Computer Science Patents for Sale or License

Interactive Pin Array Device - Webnail

An innovation in the communication field. After hearing, seeing you can now touch via Internet! An interactive pin array device comprising a plurality of elongated pins held in a frame and forming a set. The frame is adapted to hold the plurality of pins in a parallel position to one another in a series of columns and rows, such that the distal ends of the plurality of pins together form a flat virtual plane. Each pin of the plurality of pins correspond to an equivalent pin on a second devic
...

Method for visual manipulations of all kinds of programming objects

Visual object manipulation modernized IDE’s. This patent innovates a technique of an intermedia class, restrictions on visually-manipulate-able objects can be removed for an IDE. Thus, all software objects are visually manipulate-able. It opens doors for further IDE technology advancements, such as more automated software engineering operations, visual and codeless programming, and other innovations.
...

Display System Implementing View Switch Panel Based on Reflective Polarizer and Liquid Crystal

Having a laptop computer working both as a tablet and as a normal laptop faces challenge of how to respectively orientate its display. When working as a tablet, display of laptop computer has to be swung 180 degree from folded position to face up position. Drawback of working such way is to leave keyboard side open for no use and it looks and feels awkward. A variety of approaches have been attempted by commercials to alleviate the problem, but none prevailing. The invention of this patent provi
...

Improvements in and relating to Data Comparison

The patent is the representation of a low cost TTL circuit developed to recognise a binary input pattern as a percentage of that input which as application-specific integrated circuit (ASIC) logic will enable on chip CCD cameras to focus and recognise objects at the speed of the CCD rather than the bus between the CCD and processor adding delays. The ASIC logic also has the ability to recognise degraded digital sine waves patterns as true and reconstruct signals in a bridge, text and objects usi
...

Adaptable keyboard system

A system for adapting a keyboard display to a definable input language is provided. The system includes an adaptable keyboard comprising keys; a software application, operatively associated with the adaptable keyboard; and a computerized system enabling to receive data from the adaptable keyboard, process and present data and operate the application. Some of the keys of the adaptable keyboard may be language adaptable, where each adaptable key includes a screen enabling to present characters ass
...

Quantized Indexing

A Data Compression Patent, applying the power of combinatorial mathematics to enumerative coding by uncovering a method which solves the problem of arithmetic precision in Enumerative Coding, the underlying problem which has long prevented it from being used for general purpose entropy coding, and for coding complex data structures. While Enumerative Coding has been acknowledged as the most “desirable” universal coding scheme since the 1970s, to this point it has only been used as a
...

Lineographic Alphanumeric Data Input System

This input system is designed for entering text into portable electronic devices, such as cell phones, hand held computers and intelligent phones, by making short linear traces or taps with a finger or thumb on a touch sensitive keypad. The system allows the user to enter operational commands on the same keypad, as well as entering of different alphabets such as the Latin Alphabet, Mathematical Greek and Russian Alphabets and possibly other foreign languages including Japanese, Chinese and Kore
...

Conservative logic gate for design of quantum dot cellular automata circuits

A novel conservative gate especially suiting a Quantum Dot Cellular Automata (QCA) majority voter-based design. The input-to-output mapping of the novel conservative QCA (CQCA) gate is: P=A; Q=AB+BC+AC [MV(A,B,C)]; R=A'B+A'C+BC [MV(A',B,C)], where A, B, C are inputs and P, Q, R are outputs, respectively. A method of transferring information in a quantum-dot cellular automata device is also provided.
...

Method and Apparatus for Authenticating Biometric Scanners

A method and apparatus for authenticating a biometric scanner involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner. The scanner pattern is used to verify whether the scanner that acquired a particular image is the same as the scanner that acquired
...

Binary Rewriting Without Relocation Information

A binary rewriter that can provide complete code coverage without relocation information is provided, together with a method of performing such rewriting. The method can include processing a binary file as an original binary file. The method can also include disassembling the binary file to provide a disassembled binary file. The method can further include rewriting the disassembled binary file without relocation information to provide a rewritten binary file. The rewriting can provide a physica
...

Automatic Parallelization Using Binary Rewriting

Binary rewriters that do not require relocation information and automatic parallelizers within binary rewriters are provided, as well as methods for performing binary rewriting and automatic parallelization. The method, in certain embodiments. includes disassembling a binary file and determining functions in the disassembled binary file. The method can further include rewriting the binary file without relying on relocation information or object files. Optionally, the method can further include p
...

Haptic Device with Controlled Traction Forces

A haptic device includes a substrate that is subjected to lateral motion such as lateral oscillation with one or more degees of freedom together with modulation of a friction reducing oscillation in a manner that can create a shear force on the user's finger or on an object on the device.
...

Memory Device and Applications Thereof

A system that incorporates teachings of the present disclosure may include, for example, a memory device having a memory cell to selectively store holes by photon and bias voltage induction as a representation of binary values. Additional embodiments are disclosed.
...

System for Cyber Investigation and Data Management

A system for executing a cyber investigation by a non-expert user, including a computer having a processor, a memory, and a display; a computer-readable medium having stored thereon instructions for execution of a wizard application, the processor adapted to execute the instructions when the computer-readable medium is inserted into the computer, the processor programmed to: receive case information; receive a type of activity being investigated in response to user inputs to select the activity
...

System for Executing 3D Propagation for Depth Image-based Rendering

A system is disclosed for executing depth image-based rendering of a 3D image by a computer having a processor and that is coupled with one or more color cameras and at least one depth camera. The color cameras and the depth camera are positionable at different arbitrary locations relative to a scene to be rendered. In some examples, the depth camera is a low resolution camera and the color cameras are high resolution. The processor is programmed to propagate depth information from the depth cam
...

Exchange-assisted Spin Transfer Torque Switching

In general, the invention is directed to techniques for reducing the amount of switching current that is utilized within a magnetic storage (e.g., MRAM) device. An example apparatus includes a fixed magnetic layer that provides a fixed direction of magnetization, an exchange-coupled magnetic multi-layer structure, and a non-magnetic layer placed between the fixed magnetic layer and the exchange-coupled magnetic multi-layer structure. The exchange-coupled magnetic multi-layer structure includes a
...

Method for Switching Magnetic Random Access Memory Elements and Magnetic Element Structures

A method for storing data in a magnetic memory element of an array of elements which avoids inadvertent switching of other elements is disclosed. First and second magnetic fields are applied to a selected magnetic element for a first time interval to switch the element into an intermediate state where minor domains are created. A second value of magnetic fields are then applied large enough to switch the magnetization of the minor domains, but not large enough to switch the magnetization of an a
...

Display of Patient-specific Data

Systems, methods, and computer-program products identify clinical data corresponding to a plurality of patients located within a common health care delivery unit, and apply one or more rules to at least some of the clinical data using at least one quality and/or safety measure-specific specification. Based on the application of the rules, one or more care indicators corresponding to the plurality of patients are displayed in a single interface, the one or more care indicators indicating whether
...

Decomposition Based Approach for the Synthesis of Threshold Logic Circuits

A computerized system and method for synthesizing threshold logic circuits is disclosed. The disclosed system and method receives a Boolean function and converts the Boolean function into a novel cofactor tree data structure like a BDD and an MML factor tree. Functions of the nodes making up the cofactor tree are tested to determine whether or not they are threshold. If is the function of a node is a threshold function, the process continues with the parent node. If the function of the node is n
...

Differential Threshold Voltage Non-volatile Memory and Related Methods

Embodiments and examples of differential threshold voltage non-volatile memories and related methods are described herein. Other embodiments, examples thereof, and related method are also disclosed herein.
...

Ultra-low Dimensional Representation for Face Recognition Under Varying Expressions

A method, apparatus and computer program product are provided for identifying an unknown subject using face recognition. In particular, upon receiving a plurality of images depicting a subject, the method may include deriving and storing a common component image and a gross innovation component image associated with the subject, wherein the subject can later be identified in a new image using these two stored images. The common component image may capture features that are common to all of the r
...

SRAM cell with intrinsically high stability and low leakage

A Static Random Access Memory (SRAM) cell having high stability and low leakage is provided. The SRAM cell includes a pair of cross-coupled inverters providing differential storage of a data bit. Power to the SRAM cell is provided by a read word line (RWL) signal, which is also referred to herein as a read control signal. During read operations, the RWL signal is pulled to a voltage level that forces the SRAM cell to a full-voltage state. During standby, the RWL signal is pulled to a voltage lev
...

