: December 19, 2024
    Inventors: Amiya Trivedi, Venkatesh Lakshmikanthan, Raj Umashankar Gupta, Alok Kumar Sinha