Patents by Inventor Muhammad Rizwan
Muhammad Rizwan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12228090Abstract: An engine control system includes one or more oxygen (O2) sensors disposed proximate to a three-way catalytic converter (TWC) in an exhaust system of the vehicle, the one or more O2 sensors each configured to measure an O2 level of exhaust gas produced by the engine. A controller is in signal communication with the one or more O2 sensors and programmed to detect a fuel shut-off (FSO) event where the engine ceases providing fuel to the engine, determine an accumulated gas flow through the TWC during the FSO event, determine the FSO event has ended, initiate an open loop fuel enrichment mode where the engine is supplied with a first fuel enrichment level having a first rich fuel/air ratio, and subsequently initiate a closed loop fuel enrichment mode where the engine is supplied with a second fuel enrichment level having a second rich fuel/air ratio, to thereby reduce NOx emissions.Type: GrantFiled: December 1, 2023Date of Patent: February 18, 2025Assignee: FCA US LLCInventors: Mark E Ives, Kevin L Mason, Justin Neufeld, Simon O Omekanda, Muhammad Rizwan S Khan
-
Patent number: 12096705Abstract: A memory cell may include an active electrode, an inert electrode, and a dielectric positioned between them. A forward electrical bias between the electrodes may result in the formation of a conductive bridge between them. A reverse electrical bias may result in the dissolution of the conductive bridge. The memory cell may include nanotube structures formed within the dielectric, where the nanotube structures define columns between the active electrode and the inert electrode. A memory device may include multiple such conductive bridge memory cells. A method of forming a memory cell may include positioning an active electrode onto a substrate, positioning a dielectric layer onto the active electrode, forming nanotube structures within the dielectric layer while positioning the dielectric layer, where the nanotube structures define columns within the dielectric layer, and positioning an inert electrode onto the dielectric layer.Type: GrantFiled: December 3, 2020Date of Patent: September 17, 2024Assignee: Bosie State UniversityInventors: Maria Mitkova, Muhammad Rizwan Latif
-
Publication number: 20240232568Abstract: In some embodiments, a radio frequency identification (RFID) system may include at least one Ultra High Frequency (UHF) antenna component, a conductive loop having a largest dimension that is smaller than the wavelength of radiation transmitted at a Microwave Frequency (MW). The conductive loop may define a gap and an RFID chip may be electrically coupled to the conductive loop. The conductive loop may be configured to be resonant at an Ultra High Frequency (UHF) and less resonant at Microwave Frequency (MW). The antenna component may be selected from the group consisting of a dipole antenna, a monopole antenna, a loop antenna, or a slot antenna.Type: ApplicationFiled: June 24, 2022Publication date: July 11, 2024Inventors: Ian J. FORSTER, Norman A. HOWARD, Panagiotis PETRIDIS, Muhammad RIZWAN
-
Patent number: 11786913Abstract: The present disclosure describes a filtration device that includes a housing that includes a first tubular section connected to a second tubular section, wherein the first tubular section extends along a longitudinal axis and includes an open end that forms a fluid inlet of the housing, a closed end opposite the open end, and a connection opening positioned between the open and closed ends, and wherein the second tubular section includes a first open end connected to the connection opening of the first tubular section and a second open end that forms a fluid outlet of the housing; and a filter that is arranged inside of the first tubular section and that extends along the longitudinal axis of the first tubular section; wherein the filter includes an electromagnet configured to generate a magnetic field that surrounds at least the first tubular section and attracts metal contaminants in a fluid to the filter. A filter system is also described.Type: GrantFiled: May 14, 2021Date of Patent: October 17, 2023Assignee: Saudi Arabian Oil CompanyInventors: Taib Abang, Muhammad Rizwan Tariq, Mokhtarudin Abdul Razak, Mohammad Boobaid
-
Publication number: 20220381311Abstract: A wave spring unit comprising a plurality of annular wave-spring elements stacked vertically along an axial direction, which is characterized in that each of the annular wave spring elements of the wave spring unit comprises crest portion and trough portion formed alternately in a horizontal axial direction; said crest portion and trough portion of adjacent vertically annular wave spring elements are positioned opposite each other; said adjacent vertically annular wave spring elements have the same or different from each other in at least one physical parameter selected form a strip thickness, a strip diameter, a strip weight, strip shape, wave contact number, edge shape, overall shape of the spring and a combination of wave and helical spring; and the wave spring unit has a maximum compression up to 30.2 mm and is capable of bearing load up to 2680.2 N.Type: ApplicationFiled: May 18, 2021Publication date: December 1, 2022Inventors: Jeng-Ywan Jeng, Aamer Nazir, Muhammad Rizwan ul Haq
-
Publication number: 20220362782Abstract: The present disclosure describes a filtration device that includes a housing that includes a first tubular section connected to a second tubular section, wherein the first tubular section extends along a longitudinal axis and includes an open end that forms a fluid inlet of the housing, a closed end opposite the open end, and a connection opening positioned between the open and closed ends, and wherein the second tubular section includes a first open end connected to the connection opening of the first tubular section and a second open end that forms a fluid outlet of the housing; and a filter that is arranged inside of the first tubular section and that extends along the longitudinal axis of the first tubular section; wherein the filter includes an electromagnet configured to generate a magnetic field that surrounds at least the first tubular section and attracts metal contaminants in a fluid to the filter. A filter system is also described.Type: ApplicationFiled: May 14, 2021Publication date: November 17, 2022Inventors: Taib Abang, Muhammad Rizwan Tariq, Mokhtarudin Abdul Razak, Mohammad Boobaid