Methods and Apparatuses for User-verifiable Trusted Path in the Presence of Malware

An apparatus and method for establishing a trusted path (152) between a user interface (150) and a trusted executable (312), wherein the trusted path (152) includes a hypervisor (316) and a driver shim (314). The method includes measuring (710) an identity of the hypervisor; comparing (712) the measurement of the identity of the hypervisor with a policy for the hypervisor; measuring (714) an identity of the driver shim; comparing (716) the measurement of the identity of the driver shim with a po
...

Systems and Methods for Implementing a Machine-Learning Agent to Retrieve Information in Response to a Message

Mixed-initiative message-augmenting agent systems and methods that provide users with tools that allow them to respond to messages, such as email messages, containing requests for information or otherwise requiring responses that require information that needs to be retrieved from one or more data sources. The systems and methods allow users to train machine-learning agents how to retrieve and present information in responses to like messages so that the machine-learning agents can eventually au
...

Efficient High Performance System for Writing Data from Applications to a Safe File System

Systems and methods for increasing the efficiency of data storage processes for high performance, high core number computing systems. In one embodiment, the systems of the present invention perform sequential I/O whenever possible. To achieve a high degree of sequentiality, the block allocation scheme is determined by the next available block on the next available disk. This simple, non-deterministic data placement method is extremely effective for providing sequential data streams to the spindl
...

Simultaneous Bit Pattern Determination and Head Positional Information Detection on Patterned Media

An apparatus, system, and method comprise a magnetoresistive head configured to respond to magnetization states of patterned cells formed on a patterned medium. The magnetoresistive head detects the magnetization states of at least two patterned cells formed on a patterned medium. The magnetoresistive head generates a readback signal based on the magnetization state of the at least two patterned cells. A detector circuit coupled to the head determines a bit pattern corresponding to the readback
...

Buffer Layers for L10 Thin Film Perpendicular Media

A process of fabricating a perpendicular magnetic recording medium. In one embodiment, the process may comprise forming a metallic buffer layer with a (002) texture on an underlayer using a deposition process performed at a temperature below 30 DEG C. The underlayer may have a crystalline (001) texture. The process may further comprise forming a perpendicular magnetic recording layer on top of the metallic buffer layer using a deposition process performed at a temperature above 350 DEG C. The ma
...

Revising Imagery Search Results Based on User Feedback

A method, system, and medium are provided for revising a first set of search results related to high-resolution satellite imagery. One embodiment of the method includes receiving a query that seeks high-resolution, remotely sensed images of geographic areas that have changed consistent with a given change signature; returning indications of the geographic areas; and presenting a first set of images that corresponds to the indications; presenting a set of feedback of options in connection with ea
...

Rapid Image Annotation Via Brain State Decoding and Visual Pattern Mining

Human visual perception is able to recognize a wide range of targets but has limited throughput. Machine vision can process images at a high speed but suffers from inadequate recognition accuracy of general target classes. Systems and methods are provided that combine the strengths of both systems and improve upon existing multimedia processing systems and methods to provide enhanced multimedia labeling, categorization, and searching.
...

Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems

Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems are provided. These systems and methods provide an alert correlator and an alert distributor that enable early signs of an attack to be detected and rapidly disseminated to collaborating systems. The alert correlator utilizes data structures to correlate alert detections and provide a mechanism through which threat information can be revealed to other collaborating systems. The a
...

System and Method for Hardware Acceleration of a Software Transactional Memory

In a transactional memory technique, hardware serves simply to optimize the performance of transactions that are controlled fundamentally by software. The hardware support reduces the overhead of common TM tasks-conflict detection, validation, and data isolation-for common-case bounded transactions. Software control preserves policy flexibility and supports transactions unbounded in space and in time. The hardware includes 1) an alert-on-update mechanism for fast software-controlled conflict det
...

Dynamic reconfigurable memory hierarchy

A cache and TLB layout and design leverage repeater insertion to provide dynamic low-cost configurability trading off size and speed on a per application phase basis. A configuration management algorithm dynamically detects phase changes and reacts to an application's hit and miss intolerance in order to improve memory hierarchy performance while taking energy consumption into consideration.
...

Computing Device Using Inexact Computing Architecture Processor

In general, in one aspect, the invention relates to a computer readable medium including software instructions which, when executed by a processor, perform a method, the method including receiving a first method call from an application, wherein the first method call is associated with a first application component; obtaining a first application component error tolerance (ACET) value associated with the first method call; determining, using the first ACET value and a first inexact amount value (
...

Methods for Protecting Against Piracy of Integrated Circuits

Techniques are provided for reducing the likelihood of piracy of integrated circuit design using combinational circuit locking system and activation protocol based on public-key cryptography. Every integrated circuit is to be activated with an external key, which can only be generated by an authenticator, such as the circuit designer. During circuit design, register transfer level (RTL) descriptions of the IC design are embedded with combinational logic based on a master key applied by the authe
...

Protecting Hardware Circuit Design by Secret Sharing

Techniques are able to lock and unlock and integrated circuit (IC) based device by encrypting/decrypting a bus on the device. The bus may be a system bus for the IC, a bus within the IC, or an external input/output bus. A shared secret protocol is used between an IC designer and a fabrication facility building the IC. The IC at the fabrication facility scrambles the bus on the IC using an encryption key generated from unique identification data received from the IC designer. With the IC bus lock
...

Method and System for Scalable Ethernet

A computer readable medium comprising computer readable code for data transfer. The computer readable code, when executed, performs a method. The method includes receiving, at a first Axon, an ARP request from a source host directed to a target host. The method also includes obtaining a first route from the first Axon to the second Axon, and generating a target identification corresponding to the target host. The method further includes sending an Axon-ARP request to the second Axon using the fi
...

Methods and Systems of Digital Rights Management for Integrated Circuits

Methods for remote activation and permanent or temporary deactivation of integrated circuits (IC) for digital rights management are disclosed. Remote activation enables designers to remotely control each IC manufactured by an independent silicon foundry. Certain embodiments of the invention exploit inherent unclonable variability in modern manufacturing for the creation of unique identification (ID) and then integrate the IDs into the circuit functionality. Some of the objectives may be realized
...

Method and Software Tool for Designing an Integrated Circuit

A method of designing an integrated circuit for use in an application having standards having a plurality of primitives, wherein each of the primitives has a corresponding response. The method includes generating a macros description of each of the primitives and the response corresponding to each of the primitives, generating a template relating to the response corresponding to each of the primitives, receiving information specifying a behavior of the integrated circuit in response to the primi
...

Systems and Methods for the Detection of Malware

A system and method for distinguishing human input events from malware- generated events includes one or more central processing units (CPUs), one or more input devices and memory. The memory includes program code that when executed by the CPU causes the CPU to obtain a first set of input events from a user utilizing the input device. The first input events are used to obtain or derive a feature indicative of the user, such as a multi-dimensional feature vector as provided by a support vector ma
...

Virtual Flow Pipelining Processing Architecture

A computer system for embodying a virtual flow pipeline programmable processing architecture for a plurality of wireless protocol applications is disclosed. The computer system includes a plurality of functional units for executing a plurality of tasks, a synchronous task queue and a plurality of asynchronous task queues for linking the plurality of tasks to be executed by the functional units in a priority order, and a virtual flow pipeline controller. The virtual flow pipeline controller inclu
...

Systems and Methods for Network Acceleration and Efficient Indexing for Caching File Systems

The illustrative embodiments described herein are directed to a system, methods, and computer program product, for network acceleration and efficient indexing for caching file systems. For example, the disclosed embodiments achieve (1) high compression rate, (2) low disk seeks, and (3) low memory pressure using by introducing novel features such as, but not limited to, multi-resolution chunking and intelligent load shedding. In addition, the disclosed embodiments introduces a family of HashCache
...

Hardware Trust Anchors in Sp-enabled Processors

A trust system and method is disclosed for use in computing devices in which a central Authority shares secrets and sensitive data with users of the respective devices. The secrets and data are protected by hardware-rooted encryption and cryptographic hashing, and can be stored securely in untrusted storage Hardware-protected keys and other secrets further protect the confidentiality and/or integrity of any amount of other information by the use of strong encryption and/or keyed-hashing, respect
...

Method and System for a Run-time Reconfigurable Computer Architecture

A reconfigurable computer architecture is disclosed. The reconfigurable computer architecture has a plurality of logic elements, a plurality of connection switching elements, and a plurality of volatile and/or non- volatile configuration random access memories (RAMs). Each of the configuration RAMs is electrically coupled to at least one of the plurality of logic elements or at least one of the connection switching elements.
...

