Patents by Inventor Swaminathan Balasubramanian
Swaminathan Balasubramanian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240281287Abstract: An embodiment for maintaining service level objectives in container orchestration platforms using constraint propagation. The embodiment may receive a set of service level objectives associated with deployment of an application. The embodiment may determine a series of resource dependencies corresponding to the received set of service level objectives for the application. The embodiment may generate a first set of constraints corresponding to service requirements for the received set of service level objectives. The embodiment may generate a second set of constraints corresponding to relationships within a target cluster between the target cluster resources and the series of resource dependencies. The embodiment may detect violations of the first set of constraints, and then determine one or more remediation measures to restore the received set of service level objectives based on the second set of constraints to output the one or more remediation measures to an end user.Type: ApplicationFiled: February 22, 2023Publication date: August 22, 2024Inventors: Swaminathan Balasubramanian, Pierre C. Berlandier, Renganathan Sundararaman, Gayatri Renganathan, Rajiv Joshi
-
Patent number: 11758012Abstract: Mechanisms are provided for optimizing remuneration for computing services. Computing services are registered which stores registration data comprising remuneration associations between computing services and consumers. A hierarchical computer model is generated based on the registration data, where the model represents dependencies between consumers and providers of computing services. For a service request from a consumer, each transaction with each computing service in a service invocation chain associated with the service request is identified and a cost of each transaction is calculated. The calculated cost of the service invocation chain is optimized based on applying an optimization algorithm to a cost function applied to a selected portion of the hierarchical computer model corresponding to the service invocation chain.Type: GrantFiled: January 18, 2023Date of Patent: September 12, 2023Assignee: International Business Machines CorporationInventors: Swaminathan Balasubramanian, Rajiv Joshi, Renganathan Sundararaman, Pierre C. Berlandier
-
Patent number: 11757892Abstract: A method for a story fill authentication process includes, responsive to receiving a first authentication request to authenticate a user, displaying a first generated story with one or more obfuscated portions, where the first generated story is based on event data associated with a first previously captured event and additional data utilized to enrich the event data for the first previously captured event. The method also includes, responsive to determining text provided for the one or more obfuscated portions of the first generated story at least meets a comparison threshold level to a first complete generated story based on a semantic comparison, granting the user access to a resource associated with the first authentication request.Type: GrantFiled: November 3, 2020Date of Patent: September 12, 2023Assignee: International Business Machines CorporationInventors: Swaminathan Balasubramanian, Peeyush Jaiswal, Cheranellore Vasudevan, Priyansh Jaiswal, Sibasis Das
-
Publication number: 20230267540Abstract: A method, programming product, and/or system is disclosed for accounting for random (idiosyncratic) factors (Z) in a loss function influenced by both systemic factors (Y) and random factors (Z) and includes: computing an initial center of gravity (initial COG) of a loss function; and adjusting the initial COG of the loss function toward an Origin to a New COG to account for the random factors (Z). The New COG is determined in an approach and includes: performing a Monte Carlo sampling around an Origin to identify a Max loss at the Origin; performing a Monte Carlo sampling around the Initial COG to identify a Max loss at the Initial COG; and computing a distance to the New COG from the Initial COG using geometric ratios. In a further aspect, an importance sampling is performed about the New COG.Type: ApplicationFiled: February 24, 2022Publication date: August 24, 2023Inventors: Rajiv Joshi, Rouwaida Nawaf Kanj, Swaminathan Balasubramanian, Pierre C. Berlandier
-
Publication number: 20230241768Abstract: A mobile robot includes a non-inverted pendulum body hereafter referred to as NPB with at least one pivot axis and this pivot axis divides the NPB into two portions. One portion of the NPB contains the center of mass of the NPB that can have structures to carry external payloads. The second portion of the NPB can have one or more manipulator arm and vision units. On the pivot axis is disposed at least one leg rotatabily coupled to the NPB. The other end of the leg has a foot joint on which is disposed a drive wheel or a foot. With additional degrees of freedom for each leg the robot can move similar to humanoids, be able to carry and sustain heavy loads with minimal leg joint torques and/or manipulate heavy loads and forces with self-compensating mass of the NPB while using minimal leg joint torques.Type: ApplicationFiled: June 14, 2021Publication date: August 3, 2023Inventor: Swaminathan Balasubramanian
-
Publication number: 20230196369Abstract: A computer-implemented method, system and computer program product for identifying suspicious behavior. Requests to provide digital identification (ID) document(s) to a computing device of a verifier by a computing device of a consumer based on a validation context are detected. Responses to such requests are also detected in which the computing device of the consumer provides digital ID document(s) to the computing device of the verifier. A score is then generated corresponding to a likelihood of fraud in the transaction involving the consumer and the verifier using an artificial intelligence model based on the validation context, the digital ID document(s) requested to be provided by the computing device of the consumer and the digital ID document(s) provided to the computing device of the verifier. The computing device of the verifier may then be informed that there is evidence of fraud based on a value of the score.Type: ApplicationFiled: December 20, 2021Publication date: June 22, 2023Inventors: Jason Malinowski, Swaminathan Balasubramanian, Cheranellore Vasudevan, Genevieve van den Boer, Thomas G. Lawless, III, Gordan G. Greenlee
