Patents by Inventor Mohamed A. Ismail

Mohamed A. Ismail has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12117529
    Abstract: Techniques for determining errors or drifts between maps used for updating maps and/or controlling a system which uses the map. In some examples, a first, global, map may be received or determined. Sensor data may then be used to localize a system with respect to the first map and to generate a first trajectory relative to the first map. The sensor data may be used to create a second map and a second trajectory for navigating the system relative to the second map. Differences between the first and second trajectories (or portions thereof), when compared in a common reference frame, may be used as an indication of drift between various processes or errors in the maps and, subsequently, be used for updating the first map and/or controlling the system.
    Type: Grant
    Filed: June 22, 2022
    Date of Patent: October 15, 2024
    Assignee: Zoox, Inc.
    Inventors: Michael Carsten Bosse, Feroze Naina Mohamed Dheen Mohamed Ismail
  • Publication number: 20240281229
    Abstract: A set of construct-modification tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. Tags may incorporate properties, permissions, and generate notifications. Example tags include IGNORE, DEACTIVATE, OPTIMIZE, FIX, ALTERNATE, PROTOTYPE, REQUESTREVIEW, REVIEWED, CANDIDATE, and BESTCANDIDATE. Methods ensure that tags no longer remain in source code once the software development process enters the production phase.
    Type: Application
    Filed: January 26, 2024
    Publication date: August 22, 2024
    Applicant: Zoho Corporation Private Limited
    Inventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj, Siba Mishra, Vanaja Ramaswamy, Padma J, Shalini Lakshmi A J, Sudheer A. Grandhi
  • Publication number: 20240281224
    Abstract: Construct-modification tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. A hierarchy of developers and associated permissions is maintained. A tag may be associated with one or more developers as well as one or more permissions. Notifications associated with tags may be issued to one or more developers in response to a conveyed compiler request. General messages to all the developers and personalized messages to one or more developers indicate the presence of tags and need to resolve issues before the software development process enters the production phase.
    Type: Application
    Filed: January 26, 2024
    Publication date: August 22, 2024
    Applicant: Zoho Corporation Private Limited
    Inventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj, Siba Mishra, Vanaja Ramaswamy, Padma J, Shalini Lakshmi A J, Sudheer A. Grandhi
  • Publication number: 20240281225
    Abstract: Construct-modification tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. A CANDIDATE tag conveys a request to a compiler to identify multiple candidate constructs, compile each set of candidates or sets of multiple candidates into executables, and profile the compiled executables. Results of the profiling can be compared and a best candidate or set of candidates selected based on one or more of various criteria. A CANDIDATE tag may incorporate properties, permissions, and generate notifications. Methods ensure that tags no longer remain in source code once the software development process enters the production phase.
    Type: Application
    Filed: January 26, 2024
    Publication date: August 22, 2024
    Applicant: Zoho Corporation Private Limited
    Inventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj
  • Publication number: 20240281230
    Abstract: Construct-modified tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. A REQUESTREVIEW tag conveys a request to a compiler to notify a reviewer that source code is ready for review. A REVIEWED tag indicates a review has been performed and may signify code acceptance. Alternatively, a FIX or OPTIMIZE tag may be used to identify further code development requirement. These tags may incorporate properties, permissions, and generate notifications. Methods may facilitate code review and feedback in other aspects. Methods ensure that tags no longer remain in source code once the software development process enters the production phase.
    Type: Application
    Filed: January 26, 2024
    Publication date: August 22, 2024
    Applicant: Zoho Corporation Private Limited
    Inventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj, Siba Mishra, Vanaja Ramaswamy, Padma J, Shalini Lakshmi A J, Sudheer A. Grandhi
  • Publication number: 20240281228
    Abstract: Construct-modification tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. A FIX or OPTIMIZE tag identifies a construct to be altered. An ALTERNATE tag identifies an alternate construct to be compiled while ignoring a FIX or OPTIMIZE tagged construct of the same name. The alternate construct may be marked for ignoring once the other tagged construct of the name is fixed or optimized. Each tag may incorporate properties, permissions, and generate notifications. Methods ensure that tags no longer remain in source code once the software development process enters the production phase.