Bacteriorhodopsin Protein Variants and Methods of Use for Long Term Data Storage

Bacteriorhodopsin protein variants and methods using the bacteriorhodopsin variants for performance in holographic and three-dimensional (3D) memory storage devices are described. The amino acid and chemical modifications of bacteriorhodopsin provided herein achieve greatly enhanced protein performance. The memory storage devices write, read and erase data proficiently. The bacteriorhodopsin protein variants are useful in optical memory storage and associative processor systems. Irradiation of t
...

Method and System for Recognition of a Target in a Three Dimensional Scene

A method for three-dimensional reconstruction of a three-dimensional scene and target object recognition may include acquiring a plurality of elemental images of a three-dimensional scene through a microlens array; generating a reconstructed display plane based on the plurality of elemental images using three-dimensional volumetric computational integral imaging; and recognizing the target object in the reconstructed display plane by using an image recognition or classification algorithm.
...

Method for Controlling an Auditory Game and Associated Device

The invention relates to a method for controlling an auditory game, wherein the displacement of a game element is given in a real time and is soundly reproducible. The inventive method consists in determining once the beginning event of movement in the state of motion of the game object in a three-dimensional space and of a human user object in the three-dimensional space always in the state of motion in such a way that the state of motion of the game object is compared with the state of motion
...

Method for Recognizing a Shape from a Path of a Digitizing Device

Described is a method for recognizing a shape from a path of a digitizing device. A set of points along a path of the digitizing device is acquired and a parametric representation is fit to the path. The parametric representation is compared to a set of known shapes to determine that the path of the digitizing device represents a particular shape. Fitting the parametric representation to the path includes generating a vector distance field representation of a set of objects corresponding to the
...

Methods and Apparatus for Image Restoration

Methods and apparatus for restoration of a digital image. In one embodiment, a method for repairing a defect in a digital image to provide a restored image comprises determining a plurality of pixel locations to form a neighborhood relating to the defect and whether or not the neighborhood has a well-defined, dark border along its edge. Should the neighborhood not have dark border, one embodiment of the method entails processing the neighborhood to bring the neighborhood approximately to uniform
...

Methods and Apparatus for Visual Sub-band Decomposition of Signals

Methods and apparatus for image processing include performing visual sub-band decomposition of an image using human visual system characteristics to generate a plurality of sub-band decomposed images, independently processing the plurality of sub-band decomposed images with at least one application, and fusing the independently processed sub-band decomposed images to reconstruct an output image.
...

Interactive Digital Workbook System and Method

A digital workbook program, method, and system include a program interface module configured to communicate with a set of applications and a workbook module configured to generate a digital workbook from a master digital workbook. The digital workbook includes content and mechanisms that enable inputs to and receipt of outputs from the set of applications. Also included are a user interface module configured to generate user interface screens within which the digital workbook is presented and a
...

Adaptive Hybrid Reasoning Decision Support System

A method for indexing a plurality of nodes using a computer system is provided. The computer system includes data storage and a processor coupled to the data storage. The method includes acts of storing the plurality of nodes in the data storage, each of the plurality of nodes having a hit count, a link count and an outcome, creating a qualitative index ordering a plurality of nodes according to the hit count, the link count and the outcome of each node and storing the qualitative index in the d
...

Approximate Srt Division Method

The invention relates to a program storage device readable by a machine, tangibly embodying a program of instructions executable by a specific semiconductor-based computational device situated in the machine to perform the steps of a partial SRT (PSRT) division of a dividend X by a divisor D to obtain a quotient Q. The steps include: causing a computer to obtain the dividend X and the divisor D; representing the dividend X and the divisor D as a digital representation having a plurality of bits;
...

Ram Memory Element with One Transistor

The invention relates to a memory element consisting of an MOS transistor having a drain (8), a source (7) and a body region covered by an insulated gate (12), wherein the thickness of the body region is divided into two distinct regions (13, 14) separated by a portion of an insulating layer (16) extending parallel to the plane of the gate.
...

Device and Method for Adaptive Control of Blank's Machining

Invention refers to devices, especially to computer numerical control (CNC) machines, and to the method for adaptive machining of parts using adaptive control system with fuzzy logic principles, especially to the device and method, which adaptively controls technological parameters according to surface roughness of machined part. Device is characterized in that it further comprises profilometer (10), which is connected to computer numerical control machine (9) and which is provided for acquiring
...

Motion Estimation and Compensation Process and Device

In the motion estimation and compensation process for video frames, blocks O of pixels are considered. A number k of bit planes in a block O in a video frame F are compared with blocks OR in reference frames (FR). The best matching block (ORM) is determined in the reference frames (FR). Subsequently, a weight value (WX IJ) is calculated for the best matching block (ORM) based on the ratio of valid pixels therein. The residual pixel values (VX IJ) extracted from the best matching block (ORM) and
...

Method and Device for Improved Ontology Engineering

The present invention is related to a method for populating a data system, comprising the steps of: a. mapping at least one application path of the data system to at least one conceptual path of an ontology system, said application path addressing a parts of the structure of the data system and said conceptual path addressing a parts of the structure of the ontology system; and b. automatically populating the data system at a location addressed by the application path with data values contained
...

Method and Device for Ontology Evolution

The present invention is related to a method for modifying a mapping from at least one application path of a data system to a conceptual path of an ontology system, said application path addressing a part of the structure of the data system and said conceptual path addressing a part of the structure of the ontology system. The method comprises the steps of : detecting a change to a part of the structure of the ontology system one or more of the conceptual paths is addressing; updating the mappin
...

Parameterized Configuration for a Programmable Logic Device

The invention relates to a method and a tool for generating a parameterized configuration for a Field Programmable Gate Array from a Boolean function, the Boolean function comprising at least one parameter argument, comprising the steps generating at least one tunable logic block from the Boolean function and from at least one parameter argument, and mapping the at least one tunable logic block to the Field Programmable Gate Array. This is advantageous since a parameterized configuration can be
...

Method of Operating Quantum-mechanical Memory and Computational Devices

A method of operating a quantum system comprising computational elements, including an insulated ring of superconductive material, and semi-closed rings used as an interface between the computational elements and the external world, is disclosed. In one aspect, the method comprises providing an electrical signal, e.g. a current, in an input ring magnetically coupled to a computational element, which generates a magnetic field in the computational element and sensing the change in the current and
...

Scheduling an Application for Performance on a Heterogeneous Computing System

The invention concerns scheduling an application comprised of precedence constrained parallel tasks on a high-performance computer system. The computer system has a plurality of processors each enabled to operate on different voltage supply levels. First, a priority order for the tasks based on the computation and communication costs of the tasks is determined. Next, the based on the priority order of the tasks, assigning each task both a processor and a voltage level that substantially minimise
...

Software Platform and System for Grid Computing

A software platform for providing grid computing on a network of computing nodes, comprising a configurable service container executable at the nodes, including message dispatching, communication, network membership and persistence modules, and adapted to host pluggable service modules. When executed at the nodes at least one instance of the container includes a membership service module for maintaining network connectivity between the nodes, at least one instance of the container includes a sch
...

Virtual Human Interaction System

A virtual human interaction system is described for use on a web-enabled computer which facilitates the training and education of medical services practitioners such as doctors, nurses, pharmacists and the like by allowing them to virtually interact with a virtual patient delivered by the system and displayed on the computer screen. The system embodies a plurality of cases, and for each case, there are a number of possible outcomes, depending on the choices made by the medical services practitio
...

Machine Learning

Computer implemented machine learning methods are described. A co-operative learning method involves a first rule based system and a second rule based system. A rule base is generated from input data and recursion data is used to recursively update the rule base as a result of newly received input data. Rule data defining at least one rule and associated data are sent to the second system which determines whether to update its rule base using the transmitted rule data, and if so the recursion da
...

Apparatus and Method for Performing Service Adaptation in Respect of a Mobile Computing Device

One embodiment of the invention provides a method and apparatus for performing service adaptation in respect of a mobile computing device. The method includes providing a service adaptation specification as a set of rules, where each rule comprises a rule body containing one or more premises and a rule head containing one or more conclusions that hold if said one or more premises are true. The rules are defined as classes in an ontology. The premises represent adaptation context and the conclusi
...

