-
公开(公告)号:US10674086B2
公开(公告)日:2020-06-02
申请号:US15924428
申请日:2018-03-19
Applicant: Yiwei Wang , Lingyan Liang
Inventor: Yiwei Wang , Lingyan Liang
Abstract: Image processing method and device are disclosed. The image processing method is inclusive of a step of obtaining a target image; a step of performing motion estimation on the target image so as to attain motion paths; a step of determining, on the basis of the motion paths, whether there exists a fluctuation meeting a predetermined requirement in the target image; and a step of taking, if there exists a fluctuation meeting the predetermined requirement in the target image, the target image as a reference image. The reference image is utilized to carry out inter frame motion estimation with respect to the respective images acquired.
-
公开(公告)号:US11748894B2
公开(公告)日:2023-09-05
申请号:US17051602
申请日:2019-05-09
Applicant: Yiwei Wang , Liyan Liu , Wei Wang
Inventor: Yiwei Wang , Liyan Liu , Wei Wang
CPC classification number: G06T7/246 , G06T7/248 , G06V10/74 , G06V10/462
Abstract: Disclosed is a video stabilization method including steps of selecting a first area in a first image; determining at least one first feature point based on the first area, and performing feature point matching on the first image and a second image so as to obtain at least one feature point matching pair between the first image and the second image, each feature point matching pair including a first feature point of the first image and a second feature point of the second image; conducting motion parameter estimation based on the at least one feature point matching pair so as to obtain a motion parameter; and carrying out motion compensation with respect to the first image based on the motion parameter so as to acquire a first stable image after compensation.
-
公开(公告)号:US20220272111A1
公开(公告)日:2022-08-25
申请号:US17527466
申请日:2021-11-16
Applicant: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , MANISH ARIGALA
Inventor: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , MANISH ARIGALA
IPC: H04L9/40
Abstract: In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network.
-
公开(公告)号:US11363206B2
公开(公告)日:2022-06-14
申请号:US16932013
申请日:2020-07-17
Applicant: Yiwei Wang , Liyan Liu , Wei Wang
Inventor: Yiwei Wang , Liyan Liu , Wei Wang
Abstract: A method, for correcting a rolling shutter phenomenon, includes obtaining a double fish-eye image to be processed using a photographing device; obtaining an image processing parameter including gyro data of the photographing device; calculating a rolling shutter phenomenon correcting parameter based on the image processing parameter; and correcting the rolling shutter phenomenon with respect to the double fish-eye image in a spherical-coordinate system using the rolling shutter phenomenon correcting parameter.
-
公开(公告)号:US20110165444A1
公开(公告)日:2011-07-07
申请号:US12933141
申请日:2010-04-28
Applicant: Chuntai Guo , Dingkai Yuan , Yiwei Wang , Chiwei Wang
Inventor: Chuntai Guo , Dingkai Yuan , Yiwei Wang , Chiwei Wang
CPC classification number: H01M10/0525 , H01M2/263 , H01M10/0587
Abstract: A Li-ion power cell includes at least two winding cores produced by a winding process. Each of the winding cores has an anode tab and a cathode tab. The anode tabs and the cathode tabs of the respective winding cores are connected in parallel, respectively. The winding core is of cylindrical or diamond shape. The Li-ion power cell further includes a housing, an anode pole and a cathode pole which are disposed on the housing. The anode tabs of the respective winding cores are connected in parallel and then electrically connected to the anode pole, and the cathode tabs of the respective winding cores are connected in parallel and then electrically connected to the cathode pole.
Abstract translation: 锂离子电池包括通过卷绕工艺生产的至少两个缠绕芯。 每个绕组芯具有阳极片和阴极片。 各个绕组芯的阳极片和阴极片分别并联连接。 卷芯是圆柱形或菱形。 锂离子电池还包括设置在壳体上的壳体,阳极极和阴极极。 各个绕组芯的阳极片平行连接,然后电连接到阳极,并且各个绕组芯的阴极突片并联连接,然后电连接到阴极。
-
公开(公告)号:US12294589B2
公开(公告)日:2025-05-06
申请号:US17527466
申请日:2021-11-16
Applicant: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Bharathwaj Sankara Viswanathan , Brady Schulman , Matthew Finn , Paul John Lesiak , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang , Udayan Joshi , Soumyadeep Choudhury , Muhammada Furqan , Manish Arigala
Inventor: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Bharathwaj Sankara Viswanathan , Brady Schulman , Matthew Finn , Paul John Lesiak , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang , Udayan Joshi , Soumyadeep Choudhury , Muhammada Furqan , Manish Arigala
Abstract: In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network.
