Computer Science Patents for Sale or License

Notify me of New Entries on this Page

You can receive an email whenever a new patent is added to this category. You can unsubscribe at any time.

Method for Determining the Shortest Path through a Network

A new method is presented for finding a path connecting two locations in a network of connections. The approach is different from methods such as Dijkstra (or the popular A* approach) and, depending on usage, shows several benefits over other methods. Though the approach does not guarantee that the ...
...

Interactive Pin Array Device - Webnail

An innovation in the communication field. After hearing, seeing you can now touch via Internet! An interactive pin array device comprising a plurality of elongated pins held in a frame and forming a set. The frame is adapted to hold the plurality of pins in a parallel position to one another in a ...
...

Method for visual manipulations of all kinds of programming objects

Visual object manipulation modernized IDE’s. This patent innovates a technique of an intermedia class, restrictions on visually-manipulate-able objects can be removed for an IDE. Thus, all software objects are visually manipulate-able. It opens doors for further IDE technology advancements, such as...
...

Improvements in and relating to Data Comparison

The patent is the representation of a low cost TTL circuit developed to recognise a binary input pattern as a percentage of that input which as application-specific integrated circuit (ASIC) logic will enable on chip CCD cameras to focus and recognise objects at the speed of the CCD rather than the ...
...

Adaptable keyboard system

A system for adapting a keyboard display to a definable input language is provided. The system includes an adaptable keyboard comprising keys; a software application, operatively associated with the adaptable keyboard; and a computerized system enabling to receive data from the adaptable keyboard, p...
...

Quantized Indexing

A Data Compression Patent, applying the power of combinatorial mathematics to enumerative coding by uncovering a method which solves the problem of arithmetic precision in Enumerative Coding, the underlying problem which has long prevented it from being used for general purpose entropy coding, a...
...

Lineographic Alphanumeric Data Input System

This input system is designed for entering text into portable electronic devices, such as cell phones, hand held computers and intelligent phones, by making short linear traces or taps with a finger or thumb on a touch sensitive keypad. The system allows the user to enter operational commands on th...
...

Conservative logic gate for design of quantum dot cellular automata circuits

A novel conservative gate especially suiting a Quantum Dot Cellular Automata (QCA) majority voter-based design. The input-to-output mapping of the novel conservative QCA (CQCA) gate is: P=A; Q=AB+BC+AC [MV(A,B,C)]; R=A'B+A'C+BC [MV(A',B,C)], where A, B, C are inputs and P, Q, R are outputs, respecti...
...

Method and Apparatus for Authenticating Biometric Scanners

A method and apparatus for authenticating a biometric scanner involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used...
...

Binary Rewriting Without Relocation Information

A binary rewriter that can provide complete code coverage without relocation information is provided, together with a method of performing such rewriting. The method can include processing a binary file as an original binary file. The method can also include disassembling the binary file to provide ...
...

Automatic Parallelization Using Binary Rewriting

Binary rewriters that do not require relocation information and automatic parallelizers within binary rewriters are provided, as well as methods for performing binary rewriting and automatic parallelization. The method, in certain embodiments. includes disassembling a binary file and determining fun...
...

Haptic Device with Controlled Traction Forces

A haptic device includes a substrate that is subjected to lateral motion such as lateral oscillation with one or more degees of freedom together with modulation of a friction reducing oscillation in a manner that can create a shear force on the user's finger or on an object on the device....
...

Memory Device and Applications Thereof

A system that incorporates teachings of the present disclosure may include, for example, a memory device having a memory cell to selectively store holes by photon and bias voltage induction as a representation of binary values. Additional embodiments are disclosed....
...

System for Cyber Investigation and Data Management

A system for executing a cyber investigation by a non-expert user, including a computer having a processor, a memory, and a display; a computer-readable medium having stored thereon instructions for execution of a wizard application, the processor adapted to execute the instructions when the compute...
...

System for Executing 3D Propagation for Depth Image-based Rendering

A system is disclosed for executing depth image-based rendering of a 3D image by a computer having a processor and that is coupled with one or more color cameras and at least one depth camera. The color cameras and the depth camera are positionable at different arbitrary locations relative to a scen...
...

Exchange-assisted Spin Transfer Torque Switching

In general, the invention is directed to techniques for reducing the amount of switching current that is utilized within a magnetic storage (e.g., MRAM) device. An example apparatus includes a fixed magnetic layer that provides a fixed direction of magnetization, an exchange-coupled magnetic multi-l...
...

Method for Switching Magnetic Random Access Memory Elements and Magnetic Element Structures

A method for storing data in a magnetic memory element of an array of elements which avoids inadvertent switching of other elements is disclosed. First and second magnetic fields are applied to a selected magnetic element for a first time interval to switch the element into an intermediate state whe...
...

Display of Patient-specific Data

Systems, methods, and computer-program products identify clinical data corresponding to a plurality of patients located within a common health care delivery unit, and apply one or more rules to at least some of the clinical data using at least one quality and/or safety measure-specific specification...
...

Decomposition Based Approach for the Synthesis of Threshold Logic Circuits

A computerized system and method for synthesizing threshold logic circuits is disclosed. The disclosed system and method receives a Boolean function and converts the Boolean function into a novel cofactor tree data structure like a BDD and an MML factor tree. Functions of the nodes making up the cof...
...

Differential Threshold Voltage Non-volatile Memory and Related Methods

Embodiments and examples of differential threshold voltage non-volatile memories and related methods are described herein. Other embodiments, examples thereof, and related method are also disclosed herein....
...

Ultra-low Dimensional Representation for Face Recognition Under Varying Expressions

A method, apparatus and computer program product are provided for identifying an unknown subject using face recognition. In particular, upon receiving a plurality of images depicting a subject, the method may include deriving and storing a common component image and a gross innovation component imag...
...

SRAM cell with intrinsically high stability and low leakage

A Static Random Access Memory (SRAM) cell having high stability and low leakage is provided. The SRAM cell includes a pair of cross-coupled inverters providing differential storage of a data bit. Power to the SRAM cell is provided by a read word line (RWL) signal, which is also referred to herein as...
...

Methods and Apparatuses for User-verifiable Trusted Path in the Presence of Malware

An apparatus and method for establishing a trusted path (152) between a user interface (150) and a trusted executable (312), wherein the trusted path (152) includes a hypervisor (316) and a driver shim (314). The method includes measuring (710) an identity of the hypervisor; comparing (712) the meas...
...

Systems and Methods for Implementing a Machine-Learning Agent to Retrieve Information in Response to a Message

Mixed-initiative message-augmenting agent systems and methods that provide users with tools that allow them to respond to messages, such as email messages, containing requests for information or otherwise requiring responses that require information that needs to be retrieved from one or more data s...
...

Efficient High Performance System for Writing Data from Applications to a Safe File System

Systems and methods for increasing the efficiency of data storage processes for high performance, high core number computing systems. In one embodiment, the systems of the present invention perform sequential I/O whenever possible. To achieve a high degree of sequentiality, the block allocation sche...
...

Simultaneous Bit Pattern Determination and Head Positional Information Detection on Patterned Media

An apparatus, system, and method comprise a magnetoresistive head configured to respond to magnetization states of patterned cells formed on a patterned medium. The magnetoresistive head detects the magnetization states of at least two patterned cells formed on a patterned medium. The magnetoresisti...
...

Buffer Layers for L10 Thin Film Perpendicular Media

A process of fabricating a perpendicular magnetic recording medium. In one embodiment, the process may comprise forming a metallic buffer layer with a (002) texture on an underlayer using a deposition process performed at a temperature below 30 DEG C. The underlayer may have a crystalline (001) text...
...

Revising Imagery Search Results Based on User Feedback

A method, system, and medium are provided for revising a first set of search results related to high-resolution satellite imagery. One embodiment of the method includes receiving a query that seeks high-resolution, remotely sensed images of geographic areas that have changed consistent with a given ...
...

Rapid Image Annotation Via Brain State Decoding and Visual Pattern Mining

Human visual perception is able to recognize a wide range of targets but has limited throughput. Machine vision can process images at a high speed but suffers from inadequate recognition accuracy of general target classes. Systems and methods are provided that combine the strengths of both systems a...
...

Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems

Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems are provided. These systems and methods provide an alert correlator and an alert distributor that enable early signs of an attack to be detected and rapidly disseminated to collabora...
...

System and Method for Hardware Acceleration of a Software Transactional Memory

In a transactional memory technique, hardware serves simply to optimize the performance of transactions that are controlled fundamentally by software. The hardware support reduces the overhead of common TM tasks-conflict detection, validation, and data isolation-for common-case bounded transactions....
...

Dynamic reconfigurable memory hierarchy

A cache and TLB layout and design leverage repeater insertion to provide dynamic low-cost configurability trading off size and speed on a per application phase basis. A configuration management algorithm dynamically detects phase changes and reacts to an application's hit and miss intolerance in ord...
...

Computing Device Using Inexact Computing Architecture Processor

In general, in one aspect, the invention relates to a computer readable medium including software instructions which, when executed by a processor, perform a method, the method including receiving a first method call from an application, wherein the first method call is associated with a first appli...
...

Methods for Protecting Against Piracy of Integrated Circuits

Techniques are provided for reducing the likelihood of piracy of integrated circuit design using combinational circuit locking system and activation protocol based on public-key cryptography. Every integrated circuit is to be activated with an external key, which can only be generated by an authenti...
...

Protecting Hardware Circuit Design by Secret Sharing

Techniques are able to lock and unlock and integrated circuit (IC) based device by encrypting/decrypting a bus on the device. The bus may be a system bus for the IC, a bus within the IC, or an external input/output bus. A shared secret protocol is used between an IC designer and a fabrication facili...
...

Method and System for Scalable Ethernet

A computer readable medium comprising computer readable code for data transfer. The computer readable code, when executed, performs a method. The method includes receiving, at a first Axon, an ARP request from a source host directed to a target host. The method also includes obtaining a first route ...
...