    Type: Application
    Filed: January 26, 2024
    Publication date: August 22, 2024
    Applicant: Zoho Corporation Private Limited
    Inventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj
  • Publication number: 20240281223
    Abstract: Construct-modification tags conveying development-phase compiler requests are introduced into source code to facilitate communication between developers, identify areas that need developer attention, send directives to a compiler, and other development features in an integrated development environment, during the software development phase. A DEACTIVATE tag conveys a request to a compiler to deactivate an associated construct, as well as to find and deactivate dependencies of the construct. A DEACTIVATE tag may incorporate properties, permissions, and generate notifications, including a condition for evaluation, the deactivation conditionally responsive to the result of the condition evaluation. Methods ensure that tags no longer remain in source code once the software development process enters the production phase.
    Type: Application
    Filed: January 26, 2024
    Publication date: August 22, 2024
    Applicant: Zoho Corporation Private Limited
    Inventors: Sridhar Vembu, Akshhayaa S, Joseph Sathya Kumar, Balamurugan K E, Suresh Kumar R, Mohamed Ismail Kaja Mydeen, Ramesh Kumar Govindaraj, Siba Mishra, Vanaja Ramaswamy, Padma J, Shalini Lakshmi A J, Sudheer A. Grandhi
  • Patent number: 12026108
    Abstract: Techniques are disclosed relating to controlling performance state of a memory element based on latency information for a processor. In some embodiments, a level of a memory hierarchy is configured to operate at multiple different performance states at different times. Processor circuitry may execute programs that generate requests to access the memory hierarchy. Bandwidth-based control circuitry may generate, based on bandwidth conditions for the processor circuitry, bandwidth performance state signals. Latency-based control circuitry may generate, based on latency information for processor requests to access the memory hierarchy, latency performance state signals. Performance control circuitry may control the performance state of the level of the memory hierarchy based on the bandwidth performance state signals and the latency performance state signals. Disclosed techniques may improve processor performance in certain operating scenarios.
    Type: Grant
    Filed: December 13, 2022
    Date of Patent: July 2, 2024
    Assignee: Apple Inc.
    Inventors: Karthik Ramani, Mohamed Ismail, Tian You Wang
  • Patent number: 11757700
    Abstract: A computing system receives, from a client device, a first request for access to a single page application associated with the computing system. A gateway of the computing system intercepts the first request before it reaches a shell service associated with the single page application. The gateway sends a second request for the single page application to the shell service. Based on the single page application request, the gateway determines that the shell service is experiencing a failure. Responsive to determining that the shell service is experiencing a failure, the gateway retrieves, from a content delivery network, a uniform resource locator (URL) associated with a time-lapse hypertext markup language (HTML) of the single page application. The gateway redirects the client device to the time-lapse HTML of the single page application using the URL.
    Type: Grant
    Filed: July 5, 2022
    Date of Patent: September 12, 2023
    Inventors: Venkatesan Murugesan, Karim Lakhani, Samy Mohamed Ismail Mohamed, Sarika N. Kale, Alexey Povkh, Hung T. Nguyen, Laurent Benchimol
  • Publication number: 20230033937
    Abstract: A computing system receives, from a client device, a first request for access to a single page application associated with the computing system. A gateway of the computing system intercepts the first request before it reaches a shell service associated with the single page application. The gateway sends a second request for the single page application to the shell service. Based on the single page application request, the gateway determines that the shell service is experiencing a failure. Responsive to determining that the shell service is experiencing a failure, the gateway retrieves, from a content delivery network, a uniform resource locator (URL) associated with a time-lapse hypertext markup language (HTML) of the single page application. The gateway redirects the client device to the time-lapse HTML of the single page application using the URL.
    Type: Application
    Filed: July 5, 2022
    Publication date: February 2, 2023
    Applicant: INTUIT INC.
