Patents by Inventor Mohamed A. Ismail
Mohamed A. Ismail has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12117529Abstract: Techniques for determining errors or drifts between maps used for updating maps and/or controlling a system which uses the map. In some examples, a first, global, map may be received or determined. Sensor data may then be used to localize a system with respect to the first map and to generate a first trajectory relative to the first map. The sensor data may be used to create a second map and a second trajectory for navigating the system relative to the second map. Differences between the first and second trajectories (or portions thereof), when compared in a common reference frame, may be used as an indication of drift between various processes or errors in the maps and, subsequently, be used for updating the first map and/or controlling the system.Type: GrantFiled: June 22, 2022Date of Patent: October 15, 2024Assignee: Zoox, Inc.Inventors: Michael Carsten Bosse, Feroze Naina Mohamed Dheen Mohamed Ismail
-
Publication number: 20240281229Abstract: A set of construct-modification tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. Tags may incorporate properties, permissions, and generate notifications. Example tags include IGNORE, DEACTIVATE, OPTIMIZE, FIX, ALTERNATE, PROTOTYPE, REQUESTREVIEW, REVIEWED, CANDIDATE, and BESTCANDIDATE. Methods ensure that tags no longer remain in source code once the software development process enters the production phase.Type: ApplicationFiled: January 26, 2024Publication date: August 22, 2024Applicant: Zoho Corporation Private LimitedInventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj, Siba Mishra, Vanaja Ramaswamy, Padma J, Shalini Lakshmi A J, Sudheer A. Grandhi
-
Publication number: 20240281224Abstract: Construct-modification tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. A hierarchy of developers and associated permissions is maintained. A tag may be associated with one or more developers as well as one or more permissions. Notifications associated with tags may be issued to one or more developers in response to a conveyed compiler request. General messages to all the developers and personalized messages to one or more developers indicate the presence of tags and need to resolve issues before the software development process enters the production phase.Type: ApplicationFiled: January 26, 2024Publication date: August 22, 2024Applicant: Zoho Corporation Private LimitedInventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj, Siba Mishra, Vanaja Ramaswamy, Padma J, Shalini Lakshmi A J, Sudheer A. Grandhi
-
Publication number: 20240281225Abstract: Construct-modification tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. A CANDIDATE tag conveys a request to a compiler to identify multiple candidate constructs, compile each set of candidates or sets of multiple candidates into executables, and profile the compiled executables. Results of the profiling can be compared and a best candidate or set of candidates selected based on one or more of various criteria. A CANDIDATE tag may incorporate properties, permissions, and generate notifications. Methods ensure that tags no longer remain in source code once the software development process enters the production phase.Type: ApplicationFiled: January 26, 2024Publication date: August 22, 2024Applicant: Zoho Corporation Private LimitedInventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj
-
Publication number: 20240281230Abstract: Construct-modified tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. A REQUESTREVIEW tag conveys a request to a compiler to notify a reviewer that source code is ready for review. A REVIEWED tag indicates a review has been performed and may signify code acceptance. Alternatively, a FIX or OPTIMIZE tag may be used to identify further code development requirement. These tags may incorporate properties, permissions, and generate notifications. Methods may facilitate code review and feedback in other aspects. Methods ensure that tags no longer remain in source code once the software development process enters the production phase.Type: ApplicationFiled: January 26, 2024Publication date: August 22, 2024Applicant: Zoho Corporation Private LimitedInventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj, Siba Mishra, Vanaja Ramaswamy, Padma J, Shalini Lakshmi A J, Sudheer A. Grandhi
-