Methods and Systems of Digital Rights Management for Integrated Circuits

Methods for remote activation and permanent or temporary deactivation of integrated circuits (IC) for digital rights management are disclosed. Remote activation enables designers to remotely control each IC manufactured by an independent silicon foundry. Certain embodiments of the invention exploit ...
...

Method and Software Tool for Designing an Integrated Circuit

A method of designing an integrated circuit for use in an application having standards having a plurality of primitives, wherein each of the primitives has a corresponding response. The method includes generating a macros description of each of the primitives and the response corresponding to each o...
...

Systems and Methods for the Detection of Malware

A system and method for distinguishing human input events from malware- generated events includes one or more central processing units (CPUs), one or more input devices and memory. The memory includes program code that when executed by the CPU causes the CPU to obtain a first set of input events fro...
...

Virtual Flow Pipelining Processing Architecture

A computer system for embodying a virtual flow pipeline programmable processing architecture for a plurality of wireless protocol applications is disclosed. The computer system includes a plurality of functional units for executing a plurality of tasks, a synchronous task queue and a plurality of as...
...

Systems and Methods for Network Acceleration and Efficient Indexing for Caching File Systems

The illustrative embodiments described herein are directed to a system, methods, and computer program product, for network acceleration and efficient indexing for caching file systems. For example, the disclosed embodiments achieve (1) high compression rate, (2) low disk seeks, and (3) low memory pr...
...

Hardware Trust Anchors in Sp-enabled Processors

A trust system and method is disclosed for use in computing devices in which a central Authority shares secrets and sensitive data with users of the respective devices. The secrets and data are protected by hardware-rooted encryption and cryptographic hashing, and can be stored securely in untrusted...
...

Method and System for a Run-time Reconfigurable Computer Architecture

A reconfigurable computer architecture is disclosed. The reconfigurable computer architecture has a plurality of logic elements, a plurality of connection switching elements, and a plurality of volatile and/or non- volatile configuration random access memories (RAMs). Each of the configuration RAMs ...
...

Bacteriorhodopsin Protein Variants and Methods of Use for Long Term Data Storage

Bacteriorhodopsin protein variants and methods using the bacteriorhodopsin variants for performance in holographic and three-dimensional (3D) memory storage devices are described. The amino acid and chemical modifications of bacteriorhodopsin provided herein achieve greatly enhanced protein performa...
...

Method and System for Recognition of a Target in a Three Dimensional Scene

A method for three-dimensional reconstruction of a three-dimensional scene and target object recognition may include acquiring a plurality of elemental images of a three-dimensional scene through a microlens array; generating a reconstructed display plane based on the plurality of elemental images u...
...

Method for Controlling an Auditory Game and Associated Device

The invention relates to a method for controlling an auditory game, wherein the displacement of a game element is given in a real time and is soundly reproducible. The inventive method consists in determining once the beginning event of movement in the state of motion of the game object in a three-d...
...

Method for Recognizing a Shape from a Path of a Digitizing Device

Described is a method for recognizing a shape from a path of a digitizing device. A set of points along a path of the digitizing device is acquired and a parametric representation is fit to the path. The parametric representation is compared to a set of known shapes to determine that the path of the...
...

Methods and Apparatus for Image Restoration

Methods and apparatus for restoration of a digital image. In one embodiment, a method for repairing a defect in a digital image to provide a restored image comprises determining a plurality of pixel locations to form a neighborhood relating to the defect and whether or not the neighborhood has a wel...
...

Methods and Apparatus for Visual Sub-band Decomposition of Signals

Methods and apparatus for image processing include performing visual sub-band decomposition of an image using human visual system characteristics to generate a plurality of sub-band decomposed images, independently processing the plurality of sub-band decomposed images with at least one application,...
...

Interactive Digital Workbook System and Method

A digital workbook program, method, and system include a program interface module configured to communicate with a set of applications and a workbook module configured to generate a digital workbook from a master digital workbook. The digital workbook includes content and mechanisms that enable inpu...
...

Adaptive Hybrid Reasoning Decision Support System

A method for indexing a plurality of nodes using a computer system is provided. The computer system includes data storage and a processor coupled to the data storage. The method includes acts of storing the plurality of nodes in the data storage, each of the plurality of nodes having a hit count, a ...
...

Approximate Srt Division Method

The invention relates to a program storage device readable by a machine, tangibly embodying a program of instructions executable by a specific semiconductor-based computational device situated in the machine to perform the steps of a partial SRT (PSRT) division of a dividend X by a divisor D to obta...
...

Ram Memory Element with One Transistor

The invention relates to a memory element consisting of an MOS transistor having a drain (8), a source (7) and a body region covered by an insulated gate (12), wherein the thickness of the body region is divided into two distinct regions (13, 14) separated by a portion of an insulating layer (16) ex...
...

Device and Method for Adaptive Control of Blank's Machining

Invention refers to devices, especially to computer numerical control (CNC) machines, and to the method for adaptive machining of parts using adaptive control system with fuzzy logic principles, especially to the device and method, which adaptively controls technological parameters according to surf...
...

Motion Estimation and Compensation Process and Device

In the motion estimation and compensation process for video frames, blocks O of pixels are considered. A number k of bit planes in a block O in a video frame F are compared with blocks OR in reference frames (FR). The best matching block (ORM) is determined in the reference frames (FR). Subsequently...
...

Method and Device for Improved Ontology Engineering

The present invention is related to a method for populating a data system, comprising the steps of: a. mapping at least one application path of the data system to at least one conceptual path of an ontology system, said application path addressing a parts of the structure of the data system and said...
...

Method and Device for Ontology Evolution

The present invention is related to a method for modifying a mapping from at least one application path of a data system to a conceptual path of an ontology system, said application path addressing a part of the structure of the data system and said conceptual path addressing a part of the structure...
...

Parameterized Configuration for a Programmable Logic Device

The invention relates to a method and a tool for generating a parameterized configuration for a Field Programmable Gate Array from a Boolean function, the Boolean function comprising at least one parameter argument, comprising the steps generating at least one tunable logic block from the Boolean fu...
...

Method of Operating Quantum-mechanical Memory and Computational Devices

A method of operating a quantum system comprising computational elements, including an insulated ring of superconductive material, and semi-closed rings used as an interface between the computational elements and the external world, is disclosed. In one aspect, the method comprises providing an elec...
...

Scheduling an Application for Performance on a Heterogeneous Computing System

The invention concerns scheduling an application comprised of precedence constrained parallel tasks on a high-performance computer system. The computer system has a plurality of processors each enabled to operate on different voltage supply levels. First, a priority order for the tasks based on the ...
...

Software Platform and System for Grid Computing

A software platform for providing grid computing on a network of computing nodes, comprising a configurable service container executable at the nodes, including message dispatching, communication, network membership and persistence modules, and adapted to host pluggable service modules. When execute...
...

Virtual Human Interaction System

A virtual human interaction system is described for use on a web-enabled computer which facilitates the training and education of medical services practitioners such as doctors, nurses, pharmacists and the like by allowing them to virtually interact with a virtual patient delivered by the system and...
...

Machine Learning

Computer implemented machine learning methods are described. A co-operative learning method involves a first rule based system and a second rule based system. A rule base is generated from input data and recursion data is used to recursively update the rule base as a result of newly received input d...
...

Apparatus and Method for Performing Service Adaptation in Respect of a Mobile Computing Device

One embodiment of the invention provides a method and apparatus for performing service adaptation in respect of a mobile computing device. The method includes providing a service adaptation specification as a set of rules, where each rule comprises a rule body containing one or more premises and a r...
...

Method and Apparatus for Virtualization of Appliances

A method and apparatus for the virtualization of appliances provides an embedded operating system (OS) which is included in the system boot ROM of a personal computer. When the system boots, the OS is launched and looks for all available virtual appliances from, for example, the following places: lo...
...

Device for Providing Built-in Broadband Dial-up Function

A device for providing a built-in broadband dial-up function belongs to the network communication field. The device comprises: a USB communication interface module, a processor, a first storage module and a network dial-up interface module. The USB communication interface module is connected with th...
...

Method, System and Computer-accessible Medium for Providing a Distributed Predicate Prediction

Examples of a system, method and computer accessible medium are provided to generate a predicate prediction for a distributed multi-core architecture. Using such system, method and computer accessible medium, it is possible to intelligently encode approximate predicate path information on branch ins...
...

Methods for memory assignment schemes and architecture for shareable parallel memory module based internet switches

Systems and methods are described for high-speed memory assignment schemes for routing packets in a sharable parallel memory module based switch system. A method includes receiving a parameter, determining availability of memory location, determining if an available memory location is pre-assigned, ...
...

Method for Skin Tone Detection

There is described a method for detecting the presence of skin tone in an image. A gray scale representation of a pixel within the image is provided. Next, a red chrominance independent representation for is provided for the pixel. Then, the two representations are analysed to determine whether a di...
...

USB Portable Device

A USB portable device (1) comprises an activating USB peripheral (12a), a storing USB peripheral (12b), and a controlling USB peripheral (12c). When the USB portable device (1) is connected to a host device (2), the activating USB peripheral (12a) is allowed to be recognized as a readable device and...
...

A Method, Apparatus, Computer Readable Storage Medium and Computer Program for Forming an Object

A method for forming an object, comprising: providing at least a first material having a melting point at a first temperature and a second material having a melting point at a second temperature; heating at least a portion of the first and second materials above the first and second temperatures to ...
...

Method, apparatus, computer readable storage medium and computer program for forming an object

A method for forming an object, including providing at least a first material having a melting point at a first temperature and a second material having a melting point at a second temperature; heating at least a portion of the first and second materials above the first and second temperatures to fo...
...

System and Method for Arranging Items for Display

A system for arranging searchable items, such as digital images or multimedia icons for presentation on a graphical user interface. The system has an optimizer module which minimises a cost function for arranging items in a layout space and is applied to one or more predetermined characteristics of ...
...