-
Publication number: 20220168472Abstract: Various embodiments are described herein for the fabrication enzyme degradable hydrogels useful as payload delivery systems. More particularly, embodiments disclosed herein relate to enzyme-degradable hydrogel systems comprising a crosslinkable polymer, such as a chemically-modified biopolymer, for example, chemically-modified gelatin, the hydrogel formed by a method comprising sequential physical and chemical crosslinking steps, for delivery of various payloads. Enzymes may be selected and administered to tune the release profile of the hydrogel. The payload can be, but not limited to, drugs, markers, cells, or these members encapsulated within another drug delivery such as a nanoparticle, or liposome. The hydrogel system can also be combined with another device such as a contact lens or bandage for wound healing.Type: ApplicationFiled: March 13, 2020Publication date: June 2, 2022Inventors: Susmita BOSE, John TSE, Muhammad RIZWAN, Evelyn YIM, Lyndon JONES, Chau-Minh PHAN
-
Patent number: 11210390Abstract: Techniques for efficient malicious content detection in plural versions of a software application are described. According to one embodiment, the computerized method includes installing a plurality of different versions of a software application concurrently within a virtual machine and selecting a subset of the plurality of versions of the software application that are concurrently installed within the virtual machine. Next, one or more software application versions of the subset of the plurality of versions of the software application are processed to access a potentially malicious content suspect within the virtual machine, without switching to another virtual machine. The behaviors of the potentially malicious content suspect during processing by the one or more software application versions are monitored to detect behaviors associated with a malicious attack.Type: GrantFiled: July 16, 2018Date of Patent: December 28, 2021Assignee: FireEye Security Holdings US LLCInventors: Yasir Khalid, Muhammad Amin, Emily Jing, Muhammad Rizwan
-
Publication number: 20210167284Abstract: A memory cell may include an active electrode, an inert electrode, and a dielectric positioned between them. A forward electrical bias between the electrodes may result in the formation of a conductive bridge between them. A reverse electrical bias may result in the dissolution of the conductive bridge. The memory cell may include nanotube structures formed within the dielectric, where the nanotube structures define columns between the active electrode and the inert electrode. A memory device may include multiple such conductive bridge memory cells. A method of forming a memory cell may include positioning an active electrode onto a substrate, positioning a dielectric layer onto the active electrode, forming nanotube structures within the dielectric layer while positioning the dielectric layer, where the nanotube structures define columns within the dielectric layer, and positioning an inert electrode onto the dielectric layer.Type: ApplicationFiled: December 3, 2020Publication date: June 3, 2021Inventors: Maria Mitkova, Muhammad Rizwan Latif
-
Patent number: 10853357Abstract: Systems and methods for querying a semantic data set are described. The semantic data set is defined by an ontology that represents a graphical relationship among data included in the semantic data set. One method includes receiving one or more keywords associated with a search operation from a user, and identifying a node associated with each of the one or more keywords. The method includes, for each identified node, tracing a path from the identified node to a root represented in the graphical relationship of the ontology, the path including one or more vertices, and identifying a lowest common ancestor of each of the vertices included in the paths for each identified node. The method includes constructing a subgraph connecting each identified node to the lowest common ancestor, and traversing the subgraph to generate a query in the query language executable against the semantic data set.Type: GrantFiled: September 11, 2017Date of Patent: December 1, 2020Assignee: University of Southern CaliforniaInventors: Muhammad Rizwan Saeed, Charalampos Chelmis, Viktor K. Prasanna
-
Patent number: 10284575Abstract: A system and method for automatically analyzing an object for malware is described. Operating one or more virtual machines, the system and method provide an analysis environment variation framework to provide a more robust analysis of an object for malware. The multi-application, multi-plugin processing framework is configured within a virtual machine, where the framework generates a plurality of processes for analyzing the object for malware and each of plurality of processes is configured with a different application and plug-in combination selected based in part on a type of object being analyzed.Type: GrantFiled: November 10, 2015Date of Patent: May 7, 2019Assignee: FireEye, Inc.Inventors: Sushant Paithane, Sai Vashisht, Yasir Khalid, Alexandre Pilipenko, Muhammad Rizwan
-