    Inventors: Venkatesan MURUGESAN, Karim Lakhani, Samy Mohamed Ismail Mohamed, Sarika N. Kale, Alexey Povkh, Hung T. Nguyen, Laurent Benchimol
  • Patent number: 11457025
    Abstract: A method and system for detecting and preventing data exfiltration attacks is disclosed. The system includes a manager device and an endpoint device, and an attack prevention device. The method includes detecting, at plurality of endpoint devices, downloads made at endpoint devices using Simple Network Management Protocol (SNMP) proxy. Next, the method includes mirroring network traffic associated with the downloads. The method further includes providing the mirrored network traffic as an input to a deep learning model, wherein the deep learning model detects presence of malware in the downloads. Finally, the method involves sending, by the manager device, an alert to one or more devices to prevent, recover, or mitigate data exfiltration attacks.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: September 27, 2022
    Assignee: GAVS Technologies Pvt. Ltd.
    Inventors: Balaji Venkat Venkataswami, Suri Parthasarathy, Chandramouleeswaran Sundaram, Ragavendran Selvaraj, Mohamed Ismail Ibrahim, Chandrasekar Balasubramanian
  • Patent number: 11411800
    Abstract: A computing system receives, from a client device, a first request for access to a single page application associated with the computing system. A gateway of the computing system intercepts the first request before it reaches a shell service associated with the single page application. The gateway sends a second request for the single page application to the shell service. Based on the single page application request, the gateway determines that the shell service is experiencing a failure. Responsive to determining that the shell service is experiencing a failure, the gateway retrieves, from a content delivery network, a uniform resource locator (URL) associated with a time-lapse hypertext markup language (HTML) of the single page application. The gateway redirects the client device to the time-lapse HTML of the single page application using the URL.
    Type: Grant
    Filed: July 28, 2021
    Date of Patent: August 9, 2022
    Assignee: INTUIT INC.
    Inventors: Venkatesan Murugesan, Karim Lakhani, Samy Mohamed Ismail Mohamed, Sarika N. Kale, Alexey Povkh, Hung T. Nguyen, Laurent Benchimol
  • Patent number: 10986213
    Abstract: A method and system for streaming management information base data using simple network management protocol is disclosed. The system includes a manager device and an endpoint device, which runs a SNMP agent and SNMP proxy. The SNMP proxy retrieves MIB data from the SNMP Agent associated with the endpoint device, wherein the MIB data comprises a full MIB sub-tree and differential MIB sub-trees. MIB views comprising MIB variables of interest associated with a full MIB sub-tree and differential MIB sub-trees are created based on a predetermined configuration. The SNMP proxy stores the MIB views and corresponding MIB data in a data store and compresses the MIB views and MIB data into files. Compressed file of the MIB view with MIB data associated with full MIB sub-tree are sent to the manager device in an initial stream. Further, the endpoint device streams compressed file of the MIB views with MIB data associated with the differential MIB sub-tree to the manager device on receiving a request.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: April 20, 2021
    Assignee: GAVS Technologies Pvt. Ltd.
    Inventors: Balaji Venkat Venkataswami, Suri Parthasarathy, Chandramouleeswaran Sundaram, Ragavendran Selvaraj, Mohamed Ismail Ibrahim, Chandrasekar Balasubramanian
  • Publication number: 20200267167
    Abstract: A method and system for detecting and preventing data exfiltration attacks is disclosed. The system includes a manager device and an endpoint device, and an attack prevention device. The method includes detecting, at plurality of endpoint devices, downloads made at endpoint devices using Simple Network Management Protocol (SNMP) proxy. Next, the method includes mirroring network traffic associated with the downloads. The method further includes providing the mirrored network traffic as an input to a deep learning model, wherein the deep learning model detects presence of malware in the downloads. Finally, the method involves sending, by the manager device, an alert to one or more devices to prevent, recover, or mitigate data exfiltration attacks.