Method, System and Server for Selecting User

A method, a system and a server for selecting user are provided. The method includes: receiving request message sent by a requester, wherein the request message includes multiple conditions of user's selection and specific operation mode of user's selection; obtaining user information that satisfies...
...

USB connector and USB device

A USB connector (51) for connecting with a USB female comprises metal legs (11), a connecting line (12), and a substrate(13), wherein the metal legs (11) are formed on a surface of the substrate (13), wherein one end of the connecting line (12) connects with one end of the metal legs (11), another e...
...

Antireflection Film

An antireflection film having high stain resistance is provided. The antireflection film 10 includes a transparent substrate 11, a high-refractive index layer 12, and a low-refractive index layer 15. The low-refractive index layer 15 is formed of a cured product of a polymerizable composition contai...
...

Image Display Device and Method for Manufacturing the Same

An image display device, and a production method thereof are provided, which are capable of suppressing warping of a protective panel formed from a plastic as much as possible. In an image display device having a liquid crystal display panel 1 and a transparent protective panel 2 formed from a plast...
...

Method, User Device and Server for Multimedia Session Transfer

The present invention discloses a method, user device and server for multimedia session transfer. The method includes: receiving the session transfer request using the static Session Transfer Identifier (STI) which is sent by the user device; dealing with the Circuit-Switched (CS) session transfer r...
...

Method and apparatus for abnormality recovering of data card, and data card

A method and apparatus for abnormality recovering of data card is provided. The method includes: obtaining identification information of a network interface card device in an accessed data card; obtaining status information of the network interface card device in accordance with the identification i...
...

Method, device and system for negotiating authentication mode

The present disclosure discloses a method, device and system for negotiating authentication mode. A first negotiation request carrying an authentication mode supported by a terminal is sent to an authentication server, so that the authentication server determines and sends an authentication mode sup...
...

Method and apparatus for improving radio performance of wireless data terminal device

A wireless data terminal device comprises a detachable USB connector and a main circuit board, where at least two redundancy grounding connections are provided between the detachable USB connector and the main circuit board, and the grounding points of the at least two redundancy grounding connectio...
...

A Video Encoding/decoding Method and a Video Encoder/decoder

A video coding method, a video decoding method, a video coder, and a video decoder are disclosed herein. A video coding method includes: performing base-layer coding for the first view, and extracting prediction information of at least one layer by combining a locally decoded first view and a second...
...

Method and device for implementing USB endpoint multiplexing

A method and device for implementing USB endpoint multiplexing are disclosed. The USB device of the present disclosure supports at least two USB functional devices, and the number of the USB functional devices that are supported by the USB device is larger than the number of data endpoints of the US...
...

Apparatus and Method for Acquiring Sectional Images

Disclosed is a computer implemented method of interrogating volumetric data, the method including the steps of: defining a reference surface relative to the volumetric data; providing an interrogation window lying in a movable interrogation plane intersecting the reference surface and the interrogat...
...

Image Display Device, Imaging Device, and Program

An image-capturing device (image display device) 1 includes a rear monitor 12 (display means) having a primary display region MR and a plurality of secondary display regions SR1 to SR3. Further, display control means of the image-capturing device 1 controls contents of display on the rear monitor 12...
...

Display device and method of controlling display device

A display device includes a flexible substrate, a display unit including a plurality of light-emitting elements arranged at the substrate and configured to display an image according to an image signal, a displacement sensor provided to a front surface or a back surface of the substrate and configur...
...

Data transmission optoelectric device

An optoelectronic data transmission device has an active section with an active element that generates an optical gain if a forward bias is applied, and an absorption section. A waveguide incorporates the active section and the absorption section. Mirrors providing feedback for light are placed to f...
...

Image data generating method for displaying computer generated object on displaying device, involves rendering divided polygon area networks with shaded value for receiving image data in display devic

The method involves supplying polygon area networks with amount of vertex for representing an object. The polygon area networks are divided according to a classification procedure e.g. butterfly-classification procedure. A normal amount of vertex is determined, where normal vertex is assigned to the...
...

Method, System and Computer Program Product for the Decentralized Distribution of Digital Content

A method for the decentralized distribution of digital content via a network includes providing content with a tag configured to allow at least one of an operator of a download portal and a content provider to track distribution of the content so as to collect data about a number of downloads of the...
...

Method for Executing One or More Programs on a Multi-Core Processor and Many-Core Processor

The invention relates to a method for executing computer usable program code or a program made up of program parts on a multi-core processor (1) with a multiplicity of execution units (21, 22, 23, 24), each of which comprises a local memory (201) and at least one processing unit (202) communicativel...
...

Digital Watermarking

These 2 applications include a new and improved watermarking system and method for use with video and audio. The system and method can be applied directly to compressed media data/ frames with variable lengths (as opposed to a common fixed length) which (1)tremendously reduces the amount data needed...
...

Digital Watermarking

2 patent pending digital watermarking systems for sale....
...

Thermal Ground Plane for Cooling Chips and Semiconductor Devices

BACKGROUND: Efficient cooling of semiconductor and integrated circuit devices is critical to their operation. Improvements in cooling allow further technological advancement. Titanium is a unique material suited well for harsh environments and is robust and shock resistant. DESCRIPTION: Researche...
...

A Video Fingerprinting Method for Duplicate Detection

BACKGROUND: Copyright infringements and data piracy have become serious concerns for the ever growing online video repositories in recent years. The uploaded videos on commercial sites are mainly textually tagged. Tags are of little help in monitoring the content and preventing copy-right infringeme...
...

Hybrid Silicon Evanescent Devices

BACKGROUND: Conventional silicon photonic and optoelectronic devices are mostly built on silicon-on-insulator (SOI) wafers, where a buried SiO2 layer provides vertically optical confinement to maintain lightwave propagation. With increasing demand to replace electrons with light to be the informatio...
...

Improved Differential Space-Time Block codes for Mobile Wireless Systems

BACKGROUND: Space-time block coding (STBC) is used in advanced wireless communications systems to transmit redundant data streams from multiple antennae in order to improve the reliability of data transfer and greatly increase data transmission rates. Such redundancy helps protect wireless data link...
...

New Method for Concurrent Error Detection and Correcting

BACKGROUND: The spread of technology into hostile environments has increased the need for dependable machine execution without compromising performance levels. The de facto model used for describing fault tolerant systems is the single-event upset (SEU) model, which specifies a maximum of one error ...
...

Embedded Systems Building Blocks (eBLOCKS)

BACKGROUND: Embedded systems combine numerical or Boolean logic operations with arrays of electronic components such as sensors, monitors, controls, and communication devices to add “intelligent” functionality to otherwise unsophisticated circuitry. Unfortunately, most people don't have the skills n...
...

Optical Dispersion Monitoring Technique using Double Sideband Subcarriers

BACKGROUND: The tremendous growth in Internet traffic has presented the need to scale networks far beyond current speeds, capacities, and performance levels. Optical fiber is capable of transmitting large amounts of data at high speeds without needing to periodically retransmit signals over long dis...
...

Self-Assembled Nano-Cluster and Quantum Dot Lattices

BACKGROUND: Self-assembled quantum dots (QDs) have been the subject of great interest in recent years due to their attractive electronic and optical properties. QD structures and their applications, such as lasers detectors, and memories have demonstrated several unique physical properties. The self...
...

System and Method for Testing High-Speed VLSI Devices using slower Testers

BACKGROUND: The operating speed of VLSI circuits is constantly increasing and even small delay faults can cause these circuits to malfunction. Delay testing, which applies pre-generated test vectors to the circuit during its intended operating speed, can ensure the circuit's temporal correctness. Ho...
...

Watermarking Based Intellectual Property Protectio

BACKGROUND: In the past in the semiconductor industry, circuit designers and process engineers worked together at the same company. However, companies are now specializing in either design or processing. As a result, systems are being built from pre-designed, or virtual components (VCs). Reuse of VC...
...

Quantum Computation with Quantum Dots and Terahertz Cavity Quantum Electrodynamics

BACKGROUND: A quantum computer processes quantum information, which is stored in "quantum bits" (qubits). The recent explosion of interest in quantum computation can be traced to Shor's demonstration in 1994 that a quantum computer could exponentially speed up factorization of integers. This applica...
...

Adaptive Removal of Resonance-Induced Noise

BACKGROUND: There are many instances when it is desirable to remove an underlying operating frequency from an output signal. When the frequency range is somewhat known, this removal is relatively straightforward using a stagger-tuned notch filter. Stagger-tuned notch filters, however, introduce cons...
...

Predictive Event-Tracking Method

BACKGROUND: With the rapid increase of processor speeds, the bottleneck of input/output (I/O) and network system latency has become a critical issue in computer system performance. Standard least-recently-used (LRU)-based caching techniques offer some assistance, but by ignoring relationships that e...
...

Integrable Sub-Micron Ferromagnets for High Density Storage

DESCRIPTION: The continued evolution of magnetic media's vital role in information storage requires advances in appropriate technologies. Scientists at the University of California have developed a process of introducing sub-micron ferromagnets of selectable size and spacings into semiconductor stru...
...

Quantum Dot Fabrication Process

DESCRIPTION: Quantum dots possess unique properties that could potentially revolutionize existing optical and electronic technologies as well as open up new technologies. Conventional quantum dot fabrication techniques, however, have several drawbacks, such as large recombination velocities and sur...
...

Patented Apparatus, Method and Connection Means for a Modular Personal Datacenter

Three issued US patents protecting a system comprised of modular, stackable digital appliances (integrated hardware & software) that work together to form an easy to expand personal datacenter. Key Features: Simple to determine compatibility by observing the shape of the product. Integrated, ex...
...

Colorization of Photos and Video Images

Highlights Computer-assisted process for adding colors to monochrome images or films Simplifies colorization process by exploiting the premise that neighboring pixels in an image possess corresponding intensities and color shades Interactive colorization process improves image quality with less m...
...