Method and Apparatus for Virtualization of Appliances

A method and apparatus for the virtualization of appliances provides an embedded operating system (OS) which is included in the system boot ROM of a personal computer. When the system boots, the OS is launched and looks for all available virtual appliances from, for example, the following places: local USB, flash card, e.g. SD, xD, CF, CDROM/DVD, or other storage media; local hard disk storage; and the Internet, e.g. an appliance server. The user selects an appliance to use from the OS, whereupo
...

Device for Providing Built-in Broadband Dial-up Function

A device for providing a built-in broadband dial-up function belongs to the network communication field. The device comprises: a USB communication interface module, a processor, a first storage module and a network dial-up interface module. The USB communication interface module is connected with the processor, the first storage module is connected with the processor, and the network dial-up interface module is connected between the processor and a telephone line. The device can also install the
...

Method, System and Computer-accessible Medium for Providing a Distributed Predicate Prediction

Examples of a system, method and computer accessible medium are provided to generate a predicate prediction for a distributed multi-core architecture. Using such system, method and computer accessible medium, it is possible to intelligently encode approximate predicate path information on branch instructions. Using this statically generated information, distributed predicate predictors can generate dynamic predicate histories that can facilitate an accurate prediction of high-confidence predicat
...

Methods for memory assignment schemes and architecture for shareable parallel memory module based internet switches

Systems and methods are described for high-speed memory assignment schemes for routing packets in a sharable parallel memory module based switch system. A method includes receiving a parameter, determining availability of memory location, determining if an available memory location is pre-assigned, and assigning a packet a parameter if the memory location is available. Systems of the present invention provides hardware and/or software based components for implementing the steps of receiving a pa
...

Method for Skin Tone Detection

There is described a method for detecting the presence of skin tone in an image. A gray scale representation of a pixel within the image is provided. Next, a red chrominance independent representation for is provided for the pixel. Then, the two representations are analysed to determine whether a difference in value between the representations corresponds with a the presence of a skin tone value. The present invention provides a rapid skin tone detection classifier particularly useful for real t
...

USB Portable Device

A USB portable device (1) comprises an activating USB peripheral (12a), a storing USB peripheral (12b), and a controlling USB peripheral (12c). When the USB portable device (1) is connected to a host device (2), the activating USB peripheral (12a) is allowed to be recognized as a readable device and a switching program (11) in the recognized readable device is read in the host device (2) and executed. Consequently, a switching indication is received from the host device (2), the readable device
...

A Method, Apparatus, Computer Readable Storage Medium and Computer Program for Forming an Object

A method for forming an object, comprising: providing at least a first material having a melting point at a first temperature and a second material having a melting point at a second temperature; heating at least a portion of the first and second materials above the first and second temperatures to form a substantially molten alloy, the molten alloy having a solidifying point at a third temperature, the third temperature being less than the first temperature and the second temperature; providing
...

Method, apparatus, computer readable storage medium and computer program for forming an object

A method for forming an object, including providing at least a first material having a melting point at a first temperature and a second material having a melting point at a second temperature; heating at least a portion of the first and second materials above the first and second temperatures to form a substantially molten alloy, the molten alloy having a solidifying point at a third temperature, the third temperature being less than the first temperature and the second temperature; and providi
...

System and Method for Arranging Items for Display

A system for arranging searchable items, such as digital images or multimedia icons for presentation on a graphical user interface. The system has an optimizer module which minimises a cost function for arranging items in a layout space and is applied to one or more predetermined characteristics of the items. The optimizer module also creates a mixture distribution by considering each item as having a spatial distribution in the layout space and controls the entropy of the mixture distribution i
...

Method, System and Server for Selecting User

A method, a system and a server for selecting user are provided. The method includes: receiving request message sent by a requester, wherein the request message includes multiple conditions of user's selection and specific operation mode of user's selection; obtaining user information that satisfies each condition respectively according to the specific operation mode of user's selection; making selection from the user information that satisfies each condition respectively, and obtaining the user
...

USB connector and USB device

A USB connector (51) for connecting with a USB female comprises metal legs (11), a connecting line (12), and a substrate(13), wherein the metal legs (11) are formed on a surface of the substrate (13), wherein one end of the connecting line (12) connects with one end of the metal legs (11), another end of the connecting line 12 connects with a PCB, and the USB connector(51) further comprises a fool-proof structure 17 which provided on the surface of the substrate 13 to prevent the USB connector f
...

Antireflection Film

An antireflection film having high stain resistance is provided. The antireflection film 10 includes a transparent substrate 11, a high-refractive index layer 12, and a low-refractive index layer 15. The low-refractive index layer 15 is formed of a cured product of a polymerizable composition containing hollow fine particles such as hollow silica particles, a modified silicone compound, and a second resin component such as a polyfunctional (meth)acrylate. Generally, in an image display device
...

Image Display Device and Method for Manufacturing the Same

An image display device, and a production method thereof are provided, which are capable of suppressing warping of a protective panel formed from a plastic as much as possible. In an image display device having a liquid crystal display panel 1 and a transparent protective panel 2 formed from a plastic which are arranged facing each other via a cured resin, an outer dimension of the protective panel 2 is made larger than an outer dimension of the liquid crystal display panel 1, curing of a resin
...

Method, User Device and Server for Multimedia Session Transfer

The present invention discloses a method, user device and server for multimedia session transfer. The method includes: receiving the session transfer request using the static Session Transfer Identifier (STI) which is sent by the user device; dealing with the Circuit-Switched (CS) session transfer request and judging whether the user device has the CS session in the holding state; if yes, transmitting the dynamic STI corresponding to the CS session in the holding state to the user device; sendin
...

Method and apparatus for abnormality recovering of data card, and data card

A method and apparatus for abnormality recovering of data card is provided. The method includes: obtaining identification information of a network interface card device in an accessed data card; obtaining status information of the network interface card device in accordance with the identification information of the network interface card device; determining whether the network interface card device is abnormal in accordance with the status information of the network interface card device; and u
...

Method, device and system for negotiating authentication mode

The present disclosure discloses a method, device and system for negotiating authentication mode. A first negotiation request carrying an authentication mode supported by a terminal is sent to an authentication server, so that the authentication server determines and sends an authentication mode supported by both the authentication server and the terminal, where the authentication mode is determined according to an authentication mode supported by the authentication server and the authentication
...

Method and apparatus for improving radio performance of wireless data terminal device

A wireless data terminal device comprises a detachable USB connector and a main circuit board, where at least two redundancy grounding connections are provided between the detachable USB connector and the main circuit board, and the grounding points of the at least two redundancy grounding connections are not adjacent to each other. A method for improving the radio performance of the wireless data terminal device is further provided. With the wireless data terminal device or the method for impro
...

A Video Encoding/decoding Method and a Video Encoder/decoder

A video coding method, a video decoding method, a video coder, and a video decoder are disclosed herein. A video coding method includes: performing base-layer coding for the first view, and extracting prediction information of at least one layer by combining a locally decoded first view and a second view; performing enhancement-layer coding for prediction information of at least one layer respectively; and multiplexing the enhancement-layer codes and the base-layer codes of the first view to obt
...

Method and device for implementing USB endpoint multiplexing

A method and device for implementing USB endpoint multiplexing are disclosed. The USB device of the present disclosure supports at least two USB functional devices, and the number of the USB functional devices that are supported by the USB device is larger than the number of data endpoints of the USB device. The method includes: receiving a request for switching over USB functional devices, where the request carries a function identifier of a USB functional device selected by a user; searching f
...

Apparatus and Method for Acquiring Sectional Images

Disclosed is a computer implemented method of interrogating volumetric data, the method including the steps of: defining a reference surface relative to the volumetric data; providing an interrogation window lying in a movable interrogation plane intersecting the reference surface and the interrogation window intersecting the volumetric data, said interrogation plane having a pole lying in it about which pole said interrogation plane is rotatable, wherein movement of the interrogation plane prov
...

Image Display Device, Imaging Device, and Program

An image-capturing device (image display device) 1 includes a rear monitor 12 (display means) having a primary display region MR and a plurality of secondary display regions SR1 to SR3. Further, display control means of the image-capturing device 1 controls contents of display on the rear monitor 12 so that a plurality of images are displayed in the plurality of secondary display regions SR1 to SR3 and so that an image P2 which is displayed in one secondary display region (for example, SR2) amon
...