Patent number: 10025927Abstract: Techniques for efficient malicious content detection in plural versions of a software application are described. According to one embodiment, the computerized method includes installing a plurality of different versions of a software application concurrently within a virtual machine and selecting a subset of the plurality of versions of the software application that are concurrently installed within the virtual machine. Next, one or more software application versions of the subset of the plurality of versions of the software application are processed to access a potentially malicious content suspect within the virtual machine, without switching to another virtual machine. The behaviors of the potentially malicious content suspect during processing by the one or more software application versions are monitored to detect behaviors associated with a malicious attack.Type: GrantFiled: April 17, 2017Date of Patent: July 17, 2018Assignee: FireEye, Inc.Inventors: Yasir Khalid, Muhammad Amin, Emily Jing, Muhammad Rizwan
-
Publication number: 20180075161Abstract: Systems and methods for querying a semantic data set are described. The semantic data set is defined by an ontology that represents a graphical relationship among data included in the semantic data set. One method includes receiving one or more keywords associated with a search operation from a user, and identifying a node associated with each of the one or more keywords. The method includes, for each identified node, tracing a path from the identified node to a root represented in the graphical relationship of the ontology, the path including one or more vertices, and identifying a lowest common ancestor of each of the vertices included in the paths for each identified node. The method includes constructing a subgraph connecting each identified node to the lowest common ancestor, and traversing the subgraph to generate a query in the query language executable against the semantic data set.Type: ApplicationFiled: September 11, 2017Publication date: March 15, 2018Applicant: University of Southern CaliforniaInventors: Muhammad Rizwan Saeed, Charalampos Chelmis, Viktor K. Prasanna
-
Patent number: 9626509Abstract: Techniques for efficient and effective malicious content detection in plural versions of a software application are described herein. According to one embodiment, multiple versions of a software application are concurrently within a virtual machine (VM) executed within a data processing system. For each of the versions of the software application, a corresponding one of the versions is invoked to access a malicious content suspect within the VM without switching to another VM. The behaviors of each of the versions of the software application in response to the malicious content suspect is monitored to detect anomalous behavior indicative of malicious content in the malicious content suspect during execution of any of the versions of the software application. The detected anomalous behaviors, and, associated therewith, a version number corresponding to each of the versions of the software application whose execution resulted in the anomalous behavior are stored.Type: GrantFiled: March 13, 2013Date of Patent: April 18, 2017Assignee: FireEye, Inc.Inventors: Yasir Khalid, Muhammad Amin, Emily Jing, Muhammad Rizwan
-
Patent number: 9596851Abstract: A method for controlling growth of Red Palm Weevil includes administering to the Red Palm Weevil a composition including a pesticidally effective amount of coumarin and an agriculturally-acceptable carrier.Type: GrantFiled: December 18, 2015Date of Patent: March 21, 2017Assignee: KING FAISAL UNIVERSITYInventors: Ahmed Mohammed S. Al-Jabr, Abid Hussain, Muhammad Rizwan-Ul-Haq, Hassan Al-Ayedh
-
Publication number: 20150264017Abstract: A method for performing a remote control operation in a vehicle is provided. The method includes receiving, at telematics electronics of a vehicle, versions of a remote control command sent wirelessly to the vehicle by a dispatcher service. The versions of the remote control command are text-based messages encrypted by the dispatcher service using a first encryption mechanism. The method also includes decrypting the versions of the remote control command received from the dispatcher service into a plain text command. The method further includes encrypting the plain text command using a second encryption mechanism for use within the vehicle. The method additionally includes providing the command encrypted using the second encryption mechanism to another controller within the vehicle.Type: ApplicationFiled: March 14, 2014Publication date: September 17, 2015Applicants: HYUNDAI MOTOR COMPANY, HYUNDAI AMERICA TECHNICAL CENTER, INC., KIA MOTORS CORPORATIONInventors: Mustafa Saed, Muhammad Rizwan
-
Publication number: 20090298030Abstract: The inventive process named SWITCH is a unique teaching aid for students and teachers of biology to help them better understand the basic concepts and remove the ambiguities left behind by traditional teaching methods. It utilizes a portable ultrasound machine in a class room setting to obtain real time images of internal organs of human/animal body and project them on a big screen while the audience watches. The images so produced are not only vivid and multidimensional but also carry information like organ size, shape, texture, position and physical relationship to other organs in the body. In case of heart and blood vessels the real time images demonstrate exact function of chambers and valves and flow of blood in color from arterial to venous tree. The technique aims at fortifying truthful concepts of systems in a living body from the very basic to advanced levels of biology education.Type: ApplicationFiled: May 30, 2008Publication date: December 3, 2009Inventor: Muhammad Rizwan Haider
-
Patent number: D941279Type: GrantFiled: February 25, 2020Date of Patent: January 18, 2022Assignee: Avery Dennison Retail Information Services LLCInventor: Muhammad Rizwan
-
Patent number: D979542Type: GrantFiled: January 15, 2021Date of Patent: February 28, 2023Assignee: Avery Dennison Retail Information Services LLCInventors: Muhammad Rizwan, Panagiotis Petridis