Target-driven Smoke Animation

Highlights Efficient, direct control of animated smoke as special effect Provides animators with precise control while eliminating need for high performance computation resources Generates smoke animations at low cost compared to flow simulation methods currently available Application in computer...
...

A Novel High Dynamic Range Compression Method

Highlights The method allows representation of high quality high dynamic range (HDR) images containing large contrast differences between light and dark areas, as the human eye actually sees, on monitors and printers that are designed to display a much smaller dynamic range Preserves fine detail ...
...

Robust Real Time Pattern Matching

Highlights Proprietary algorithm for pattern matching in both static and dynamic applications Computer vision software for extracting and analyzing information from images Simple, fast method for use by industrial robots and vision based systems for assembly, manufacturing and inspection Applicat...
...

New View Synthesis from Plural Images Using a Trifocal Sensor Data Structure in a Multi-view Parallax Geometry

The invention is embodied in a process for synthesizing a new image representing a new viewpoint of a scene from at least two existing images of the scene taken from different respective viewspoints. The process begins by choosing a planar surface visible in the at least two of the existing images a...
...

System and Method for Providing Multi-sensor Super-resolution

A super-resolution enhanced image generating system is described for generating a super-resolution-enhanced image from an image of a scene, identified as image g.sub.0, comprising a base image and at least one other image g.sub.i, the-system comprising an initial super-resolution enhanced image gene...
...

Compiler Aided Ticket Scheduling (cats)

Highlights Today’s personal computers (PCs) are rapidly becoming heterogeneous multi-core computing environments with PC cards having their own CPUs. Few applications really take advantage of all the available processing power. Currently there is no generic programming model and corresponding run...
...

Improved Cache Performance with Reduced Energy

Highlights Cache design improves performance by ~10% Win-win situation: design that improves performance also reduces power consumption Consists of a main cache structure preceded by a small, highly associative filter Blocks inserted into the cache are far more likely to be frequently reused, re...
...

Directed Client-side IP Spraying

Highlights The system recognises significant search terms and replicates a search-term-specific portions of a search engine’s complete searchable database to provide a database that contains only relevant targets Avoids the bottleneck produced by large numbers of searchers inputting general searc...
...

Single Image Dehazing

Highlights Improved method for recovering haze-free contrasts in images from a single input Improves images from long-distance photography or in foggy conditions Improved results compared with existing techniques, such as polarization-based dehazing No need for multiple images or input of weather...
...

Low Cost Motion Capture

A new, simple and low-cost way to capture and record the movement of biological articulated structures. An example of a biological articulated structure is the body; arms, legs, fingers, etc. But not only the human body, this method will work on animals just as well as people. This technology no...
...

System and Method for Generating Vector Bitmaps with Dual Data Domains

Vector illustrations have become a ubiquitous representation of images for print, monitor display, multimedia, etc. Raster images, however, are resolution dependent and resampling them for display at a higher resolution results in an image that is qualitatively different from a similar vector illust...
...

University of Utah Space Management Information System

Space management is a major challenge for organizations with multiple assets that are spatially distributed. The University of Utah Space Management Information System (UUSM), which is the result of combination of two technologies namely database application software (Tenfold�) and geographical info...
...

Collaborative Control of a Remote Software Application

Secure remote access to computers is a real challenge in today�s world. Trading off one or more of performance, privacy and security over the other is a scenario that is commonly encountered. This invention describes a simple solution to avoid the above mentioned problems. A master user can allow a ...
...

Micro cooling device

Fast computers are today becoming a common thing. To keep these computers running fast, the heat generated from the internal components needs to be addressed. A new device called the viscous disk air flow displacement device is presented, which allows a large amount of air to be moved using the visc...
...

Novel Self-Calibration for Air-Bearing Rotary Encoders

The University of British Columbia (UBC) has developed a self-calibration method for air-bearing rotary encoders that eliminates the need for additional calibration instruments. High accuracy rotary encoders are widely used for rotational axis position measurement in ultra-precision manufacturing eq...
...

Thermally Transformable Periodic Mesoporous Organosilica (PMO) Thin Films for Low Dielectric Constant Applications

Background Periodic mesoporous organosilica (PMO) thin films have been investigated in various applications requiring specific optical, magnetic, or electrical properties. These well-defined porous films have specifically shown their interest in the microelectronics industry for application as l...
...

Veball: a Multiple Degree-of-freedom Computer Input Device

Virtual 3D manipulation of computer generated representations (eg. required in CAD software applications) or robotic control (eg. surgical devices) is a challenging task in computing or control environments that rely on standard input devices such as a keyboard, mouse, joystick, etc. Many such appli...
...

Optimizing Mathematical Programs with Peer-to-Peer Networks

Would you like to harness the exponential computational power of peer-to-peer (P2P) networks to solve demanding mathematical optimization problems, but are concerned about security? This innovation delivers the speed and scalability of P2P networks, it does not disseminate any dangerous executable ...
...

Memory-Linked Wavefront Array Processor

A method for performing computations with an asynchronous linear array of multiple processing stages is disclosed. The linear array comprises multiple processing stages interspersed with flow control flag mechanisms and with dual port linking memories. The method utilizes the flow control flag mecha...
...

Trusted Ring Secure Platform Architecture

People rely on computers to provide security, whether it be for online banking transactions, internet purchases, SCADA systems, personal and medical information, or electronic voting. Ultimately, it is the operating system that is expected to supply this security, but operating systems are often the...
...

Capability Based Planning Methodology and Tool

The Department of Homeland Security (DHS) requires local, state and regional jurisdictions to have a program for assessment of risks and capabilities prior to receiving grants. DHS has not proposed any unified format and therefore receives many applications with incomplete and disorganized data. The...
...

Capability Based Planning Methodology and Tool

The Department of Homeland Security (DHS) requires local, state and regional jurisdictions to have a program for assessment of risks and capabilities prior to receiving grants. DHS has not proposed any unified format and therefore receives many applications with incomplete and disorganized data. The...
...

Intelligent Fusion of Multi-modal Biometric Inputs for Decision Making

While techniques provide some beneficial results, they do not effectively utilize all of the information available to a score-level fusion system, including score values, quality estimates, and score distribution statistics. APL's Process for Multi-Biometric Fusion provides expandable, Bayesian ...
...

Periscope Object Identifier

The highly dynamic environment posed by the ocean surface eliminates many algorithms (i.e. statistics-based segmentation, detection) as potential solutions to detection of surface ships from a low vantage point. The JHU/APL technology is an algorithm for automatic detection, classification and r...
...

Advanced Programming Interface (API) for Integration with IVC-4300 Video Acquisition Card

Currently, the IVC-4300 video acquisition card can only be interfaced with through advanced programer knowledge of Microsoft DirectShow which can only be used in C or C++ programs. Researchers at the Johns Hopkins University Applied Physics Laboratory have developed an Advanced Programmer Interfa...
...

Three-dimensional Scanning System which Combines a Photometric Stereo Method with a Structured Light Method to Obtain the Shape of an Object

Existing art scanning technologies have several differences. For example, laser scanners are not as high-resolution. Scanning electron microscopes are higher in resolution but far more time-consuming and noisy. They also do not provide color information. Researchers at The Johns Hopkins Universi...
...

Dust Transport Application (DTA)

Dust storms throughout Sahara Africa, the Middle East and Asia are estimated to place between 200-5000 million metric tons of mineral dust into the earth's atmosphere each year. Dust storms directly affect visibility and impact daily commercial and military operations near desert regions. There is a...
...

TCM2 Data Recorder

The current TCM2/TCM-20 inclinometer's output is limited to serial communication and does not output timing information. Researchers at APL have developed a Windows compatible graphical user interface for the TCM2/TCM2-20 inclinometer produced by PNI. This program provides accurate time recording...
...

Design Methodology for Optimal Power Generation in Solar Vehicles Using Genetic Algorithms

This JHU/APL invention applies genetic algorithms to the problem of optimally determining solar panel location and size on an airship (or other solar paneled vehicle) to minimize power, weight, and volume for significant performance advantages over more “intuitive” design methods typically employed....
...

Automated Vulnerability Analysis Support Tool (AVAST)

With the speed and convenience of e-business comes considerable risk. Viruses, hackers, denial of service attacks, programming errors, stolen or destroyed databases – these and other electronic hazards can cause huge financial losses and damage to professional reputations. AVAST is a network vuln...
...

Passive Sonar Compression Algorithm (PSCA)

Passive sonar systems are used to gather critical sonar data from unmanned buoys, underwater vehicles, sensors towed from a ship or other advanced deployable sonar data collection systems. Sharing of data from these sensors is often key to a successful naval operation, however data transfer is very ...
...

Sensor-to-sensor track correlation algorithms (1) Vector sort and (2) distance sort

Fingerprint minutia matching involves finding sets of minutia from one fingerprint that can be rotated and translated so that they correspond to a set of minutia from the other print. Under ideal circumstances, if both prints are perfect and the minutia extraction is perfect, one might expect that t...
...

A Better and Faster Design and Evaluation Tool for Large Systems

Complex systems have a large number of design parameters that control or affect the performance of the overall system. As systems become larger, the possible number of combinations of these design parameters explodes combinatorially. Evaluating potential system performance with current techniques su...
...

Radiance Library Forecasting for Time-Critical Hyperspectral Target Detection Systems

Automated detection of targets continues to be a top priority for future tactical hyperspectral sensing platforms. Due to its large number of fine frequency bands across a wide portion of the spectrum (UV to LWIR), hyperspectral technology offers enhanced discrimination capability and can be used to...
...

Source of Single Photons on Pseudo-Demand from Stored Parametric Down-conversion

There are currently proposals for providing a single-photon from the spontaneous emission of an isolated two-state quantum system such as a single atom, ion or quantum dot. In principle, these approaches offer the possibility of a single-photon “on-demand” in the sense that the isolated two-state sy...
...

Adaptive Analysis Framework

This technology, the Adaptive Analysis Framework (AAF) is a novel design and maintenance plan for large databases associated with biological and medical research problems or clinical assessments that make use of large scale data sources within multiple and separate laboratory facilities. The framewo...
...