-
Publication number: 20230191821Abstract: A computer-implemented method, system and computer program product for verifying a user meets identification (ID) requirements for an associated activity or event. A request for a set of digital ID documents to be provided to the computing device of the verifier by the computing device of the device holder is detected. A response to the request is then detected which provides only a subset of the requested digital ID documents. Alternative digital ID document(s) are then identified to replace the digital ID document(s) that were requested but not provided by the device holder. An instruction is then issued to the computing device of the verifier to request one or more of the identified alternative digital ID documents from the computing device of the device holder in order to complete the verification process in determining if the device holder meets the ID requirements for an associated activity or event.Type: ApplicationFiled: December 20, 2021Publication date: June 22, 2023Inventors: Swaminathan Balasubramanian, Jason Malinowski, Cheranellore Vasudevan, Thomas G. Lawless, III, Genevieve van den Boer, Gordan G. Greenlee
-
Patent number: 11676179Abstract: A client device can receive, from a data processing system, first data, the first data selected by the data processing system based on second data generated by at least one IoT device with which the client device is associated, and the first data indicating at least one advertisement. The client device can access the at least one advertisement using the first data indicating the at least one advertisement. The client device can add the at least one advertisement to the content accessed by the client device. The client device can present the content with the at least one advertisement added to the content.Type: GrantFiled: December 14, 2020Date of Patent: June 13, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Swaminathan Balasubramanian, Mamnoon Jamil, Jian Wu, Radha Mohan De, Cheranellore Vasudevan
-
Patent number: 11677736Abstract: In an approach to transient identification generation, one or more computer processors receive a request for one or more identification artifacts associated with a user from a requesting entity. One or more computer processors determine a first set of identification artifacts. One or more computer processors transmit the first set of identification artifacts to the requesting entity. One or more computer processors determine whether the first set of identification artifacts is an approved response to the request for the one or more identification artifacts. In response to determining the first set of identification artifacts is the approved response to the request for the one or more identification artifacts, one or more computer processors generate a transient identification that includes the first set of identification artifacts. One or more computer processors transmit the transient identification to the requesting entity.Type: GrantFiled: March 25, 2021Date of Patent: June 13, 2023Assignee: International Business Machines CorporationInventors: Swaminathan Balasubramanian, Thomas G. Lawless, III, Jason Malinowski, Genevieve van den Boer, Cheranellore Vasudevan
-
Publication number: 20230090269Abstract: A method, computer system, and a computer program product for historical image search is provided. The present invention may include receiving an image search criteria. The present invention may also include generating a composite image search query based on the received image search criteria. The present invention may further include searching for a matching historical image based on the generated composite image search query. The present invention may also include returning a historical image search result.Type: ApplicationFiled: September 22, 2021Publication date: March 23, 2023Inventors: CHERANELLORE VASUDEVAN, Swaminathan Balasubramanian, SIBASIS DAS, Radha Mohan De
-
Publication number: 20230093468Abstract: Embodiments of the invention are directed to a computer-implemented method of performing an electronic search. The computer-implemented method includes receiving, using a processor, a composite electronic image including a plurality of electronically identifiable objects, wherein the composite electronic image is associated with a user. The processor is used to segment the composite electronic image into sub-images by providing at least one of the sub-images for each of the plurality of electronically identifiable objects. For each of the sub-images, the processor is used to perform personalized sub-image search operations. The personalized sub-image search operations include selecting a sub-image-to-be-searched from among the sub-images; associating the sub-image-to-be-searched with personalized metadata of the user; and searching, based at least in part on the personalized metadata of the user, a database to return a set of search images.Type: ApplicationFiled: September 20, 2021Publication date: March 23, 2023Inventors: Swaminathan Balasubramanian, Radha Mohan De, Mamnoon Jamil, Jian Wu, Cheranellore Vasudevan
-
Publication number: 20220395974Abstract: A mobile robot includes a non-inverted pendulum body hereafter referred to as NPB with at least one pivot axis and this pivot axis divides the NPB into two portions. One portion of the NPB contains the center of mass of the NPB that can have structures to carry external payloads. The second portion of the NPB can have one or more manipulator arm and vision units. On the pivot axis is disposed at least one leg rotatabily coupled to the NPB. The other end of the leg has a foot joint on which is disposed a drive wheel or a foot. With additional degrees of freedom for each leg the robot can move similar to humanoids, be able to carry and sustain heavy loads with minimal leg joint torques and/or manipulate heavy loads and forces with self-compensating mass of the NPB while using minimal leg joint torques.Type: ApplicationFiled: June 14, 2021Publication date: December 15, 2022Inventor: Swaminathan Balasubramanian
-