Display device and method of controlling display device

A display device includes a flexible substrate, a display unit including a plurality of light-emitting elements arranged at the substrate and configured to display an image according to an image signal, a displacement sensor provided to a front surface or a back surface of the substrate and configured to detect a curved state of the substrate, and a pixel shift control unit configured to control pixel shifting of the image displayed in the display unit when a curve of the substrate is detected b
...

Data transmission optoelectric device

An optoelectronic data transmission device has an active section with an active element that generates an optical gain if a forward bias is applied, and an absorption section. A waveguide incorporates the active section and the absorption section. Mirrors providing feedback for light are placed to frame the waveguide. The device can be operated in a pulsed regime emitting pulsed laser light. An additional modulator allows modulating its refractive index due to the electrooptic effect. A device p
...

Image data generating method for displaying computer generated object on displaying device, involves rendering divided polygon area networks with shaded value for receiving image data in display devic

The method involves supplying polygon area networks with amount of vertex for representing an object. The polygon area networks are divided according to a classification procedure e.g. butterfly-classification procedure. A normal amount of vertex is determined, where normal vertex is assigned to the amount of vertex according to the classification procedure. The divided polygon area networks are rendered with a shaded value for receiving image data in a display device, where the normal vertex is
...

Method, System and Computer Program Product for the Decentralized Distribution of Digital Content

A method for the decentralized distribution of digital content via a network includes providing content with a tag configured to allow at least one of an operator of a download portal and a content provider to track distribution of the content so as to collect data about a number of downloads of the content and about distributors of the content. A distributor downloads the content via the download portal and selects a content consumer for further distribution of the content. The content consumer
...

Method for Executing One or More Programs on a Multi-Core Processor and Many-Core Processor

The invention relates to a method for executing computer usable program code or a program made up of program parts on a multi-core processor (1) with a multiplicity of execution units (21, 22, 23, 24), each of which comprises a local memory (201) and at least one processing unit (202) communicatively linked to the local memory, wherein each of the execution units (21, 22, 23, 24) is connected to a communications network (30) for data exchange. One or more program parts are stored in at least som
...

Digital Watermarking

These 2 applications include a new and improved watermarking system and method for use with video and audio. The system and method can be applied directly to compressed media data/ frames with variable lengths (as opposed to a common fixed length) which (1)tremendously reduces the amount data needed to be processed and (2) increases the degree of difficulty for tampering without being detected. The system and method generates a novel digital signature for each compressed frame based upon the
...

Digital Watermarking

2 patent pending digital watermarking systems for sale.
...

Thermal Ground Plane for Cooling Chips and Semiconductor Devices

BACKGROUND: Efficient cooling of semiconductor and integrated circuit devices is critical to their operation. Improvements in cooling allow further technological advancement. Titanium is a unique material suited well for harsh environments and is robust and shock resistant. DESCRIPTION: Researchers have developed a novel Thermal Ground Plane (TGP) for cooling semiconductor devices and integrated circuits that capitalizes on the advantages of titanium as a material as well as wicking action. I
...

A Video Fingerprinting Method for Duplicate Detection

BACKGROUND: Copyright infringements and data piracy have become serious concerns for the ever growing online video repositories in recent years. The uploaded videos on commercial sites are mainly textually tagged. Tags are of little help in monitoring the content and preventing copy-right infringements. The watermarking approach and the fingerprinting approach have been used for detecting such infringements, however, there is still the need for fast algorithms for duplicate detection in large da
...

Hybrid Silicon Evanescent Devices

BACKGROUND: Conventional silicon photonic and optoelectronic devices are mostly built on silicon-on-insulator (SOI) wafers, where a buried SiO2 layer provides vertically optical confinement to maintain lightwave propagation. With increasing demand to replace electrons with light to be the information carrier for higher-speed data communication and lower power dissipation, optoelectronic devices also need to be placed in/among Complementary Metal Oxide Semiconductor (CMOS) devices fabricated on p
...

Improved Differential Space-Time Block codes for Mobile Wireless Systems

BACKGROUND: Space-time block coding (STBC) is used in advanced wireless communications systems to transmit redundant data streams from multiple antennae in order to improve the reliability of data transfer and greatly increase data transmission rates. Such redundancy helps protect wireless data links against fading and other adverse signal distortions caused by scattering, reflection, and refraction in the environment and by thermal noise in the receiver. Differential STBC is a type of STBC that
...

New Method for Concurrent Error Detection and Correcting

BACKGROUND: The spread of technology into hostile environments has increased the need for dependable machine execution without compromising performance levels. The de facto model used for describing fault tolerant systems is the single-event upset (SEU) model, which specifies a maximum of one error per cycle. While SEU compliant machines should be able to operate under constant error rates of one fault per cycle, many do not due to prohibitive overhead, and thus many machines are often only part
...

Embedded Systems Building Blocks (eBLOCKS)

BACKGROUND: Embedded systems combine numerical or Boolean logic operations with arrays of electronic components such as sensors, monitors, controls, and communication devices to add “intelligent” functionality to otherwise unsophisticated circuitry. Unfortunately, most people don't have the skills needed to configure the hardware or program the software of such systems. This poses a significant obstacle to the use of embedded systems in many contexts despite their great usefulness over a wid
...

Optical Dispersion Monitoring Technique using Double Sideband Subcarriers

BACKGROUND: The tremendous growth in Internet traffic has presented the need to scale networks far beyond current speeds, capacities, and performance levels. Optical fiber is capable of transmitting large amounts of data at high speeds without needing to periodically retransmit signals over long distances. Simultaneously transmitting optical signals over the same fiber from many different light sources that have properly spaced peak emission wavelengths can dramatically increase the information
...

Self-Assembled Nano-Cluster and Quantum Dot Lattices

BACKGROUND: Self-assembled quantum dots (QDs) have been the subject of great interest in recent years due to their attractive electronic and optical properties. QD structures and their applications, such as lasers detectors, and memories have demonstrated several unique physical properties. The self-assembled growth of the QDs relies upon strain-induced island formation by the Stranski-Krastanow growth mode. However, efforts to understand and control island formation, ordering, and positioning a
...

System and Method for Testing High-Speed VLSI Devices using slower Testers

BACKGROUND: The operating speed of VLSI circuits is constantly increasing and even small delay faults can cause these circuits to malfunction. Delay testing, which applies pre-generated test vectors to the circuit during its intended operating speed, can ensure the circuit's temporal correctness. However, current testers are usually several times slower than the speed of the new VLSI designs. This gap between the speeds of the testers and the high-performance designs is likely to continue into t
...

Watermarking Based Intellectual Property Protectio

BACKGROUND: In the past in the semiconductor industry, circuit designers and process engineers worked together at the same company. However, companies are now specializing in either design or processing. As a result, systems are being built from pre-designed, or virtual components (VCs). Reuse of VCs saves time and money by implementing proven functions into new designs and, when licensed legitimately, is beneficial to both the licensee and the designer. However, billions of dollars are lost eac
...

Quantum Computation with Quantum Dots and Terahertz Cavity Quantum Electrodynamics

BACKGROUND: A quantum computer processes quantum information, which is stored in "quantum bits" (qubits). The recent explosion of interest in quantum computation can be traced to Shor's demonstration in 1994 that a quantum computer could exponentially speed up factorization of integers. This application is of great interest in commerce and national defense because the difficulty in factoring large integers is the basis for public-key encryption. Algorithms that dramatically speed up other common
...

Adaptive Removal of Resonance-Induced Noise

BACKGROUND: There are many instances when it is desirable to remove an underlying operating frequency from an output signal. When the frequency range is somewhat known, this removal is relatively straightforward using a stagger-tuned notch filter. Stagger-tuned notch filters, however, introduce considerable phase lag and when the frequencies are grossly unknown, unstable, or both, so much phase lag is introduced as to make these filters unsuitable for a very important application: closed-loop co
...

Predictive Event-Tracking Method

BACKGROUND: With the rapid increase of processor speeds, the bottleneck of input/output (I/O) and network system latency has become a critical issue in computer system performance. Standard least-recently-used (LRU)-based caching techniques offer some assistance, but by ignoring relationships that exist between system events, they fail to make full use of the information available. Event modeling techniques, such as those from the data compression field, have much success in supporting caching.
...

Integrable Sub-Micron Ferromagnets for High Density Storage

DESCRIPTION: The continued evolution of magnetic media's vital role in information storage requires advances in appropriate technologies. Scientists at the University of California have developed a process of introducing sub-micron ferromagnets of selectable size and spacings into semiconductor structures (including both Si and III-V compound semiconductors) by means of ion implantation and subsequent heat treatments. The properties of this invention offer alternate technologies for the next gen
...