    Type: Application
    Filed: May 17, 2019
    Publication date: August 20, 2020
    Inventors: BALAJI VENKAT VENKATASWAMI, SURI PARTHASARATHY, CHANDRAMOULEESWARAN SUNDARAM, RAGAVENDRAN SELVARAJ, MOHAMED ISMAIL IBRAHIM, CHANDRASEKAR BALASUBRAMANIAN
  • Publication number: 20200244773
    Abstract: A method and system for streaming management information base data using simple network management protocol is disclosed. The system includes a manager device and an endpoint device, which runs a SNMP agent and SNMP proxy. The SNMP proxy retrieves MIB data from the SNMP Agent associated with the endpoint device, wherein the MIB data comprises a full MIB sub-tree and differential MIB sub-trees. MIB views comprising MIB variables of interest associated with a full MIB sub-tree and differential MIB sub-trees are created based on a predetermined configuration. The SNMP proxy stores the MIB views and corresponding MIB data in a data store and compresses the MIB views and MIB data into files. Compressed file of the MIB view with MIB data associated with full MIB sub-tree are sent to the manager device in an initial stream. Further, the endpoint device streams compressed file of the MIB views with MIB data associated with the differential MIB sub-tree to the manager device on receiving a request.
    Type: Application
    Filed: May 17, 2019
    Publication date: July 30, 2020
    Inventors: BALAJI VENKAT VENKATASWAMI, SURI PARTHASARATHY, CHANDRAMOULEESWARAN SUNDARAM, RAGAVENDRAN SELVARAJ, MOHAMED ISMAIL IBRAHIM, CHANDRASEKAR BALASUBRAMANIAN
  • Publication number: 20190266310
    Abstract: The present disclosure generally relates to semiconductor structures and, more particularly, to rule check structures and methods of manufacture. The method includes matching, by a computing device, patterns in a design layer to approved patterns; determining, by the computing device, a similarity between at least one unmatched pattern and the approved patterns; and correcting, by the computing device, the at least one unmatched pattern to match a pattern with the closest similarity out of the approved patterns.
    Type: Application
    Filed: February 26, 2018
    Publication date: August 29, 2019
    Inventors: Uwe P. SCHROEDER, Mohamed A.A. ISMAIL, Nikhil BUDDI
  • Publication number: 20190011180
    Abstract: The present invention is a separation unit process in which a high pressure section of a separation unit operates at a relatively high pressure to initially process and separate a high pressure feed stream and a low pressure section of the separation unit to initially process and separate a low pressure feed stream, where the high pressure section and the low pressure section are integral with and exchange streams to accomplish a desired separation of a wellhead fluid feed which typically includes a heavier portion of pentanes and heavier components
    Type: Application
    Filed: July 5, 2017
    Publication date: January 10, 2019
    Inventor: Hussein Mohamed Ismail Mostafa
  • Patent number: 10112730
    Abstract: One or more methods for remotely estimating a drone's weight during flying are contemplated. It is possible to utilize a long range laser Doppler Vibrometer or a remote optical surveillance system. In addition, it is possible to employ a method disclosed herein using physical signatures for identifying flight characteristics and manufacturers of different drones and for monitoring drones' degradation prior to failures as a condition based maintenance system. The present teachings are applicable to drones, helicopters, and all manned and unmanned aerial vehicles.
    Type: Grant
    Filed: March 12, 2018
    Date of Patent: October 30, 2018
    Inventor: Mohamed Alsayed Ahmed Mohamed Ismail
  • Publication number: 20180273208
    Abstract: One or more methods for remotely estimating a drone's weight during flying are contemplated. It is possible to utilize a long range laser Doppler Vibrometer or a remote optical surveillance system. In addition, it is possible to employ a method disclosed herein using physical signatures for identifying flight characteristics and manufacturers of different drones and for monitoring drones' degradation prior to failures as a condition based maintenance system. The present teachings are applicable to drones, helicopters, and all manned and unmanned aerial vehicles.
    Type: Application
    Filed: March 12, 2018
    Publication date: September 27, 2018
    Inventor: Mohamed Alsayed Ahmed Mohamed Ismail
  • Patent number: 10081060
    Abstract: A method of reducing silver(I) salts to silver nanoparticles employing a carbohydrate reductant in the presence of an inorganic base, a surfactant and optionally a polymer. The method is performed in an aqueous solution at a temperature up to 60° C. and for a duration of up to 40 minutes.
    Type: Grant
    Filed: March 9, 2016
    Date of Patent: September 25, 2018
    Assignee: King Abdulaziz University
    Inventors: Hassan Amroun Ewais, Iqbal Mohamed Ismail