Patent number: 11528244Abstract: A method according to one embodiment is for transmitting a message. In one embodiment, one or more processor of a messaging system identifies a certain message of the messaging system, the certain message being a blocked message intended for transmission to a certain user of the messaging system. In one embodiment, the one or more processor further determines one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user, the certain user being a prospective recipient of a message. In one embodiment, the one or more processor transmits a message to the certain user responsively to a result of the determining of the one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user of the messaging system.Type: GrantFiled: January 31, 2020Date of Patent: December 13, 2022Assignee: Kyndryl, Inc.Inventors: Swaminathan Balasubramanian, Ravi P. Bansal, Andrew R. Jones, Brian M. O'Connell
-
Patent number: 11521728Abstract: Embodiments for scheduling the delivery of multiple medications to a patient by a processor. Any interactions between the multiple medications or between one of the multiple medications and a type of food are considered to construct an analytical model to identify an optimized schedule for delivery of the multiple medications to the patient. The optimized schedule is adjusted in real time as additional information concerning the multiple medications and the type of food are introduced, and delivered to a dispensing device associated with the one of the multiple medications.Type: GrantFiled: June 25, 2019Date of Patent: December 6, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Derek P. Bagwell, Swaminathan Balasubramanian, Mamnoon Jamil, Cheranellore Vasudevan
-
Publication number: 20220384009Abstract: Embodiments for scheduling the delivery of multiple medications to a patient by a processor. Any interactions between the multiple medications or between one of the multiple medications and a type of food are considered to construct an analytical model to identify an optimized schedule for delivery of the multiple medications to the patient. The optimized schedule is adjusted in real time as additional information concerning the multiple medications and the type of food are introduced, and delivered to a dispensing device associated with the one of the multiple medications.Type: ApplicationFiled: June 25, 2019Publication date: December 1, 2022Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Derek P. BAGWELL, Swaminathan BALASUBRAMANIAN, Mamnoon JAMIL, Cheranellore VASUDEVAN
-
Patent number: 11496503Abstract: A method for event data fencing includes initializing a media monitoring algorithm, wherein the media monitoring algorithm scans for one or more words relating to a data breach in publicly available reports. Responsive to identifying a report from the publicly available reports relating to a vulnerability associated with the data breach, the method determines whether the vulnerability is associated with event data utilized for an authentication process. Responsive to determining the vulnerability is associated with a portion of the event data utilized for the authentication process, the method fences the portion of event data associated with the vulnerability, wherein fencing prevents the portion of event data from being utilized in the authentication process.Type: GrantFiled: May 17, 2019Date of Patent: November 8, 2022Assignee: International Business Machines CorporationInventors: Cheranellore Vasudevan, Swaminathan Balasubramanian, Sibasis Das, Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20220309091Abstract: Technology for taking presentation data (for example, video images from a movie, audio from a podcast), determining that the content includes an untrue assertion (for example, “the United States only has 48 states”) and automatically correcting the presentation so that the untrue assertion is corrected (for example, replacing an incorrect video caption with “the United States has 50 states as of early 2021”).Type: ApplicationFiled: March 29, 2021Publication date: September 29, 2022Inventors: Ravi Prakash Bansal, Swaminathan Balasubramanian, Sarbajit K. Rakshit, Pierre C. Berlandier
-
Publication number: 20220311758Abstract: In an approach to transient identification generation, one or more computer processors receive a request for one or more identification artifacts associated with a user from a requesting entity. One or more computer processors determine a first set of identification artifacts. One or more computer processors transmit the first set of identification artifacts to the requesting entity. One or more computer processors determine whether the first set of identification artifacts is an approved response to the request for the one or more identification artifacts. In response to determining the first set of identification artifacts is the approved response to the request for the one or more identification artifacts, one or more computer processors generate a transient identification that includes the first set of identification artifacts. One or more computer processors transmit the transient identification to the requesting entity.Type: ApplicationFiled: March 25, 2021Publication date: September 29, 2022Inventors: Swaminathan Balasubramanian, Thomas G. Lawless, III, Jason Malinowski, Genevieve van den Boer, CHERANELLORE VASUDEVAN
-
Publication number: 20220191659Abstract: A tool for inter-vehicle communication. The tool determines whether contextual data and journey information for a user justifies a notification. Responsive to a determination that the contextual data and the journey information justifies the notification, the tool generates the notification. The tool generates a trust score for the notification. The tool determines one or more vehicles located within a pre-defined proximity of the user. The tool transmits the notification and the trust score to the one or more vehicles located within the pre-defined proximity of the user.Type: ApplicationFiled: December 16, 2020Publication date: June 16, 2022Inventors: Jason Malinowski, Cheranellore Vasudevan, Swaminathan Balasubramanian, Thomas G. Lawless, III
-
Publication number: 20220188871Abstract: A client device can receive, from a data processing system, first data, the first data selected by the data processing system based on second data generated by at least one IoT device with which the client device is associated, and the first data indicating at least one advertisement. The client device can access the at least one advertisement using the first data indicating the at least one advertisement. The client device can add the at least one advertisement to the content accessed by the client device. The client device can present the content with the at least one advertisement added to the content.Type: ApplicationFiled: December 14, 2020Publication date: June 16, 2022Inventors: Swaminathan Balasubramanian, Mamnoon Jamil, Jian Wu, Radha Mohan De, Cheranellore Vasudevan