Quantum Dot Fabrication Process

DESCRIPTION: Quantum dots possess unique properties that could potentially revolutionize existing optical and electronic technologies as well as open up new technologies. Conventional quantum dot fabrication techniques, however, have several drawbacks, such as large recombination velocities and surface depletion, that arise from having the surface exposed while patterning the substrate before or after growth. Researchers at the University of California have developed a quantum dot fabricatio
...

Patented Apparatus, Method and Connection Means for a Modular Personal Datacenter

Three issued US patents protecting a system comprised of modular, stackable digital appliances (integrated hardware & software) that work together to form an easy to expand personal datacenter. Key Features: Simple to determine compatibility by observing the shape of the product. Integrated, extensible cooling system. Build in connectors eliminate need for wires between appliances. Enhanced Performance and Reliability. Unified, comprehensive system for homes and SMB. Scope of Possibl
...

Colorization of Photos and Video Images

Highlights Computer-assisted process for adding colors to monochrome images or films Simplifies colorization process by exploiting the premise that neighboring pixels in an image possess corresponding intensities and color shades Interactive colorization process improves image quality with less manual effort than existing techniques Application: image editing for stills and films companies and studios specializing in computer graphics, films, photos, and image editing software Our Innovation
...

Target-driven Smoke Animation

Highlights Efficient, direct control of animated smoke as special effect Provides animators with precise control while eliminating need for high performance computation resources Generates smoke animations at low cost compared to flow simulation methods currently available Application in computer graphics animation and special effects tools Our Innovation Target driven smoke animation works by either a) explicitly defining target states into which the smoke evolves; or b) by constraining t
...

A Novel High Dynamic Range Compression Method

Highlights The method allows representation of high quality high dynamic range (HDR) images containing large contrast differences between light and dark areas, as the human eye actually sees, on monitors and printers that are designed to display a much smaller dynamic range Preserves fine detail and avoids common negative attributes such as halos, gradient reversals, or loss of local contrast Merges different exposures into one image with an increased dynamic range, revealing highlights and s
...

Robust Real Time Pattern Matching

Highlights Proprietary algorithm for pattern matching in both static and dynamic applications Computer vision software for extracting and analyzing information from images Simple, fast method for use by industrial robots and vision based systems for assembly, manufacturing and inspection Applications in face recognition and security Our Innovation Two part system The “Image Hamming Distance Family” of image distance measures. Family members are robust to occlusions, geometrical transfo
...

New View Synthesis from Plural Images Using a Trifocal Sensor Data Structure in a Multi-view Parallax Geometry

The invention is embodied in a process for synthesizing a new image representing a new viewpoint of a scene from at least two existing images of the scene taken from different respective viewspoints. The process begins by choosing a planar surface visible in the at least two of the existing images and transforming the at least two existing images relative to one another so as to bring the planar surface into perspective alignment in the at least two existing images, and then choosing a reference
...

System and Method for Providing Multi-sensor Super-resolution

A super-resolution enhanced image generating system is described for generating a super-resolution-enhanced image from an image of a scene, identified as image g.sub.0, comprising a base image and at least one other image g.sub.i, the-system comprising an initial super-resolution enhanced image generator, an image projector module and a super-resolution enhanced image estimate update generator module. The initial super-resolution enhanced image generator module is configured to use the image g.s
...

Compiler Aided Ticket Scheduling (cats)

Highlights Today’s personal computers (PCs) are rapidly becoming heterogeneous multi-core computing environments with PC cards having their own CPUs. Few applications really take advantage of all the available processing power. Currently there is no generic programming model and corresponding runtime support to enable a developer to take advantage of unused processing power in PC accessory cards. The HYDRA framework provides a tool for developers to take advantage of unused power, enabling
...

Improved Cache Performance with Reduced Energy

Highlights Cache design improves performance by ~10% Win-win situation: design that improves performance also reduces power consumption Consists of a main cache structure preceded by a small, highly associative filter Blocks inserted into the cache are far more likely to be frequently reused, resulting in more efficient utilization of cache space Random sampling cache has better overall performance than larger, more expensive caches Our Innovation Random sampling of references is used to
...

Directed Client-side IP Spraying

Highlights The system recognises significant search terms and replicates a search-term-specific portions of a search engine’s complete searchable database to provide a database that contains only relevant targets Avoids the bottleneck produced by large numbers of searchers inputting general search terms by identifying relevant terms in the query and directing the browser directly to search in specific search engine servers Option to direct browser directly to the most popular search target
...

Single Image Dehazing

Highlights Improved method for recovering haze-free contrasts in images from a single input Improves images from long-distance photography or in foggy conditions Improved results compared with existing techniques, such as polarization-based dehazing No need for multiple images or input of weather conditions Our Innovation New method for estimating the optical transmission in hazy scenes with minimal input requirements, a single image. Haze-free contrasts are recovered by using the optical
...

Low Cost Motion Capture

A new, simple and low-cost way to capture and record the movement of biological articulated structures. An example of a biological articulated structure is the body; arms, legs, fingers, etc. But not only the human body, this method will work on animals just as well as people. This technology not only captures movement, but is wearable and portable. It is not dependent on a base station. It is also light and flexible enough that it can be unobtrusively fabricated into sportswear. In oth
...

System and Method for Generating Vector Bitmaps with Dual Data Domains

Vector illustrations have become a ubiquitous representation of images for print, monitor display, multimedia, etc. Raster images, however, are resolution dependent and resampling them for display at a higher resolution results in an image that is qualitatively different from a similar vector illustration rasterized at the same resolution. The system and method of this technology defines the concepts of vector bitmaps and dual data domain encoding. This technology identifies the ideal histogram
...

University of Utah Space Management Information System

Space management is a major challenge for organizations with multiple assets that are spatially distributed. The University of Utah Space Management Information System (UUSM), which is the result of combination of two technologies namely database application software (Tenfold�) and geographical information system (GIS) (ESRI�, ArcSDE�), was developed to assist the space office to manage space within University of Utah. The idea was to use the combined features of these applications thereby
...

Collaborative Control of a Remote Software Application

Secure remote access to computers is a real challenge in today�s world. Trading off one or more of performance, privacy and security over the other is a scenario that is commonly encountered. This invention describes a simple solution to avoid the above mentioned problems. A master user can allow a group of computer users to collaboratively control an application, and only the application, running in a remote server. The same images that run on the master computer are ported to the desktop of
...

Micro cooling device

Fast computers are today becoming a common thing. To keep these computers running fast, the heat generated from the internal components needs to be addressed. A new device called the viscous disk air flow displacement device is presented, which allows a large amount of air to be moved using the viscous effects of rotating disk. It is especially unique in its ability to fit into tight places, move relatively large amounts of air and can be used in applications where axial fans cannot be used.
...

Novel Self-Calibration for Air-Bearing Rotary Encoders

The University of British Columbia (UBC) has developed a self-calibration method for air-bearing rotary encoders that eliminates the need for additional calibration instruments. High accuracy rotary encoders are widely used for rotational axis position measurement in ultra-precision manufacturing equipment and measurement machines. The angular measurement accuracy of a rotary encoder is highly dependent on the grating disk manufacturing error, glass disk installation on the measured axis, the sc
...

Thermally Transformable Periodic Mesoporous Organosilica (PMO) Thin Films for Low Dielectric Constant Applications

Background Periodic mesoporous organosilica (PMO) thin films have been investigated in various applications requiring specific optical, magnetic, or electrical properties. These well-defined porous films have specifically shown their interest in the microelectronics industry for application as low dielectric constant insulating layers for the next generations of chips. This improvement in dielectrics reduces crosstalk, reduces the ‘RC’ delay caused by interlayer capacitance, and can redu
...

Veball: a Multiple Degree-of-freedom Computer Input Device

Virtual 3D manipulation of computer generated representations (eg. required in CAD software applications) or robotic control (eg. surgical devices) is a challenging task in computing or control environments that rely on standard input devices such as a keyboard, mouse, joystick, etc. Many such applications require the use of two input devices where less frequently activated functions are allocated to input from a device controlled by the user's non-dominant hand. Unfortunately, almost all non-do
...

