Patents by Inventor Mike ZHANG
Mike ZHANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11939244Abstract: Methods and systems for electrochemical treatment of fertigation water for use and for recycling in agricultural systems such as in controlled environment agricultural systems.Type: GrantFiled: November 5, 2019Date of Patent: March 26, 2024Assignee: UNIVERSITY OF GUELPHInventors: Serge Levesque, Thomas Graham, Dorin Bejan, Jamie Lawson, Mike Dixon, Ping Zhang
-
Patent number: 11913736Abstract: A heater includes a flow guide and a plurality of electrical resistance heating elements. The flow guide defines a continuous geometric helicoid disposed about a longitudinal axis of the heater assembly. The flow guide defines a predetermined pattern of perforations that extend in a longitudinal direction through a first longitudinal length of the geometric helicoid, the longitudinal direction being parallel to the longitudinal axis. The plurality of electrical resistance heating elements extend through the perforations. At least one electrical resistance heating element of the plurality of electrical resistance heating elements has a first region with a first watt density and a second region with a second watt density. The second region is located farther in the longitudinal direction than the first region. The second watt density is less than the first watt density.Type: GrantFiled: September 28, 2022Date of Patent: February 27, 2024Assignee: Watlow Electric Manufacturing CompanyInventors: Satya Tatavarthy, Ethan Dinauer, Sanhong Zhang, Scott H. Boehmer, Scott Yarbrough, Troy Ruben Bolton, John Lilleland, Jacob Wilson, Mike Bange, Mark D. Everly
-
Patent number: 11537934Abstract: Embodiments herein provide for a machine learning algorithm that generates models that are more interpretable and transparent than existing machine learning approaches. These embodiments identify, at a record level, the effect of individual input variables on the machine learning model. To provide those improvements, a reason code generator assigns monotonic relationships to a series of input variables, which are then incorporated into the machine learning algorithm as metadata. In some embodiments, the reason code generator creates records based on the monotonic relationships, which are used by the machine learning algorithm to generate predicted values. The reason code generator compares an original predicted value from the machine learning model to the predicted values from the machine learning model.Type: GrantFiled: September 20, 2018Date of Patent: December 27, 2022Assignee: Bluestem Brands, Inc.Inventors: Marick Sinay, Damien Benveniste, Peng Jiang, Philip Remmele, Junqing Wu, Mike Zhang
-
Patent number: 11138650Abstract: Embodiments are directed to manufacturing footwear. A first outer mold shell and a second outer mold shell may be provided. A first inner mold body and a second inner mold body may be manufactured. The first and second inner mold bodies may have respective first and second inner mold surfaces. The second inner mold surface, together with the first inner mold surface, may define an internal mold volume. The first and second inner mold bodies may be removably coupled to the respective first and second outer mold shells to form first and second hybrid side rings. The first hybrid side ring and the second hybrid side ring may be installed in an automated injection molding machine. The installed first hybrid side ring may be moved toward the installed second hybrid side ring to provide the internal mold volume. One or more liquids may be injected into the internal mold volume.Type: GrantFiled: October 25, 2018Date of Patent: October 5, 2021Assignee: SUPERFEET WORLDWIDE, INC.Inventors: Eric Paris Hayes, Mike Zhang, Daniel Wakeland
-
Publication number: 20200097439Abstract: Embodiments herein provide for a machine learning algorithm that generates models that are more interpretable and transparent than existing machine learning approaches. These embodiments identify, at a record level, the effect of individual input variables on the machine learning model. To provide those improvements, a reason code generator assigns monotonic relationships to a series of input variables, which are then incorporated into the machine learning algorithm as metadata. In some embodiments, the reason code generator creates records based on the monotonic relationships, which are used by the machine learning algorithm to generate predicted values. The reason code generator compares an original predicted value from the machine learning model to the predicted values from the machine learning model.Type: ApplicationFiled: September 20, 2018Publication date: March 26, 2020Inventors: Marick Sinay, Damien Benveniste, Peng Jiang, Philip Remmele, Junqing Wu, Mike Zhang
-
Publication number: 20190073709Abstract: Embodiments are directed to manufacturing footwear. A first outer mold shell and a second outer mold shell may be provided. A first inner mold body and a second inner mold body may be manufactured. The first and second inner mold bodies may have respective first and second inner mold surfaces. The second inner mold surface, together with the first inner mold surface, may define an internal mold volume. The first and second inner mold bodies may be removably coupled to the respective first and second outer mold shells to form first and second hybrid side rings. The first hybrid side ring and the second hybrid side ring may be installed in an automated injection molding machine. The installed first hybrid side ring may be moved toward the installed second hybrid side ring to provide the internal mold volume. One or more liquids may be injected into the internal mold volume.Type: ApplicationFiled: October 25, 2018Publication date: March 7, 2019Inventors: Eric Paris Hayes, Mike Zhang, Daniel Wakeland
-
