Patents by Inventor Sivakumar Narayanan
Sivakumar Narayanan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11459676Abstract: Automatic operation of a ring spinning system containing a ring spinning machine having spinning positions and a winding machine having winding positions. Yarn is spun at one of the spinning positions and wound up to a cop. Values of a parameter characteristic for the operation of the spinning position are determined during the winding of the cop and stored as spinning data that is assigned to the cop. The spinning data assigned to the cop is taken into account when deciding whether to feed the cop after it has been set down to one of the winding positions. The assignment is based on an identification of a point in time of winding of the cop and an identification of the spinning position at which the cop was wound.Type: GrantFiled: May 27, 2019Date of Patent: October 4, 2022Assignee: Uster Technologies AGInventors: Vasileios Archontopoulos, Sivakumar Narayanan, Peter Schmid, Kurt Eggimann, Paul Geiter
-
Patent number: 11319649Abstract: A method to operate a ring spinning system containing a ring spinning machine having spinning positions and a winding machine having winding positions. Yarn is spun at the spinning position and wound to a cop. Values of a spinning parameter are determined at different times during the winding of the cop and stored as spinning data. The cop is transported from the spinning position to the winding position, where the yarn is rewound from the cop onto a bobbin. Values of a yarn parameter are determined at at least two different times during the rewinding, and stored as yarn data. The spinning data and the yarn data are assigned to each other such that they relate to the same yarn section. Based on the spinning data and yarn data assigned, an intervention is made on the ring spinning machine.Type: GrantFiled: May 27, 2019Date of Patent: May 3, 2022Assignee: Uster Technologies AGInventors: Vasileios Archontopoulos, Sivakumar Narayanan, Andreas Birsner, Kurt Eggimann, Paul Geiter
-
Publication number: 20220036414Abstract: Methods, systems, and computer program products for product description-based line item matching are provided herein. A computer-implemented method includes obtaining a digital invoice from a vendor comprising one or more text descriptions; retrieving a purchase order corresponding to the digital invoice from a purchase order database, wherein the purchase order comprises one or more line items; applying an out-of-vendor vocabulary model to the one or more text descriptions, wherein the out-of-vendor vocabulary model is trained to remove irrelevant text from the text descriptions based at least in part on historical purchase orders stored in the purchase order database corresponding to the vendor; and matching the one or more text descriptions from the digital invoice to the one or more line items in the purchase order based at least in part on output of the out-of-vendor vocabulary model.Type: ApplicationFiled: July 30, 2020Publication date: February 3, 2022Inventors: Sampath Dechu, Neelamadhav Gantayat, Harshit Rawat, Sivakumar Narayanan
-
Publication number: 20210164132Abstract: The method is used for the automatic operation of a ring spinning system (1) which contains a ring spinning machine (2) having a plurality of spinning positions (21) and a winding machine (3) having a plurality of winding positions (31). Yarn (92) is spun at one of the spinning positions (21) and wound up to a cop (91). For the spinning position (21), values of a parameter characteristic for the operation of the spinning position (21) are determined during the winding of the cop (91) and stored as spinning data. The spinning data are assigned to the cop (91). The cop (91) is set down from the spinning position (21). The spinning data assigned to the cop (91) is taken into account when deciding whether to feed the cop (91) after it has been set down to one of the winding positions (31). The automatic assignment is based on an identification of a point in time of winding of the cop (91) and an identification of the spinning position (21) at which the cop (91) was wound.Type: ApplicationFiled: May 27, 2019Publication date: June 3, 2021Applicant: Uster Technologies AGInventors: Vasileios ARCHONTOPOULOS, Sivakumar NARAYANAN, Peter Schmid, Kurt EGGIMANN, Paul GEITER