Universal Display Format (UDF) for Optimized Real-Time Display of Geographic Data

The Johns Hopkins University Applied Physics Laboratory's "Universal Display Format (UDF)" provides a simplified, platform- and application-independent file format optimized for real-time display of geographical data. The UDF toolset converts a variety of data formats containing geographical informa...
...

Chebyshev Data Compression

Both lossy and lossless data compression methods have come into wide use for a variety of data compression needs. Lossless compression algorithms typically achieve reductions in data volume by a factor of 1.5 to 2, essentially without loss of information. Lossy algorithms, on the other hand, achieve...
...

Latitude Longitude Plotter

Prior to the development of this program, analyzing latitude/longitude data was very time-consuming and labor-intensive, requiring many different software applications. JHU/APL’s Latitude Longitude Plotter integrates all of the features of those applications into one program. Results that would h...
...

Methods for Implementing Quantum Logic Operations Using Polarizing Beam Splitters

Quantum computers are expected to perform numerical calculations that are not feasible using conventional computers. They are expected to factor large numbers in an efficient manner, which would have a major impact on cryptography and secure communications. JHU/APL’s new method implements quantum...
...

Open Autonomy Kernel (OAK), an Architecture for Mode-Identification and Reconfiguration of Control systems Model-Based

Model-based reasoning systems have been relying upon a single model on which a single reasoning engine operates. A single inference engine physically removes the intelligence from the control system when used to control geographically large systems such as ships, computer networks, power grids and t...
...

Online Data Visualization Toolkit

The power of the Internet as a Research tool is only now becoming apparent. The Scientific community is struggling to find ways to provide access to complicated data sets over the web. Each new mission or research project is faced with the same difficulty; how to provide a convenient and reliable in...
...

Integrated Adaptive Antenna Array and Adaptive Locally-Optimum Detection Processor

Adaptive Antenna Arraying (AAA) and Adaptive Locally-Optimum Detection (ALOD) are two complementary signal-processing techniques use for detecting weak signals (such as radio or radar) in the presence of strong man-made interference or jamming. The system is primarily designed for incorporation with...
...

Tactical Image Rendering Tool Image Processing Algorithm for Creation of Unclassified Line Drawings from Classified National Technical Means Imagery

The security classification of the images, and sometimes the inherently large file sizes, prohibit the images from being used in certain operations. One common means for addressing the security classification issue is to create image derived products that are eligible for security classification dow...
...

Cybernetic Systems Based on Inductive Logic

A common approach to problem solving is to obtain the necessary information, make necessary interferences, and carry out required actions in the "best" way possible given the practical constraints of limited knowledge and limited abilities to act. The present invention provides a quantitative defini...
...

Real-Time Video Integration with Mapping Software

While receiving a live video feed certainly provides much useful information for the task at hand, often it is difficult to interpret the data without having a broader perspective. For instance, consider a search and rescue mission that is utilizing aerial video to assist in finding a lost person. T...
...

Clinician's Portable, Digital, Intelligent Assistant (Pain Informatics Program)

The input devices are mobile pen-based computers and palm pad systems that will emulate and expand the clinician’s present paper patient system. The system will provide for semi-automation of the collection, archiving, and retrieval of patient information. The Pain Informatics system provides medica...
...

A Hybrid Software/Hardware Technique for High Speed Backplane Messaging

A system and method of enhanced backplane messaging among a plurality of computer boards communicating over a common bus uses a set of pre-allocated buffers on each computer board to receive messages from other computer boards. Each sending computer board is represented on each remote computer board...
...

PC-Based Voice Activated Human Interaction Simulations

A computer-based training tool and method that emulates human behavior using a computer-simulated person in a realistic scenario. The simulated person provides verbal responses in combination with an animated video display reflecting the body language of the simulated person in response to questions...
...

Symbol Synchronization in a CPM Communications Receiver Based on Energy Near Half the Symbol Rate

The primary objective of the invention is to provide a new method for timing recovery and symbol synchronization in a continuous phase demodulator that overcomes the problems of symbol synchronization for a general continuous phase modulation system. The method is linear in the phase up to an in...
...

Enhanced Virtual Executor (EVE) for Linking Intra-Institutional PC's in Parallel Processing

The Enhanced Virtual Executor (EVE) is a software program that provides the capability to run command-line-driven personal computer (PC) programs remotely and simultaneously on multiple computers, via a TCP/IP network. By distributing computational processes over many computers in this way, the time...
...

Optical Method for Quantum Computing

Many kinds of numerical problems cannot be solved using conventional computers because of the time required to complete the computation. It has been estimated that the time required to factor a 150-digit number using the fastest supercomputers currently available would be longer than the age of the ...
...

Adaptive Windowing of FFT Data for Increased Resolution and Sidelobe Rejection

Fast Fourier Transforms (FFTs) are used for processing observed signals. Weighing functions, referred to as windows, are applied to the data to reduce the spectral leakage associated with finite observation intervals. Thus, in applying windows to a sample data harmonic analysis, undesirable effects ...
...

Apparatus and Method for Quantum Mechanical Encryption for the Transmission of Secure Communications

An apparatus and method were developed that permit the transmission of secure communications. The invention uses quantum mechanical effects to establish nonlocal correlations between a pair of photons. This is analogous to an automatic encryption code that exists at only one location and is immediat...
...

Polygraph Automated Scoring Systems

A polygraph automated scoring system was developed in which polygraph signals are input and a probability of deception is output. To begin the process, digitized polygraph signals are transformed into more fundamental signals. These fundamental signals are then subjected to standardization, a critic...
...

Stack Data Cache Having a Stack Management Hardware with Internal and External Stack Pointers and Buffers for Handling Underflow and Overflow Stack

An efficient hardware cache manager controls the top-of-stack data underflow/overflow. A processor chip includes a processor, a stack buffer, and the invented cache management hardware. The processor chip communicates with a remove overflow stack through an address/data bus. The cache management har...
...

Adaptive Locally-Optimum Detection Signal Processor and Processing Methods

Previous adaptive nonlinear techniques do not implement optimum signal detection transforms based on the full probability distribution of interference variables, and therefore do not suppress as broad a range of interference types as effectively as does the invention described and claimed herein. Fu...
...

Apparatus for Categorizing and Accumulating Events

The invention provides an apparatus for categorizing and accumulating a plurality of different event types wherein the characteristics of each event are detected by a detector and presented to the apparatus as an electrical signal of variable analog or digital value which may indicate the type, spee...
...

Address Sequence Generation by Means of Reverse Carry Addition

An apparatus and method are disclosed for generating a bit reversed sequence. The apparatus includes a reverse addition means for adding binary words in most significant to least significant bit order with the overflow or carry bit propagated to the left. The invention is used to generate a bit reve...
...

Computer-Controlled Neurological Stimulation System

Implanted electrical stimulation devices have been employed in the management of chronic intractable pain for over twenty years. The most common electrode implantation site has been the dorsal spinal epidural space. Spinal cord stimulation, like peripheral nerve or thalamic stimulation, evokes pares...
...

A Better and Faster Design and Evaluation Tool for Large Systems

Complex systems have a large number of design parameters that control or affect the performance of the overall system. As systems become larger, the possible number of combinations of these design parameters explodes combinatorially. Evaluating potential system performance with current techniques su...
...

Functional Memory Custom Computing Machine (FMCCM)

Description The FMCCM implements and combines ideas from Field Programmable Gate Array (FPGA) Custom Computing Machines (FCCMs), reduced instruction set computing (RISC) and spreadsheet (tabular) programming. The FMCCM approach differs from others in that it follows the conventional processor/memory...
...

Partial Handoff in MIMO-OFDM Cellular Systems

Background MIMO technology allows high data-rate transmission to a single user using spatial multiplexing techniques, space-time coding, and other methods known in the art. In a wireless cellular network, when the mobile receiver is moving from one cell to another, multiple transmit antennas provide...
...

Multi-band Modulation, Coding, and Medium Access Control for Wireless Networks

Background The IEEE 802.11n standard, which some enterprises are already adding into their wireless plans, promises to replace the Ethernet and bring WLANS and UWB into one virtually seamless web. This technology enhances 802.11n and similar standards by jointly designing the MAC and PHY layers of m...
...

Method and System for Background Replication of Data Objects

Background Prefetching is used to improve the speed of data requests by anticipating the next request and prefetching the respective data. Currently prefetching is hand-tuned, which risks being too aggressive or too timid, consequently hurting demand traffic or diminishing prefetching performance. M...
...

Codebook Tables for Encoding and Decoding Partial Channel State Information in a Multiple-Input Multiple-Output (MIMO) System

Background Multiple-input multiple-output (MIMO) communication systems can use channel state information to improve performance in wireless links. A practical way to obtain channel state information at the transmitter is through codebook-based closed-loop transmit diversity methods, known broadly as...
...

Workload-guided Application Scheduling in Multi-core Systems

Background Heterogeneous multi-core processors have emerged more efficient as compared to homogeneous multi-core processors. This is due to the ability of heterogeneous multi-core processors to meet the different resource requirements of applications, and hence achieve power-efficient computing. How...
...

Workload-guided Application Scheduling in Multi-core Systems

Background Heterogeneous multi-core processors have emerged more efficient as compared to homogeneous multi-core processors. This is due to the ability of heterogeneous multi-core processors to meet the different resource requirements of applications, and hence achieve power-efficient computing. How...
...

University of Texas At Austin

Background Analyze vibration of cars: Noise levels for comfort, quality Simulation models needed; physical prototypes not practical Detailed (huge) model needed Historically, Cray supercomputers were required: Expensive Slow job turnaround Limited benefit from analysis Invention Description New ...
...

UTWID 5.0 for Injection Water Management

Background Injection water management is a critical component to offshore well operation. Invention Description UTWID allows the user to address: How clean is clean? What filtration specs should I use? Can I inject raw seawater? How much oil in produced water will my injection well tolerate? How...
...