Optimizing Mathematical Programs with Peer-to-Peer Networks

Would you like to harness the exponential computational power of peer-to-peer (P2P) networks to solve demanding mathematical optimization problems, but are concerned about security? This innovation delivers the speed and scalability of P2P networks, it does not disseminate any dangerous executable files and it disguises all processes from participants. Mathematical Capabilities This innovation harnesses the computational power of P2P networks to process Integer Linear Programs (ILP
...

Memory-Linked Wavefront Array Processor

A method for performing computations with an asynchronous linear array of multiple processing stages is disclosed. The linear array comprises multiple processing stages interspersed with flow control flag mechanisms and with dual port linking memories. The method utilizes the flow control flag mechanisms between processing stages to control the flow of computations through the array. A Memory-Linked Wavefront Array Processor (MWAP) is disclosed which computes a broad range of signal processing a
...

Trusted Ring Secure Platform Architecture

People rely on computers to provide security, whether it be for online banking transactions, internet purchases, SCADA systems, personal and medical information, or electronic voting. Ultimately, it is the operating system that is expected to supply this security, but operating systems are often the weak link in the chain. Trusted Ring provides a modular framework for inserting custom security services that can be taylored to protect the information that matters most. Trused Ring provides isolat
...

Capability Based Planning Methodology and Tool

The Department of Homeland Security (DHS) requires local, state and regional jurisdictions to have a program for assessment of risks and capabilities prior to receiving grants. DHS has not proposed any unified format and therefore receives many applications with incomplete and disorganized data. They are unable to prioritize grants and distribute the money where it will be of the most value. What is needed is a planning methodology and tool that will allow jurisdictions to assess their capabilit
...

Capability Based Planning Methodology and Tool

The Department of Homeland Security (DHS) requires local, state and regional jurisdictions to have a program for assessment of risks and capabilities prior to receiving grants. DHS has not proposed any unified format and therefore receives many applications with incomplete and disorganized data. They are unable to prioritize grants and distribute the money where it will be of the most value. What is needed is a planning methodology and tool that will allow jurisdictions to assess their capabilit
...

Intelligent Fusion of Multi-modal Biometric Inputs for Decision Making

While techniques provide some beneficial results, they do not effectively utilize all of the information available to a score-level fusion system, including score values, quality estimates, and score distribution statistics. APL's Process for Multi-Biometric Fusion provides expandable, Bayesian belief network-based architecture for multimodal biometric fusion. Studies have been carried out using the architecture to fuse fingerprints and voice data. This invention is unique because: 1) the me
...

Periscope Object Identifier

The highly dynamic environment posed by the ocean surface eliminates many algorithms (i.e. statistics-based segmentation, detection) as potential solutions to detection of surface ships from a low vantage point. The JHU/APL technology is an algorithm for automatic detection, classification and range and bearing estimation of surface ships in periscope images. The Periscope Object Identifier (POI) is applicable to visible-spectrum still and video camera images and has been tested with data fr
...

Advanced Programming Interface (API) for Integration with IVC-4300 Video Acquisition Card

Currently, the IVC-4300 video acquisition card can only be interfaced with through advanced programer knowledge of Microsoft DirectShow which can only be used in C or C++ programs. Researchers at the Johns Hopkins University Applied Physics Laboratory have developed an Advanced Programmer Interface (API) with an accompanying library that provides a simpler interface for the IVC-4300 video acquisition card. This software package can be used to develop software and hardware products that uze th
...

Three-dimensional Scanning System which Combines a Photometric Stereo Method with a Structured Light Method to Obtain the Shape of an Object

Existing art scanning technologies have several differences. For example, laser scanners are not as high-resolution. Scanning electron microscopes are higher in resolution but far more time-consuming and noisy. They also do not provide color information. Researchers at The Johns Hopkins University Applied Physics Laboratory have developed a device which combines structured light scanning and photometric stereo. The result is a 3D scanner that is capable of extremely high resolution scanning
...

Dust Transport Application (DTA)

Dust storms throughout Sahara Africa, the Middle East and Asia are estimated to place between 200-5000 million metric tons of mineral dust into the earth's atmosphere each year. Dust storms directly affect visibility and impact daily commercial and military operations near desert regions. There is a need for a dust forecasting model with a 72-hour forecast capability. Researchers at The Johns Hopkins University Applied Physics Laboratory have developed The Dust Transport Application which is
...

TCM2 Data Recorder

The current TCM2/TCM-20 inclinometer's output is limited to serial communication and does not output timing information. Researchers at APL have developed a Windows compatible graphical user interface for the TCM2/TCM2-20 inclinometer produced by PNI. This program provides accurate time recording of measurements made by the inclinometer. It also interprets the cryptic ASCII output and records it to a human readable file. Further, it can retransmit the inclinometer data over a computer network
...

Design Methodology for Optimal Power Generation in Solar Vehicles Using Genetic Algorithms

This JHU/APL invention applies genetic algorithms to the problem of optimally determining solar panel location and size on an airship (or other solar paneled vehicle) to minimize power, weight, and volume for significant performance advantages over more “intuitive” design methods typically employed. Genetic algorithms are search algorithms based on the mechanics of natural selection and propagation of superior genes. In a general sense, these algorithms encode potential solutions to a spe
...

Automated Vulnerability Analysis Support Tool (AVAST)

With the speed and convenience of e-business comes considerable risk. Viruses, hackers, denial of service attacks, programming errors, stolen or destroyed databases – these and other electronic hazards can cause huge financial losses and damage to professional reputations. AVAST is a network vulnerability analysis tool that combines information retrieval techniques and domain expertise to transform computer security data into organized information with predictive power. The AVAST tool relie
...

Passive Sonar Compression Algorithm (PSCA)

Passive sonar systems are used to gather critical sonar data from unmanned buoys, underwater vehicles, sensors towed from a ship or other advanced deployable sonar data collection systems. Sharing of data from these sensors is often key to a successful naval operation, however data transfer is very difficult due to the large volume of information that needs to be transmitted in a short amount of time. Data compression has become an essential part in the information gathering process and although
...

Sensor-to-sensor track correlation algorithms (1) Vector sort and (2) distance sort

Fingerprint minutia matching involves finding sets of minutia from one fingerprint that can be rotated and translated so that they correspond to a set of minutia from the other print. Under ideal circumstances, if both prints are perfect and the minutia extraction is perfect, one might expect that the minutia sets could be rotated and translated so that each minutia point from one print coincides with a minutia point from the other print. On the other hand, if there is distortion, the matching m
...

A Better and Faster Design and Evaluation Tool for Large Systems

Complex systems have a large number of design parameters that control or affect the performance of the overall system. As systems become larger, the possible number of combinations of these design parameters explodes combinatorially. Evaluating potential system performance with current techniques such as Modeling and Simulation (M&S) requires exploring all possible combinations, which becomes cost and time prohibitive to run. In addition, these large numbers of compute runs and voluminous output
...

Radiance Library Forecasting for Time-Critical Hyperspectral Target Detection Systems

Automated detection of targets continues to be a top priority for future tactical hyperspectral sensing platforms. Due to its large number of fine frequency bands across a wide portion of the spectrum (UV to LWIR), hyperspectral technology offers enhanced discrimination capability and can be used to detect and identify various materials of interest. Hyperspectral imagery (HIS) data and derived information have shown the potential for meeting requirements not achievable with other collection syst
...

Source of Single Photons on Pseudo-Demand from Stored Parametric Down-conversion

There are currently proposals for providing a single-photon from the spontaneous emission of an isolated two-state quantum system such as a single atom, ion or quantum dot. In principle, these approaches offer the possibility of a single-photon “on-demand” in the sense that the isolated two-state system can be excited at any time by any user. Although the probability of single-photon emission can be high in these approaches, there is no method for ensuring that a photon has actually been emi
...

Adaptive Analysis Framework

This technology, the Adaptive Analysis Framework (AAF) is a novel design and maintenance plan for large databases associated with biological and medical research problems or clinical assessments that make use of large scale data sources within multiple and separate laboratory facilities. The framework manages and assists the collection, analysis and storage of immense and distributed sets of data and helps establish protocols for new research projects. While the application focuses on biological
...

Universal Display Format (UDF) for Optimized Real-Time Display of Geographic Data

The Johns Hopkins University Applied Physics Laboratory's "Universal Display Format (UDF)" provides a simplified, platform- and application-independent file format optimized for real-time display of geographical data. The UDF toolset converts a variety of data formats containing geographical information (Vmap, WVS, DNC, etc.) into points, symbols, lines, polygons, text, or images. The tools accept geographic data, parse it into uniform data types, and write the data, with position information an
...

