Patents by Inventor Sivakumar Narayanan

Sivakumar Narayanan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11459676
    Abstract: Automatic operation of a ring spinning system containing a ring spinning machine having spinning positions and a winding machine having winding positions. Yarn is spun at one of the spinning positions and wound up to a cop. Values of a parameter characteristic for the operation of the spinning position are determined during the winding of the cop and stored as spinning data that is assigned to the cop. The spinning data assigned to the cop is taken into account when deciding whether to feed the cop after it has been set down to one of the winding positions. The assignment is based on an identification of a point in time of winding of the cop and an identification of the spinning position at which the cop was wound.
    Type: Grant
    Filed: May 27, 2019
    Date of Patent: October 4, 2022
    Assignee: Uster Technologies AG
    Inventors: Vasileios Archontopoulos, Sivakumar Narayanan, Peter Schmid, Kurt Eggimann, Paul Geiter
  • Patent number: 11319649
    Abstract: A method to operate a ring spinning system containing a ring spinning machine having spinning positions and a winding machine having winding positions. Yarn is spun at the spinning position and wound to a cop. Values of a spinning parameter are determined at different times during the winding of the cop and stored as spinning data. The cop is transported from the spinning position to the winding position, where the yarn is rewound from the cop onto a bobbin. Values of a yarn parameter are determined at at least two different times during the rewinding, and stored as yarn data. The spinning data and the yarn data are assigned to each other such that they relate to the same yarn section. Based on the spinning data and yarn data assigned, an intervention is made on the ring spinning machine.
    Type: Grant
    Filed: May 27, 2019
    Date of Patent: May 3, 2022
    Assignee: Uster Technologies AG
    Inventors: Vasileios Archontopoulos, Sivakumar Narayanan, Andreas Birsner, Kurt Eggimann, Paul Geiter
  • Publication number: 20220036414
    Abstract: Methods, systems, and computer program products for product description-based line item matching are provided herein. A computer-implemented method includes obtaining a digital invoice from a vendor comprising one or more text descriptions; retrieving a purchase order corresponding to the digital invoice from a purchase order database, wherein the purchase order comprises one or more line items; applying an out-of-vendor vocabulary model to the one or more text descriptions, wherein the out-of-vendor vocabulary model is trained to remove irrelevant text from the text descriptions based at least in part on historical purchase orders stored in the purchase order database corresponding to the vendor; and matching the one or more text descriptions from the digital invoice to the one or more line items in the purchase order based at least in part on output of the out-of-vendor vocabulary model.
    Type: Application
    Filed: July 30, 2020
    Publication date: February 3, 2022
    Inventors: Sampath Dechu, Neelamadhav Gantayat, Harshit Rawat, Sivakumar Narayanan
  • Publication number: 20210164132
    Abstract: The method is used for the automatic operation of a ring spinning system (1) which contains a ring spinning machine (2) having a plurality of spinning positions (21) and a winding machine (3) having a plurality of winding positions (31). Yarn (92) is spun at one of the spinning positions (21) and wound up to a cop (91). For the spinning position (21), values of a parameter characteristic for the operation of the spinning position (21) are determined during the winding of the cop (91) and stored as spinning data. The spinning data are assigned to the cop (91). The cop (91) is set down from the spinning position (21). The spinning data assigned to the cop (91) is taken into account when deciding whether to feed the cop (91) after it has been set down to one of the winding positions (31). The automatic assignment is based on an identification of a point in time of winding of the cop (91) and an identification of the spinning position (21) at which the cop (91) was wound.