UTRTM Computer Software

Background The program calculates skin factor evolution during an acidizing treatment by measured pressure and injection rate data while pumping. The software can be used to evaluation acid treatment effectiveness, identify damages during injection, and optimize subsequent treatments. Invention ...
...

UTMAST (UT Matrix Acidizing Simulation Tool )

Background The program can be used to create a damage assessment model prior to applying the acidizing process in the well to reduce risk of damage to the well. Invention Description UTMAST has two main parts, the formation damage assessment and acidizing simulation. The formation damage assessm...
...

UTFracT Computer Software

Background Knowing the location and height of a fracture in a well bore can help the operator to plan and optimize production of the well and to improve future fracturing operations. Temperature logs have been used to determine the locations and the heights of fractures created by hydraulic fracturi...
...

Telephone Call Center with Method for Providing Customer with Wait Time Updates

Background There are some customer service tasks that arise when a customer calls into a call center and would rather deal with an automated self-service system than with a human agent e.g., they cannot pay their entire bill. For those customers, they can schedule a series of payments automatically....
...

SimSite Computer Program

Background The need exists for students at all levels to study real-world problems. However, time and financial constraints prevent such real-world studies. SimSite was written to simulate real-world situations. Invention Description SimSite is a computer simulation application programmed in Mic...
...

Program to Detect MOVEs of Numeric Fields to Alpha Fields in NATURAL Programs

Background When NATURAL v2.2.x code contains a numerical field holding the value '02' (xF0F2), it is moved into an alpha field; the alpha field holds the value '2' (xF240) instead of '02' (xF0F2). Invention Description A NATURAL v2.3 program reads NATURAL v2.2.x object code and detects MOVE inst...
...

PLAPACK Server Interface (PSI)

Background Mathematical software packages perform complex analysis and modeling; however, these systems can only solve a limited size of problems because of memory and CPU power limitations. Other software applications have attempted to apply the use of a parallel machine, but they are still limited...
...

Parallel Linear Algebra Package (PLAPACK) Release R3.1

Background Previously created software packages for parallel computers are inefficient because data is continuously passed back and forth between separate parallel machines. These applications have been unsuccessful in building parallel linear algebra libraries for distributed memory supercomputers....
...

Neuroevolution: Real-Time Creation of Sequential Digital Systems for Control, Design, and Decision Making

Background Many applications lack a method of evolving networks for learning tasks. In difficult real-world learning tasks such as controlling robots, playing games, or pursuing or evading an enemy, there are no direct targets that can specify the correct action for every situation. Neural networks ...
...

ModSite Computer Program

Background There exists a need to teach groundwater modeling skills at the university and professional level. Invention Description Prior to the creation of the ModSite program, no computer software existed that could be used to teach contaminant transport modeling. ModSite is a Windows-based pr...
...

Control Flow Deviation Detection for Intrusion Prevention in Embedded Software

Background Computer systems are prone to security attacks which exploit software bugs. The security attacks typically try to make the computer system execute portions of code which would not have been executed otherwise. This can result in compromising the data on the system or relinquishing control...
...

Compatibility Assessment of Educational Programs

Background The nation's public school system is poorly designed to aid certain students who are at risk, entering the mainstream educational system. The accelerated school concept works to bring at-risk students into the educational mainstream by building on their natural strengths and by having con...
...

ARL: UT GPS Software Toolkit (GPSTK)

Background Many GPS algorithms experience processing problems when the number of data components and state elements vary widely and change rapidly. Moreover, many aspects of these algorithms have never been published. Nor were they devised by bringing together different results from widely different...
...

Texas Geographic, Geographic America, and Geografía de las Americas Periodic Journals for Education of Students Across Texas, plus North, Central, and South America

Background Textbooks are expensive, can become outdated shortly after publication, and are oftentimes unaffordable by school districts. Invention Description The instructional materials are developed using the Texas InfoMart, a web-based data dissemination system developed in cooperation with NA...
...

Model-based Framework for the Detection of Spiculated Masses on Mammography

Background The detection of lesions on mammography is a repetitive and fatiguing task. Only three or four out of a thousand examined cases are malignant, and thus an abnormality may be overlooked. As a result, radiologists fail to detect 10% to 30% of cancers. Computer-Aided Detection (CADe) syst...
...

Method and Apparatus for Adapting Display to Match User-Specific Information Preferences

Background The human brain is only capable of processing a limited amount of information at one time, but the amount of information that is available to a person in a given situation is infinite. Sifting through all of the information available and pulling out data relevant to the task at hand shift...
...

Digital Earth Science Materials

Background Currently, printed textbooks are used in the classroom for an eight-year time period, but a great deal can change before textbooks are updated. This project seeks the most effective methods of teaching students by using technology, specifically in the area of earth science. Invention ...
...

Color Rendering of Phase Information in Acoustic Images

Background In certain environments, objects with very different structure can generate echoes that appear very similar in conventional acoustic displays. Examples in underwater acoustics applications are trapped gas and rigid reflectors, both of which can be responsible for very bright acoustic retu...
...

Automatic Filter Configuration for Acoustic Color Visualization

Background Existing acoustic color visualization methods rely on acoustic colormapping filters that are either static or manually adjustable by the user. If the spectral balance of the colormapping filters does not match that of the data, the resulting color image will be skewed toward one or more s...
...

Voltage Controlled Oscillator

Background Most digital electronic circuits require clocks to coordinate the processing of data. The clocks are often formed using phase-locked loops. Phase-locked loops require an oscillator (a basic source for the clock) that has a frequency that can be adjusted by means of a control voltage. Such...
...

Versatile disposable FET-based biosensors

Background Conventional CHEMFETs (chemical field effect transistors) are silicon MOSFETs with the gate uncovered to make it chemically sensitive. These gates, made of poly-silicon or metal which are replaced with a chemically sensitive metal, are widely used but are not very effective. Furthermore, ...
...

TRIPS: a Third-Generation Computer Architecture

Background Conventional CPU architectures are hitting hard limits in the following areas: operating frequency, efficiency, and power consumption. The historical 55% annual increase in CPU performance is likely to drop to 20%. In addition, computer applications are becoming more diverse: many types o...
...

Quantum Dot Applications for Flash Memory, Semiconductor Lasers and Photodetectors

Background The mobile electronic devices of the future will need lower voltage and power data storage capabilities to continue offering consumers increased functionality and extended battery life. Current non-volatile flash memory technology is reaching the limits of its ability to shrink down. A ne...
...

Packaging enhanced board-level optoelectronic interconnects

Background Advances in multiprocessor and supercomputing technology are paving the way for massively parallel computing systems. However, conventional bus technology is inhibiting this progress. Propagation delays are an inherent side effect of traditional copper interconnect technology. This delay ...
...

Non-Uniform Cache Apparatus (NUCA), System, and Method

Background Traditional cache hierarchies are broken up into levels (L1, L2, L3, etc.) where each successive level is much larger and slower than the previous one. If a needed datum is not found in the fastest level, L1, in one to three cycles, the slower L2 is searched, taking 6 to 12 cycles, and so...
...

Methods for Compact Strip/Slot Waveguide Coupling with 20dB Efficiency Enhancement

Background The market for optical networking components will grow from approximately $2.8 billion in 2007 to $7.9 billion in 2012, according to CIR forecasts. Within this market is the market segment which includes photonic crystal waveguides. This invention provides a means to efficiently couple...
...

Method for Reduction of High Speed Multipliers Minimizing the Number of Half Adders Required

Background There have been tremendous advancements in the field of microprocessors and digital signal processors, marked by an increasing demand for high-speed arithmetic circuits. In particular, the demand for high-speed multiplier circuits with reduced complexity has increased. To meet this demand...
...

Method and Apparatus for Capacitance Multiplication Within a Phase-Locked Loop

Background Often phase-locked loops are used to filter phase noise and jitter from a reference clock. These are referred to as "clean-up" phase-locked loops. They require large values of capacitance to achieve a low loop bandwidth. Traditionally the large values of capacitance are realized with phys...
...

High-performance, low-power delta-sigma analog-to-digital conversion

Background The Delta-Sigma ADC is an important building block for numerous electronic circuits today. In the market of high-performance data conversion, it is the ever-increasing thirst for wider bandwidths and lower power consumption without compromise in resolution that drives demand. Examples of ...
...

Fabrication of Oriented Silicon Nano-Structures by e-Beam Lithography and Anisotropic Wet Etching

Background Based on prior work for development of angstrom-scale measurement standards for the semiconductor industry, this innovation has made significant advancements in the alignment and control for etching lines/channels in silicon and silicon-on-insulator (SOI) structures. Prior alignment and e...
...

Efficient Heat Dissipation for Active Optical Components on Printed Circuit Boards

Background As chips become more complex, interconnects need to be placed more densely on printed circuit boards to carry data in and out of these chips. Copper interconnects, in widespread use today, are quickly approaching their physical limits because of heat and crosstalk problems, thereby threat...
...

CMOS Integrated Biosensor Microarrays

Background Today, biosensors are one of the most important analytical tools in biotechnology. These sensors take advantage of the selective interaction and binding of certain biological receptors to identify and detect different analytes such as toxins, hormones, DNA strands, proteins, bacteria, etc...
...

Bridged, Three-Path Fused Multiply-Adder

Background Industry floating-point fused multiply-adders (FMA) to date all use a slight derivation of the original FMA serial architecture. Classically this architecture is subject to two major tradeoffs: 1) difficulty in implementation due to massive alignment and end-around-carry components—especi...
...

Automatic Generation of Microprocessor Power/Thermal Stress Benchmarks

Background Microprocessor designers are interested in estimating the maximum power and maximum temperature that the chip can reach, as it helps in designing the power delivery system, packaging, cooling, and power/thermal management schemes. However, due to the lack of any standardized stress benchm...
...