Patent number: 9514201Abstract: A system has a repository that stores a plurality of events. Each event requests to utilize one or more functions in a component. An event sequencing module analyzes an event sequencing key of the event if the event requests a function having a component definition that includes an event sequence qualifier. The event sequencing module grants a lock to the event for the function if no other event having the same value for the event sequencing key has the lock for the function. The event sequencing module prevents the event from being processed if another event having the same value for the event sequencing key has the lock for the function. The event sequencing key is composed of one or more object attributes. The system has a worker server that receives the event, if the event obtains the lock, and processes the function requested by the event.Type: GrantFiled: October 13, 2006Date of Patent: December 6, 2016Assignee: International Business Machines CorporationInventors: Atul R. Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Patent number: 9274857Abstract: A computer program product is disclosed. The computer program product includes a computer useable medium that has a computer readable program. The computer readable program when executive on a computer causes the computer to receive a request from a component to invoke a function. Further, the computer readable program, when executed on a computer, causes the computer to asynchronously perform the function according to the request. In addition, the computer readable program, when executed on a computer, causes the computer to provide, to one or more programs, an indication that the function has completed work according to the request.Type: GrantFiled: October 13, 2006Date of Patent: March 1, 2016Assignee: International Business Machines CorporationInventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Publication number: 20150317482Abstract: Users can hide content normally displayed on a mobile device screen and read or view content by touching the screen and creating a path, for example, in the shape of a circle, in which a portion of the content can be viewed. The content is hidden by a particle layer. A “hole” into the particle layer and a ghost layer is used to view content normally shown in a table view. Embodiments of the present invention allow a user to view partial content in a table (message) view, such as part of a text message, through a pre-defined area, such as a circle, square or any other shape the designer chooses while covering the other content on the screen.Type: ApplicationFiled: April 29, 2015Publication date: November 5, 2015Inventors: James BLAISDELL, Mike ZHANG
-
Patent number: 9047144Abstract: A system and method for providing Quality-of-Service (QoS) functions to concurrent event-processing applications in a multi-processing database environment are described. The system includes an Event-Listener interface for determining the QoS functions applicable to the events being processed and an Event-Service interface for invoking the determined QoS functions. The Event-Service interface loads, initializes and activates the QoS functions. The QoS functions are based on service definitions. The Event-Service interface further initializes the service providers and sends the events that need QoS support to the respective service providers for processing. The QoS functions include the services commonly needed in a clustered event-processing database system like Event-Sequencing, Event-Isolation, High-Availability, Event-Filtering and Flow-Control. Other QoS functions might be added to the database system using the same interfaces provided by the invention.Type: GrantFiled: November 4, 2009Date of Patent: June 2, 2015Assignee: International Business Machines CorporationInventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Patent number: 8549144Abstract: Provided are a method, system, and article of manufacture for a common configuration framework for applications to configure database objects and resources. configuration interfaces are maintained for a plurality of different database types, wherein each configuration interface implements a database configuration operation with respect to a database of one database type. A configuration request is received from an application indicating a database type, database name, and a database configuration operation. A determination is made of one of the configuration interfaces for the requested database type to implement the requested configuration operation with respect to the database having the database name. The determined configuration interface is invoked with the requested database name to perform the requested configuration operation with respect to the database name.Type: GrantFiled: August 31, 2007Date of Patent: October 1, 2013Assignee: International Business Machines CorporationInventors: Manoj Khangaonkar, Wen Chao Li, Weixin Xu, Kai Mike Zhang
-
Patent number: 8392700Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: GrantFiled: July 2, 2008Date of Patent: March 5, 2013Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Patent number: 8352912Abstract: A computer program product is provided. The computer program product includes a computer useable medium having a computer readable program. The computer readable program when executed on a computer causes the computer to generate a topology role in a topology role tier that is included in a topology pattern. Further, the computer readable program when executed on a computer causes the computer to create a component in a component tier that is defined in the topology pattern such that the component corresponds to the topology role. In addition, the computer readable program when executed on a computer causes the computer to map the topology role to a deployment target.Type: GrantFiled: December 15, 2008Date of Patent: January 8, 2013Assignee: International Business Machines CorporationInventors: Mandar Ganesh Bhatkhande, Srikanth Bhattiprolu, Atul Ravindra Daherkar, Thomas Pollinger, Charles James Redlin, Chidanandan Theyancheri, Kai Mike Zhang