    Type: Application
    Filed: May 27, 2019
    Publication date: June 3, 2021
    Applicant: Uster Technologies AG
    Inventors: Vasileios ARCHONTOPOULOS, Sivakumar NARAYANAN, Peter Schmid, Kurt EGGIMANN, Paul GEITER
  • Publication number: 20210148012
    Abstract: The method is used to operate a ring spinning system (1) which contains a ring spinning machine (2) having a plurality of spinning positions (21) and a winding machine (3) having a plurality of winding positions (31). Yarn (92) is spun at one of the spinning positions (21) and wound up to a cop (91). Values of a spinning parameter are determined at different times during the winding of the cop (91) and stored as spinning data. The cop is transported from the spinning position (21) to one of the winding positions (31). At the winding position (31) the yarn (92) is rewound from the cop (91) onto a yarn bobbin (93). Values of a yarn parameter are determined at at least two different times during the rewinding of the cop (91) and stored as yarn data. The spinning data and the yarn data are automatically assigned to each other in such a way that they relate to the same yarn section. Based on the spinning data and yarn data assigned to each other, an intervention is made on the ring spinning machine (2).
    Type: Application
    Filed: May 27, 2019
    Publication date: May 20, 2021
    Applicant: Uster Technologies AG
    Inventors: Vasileios ARCHONTOPOULOS, Sivakumar NARAYANAN, Andreas BIRSNER, Kurt EGGIMANN, Paul GEITER
  • Publication number: 20190137382
    Abstract: The method is for monitoring contamination in a stream of fiber flocks transported pneumatically in an airflow. Characteristics of entities, including contamination, in the stream of fiber flocks are detected and evaluated. Values of a first parameter and a second parameter of the entities are determined from the characteristics of the entities. An event field is provided, which contains a quadrant or a part of a quadrant of a two-dimensional Cartesian coordinate system, wherein a first axis defines the first parameter and a second axis defines the second parameter. The values of the first parameter and the second parameter determined for an entity are entered in the event field as coordinates of an event representing the entity. Thus, entities can be handled in a differentiated way.
    Type: Application
    Filed: April 28, 2017
    Publication date: May 9, 2019
    Applicant: Uster Technologies AG
    Inventors: Thomas Nasiou, Sivakumar Narayanan, Elvis Kaljic
  • Patent number: 9185129
    Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.
    Type: Grant
    Filed: April 16, 2012
    Date of Patent: November 10, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Premkumar Jonnala, Neha M. Shah, Sivakumar Narayanan, Adam J. Sweeney, Silviu Dobrota
  • Publication number: 20130179538
    Abstract: Techniques are described for reporting and monitoring network devices using microblog messaging. Embodiments monitor network traffic traversing a network device and performance metrics of the network device to detect occurrences of network and performance events. In response to detecting an occurrence of an event, a microblog message is generated. The microblog message contains at least a description of the occurrence. The microblog message is transmitted to a microblog service, which in turn forwards the message to subscribers. The microblog message may then be analyzed by the subscribers to determine operational attributes of the network device.
    Type: Application
    Filed: January 10, 2012
    Publication date: July 11, 2013
    Inventors: Debojyoti DUTTA, Arun Kumar GOEL, Ganesh RAJAN, Sivakumar NARAYANAN, Gopal K. DOMMETY
  • Publication number: 20120204263
    Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.
    Type: Application
    Filed: April 16, 2012
    Publication date: August 9, 2012
    Inventors: Premkumar Jonnala, Neha M. Shah, Sivakumar Narayanan, Adam J. Sweeney, Silviu Dobrota
  • Patent number: 8181240
    Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.
    Type: Grant
    Filed: June 14, 2005
    Date of Patent: May 15, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Premkumar Jonnala, Neha M. Shah, Sivakumar Narayanan, Adam J. Sweeney, Silviu Dobrota
  • Publication number: 20060282892
    Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.
    Type: Application
    Filed: June 14, 2005
    Publication date: December 14, 2006
    Inventors: Premkumar Jonnala, Neha Shah, Sivakumar Narayanan, Adam Sweeney, Silviu Dobrota
  • Patent number: D933109
    Type: Grant
    Filed: December 2, 2019
    Date of Patent: October 12, 2021
    Assignee: Uster Technologies AG
    Inventors: Shmuel Cohen, Ingo Kiefer, Sivakumar Narayanan, Christophe Apotheloz, Afik Shoham