-
公开(公告)号:US12289331B2
公开(公告)日:2025-04-29
申请号:US17829361
申请日:2022-06-01
Applicant: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Brady Schulman , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang , Udayan Joshi , Soumyadeep Choudhury , Muhammada Furqan , Danesh Irani
Inventor: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Brady Schulman , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang , Udayan Joshi , Soumyadeep Choudhury , Muhammada Furqan , Danesh Irani
IPC: H04L9/40
Abstract: In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
-
公开(公告)号:US12010124B2
公开(公告)日:2024-06-11
申请号:US17335932
申请日:2021-06-01
Applicant: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Bharathwaj Sankara Viswanathan , Brady Schulman , Matthew Finn , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang
Inventor: Supreeth Hosur Nagesh Rao , Navindra Yadav , Ravi Sankuratri , Alok Lalit Wadhwa , Aria Rahadian , Bharathwaj Sankara Viswanathan , Brady Schulman , Matthew Finn , Ravi Shanker Prasad , Vasil Dochkov Yordanov , Yiwei Wang , Zhiwen Zhang
CPC classification number: H04L63/1416 , G06F9/541 , G06F16/2379 , G06F21/577 , G06F21/604 , G06F21/6245 , H04L63/0209 , H04L63/1425 , H04L63/1466 , H04L63/20 , G06F2221/034
Abstract: In one aspect, a computerized method for automatically identifying and solving for vendor data abuse in an enterprise network, includes the step of implementing a vendor detection at one or more gateways of the enterprise network. The method includes the step of mapping a set of data along with any associated data attributes of the set of data that are being shared with a vendor via the one or more gateways. The method includes the step of detecting and identifying an access anomaly with respect to the set of data associated with a vendor access. The method includes the step of implementing a specified data minimization process to the access anomaly.
-
公开(公告)号:US20240028572A1
公开(公告)日:2024-01-25
申请号:US18100574
申请日:2023-01-24
Applicant: NAVINDRA YADAV , SUPREETH HOSUR NAGESH Rao , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
Inventor: NAVINDRA YADAV , SUPREETH HOSUR NAGESH Rao , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
CPC classification number: G06F16/219 , G06F16/27
Abstract: In one aspect, a computerized system for securing data cloning and sharing options on data warehouses, comprising: a clone determiner engine that determines that a data asset is a primary data asset or a clone data asset, wherein the clone determiner engine comprises: a log data analyzer that obtains and analyzes a set of logs of the data asset from a specified log source, and wherein set of logs are used to determine that the data asset is the primary data asset or the clone data asset, a timestamp analyzer engine that obtains a timestamp data of the data asset and reviews the timestamp data to analyze ordering of the data asset, and wherein the timestamp analyzer engine determines the data asset is a primary asset or a secondary asset, and a fingerprints analyzer that obtains and reviews the data asset and any metadata of data asset, and wherein the fingerprints analyzer creates a fingerprint based on a content of the data asset and the metadata of the data asset, and wherein the fingerprints analyzer then uses the fingerprints to determine that the data asset is the clone data asset of an already known asset in conjunction with an output of the timestamp analyzer engine and the log data analyzer.
-
公开(公告)号:US20230334162A1
公开(公告)日:2023-10-19
申请号:US18107513
申请日:2023-02-09
Applicant: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
Inventor: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
CPC classification number: G06F21/604 , G06F21/6218 , G06F2221/2113
Abstract: In one aspect, a computerized method for minimizing a data governance in order to improve data security, comprising: providing and imposing a set of access rules to a set of data, wherein the set of data is stored in a data warehouse; measuring a level of over provisioning of the set of data; measuring a level of data abuse susceptibility of the set of data; implementing a dark data governance operation on the set of data; and identifying a set of infrequently used roles in the set of data.
-
-
-
-
-
-
-
-
-