An Interleaving Method Used to Boost Dynamic Performance of Current-Steering Type D/A Converters

Background Current-steering digital-to-analog converters (DACs) with excellent dynamic performance are important building blocks in high-performance electronic systems. This invention significantly boosts the DAC’s dynamic performance in applications where the load is resistive and the output voltag...
...

UNPROG Practical Automatic Program

Background Programming plans are units of programming knowledge connecting abstract concepts and their implementations. Existing research assumes that plan instances can be recognized to recover the programmer?s abstract concepts and intentions, but this approach has not been confirmed empirically. ...
...

Programming Model and Software System for Exploiting Parallelism in Irregular Programs

Background Irregular programs deal with pointer-based data structures like large graphs and trees. It is well known that it is difficult to exploit parallelism in these programs. We have developed a programming model and an associated software system that make it much easier to exploit parallelism i...
...

Hoard: a Scalable Memory Allocator for Multithread Applications

Background For large parallel, multithreaded C and C++ applications such as web and database servers, the memory allocator is often a bottleneck that severely limits program performance and scalability on multiprocessor systems. Previous memory allocators have suffered from these problems in several...
...

Goto BLAS

Background The Basic Linear Algebra Subprograms (BLAS) library contains a collection of computing routines for performing low-level basic linear algebra operations, including matrix multiplication. Users of high-end supercomputers often rely on routines from the BLAS library as a building block for ...
...

Fusible Data Structures for Fault Tolerance

Background The use of replication-based approaches for server backup in distributed environments—in which an exact replica of the data on each server is made—is computationally efficient, but can create significant hardware demands. In other domains, such as disk storage, coding theory techniques...
...

Formal Linear Algebra Methods Environment (FLAME)

Background The development and maintenance of libraries for high-performance distributed-memory parallel computers is simply too complex to be amenable to conventional approaches to implementation. Attempts to employ traditional methodology have led to the production of an abundance of anfractuous c...
...

Firewall Decision Diagrams

Background Computer network firewalls operate by a set of rules that act as a gatekeeper for data traffic. These rules are written in a table format by network administrators. The process of creating and maintaining the rules is highly susceptible to error, especially in complex network environments...
...

EVID - a Prolog Program for Interactive Defeasible Reasoning

Background Practical decisionmaking often depends on information which while not directly available to us, can be inferred from other information that is available. For instance, while driving, we may not directly experience the feel of a slick street, but can infer that the street is slick from the...
...

Virtuoso: a Computer Resource Marketplace (26060/26075/26076/26077

Virtuoso is a prototype system that creates a marketplace for resource providers to lease computer capacity to resource buyers in a straightforward manner through the use of virtualization technologies. Virtualization simultaneously minimizes the amount of management that providers need to do and m...
...

Customized Power Management Software (26078)

The invention personalizes and optimizes computing speed and power management for a given application user and manufactured computing device. To the best of our knowledge, the invention is the only solution that personalizes and customizes user experience to the levels that it does. The inventio...
...

Thermal Management of On-Chip Caches Through Power Density Minimization (26102)

The invention is a set of straightforward methods by which to reduce power consumption on computer chips. The methods result from a discovery by Northwestern investigators that cooling of on-chip cache memory has a significant impact upon computer chip power consumption. To our knowledge, the prior ...
...

Time-Sharing Parallel Applications with Performance Isolation and Control (26116)

The inventors have developed a system for time-sharing parallel machines that provides isolation and enables the execution rate of an application to be tightly controlled. Most parallel machines, such as clusters, are space-shared in order to isolate batch parallel applications from each other a...
...

Speculative Remote Display (26119)

Speculative Remote Display is the only known solution that eliminates network round-trip time for remote display systems, making the system more responsive in a wide-area environment. Remote display systems allow a distant user to control a computer or application with a graphical user interface...
...

PICSEL (28064)

INVENTION: Computer scaling techniques attempt to optimize a tradeoff between computer performance (speed) and power consumption. User studies have shown that such optimizations greatly improve if a user’s personal tastes are considered during usage. In response to this observation, the investigator...
...

IDnet Mesh: for a More Secure Intranet and Internet (28118)

INVENTION: IDnet Mesh increases security and authentication on Intranets and the Internet. It accounts for a user’s real identity without publicly revealing his identity. IDnet Mesh helps ensure that all participating users on a web site are who they claim to be to a trusted authority, including the...
...

Remote Hardware Enabling/Disabling Techniques Using Manufacturing Variability

This invention proposes the first active hardware metering scheme that symmetrically protects the IP designer and the foundry by providing a key-exchange mechanism. The active metering method uniquely locks the IC at the fabrication house by utilizing the unclonable variability-based ID of each sili...
...

Compressed Sensing Camera

Advantages . Design enables simultaneous sensing and compression of images. . Compression is part of the analog acquisition process, so the need for data compression algorithms is eliminated. . The image or video sequence is automatically encrypted without additional computational expense. . Des...
...

Throughput Maximization in Wireless Communications Systems

Current theory tells us the ultimate throughput, or ergodic capacity, of an idealized communications system. The ergodic capacity is achieved in idealized systems by using codewords that are infinitely long and thus averaged over an infinite number of instances of the fading channel. Practical syste...
...

Sensor-assisted motion estimation for efficient video encoding

It is very important to note that motion in a successive video sequence consists of two parts: global motion and local motion. The global motion is generally engendered by camera movement, while the local motion results from object movement in the scene. Most existing motion estimation algorithms do...
...

Remote Hardware Enabling/Disabling Techniques Using Manufacturing Variability

This invention proposes the first active hardware metering scheme that symmetrically protects the IP designer and the foundry by providing a key-exchange mechanism. The active metering method uniquely locks the IC at the fabrication house by utilizing the unclonable variability-based ID of each sili...
...

Continuous Remote Control and Authentication of Integrated Circuits

This invention is a new approach for remote enabling, disabling and metering of integrated circuits. The approach leverages inherent manufacturing variability of modern and pending Si technologies. The key conceptual novelty is that designers can control ICs remotely, continuously, and concurrently ...
...

EtherFuse: an Ethernet Watchdog

This invention is a device that can be inserted into existing Local Area Networks (Ethernet) to significantly enhance its reliability. The functionality of this device can be integrated into existing Ethernet switches to eliminate the need for adding new devices. However, implementing the EtherFuse ...
...

Integrated single embedded processor based laser spectroscopic sensor

This is an ultra-compact laser based gas sensor with fully integrated hardware, software, and optics. This device can automatically adjust laser wavelength and optical output, convert sensor power, measure and control target parameters, and communicate and/or process the acquired data for analysis. ...
...

Compressed Sensing Camera

Advantages . Design enables simultaneous sensing and compression of images. . Compression is part of the analog acquisition process, so the need for data compression algorithms is eliminated. . The image or video sequence is automatically encrypted without additional computational expense. . Des...
...

A Parameterized VLSI Architecture for Binary Multipliers based on Optimal Partitioning and Redundancy Removal

A parameterized VLSI architecture for performing binary multiplication on signed and unsigned binary numbers or variable widths is the invention. The archictecture consists of two basic units. The first unit optimally paritions the computations that are involved in the multiplication of two binary n...
...

Global Threshold Method and Apparatus

Thresholding or binarization of images is an important step in image processing applications that uses different criteria to separate foreground objects from the background. This invention describes a novel weight based clustering algorithm, a real-t ime single pass global thresholder suitable for i...
...

Jerk Limited Techniques for Minimizing Vibration of Maneuvering Structures

Control of machine vibrations is very important in design of flexible motion systems. This technology describes a technique to design time-delay filters which modify the input to the dynamic system such that the residual vibration at the end of the maneuver is eliminated or minimized in the presence...
...

Augmentative Communications Device for the Speech Impaired Using Commercial Grade Technology

The invention is a software package that can be installed on any Windows based computer that offers features not presently available in the augmentative communications market. Standard functions such as text-to-speech and pictures-to-speech are fund amental to the software, but a number of other fea...
...

Automated Facial Action Coding System

Automated Facial Action Coding SystemLaw enforcement tool, national security and law (Biometrics)Consumer Market Research -Computer SciencesPrograms for recognition of facial identity from digital images Automated Facial Action Coding System Categories: Imaging: Display Devices, Computer...
...

Referent Tracking

Referent tracking is a simple yet powerful way to organize electronic data and coordinate databases. The ability to track not only information but also data relationships is invaluable in various fields including healthcare, intelligence, and digital media. Currently, the creation and flow of new an...
...

Hyperspace Diagonal Counting (HSDC) for Multidimensional Database Visualization and Data Mining.

This technology describes a new mathematical technique to graphically visualize and present objects and shapes in hyperspaces, i.e., in extensions of space beyond the third dimension. Currently, these are visualized only as mathematical abstractions, although there have been attempts to capture and ...
...

Hyperspace Diagonal Counting (HSDC) for Multidimensional Visualization

This technology describes a new mathematical technique to graphically visualize and present objects and shapes in hyperspaces, i.e., in extensions of space beyond the third dimension. Currently, these are visualized only as mathematical abstractions, although there have been attempts to capture and ...
...

Jerk Limited Techniques for Minimizing Vibration of Maneuvering Structures

Control of machine vibrations is very important in design of flexible motion systems. This technology describes a technique to design time-delay filters which modify the input to the dynamic system such that the residual vibration at the end of the maneuver is eliminated or minimized in the presence...
...

Global Threshold Method and Apparatus

Thresholding or binarization of images is an important step in image processing applications that uses different criteria to separate foreground objects from the background. This invention describes a novel weight based clustering algorithm, a real-t ime single pass global thresholder suitable for i...
...

FieldXtract - a software toolkit for extraction and automated reading of machine printed and handwitten form fields for indexing and retrieval

FieldXtract - A software toolkit for extraction and automated reading of machine printed and handwitten form fields for indexing and retrieval...
...

Referent Tracking

Referent tracking is a simple yet powerful way to organize electronic data and coordinate databases. The ability to track not only information but also data relationships is invaluable in various fields including healthcare, intelligence, and digital media. Currently, the creation and flow of new an...
...