-
Publication number: 20110107354Abstract: A system and method for providing Quality-of-Service (QoS) functions to concurrent event-processing applications in a multi-processing database environment are described. The system includes an Event-Listener interface for determining the QoS functions applicable to the events being processed and an Event-Service interface for invoking the determined QoS functions. The Event-Service interface loads, initializes and activates the QoS functions. The QoS functions are based on service definitions. The Event-Service interface further initializes the service providers and sends the events that need QoS support to the respective service providers for processing. The QoS functions include the services commonly needed in a clustered event-processing database system like Event-Sequencing, Event-Isolation, High-Availability, Event-Filtering and Flow-Control. Other QoS functions might be added to the database system using the same interfaces provided by the invention.Type: ApplicationFiled: November 4, 2009Publication date: May 5, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Patent number: 7895602Abstract: Provided are a system and article of manufacture for duplicate message elimination during recovery when multiple threads are delivering messages from a message store to a destination queue. A plurality of message threads process operations to deliver messages from a message store to a destination queue, wherein one message thread processes one message. An in-doubt list is generated identifying messages that are in-progress of being delivered form the message store to the destination queue by the message threads. One message thread processing one message adds an entry including the message identifier and the thread identifier to a monitor queue. The message thread further adds the message to the destination queue. A recovery thread is generated in response to detecting a failure in the processing by the threads to deliver the messages from the message store to the destination queue.Type: GrantFiled: November 25, 2008Date of Patent: February 22, 2011Assignee: International Business Machines CorporationInventors: Kenneth L. Astl, Subramanyam Agraharam Gooty, Arul Sundaramurthy, Kai Mike Zhang
-
Publication number: 20100153164Abstract: A system and method for business calendar event modeling comprises receiving a plurality of events from a computerized calendar user wherein each event is classified as an OnTime, OffTime or OtherTime event. Wherein, an OnTime event is defined as a calendar period where the calendar user is available, an OffTime event is defined as a calendar period where the calendar user is unavailable; and an OtherTime event is defined as a calendar period unrelated to the calendar user's availability. Then, calculating the calendar user's net OnTime, wherein net OnTime is a sum of periods of a day wherein an OnTime event period does not overlap with an OffTime event period. Also, calculating user available days wherein a user available day is a day having net OnTime. Calculating the number of user available days, hours and minutes before an event.Type: ApplicationFiled: December 11, 2008Publication date: June 17, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Atul Ravindra DAHERKAR, Manoj KHANGAONKAR, Chidanandan THEYANCHERI, Kai Mike ZHANG
-
Publication number: 20100153916Abstract: A computer program product is provided. The computer program product includes a computer useable medium having a computer readable program. The computer readable program when executed on a computer causes the computer to generate a topology role in a topology role tier that is included in a topology pattern. Further, the computer readable program when executed on a computer causes the computer to create a component in a component tier that is defined in the topology pattern such that the component corresponds to the topology role. In addition, the computer readable program when executed on a computer causes the computer to map the topology role to a deployment target.Type: ApplicationFiled: December 15, 2008Publication date: June 17, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mandar Ganesh Bhatkhande, Srikanth Bhattiprolu, Atul Ravindra Daherkar, Thomas Pollinger, Charles James Redlin, Chidanandan Theyancheri, Kai Mike Zhang
-
Patent number: 7644266Abstract: An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.Type: GrantFiled: September 23, 2004Date of Patent: January 5, 2010Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Patent number: 7607006Abstract: A method is disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The method includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: GrantFiled: September 23, 2004Date of Patent: October 20, 2009Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Publication number: 20090119680Abstract: Provided are a system and article of manufacture for duplicate message elimination during recovery when multiple threads are delivering messages from a message store to a destination queue. A plurality of message threads process operations to deliver messages from a message store to a destination queue, wherein one message thread processes one message. An in-doubt list is generated identifying messages that are in-progress of being delivered form the message store to the destination queue by the message threads. One message thread processing one message adds an entry including the message identifier and the thread identifier to a monitor queue. The message thread further adds the message to the destination queue. A recovery thread is generated in response to detecting a failure in the processing by the threads to deliver the messages from the message store to the destination queue.Type: ApplicationFiled: November 25, 2008Publication date: May 7, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kenneth L. ASTL, Subramanyam Agraharam GOOTY, Arul SUNDARAMURTHY, Kai Mike ZHANG