-
Publication number: 20210148012Abstract: The method is used to operate a ring spinning system (1) which contains a ring spinning machine (2) having a plurality of spinning positions (21) and a winding machine (3) having a plurality of winding positions (31). Yarn (92) is spun at one of the spinning positions (21) and wound up to a cop (91). Values of a spinning parameter are determined at different times during the winding of the cop (91) and stored as spinning data. The cop is transported from the spinning position (21) to one of the winding positions (31). At the winding position (31) the yarn (92) is rewound from the cop (91) onto a yarn bobbin (93). Values of a yarn parameter are determined at at least two different times during the rewinding of the cop (91) and stored as yarn data. The spinning data and the yarn data are automatically assigned to each other in such a way that they relate to the same yarn section. Based on the spinning data and yarn data assigned to each other, an intervention is made on the ring spinning machine (2).Type: ApplicationFiled: May 27, 2019Publication date: May 20, 2021Applicant: Uster Technologies AGInventors: Vasileios ARCHONTOPOULOS, Sivakumar NARAYANAN, Andreas BIRSNER, Kurt EGGIMANN, Paul GEITER
-
Publication number: 20190137382Abstract: The method is for monitoring contamination in a stream of fiber flocks transported pneumatically in an airflow. Characteristics of entities, including contamination, in the stream of fiber flocks are detected and evaluated. Values of a first parameter and a second parameter of the entities are determined from the characteristics of the entities. An event field is provided, which contains a quadrant or a part of a quadrant of a two-dimensional Cartesian coordinate system, wherein a first axis defines the first parameter and a second axis defines the second parameter. The values of the first parameter and the second parameter determined for an entity are entered in the event field as coordinates of an event representing the entity. Thus, entities can be handled in a differentiated way.Type: ApplicationFiled: April 28, 2017Publication date: May 9, 2019Applicant: Uster Technologies AGInventors: Thomas Nasiou, Sivakumar Narayanan, Elvis Kaljic
-
Patent number: 9185129Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.Type: GrantFiled: April 16, 2012Date of Patent: November 10, 2015Assignee: Cisco Technology, Inc.Inventors: Premkumar Jonnala, Neha M. Shah, Sivakumar Narayanan, Adam J. Sweeney, Silviu Dobrota
-
Publication number: 20130179538Abstract: Techniques are described for reporting and monitoring network devices using microblog messaging. Embodiments monitor network traffic traversing a network device and performance metrics of the network device to detect occurrences of network and performance events. In response to detecting an occurrence of an event, a microblog message is generated. The microblog message contains at least a description of the occurrence. The microblog message is transmitted to a microblog service, which in turn forwards the message to subscribers. The microblog message may then be analyzed by the subscribers to determine operational attributes of the network device.Type: ApplicationFiled: January 10, 2012Publication date: July 11, 2013Inventors: Debojyoti DUTTA, Arun Kumar GOEL, Ganesh RAJAN, Sivakumar NARAYANAN, Gopal K. DOMMETY
-
Publication number: 20120204263Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.Type: ApplicationFiled: April 16, 2012Publication date: August 9, 2012Inventors: Premkumar Jonnala, Neha M. Shah, Sivakumar Narayanan, Adam J. Sweeney, Silviu Dobrota
-
Patent number: 8181240Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.Type: GrantFiled: June 14, 2005Date of Patent: May 15, 2012Assignee: Cisco Technology, Inc.Inventors: Premkumar Jonnala, Neha M. Shah, Sivakumar Narayanan, Adam J. Sweeney, Silviu Dobrota
-
Publication number: 20060282892Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.Type: ApplicationFiled: June 14, 2005Publication date: December 14, 2006Inventors: Premkumar Jonnala, Neha Shah, Sivakumar Narayanan, Adam Sweeney, Silviu Dobrota
-
Patent number: D933109Type: GrantFiled: December 2, 2019Date of Patent: October 12, 2021Assignee: Uster Technologies AGInventors: Shmuel Cohen, Ingo Kiefer, Sivakumar Narayanan, Christophe Apotheloz, Afik Shoham