Hyperspace Diagonal Counting (HSDC) for Multidimensional Database Visualization and Data Mining

This technology describes a new mathematical technique to graphically visualize and present objects and shapes in hyperspaces, i.e., in extensions of space beyond the third dimension. Currently, these are visualized only as mathematical abstractions, although there have been attempts to capture and ...
...

Inking Methods and Compositions for Production of Digitized Stereoscopic Polariz

Summary The Technology The Stereo Imaging Research Group developed methods, materials and applications for stereoscopic hardcopy. The group's StereoJet process forms polarizing images by inkjet printing, using commercial desktop printers without modification. Key inventions include specialized su...
...

Production of Improved Digitized Stereoscopic Polarizing Images

Summary The Technology The Stereo Imaging Research Group developed methods, materials and applications for stereoscopic hardcopy. The group's StereoJet process forms polarizing images by inkjet printing, using commercial desktop printers without modification. Key inventions include specialized su...
...

Coating Methods and Compositions for Production of Digitized Stereoscopic Polari

Summary The Technology The Stereo Imaging Research Group developed methods, materials and applications for stereoscopic hardcopy. The group's StereoJet process forms polarizing images by inkjet printing, using commercial desktop printers without modification. Key inventions include specialized su...
...

DNA Memory

Summary The invention provides methods through which high-density data storage can be achieved through the use of nucleic acid molecules as recording media. It is useful as a computer memory device or in real-time or other high-throughput or multiplexed monitoring/recording of molecular and cellular...
...

Circular Dichroism Imaging Microscope

Introduction Circular dichroism (CD) instruments are typically limited in their ability to image and analyze samples in organized media. Twinned crystals, liquid crystals, fibers, and biological tissues can be challenging to work with and CD imaging has typically been restricted to samples in isotro...
...

Conductive Composite Polymer and Its Dielectric Polymer Actuator Application

Introduction Elastomers loaded with electrically conductive powders are commonly used in gaskets for EMI shielding applications in electronic devices such as computers, telecommunication equipment and medical devices. It is a challenge to provide the shielding while meeting application-specific elas...
...

Method for Fast Crosslinking of Silicone Compounds at Low Temperature By in Situ Water Generation

Introduction Deposition of small amounts of functional materials has recently become a matter of intensive research. Inkjet printing technology is a promising and widely used technique for the fabrication of small parts with specific functionalities into welldefined locations. The limits of this tec...
...

Contact Lens as Computing Interface

Introduction The study of human-computer interaction (HCI) strives to understand and evolve how people interact with computers in order to develop systems that are more usable and more responsive to a user’s actual needs. One important aspect of this field is the design of interfaces, best exemplifi...
...

Algorithm for User Activity Anticipation

The Invention The Algorithm for User Activity Anticipation is capable of anticipating the user’s next “click” with the mouse, therefore increasing the application’s efficiency. This is especially useful in applications that require a great deal of use of the mouse, such as video games, word proc...
...

On-Chip Optical Ring Bus (ORB) Communication Architecture for Embedded Systems on Chip

Background: As application complexity continues to increase, multi-processor systems-on-chip (MPSoC) with tens to hundreds of processing cores are becoming the norm. While computational cores have become faster with each successive technology generation, communication between them has become a bott...
...

Pointer-Based Instruction Queue for Out-of-Order Processors

Background: Out-of-order processors issue instructions even before their source operands are available. The processor component central to out-of-order processing is the Instruction Queue (IQ). Its performance is critical to overall processor speed and power consumption. For instance, the issue log...
...

Asymmetric Clustered Processor Architecture based on Value Content

Background: Most conventional clustered processor architectures are symmetric systems. It is known that the scalability of ahigh-performance processor architecture has been limited in new system designs by various factors, including increasing clock frequencies, issue widths, and greater wire delay...
...

A Platform for Seamless Multi-device Interactive Digital Content

Background: Previous mechanisms for connecting two or more devices in the same physical space have been cumbersome, and offered little advantage over connecting two devices that are hundreds of miles apart. There are two general methods: first, the automatic triggering of content when a device ente...
...

Trace-Driven, Just-In-Time Compilation with a New Application of Static Single Assignment Form

Background: A decade after Java arrived, there have been improvements in the runtime performance of platform-independent virtual-machine based software. However, using such machine-independent software on resource-constrained devices such as mobile phones and PDAs remains a challenge, as both inter...
...

Efficient Transaction Based Modeling with Cycle Count Accurate at Transaction Boundary (CCATB) Models

Background: In the past, several modeling abstraction levels were proposed to improve simulation speed and modeling time over detailed cycle accurate (CA) models. The Pin Accurate Bus Cycle Accurate (PA-BCA) modeling abstraction maintained cycle accuracy at every cycle boundary for communication in...
...

Fluorescing Materials for 3D Memory Devices

Background: Photochromic fulgides are capable of reversible light-induced coloration. These organic compounds exhibit several important physical properties such as thermal stability of both colorless and colored forms, high photoreaction efficiency, high fatigue resistance to repeated coloration-bl...
...

High Speed Circuit Board Writing

A method of printing lines on circuit boards from computer information in a manner similar to using an inkjet printer. Utilizing capillary stream break-up of molten metal droplets, this novel approach is capable of printing very fine lines on the order of 10 microns wide and many centimeters long at...
...

Protocol and Software Organization Method for Real-Time Fault-Tolerant Multicasts in Computer Networks

Background: Components of application systems based on a network of computing nodes (e.g., PC's and workstations) often maintain the client-server relationship among themselves. For the sake of attaining high system reliability and performance, servers are often replicated. These servers must then ...
...

Data Compression of Time-Varying Images

Background: Current methods of transmitting time-varying images involve encoding the digital image information into a set of still frames. To reduce the bandwidth necessary to transmit the full image, compression techniques are used to eliminate statistically redundant information in the pixel inte...
...

Molecular Fan

Abstract This invention provides a heat dissipation structure for use in optoelectronic devices. More specifically, this technology is an innovative heat dissipation thick/thin organic-inorganic coating containing active molecularly functionalized vibrational lattice modes designed to act as a mol...
...

Get Connected

Software program that connects and configures first-time users to a campus network TECH FIELD(S) Software security for higher education networks FEATURES Get Connected eases the burden of initially linking thousands of students in university living residences to a campus network. Eve...
...

Diabetes

TECH FIELD(S) Software and Information Technology ……………………………………………………………………………………………………………… FEATURES Diabetes is a stereoscopic and standard video resolution computer generated animation of causes and effects of diabetes in humans to help educate middle school students. This three minute and f...
...

AST - Atomic Simulation Tool

The University of Virginia has developed a user-friendly personal computer-based atomic scale simulation code for designing and evaluating ion beam deposition systems. This work entails first defining an ion gun-target-substrate geometry, material system(s), and a chamber background pressure, and th...
...

An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks

Smartcards, cards where information is stored locally on an embedded integrated circuit rather than a magnetic strip, are examples of secure hardware devices that are becoming prolific in use. Such devices are used for everything ranging from toll payment and secure access identification cards to AT...
...

Multi-Functional Field Effect Switches Utilizing Anodized V/VO2/V Junctions

Vanadium oxides have a rich history because of the metal insulator transitions that several of the oxides and sub-oxides exhibit. In particular, VO2 has a metal–semiconductor transition just above room temperature in which this compound goes from a monoclinic crystal structure semiconductor below 34...
...

In Plane Metal-Oxide-Oxide-Metal Diode Prepared by Selective Anodization

It is expected that the Moore’s law progression of CMOS technology will end in less than two decades, and there is a worldwide search for new devices that can either extend Moore’s law or provide a totally new pathway for information processing and communication. Using metals instead of semiconducto...
...

Smart Barrier for Spin Torque Transfer Random Access Memory (STTRAM)

As the scaling of traditional CMOS devices goes beyond the 32-nm node, the present memory technology will face numerous technical hurdles. MRAM is an emergent memory technology that has the potential to replace all other current memory technologies, including SRAM, DRAM and FLASH. Conventional MRAM ...
...

VoxelVision Software for 3D Object Segmentation

General Information VoxelVision is imaging software that interactively segments and displays images of 3D anatomy derived from MRI, CT, or ultrasound scans. While other 3D imaging software is available, it is either too simplistic or takes too long to be of value. VoxelVision works with a few mou...
...

Oil Reservoir Simuluation

A new method has been developed to quickly determine fine-grid reservoir simulation pressures. It is estimated that the pressures in a one-billion cell simulation model can be determined in less than one percent of the time required by other state-of-the-art solvers. Increased accuracy is obtained b...
...

Icesheets

ICESHEETS is a brand new spreadsheet technology that combines the power of a large database with the ease of use of a spreadsheet. It gives a user the ability to view and access to multiple data sets in the same spreadsheet. Information such as monthly statements, financial reports, cost breakdowns,...
...

Simple Authentication for the Web - SAW

A secure and convenient alternative to the numerous User IDs and passwords used for online accounts. Securely authenticates users through their email accounts to avoid difficulties in managing and remembering site specific User IDs and passwords. Users can access an online account by simply input...
...

MousePuter

Imagine setting down your Smart Phone and PDA on the desk of a conference room, and connecting wireless to a flat panel TV on the wall. You connect a wireless keyboard to your PDA and begin to run a spreadsheet that is displayed on the 60” flat panel TV. Your Smart phone becomes a mouse to move arou...
...

Direct Machining (DMAC)

Direct Machining (DMAC)-The process of driving production machines directly from a higher order part description such as CAD. DMAC integrates the part description software and machine controller on the same PC, eliminating numerous intermediate post-processing and control steps and much of the contr...
...

Automated Traffic Stopped Delay Data Acquisition

The traffic stopped delay algorithm rapidly determines the stopped delay of the traffic (which is the time each vehicle is stopped in the queue of a lighted intersection) from the video feed provided by intersection cameras. This information is traditionally gathered manually and used for operationa...
...