Patents by Inventor Noor Mohammed

Noor Mohammed has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11562459
    Abstract: A graphics pipeline includes a cache having cache lines that are configured to store data used to process frames in a graphics pipeline. The graphics pipeline is implemented using a processor that processes frames for the graphics pipeline using data stored in the cache. The processor processes a first frame and writes back a dirty cache line from the cache to a memory concurrently with processing of the first frame. The dirty cache line is retained in the cache and marked as clean subsequent to being written back to the memory. In some cases, the processor generates a hint that indicates a priority for writing back the dirty cache line based on a read command occupancy at a system memory controller.
    Type: Grant
    Filed: December 21, 2020
    Date of Patent: January 24, 2023
    Assignees: ADVANCED MICRO DEVICES, INC., ATI TECHNOLOGIES ULC
    Inventors: Noor Mohammed Saleem Bijapur, Ashish Khandelwal, Laurent Lefebvre, Anirudh R. Acharya
  • Publication number: 20220292309
    Abstract: A computer-implemented system, method and computer program product for capturing data transitions and selecting machine learning models that includes: providing a machine learning model trained with a previous training data set; receiving a new data set; comparing the new data set to the previous data set; and identifying and recording new, removed, and/or changed set of attributes added to the new data set. Future possible data state transitions are generated based upon the present data state; and an implication tree is generated based upon the present data state, the pass-through data states, and the future possible data state transitions. Performance metrics of each node in the implication tree are clustered, the nodes demonstrating a high variance optionally are discarded; reachability scores for remaining nodes are calculated; and a node (representing a machine learning model to run) is selected based upon its reachability score.
    Type: Application
    Filed: March 11, 2021
    Publication date: September 15, 2022
    Inventors: Noor Mohammed Ashrafi, Mohan Nagraj Dani, Balaji Rishi Sundarajan, Sharath C. Athrey
  • Publication number: 20220148048
    Abstract: A system, computer program product, and method are presented for leveraging structured data and unstructured data, and, more specifically, to ranking documentation from unstructured data sources through leveraging insights provided by the structured data to facilitate associated business risk inquiries. The method includes identifying, by researching subject business entities, one or more structured data sources that include relevant structured data directed to the subject business entities. The method also include extracting the relevant structured data directed toward the subject business entities and leveraging the relevant structured data to identify unstructured data sources. The method further includes identifying documents from the unstructured data sources that have relevant information, thereby identifying relevant unstructured data, and leveraging the relevant structured data to determine relationships with the relevant unstructured data.
    Type: Application
    Filed: November 9, 2020
    Publication date: May 12, 2022
    Inventors: Ankit Kumar Singh, Ratul Sarkar, Noor Mohammed Ashrafi, Srinivasan S. Muthuswamy
  • Publication number: 20210398242
    Abstract: A graphics pipeline includes a cache having cache lines that are configured to store data used to process frames in a graphics pipeline. The graphics pipeline is implemented using a processor that processes frames for the graphics pipeline using data stored in the cache. The processor processes a first frame and writes back a dirty cache line from the cache to a memory concurrently with processing of the first frame. The dirty cache line is retained in the cache and marked as clean subsequent to being written back to the memory. In some cases, the processor generates a hint that indicates a priority for writing back the dirty cache line based on a read command occupancy at a system memory controller.
    Type: Application
    Filed: December 21, 2020
    Publication date: December 23, 2021
    Inventors: Noor Mohammed Saleem BIJAPUR, Ashish KHANDELWAL, Laurent LEFEBVRE, Anirudh R. ACHARYA
  • Patent number: 9301094
    Abstract: Embodiments provide a method and system for tracking a position of an object. The method may include creating a plurality of geofences on a map of a predefined location and identifying, by Wi-Fi trilateration, the position of the object within the created geofence. Further, a floor layout of the predefined location may be created by a handheld device. The position of the object can be represented on the created floor layout.
    Type: Grant
    Filed: March 19, 2014
    Date of Patent: March 29, 2016
    Assignee: Infosys Limited
    Inventors: Manoj Vijaykumar Jajoo, Pavan Kumar Kulkarni, Archana Sachin Ghag, Noor Mohammed, Chandrasekhar Subrahmanya Darbha
  • Publication number: 20160028618
    Abstract: A method of communicating information over a network is described. The method comprises the steps of providing at least one traffic distribution controller arranged to communicate information between a source and a destination over the communications network. The controller is implemented to perform software-based routing based on a software defined networking paradigm. The method also comprises determining a plurality of routes between the source and the destination within the network and assigning a plurality of route quality values to each of the plurality of routes based on a determination of a plurality of qualities of each of the plurality of routes.
    Type: Application
    Filed: July 21, 2015
    Publication date: January 28, 2016
    Inventors: Ahmad Syamil WAHID, Jalil DESA, Noor Mohammed ASRAF, Wan Noorashikeen DAUD, Yante MOHD NOR
  • Patent number: 9246922
    Abstract: Access to customer relationship management (CRM) secured field instances is enabled based on field settings. A requester's identity determines action paths to be executed in order to enable access to fields. A client application's user privileges are inherited to enable access to secured fields. Such access through a granted privilege is provided through an API intermediating inheritance of user's privileges from client application.
    Type: Grant
    Filed: June 26, 2014
    Date of Patent: January 26, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Elliot Lewis, Andriy Smertin, Noor Mohammed Merchant, Mahesh Hariharan
  • Publication number: 20140325607
    Abstract: Access to customer relationship management (CRM) secured field instances is enabled based on field settings. A requester's identity determines action paths to be executed in order to enable access to fields. A client application's user privileges are inherited to enable access to secured fields. Such access through a granted privilege is provided through an API intermediating inheritance of user's privileges from client application.
    Type: Application
    Filed: June 26, 2014
    Publication date: October 30, 2014
    Inventors: Elliot Lewis, Andriy Smertin, Noor Mohammed Merchant, Mahesh Hariharan
  • Patent number: 8805882
    Abstract: Access to customer relationship management (CRM) secured field instances is enabled based on field settings. A requester's identity determines action paths to be executed in order to enable access to fields. A client application's user privileges are inherited to enable access to secured fields. Such access through a granted privilege is provided through an API intermediating inheritance of user's privileges from client application.
    Type: Grant
    Filed: January 20, 2011
    Date of Patent: August 12, 2014
    Assignee: Microsoft Corporation
    Inventors: Elliot Lewis, Andriy Smertin, Noor Mohammed Merchant, Mahesh Hariharan
  • Publication number: 20120191758
    Abstract: Access to customer relationship management (CRM) secured field instances is enabled based on field settings. A requester's identity determines action paths to be executed in order to enable access to fields. A client application's user privileges are inherited to enable access to secured fields. Such access through a granted privilege is provided through an API intermediating inheritance of user's privileges from client application.
    Type: Application
    Filed: January 20, 2011
    Publication date: July 26, 2012
    Applicant: Microsoft Corporation
    Inventors: Elliot Lewis, Andriy Smertin, Noor Mohammed Merchant, Mahesh Hariharan