Publication number: 20240281228Abstract: Construct-modification tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. A FIX or OPTIMIZE tag identifies a construct to be altered. An ALTERNATE tag identifies an alternate construct to be compiled while ignoring a FIX or OPTIMIZE tagged construct of the same name. The alternate construct may be marked for ignoring once the other tagged construct of the name is fixed or optimized. Each tag may incorporate properties, permissions, and generate notifications. Methods ensure that tags no longer remain in source code once the software development process enters the production phase.Type: ApplicationFiled: January 26, 2024Publication date: August 22, 2024Applicant: Zoho Corporation Private LimitedInventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj
-
Publication number: 20240281223Abstract: Construct-modification tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. A DEACTIVATE tag conveys a request to a compiler to deactivate an associated construct, as well as to find and deactivate dependencies of the construct. A DEACTIVATE tag may incorporate properties, permissions, and generate notifications, including a condition for evaluation, the deactivation conditionally responsive to the result of the condition evaluation. Methods ensure that tags no longer remain in source code once the software development process enters the production phase.Type: ApplicationFiled: January 26, 2024Publication date: August 22, 2024Applicant: Zoho Corporation Private LimitedInventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj, Siba Mishra, Vanaja Ramaswamy, Padma J, Shalini Lakshmi A J, Sudheer A. Grandhi
-
Patent number: 12026108Abstract: Techniques are disclosed relating to controlling performance state of a memory element based on latency information for a processor. In some embodiments, a level of a memory hierarchy is configured to operate at multiple different performance states at different times. Processor circuitry may execute programs that generate requests to access the memory hierarchy. Bandwidth-based control circuitry may generate, based on bandwidth conditions for the processor circuitry, bandwidth performance state signals. Latency-based control circuitry may generate, based on latency information for processor requests to access the memory hierarchy, latency performance state signals. Performance control circuitry may control the performance state of the level of the memory hierarchy based on the bandwidth performance state signals and the latency performance state signals. Disclosed techniques may improve processor performance in certain operating scenarios.Type: GrantFiled: December 13, 2022Date of Patent: July 2, 2024Assignee: Apple Inc.Inventors: Karthik Ramani, Mohamed Ismail, Tian You Wang
-
Patent number: 11757700Abstract: A computing system receives, from a client device, a first request for access to a single page application associated with the computing system. A gateway of the computing system intercepts the first request before it reaches a shell service associated with the single page application. The gateway sends a second request for the single page application to the shell service. Based on the single page application request, the gateway determines that the shell service is experiencing a failure. Responsive to determining that the shell service is experiencing a failure, the gateway retrieves, from a content delivery network, a uniform resource locator (URL) associated with a time-lapse hypertext markup language (HTML) of the single page application. The gateway redirects the client device to the time-lapse HTML of the single page application using the URL.Type: GrantFiled: July 5, 2022Date of Patent: September 12, 2023Inventors: Venkatesan Murugesan, Karim Lakhani, Samy Mohamed Ismail Mohamed, Sarika N. Kale, Alexey Povkh, Hung T. Nguyen, Laurent Benchimol
-
Publication number: 20230033937Abstract: A computing system receives, from a client device, a first request for access to a single page application associated with the computing system. A gateway of the computing system intercepts the first request before it reaches a shell service associated with the single page application. The gateway sends a second request for the single page application to the shell service. Based on the single page application request, the gateway determines that the shell service is experiencing a failure. Responsive to determining that the shell service is experiencing a failure, the gateway retrieves, from a content delivery network, a uniform resource locator (URL) associated with a time-lapse hypertext markup language (HTML) of the single page application. The gateway redirects the client device to the time-lapse HTML of the single page application using the URL.Type: ApplicationFiled: July 5, 2022Publication date: February 2, 2023Applicant: INTUIT INC.Inventors: Venkatesan MURUGESAN, Karim Lakhani, Samy Mohamed Ismail Mohamed, Sarika N. Kale, Alexey Povkh, Hung T. Nguyen, Laurent Benchimol
-
Patent number: 11457025Abstract: A method and system for detecting and preventing data exfiltration attacks is disclosed. The system includes a manager device and an endpoint device, and an attack prevention device. The method includes detecting, at plurality of endpoint devices, downloads made at endpoint devices using Simple Network Management Protocol (SNMP) proxy. Next, the method includes mirroring network traffic associated with the downloads. The method further includes providing the mirrored network traffic as an input to a deep learning model, wherein the deep learning model detects presence of malware in the downloads. Finally, the method involves sending, by the manager device, an alert to one or more devices to prevent, recover, or mitigate data exfiltration attacks.Type: GrantFiled: May 17, 2019Date of Patent: September 27, 2022Assignee: GAVS Technologies Pvt. Ltd.Inventors: Balaji Venkat Venkataswami, Suri Parthasarathy, Chandramouleeswaran Sundaram, Ragavendran Selvaraj, Mohamed Ismail Ibrahim, Chandrasekar Balasubramanian
-
Patent number: 11411800Abstract: A computing system receives, from a client device, a first request for access to a single page application associated with the computing system. A gateway of the computing system intercepts the first request before it reaches a shell service associated with the single page application. The gateway sends a second request for the single page application to the shell service. Based on the single page application request, the gateway determines that the shell service is experiencing a failure. Responsive to determining that the shell service is experiencing a failure, the gateway retrieves, from a content delivery network, a uniform resource locator (URL) associated with a time-lapse hypertext markup language (HTML) of the single page application. The gateway redirects the client device to the time-lapse HTML of the single page application using the URL.Type: GrantFiled: July 28, 2021Date of Patent: August 9, 2022Assignee: INTUIT INC.Inventors: Venkatesan Murugesan, Karim Lakhani, Samy Mohamed Ismail Mohamed, Sarika N. Kale, Alexey Povkh, Hung T. Nguyen, Laurent Benchimol
-
Patent number: 10986213Abstract: A method and system for streaming management information base data using simple network management protocol is disclosed. The system includes a manager device and an endpoint device, which runs a SNMP agent and SNMP proxy. The SNMP proxy retrieves MIB data from the SNMP Agent associated with the endpoint device, wherein the MIB data comprises a full MIB sub-tree and differential MIB sub-trees. MIB views comprising MIB variables of interest associated with a full MIB sub-tree and differential MIB sub-trees are created based on a predetermined configuration. The SNMP proxy stores the MIB views and corresponding MIB data in a data store and compresses the MIB views and MIB data into files. Compressed file of the MIB view with MIB data associated with full MIB sub-tree are sent to the manager device in an initial stream. Further, the endpoint device streams compressed file of the MIB views with MIB data associated with the differential MIB sub-tree to the manager device on receiving a request.Type: GrantFiled: May 17, 2019Date of Patent: April 20, 2021Assignee: GAVS Technologies Pvt. Ltd.Inventors: Balaji Venkat Venkataswami, Suri Parthasarathy, Chandramouleeswaran Sundaram, Ragavendran Selvaraj, Mohamed Ismail Ibrahim, Chandrasekar Balasubramanian
-
Publication number: 20200267167Abstract: A method and system for detecting and preventing data exfiltration attacks is disclosed. The system includes a manager device and an endpoint device, and an attack prevention device. The method includes detecting, at plurality of endpoint devices, downloads made at endpoint devices using Simple Network Management Protocol (SNMP) proxy. Next, the method includes mirroring network traffic associated with the downloads. The method further includes providing the mirrored network traffic as an input to a deep learning model, wherein the deep learning model detects presence of malware in the downloads. Finally, the method involves sending, by the manager device, an alert to one or more devices to prevent, recover, or mitigate data exfiltration attacks.Type: ApplicationFiled: May 17, 2019Publication date: August 20, 2020Inventors: BALAJI VENKAT VENKATASWAMI, SURI PARTHASARATHY, CHANDRAMOULEESWARAN SUNDARAM, RAGAVENDRAN SELVARAJ, MOHAMED ISMAIL IBRAHIM, CHANDRASEKAR BALASUBRAMANIAN
-
Publication number: 20200244773Abstract: A method and system for streaming management information base data using simple network management protocol is disclosed. The system includes a manager device and an endpoint device, which runs a SNMP agent and SNMP proxy. The SNMP proxy retrieves MIB data from the SNMP Agent associated with the endpoint device, wherein the MIB data comprises a full MIB sub-tree and differential MIB sub-trees. MIB views comprising MIB variables of interest associated with a full MIB sub-tree and differential MIB sub-trees are created based on a predetermined configuration. The SNMP proxy stores the MIB views and corresponding MIB data in a data store and compresses the MIB views and MIB data into files. Compressed file of the MIB view with MIB data associated with full MIB sub-tree are sent to the manager device in an initial stream. Further, the endpoint device streams compressed file of the MIB views with MIB data associated with the differential MIB sub-tree to the manager device on receiving a request.Type: ApplicationFiled: May 17, 2019Publication date: July 30, 2020Inventors: BALAJI VENKAT VENKATASWAMI, SURI PARTHASARATHY, CHANDRAMOULEESWARAN SUNDARAM, RAGAVENDRAN SELVARAJ, MOHAMED ISMAIL IBRAHIM, CHANDRASEKAR BALASUBRAMANIAN
-
Publication number: 20190266310Abstract: The present disclosure generally relates to semiconductor structures and, more particularly, to rule check structures and methods of manufacture. The method includes matching, by a computing device, patterns in a design layer to approved patterns; determining, by the computing device, a similarity between at least one unmatched pattern and the approved patterns; and correcting, by the computing device, the at least one unmatched pattern to match a pattern with the closest similarity out of the approved patterns.Type: ApplicationFiled: February 26, 2018Publication date: August 29, 2019Inventors: Uwe P. SCHROEDER, Mohamed A.A. ISMAIL, Nikhil BUDDI
-
Publication number: 20190011180Abstract: The present invention is a separation unit process in which a high pressure section of a separation unit operates at a relatively high pressure to initially process and separate a high pressure feed stream and a low pressure section of the separation unit to initially process and separate a low pressure feed stream, where the high pressure section and the low pressure section are integral with and exchange streams to accomplish a desired separation of a wellhead fluid feed which typically includes a heavier portion of pentanes and heavier componentsType: ApplicationFiled: July 5, 2017Publication date: January 10, 2019Inventor: Hussein Mohamed Ismail Mostafa
-
Patent number: 10112730Abstract: One or more methods for remotely estimating a drone's weight during flying are contemplated. It is possible to utilize a long range laser Doppler Vibrometer or a remote optical surveillance system. In addition, it is possible to employ a method disclosed herein using physical signatures for identifying flight characteristics and manufacturers of different drones and for monitoring drones' degradation prior to failures as a condition based maintenance system. The present teachings are applicable to drones, helicopters, and all manned and unmanned aerial vehicles.Type: GrantFiled: March 12, 2018Date of Patent: October 30, 2018Inventor: Mohamed Alsayed Ahmed Mohamed Ismail
-
Publication number: 20180273208Abstract: One or more methods for remotely estimating a drone's weight during flying are contemplated. It is possible to utilize a long range laser Doppler Vibrometer or a remote optical surveillance system. In addition, it is possible to employ a method disclosed herein using physical signatures for identifying flight characteristics and manufacturers of different drones and for monitoring drones' degradation prior to failures as a condition based maintenance system. The present teachings are applicable to drones, helicopters, and all manned and unmanned aerial vehicles.Type: ApplicationFiled: March 12, 2018Publication date: September 27, 2018Inventor: Mohamed Alsayed Ahmed Mohamed Ismail
-
Patent number: 10081060Abstract: A method of reducing silver(I) salts to silver nanoparticles employing a carbohydrate reductant in the presence of an inorganic base, a surfactant and optionally a polymer. The method is performed in an aqueous solution at a temperature up to 60° C. and for a duration of up to 40 minutes.Type: GrantFiled: March 9, 2016Date of Patent: September 25, 2018Assignee: King Abdulaziz UniversityInventors: Hassan Amroun Ewais, Iqbal Mohamed Ismail