Chebyshev Data Compression

Both lossy and lossless data compression methods have come into wide use for a variety of data compression needs. Lossless compression algorithms typically achieve reductions in data volume by a factor of 1.5 to 2, essentially without loss of information. Lossy algorithms, on the other hand, achieve compression factors much larger than 2, but with loss of information. To date, lossy data compression algorithms have found acceptance in applications where the need to achieve high compression ra
...

Latitude Longitude Plotter

Prior to the development of this program, analyzing latitude/longitude data was very time-consuming and labor-intensive, requiring many different software applications. JHU/APL’s Latitude Longitude Plotter integrates all of the features of those applications into one program. Results that would have previously taken days to generate now take minutes. This software plots latitude and longitude data over regional, color world maps using a coordinate system. Useful options for terrain and colo
...

Methods for Implementing Quantum Logic Operations Using Polarizing Beam Splitters

Quantum computers are expected to perform numerical calculations that are not feasible using conventional computers. They are expected to factor large numbers in an efficient manner, which would have a major impact on cryptography and secure communications. JHU/APL’s new method implements quantum logic operations using linear optical elements, such as beam splitters and phase shifters. Optical fibers can transmit quantum bits of information (qubits) over large distances for communications p
...

Open Autonomy Kernel (OAK), an Architecture for Mode-Identification and Reconfiguration of Control systems Model-Based

Model-based reasoning systems have been relying upon a single model on which a single reasoning engine operates. A single inference engine physically removes the intelligence from the control system when used to control geographically large systems such as ships, computer networks, power grids and transportation networks. This has the drawback of requiring the transmission of raw data to the inference engine which increases the bandwidth requirements, reduces survivability and limits scalability
...

Online Data Visualization Toolkit

The power of the Internet as a Research tool is only now becoming apparent. The Scientific community is struggling to find ways to provide access to complicated data sets over the web. Each new mission or research project is faced with the same difficulty; how to provide a convenient and reliable interface so that data can be shared with other researchers and the public. In most cases a custom solution must be developed - an exercise that involves considerable time and effort. Although off the s
...

Integrated Adaptive Antenna Array and Adaptive Locally-Optimum Detection Processor

Adaptive Antenna Arraying (AAA) and Adaptive Locally-Optimum Detection (ALOD) are two complementary signal-processing techniques use for detecting weak signals (such as radio or radar) in the presence of strong man-made interference or jamming. The system is primarily designed for incorporation within systems using Direct Sequence Spread Spectrum signals, such as Global Positioning System (GPS) signals. In a preferred embodiment the inventive system is incorporated within a conventional GPS rece
...

Tactical Image Rendering Tool Image Processing Algorithm for Creation of Unclassified Line Drawings from Classified National Technical Means Imagery

The security classification of the images, and sometimes the inherently large file sizes, prohibit the images from being used in certain operations. One common means for addressing the security classification issue is to create image derived products that are eligible for security classification downgrade. One type of IDP is a line drawing, a simple, street map-like rendering. NIMA maintains the criteria that govern the creation of line drawings. Moreover, NIMA approval is required for any new t
...

Cybernetic Systems Based on Inductive Logic

A common approach to problem solving is to obtain the necessary information, make necessary interferences, and carry out required actions in the "best" way possible given the practical constraints of limited knowledge and limited abilities to act. The present invention provides a quantitative definition for what is meant by "best" and a way of exploiting this definition towards a formal design methodology for systems that operate cybernetically. The present invention generally provides a meth
...

Real-Time Video Integration with Mapping Software

While receiving a live video feed certainly provides much useful information for the task at hand, often it is difficult to interpret the data without having a broader perspective. For instance, consider a search and rescue mission that is utilizing aerial video to assist in finding a lost person. The field of view of the camera is limited. The ability to dynamically insert the live video into a broader background image greatly enhances the useful information. With a larger background, anything
...

Clinician's Portable, Digital, Intelligent Assistant (Pain Informatics Program)

The input devices are mobile pen-based computers and palm pad systems that will emulate and expand the clinician’s present paper patient system. The system will provide for semi-automation of the collection, archiving, and retrieval of patient information. The Pain Informatics system provides medical personnel with an organized, efficient and reliable method of completing all patient information electronically. This system can improve the accuracy and reliability of patient data collection and
...

A Hybrid Software/Hardware Technique for High Speed Backplane Messaging

A system and method of enhanced backplane messaging among a plurality of computer boards communicating over a common bus uses a set of pre-allocated buffers on each computer board to receive messages from other computer boards. Each sending computer board is represented on each remote computer board by a descriptor ring with pointers to pre-allocated buffers on that remote computer board. When a sending computer board has a message to deliver to a remote computer board, the sending computer boar
...

PC-Based Voice Activated Human Interaction Simulations

A computer-based training tool and method that emulates human behavior using a computer-simulated person in a realistic scenario. The simulated person provides verbal responses in combination with an animated video display reflecting the body language of the simulated person in response to questions asked and during and after responses to the questions. The questions and responses are pre-programmed and interrelated groups of questions and responses are maintained in dynamic tables which are con
...

Symbol Synchronization in a CPM Communications Receiver Based on Energy Near Half the Symbol Rate

The primary objective of the invention is to provide a new method for timing recovery and symbol synchronization in a continuous phase demodulator that overcomes the problems of symbol synchronization for a general continuous phase modulation system. The method is linear in the phase up to an inverse tangent function error detector. This linearity makes possible the application of the method of the invention in cases where the modulation is not binary. In the method, the symbol phase err
...

Enhanced Virtual Executor (EVE) for Linking Intra-Institutional PC's in Parallel Processing

The Enhanced Virtual Executor (EVE) is a software program that provides the capability to run command-line-driven personal computer (PC) programs remotely and simultaneously on multiple computers, via a TCP/IP network. By distributing computational processes over many computers in this way, the time required to perform large analyses can be significantly decreased. EVE can efficiently leverage an institution’s investment in PCs by running computationally-intensive jobs during evenings and week
...

Optical Method for Quantum Computing

Many kinds of numerical problems cannot be solved using conventional computers because of the time required to complete the computation. It has been estimated that the time required to factor a 150-digit number using the fastest supercomputers currently available would be longer than the age of the universe. Future increases in the speed of conventional computers will clearly be inadequate for problems of that kind, which are often of considerable practical importance. It has been shown that qua
...

Adaptive Windowing of FFT Data for Increased Resolution and Sidelobe Rejection

Fast Fourier Transforms (FFTs) are used for processing observed signals. Weighing functions, referred to as windows, are applied to the data to reduce the spectral leakage associated with finite observation intervals. Thus, in applying windows to a sample data harmonic analysis, undesirable effects due to spectral leakage are attempted to be removed. An indicator of how well a window suppresses leakage is the peak sidelobe level. Another indicator is the asymptotic rate of fall off of the sidelo
...

Apparatus and Method for Quantum Mechanical Encryption for the Transmission of Secure Communications

An apparatus and method were developed that permit the transmission of secure communications. The invention uses quantum mechanical effects to establish nonlocal correlations between a pair of photons. This is analogous to an automatic encryption code that exists at only one location and is immediately destroyed after either of the photons is detected. This latter feature also provides a means for detecting any unauthorized tap on the transmission line.
...

Polygraph Automated Scoring Systems

A polygraph automated scoring system was developed in which polygraph signals are input and a probability of deception is output. To begin the process, digitized polygraph signals are transformed into more fundamental signals. These fundamental signals are then subjected to standardization, a critical step. The standardized signals then have certain features extracted at each question. The features for all of the relevant questions are then standardized against the features for all of the contro
...

Stack Data Cache Having a Stack Management Hardware with Internal and External Stack Pointers and Buffers for Handling Underflow and Overflow Stack

An efficient hardware cache manager controls the top-of-stack data underflow/overflow. A processor chip includes a processor, a stack buffer, and the invented cache management hardware. The processor chip communicates with a remove overflow stack through an address/data bus. The cache management hardware efficiently manages overflow and underflow to and from the processor chip in such a manner that less than 1% of the processor's time is spent managing the stack cache.
...

Adaptive Locally-Optimum Detection Signal Processor and Processing Methods

Previous adaptive nonlinear techniques do not implement optimum signal detection transforms based on the full probability distribution of interference variables, and therefore do not suppress as broad a range of interference types as effectively as does the invention described and claimed herein. Further, the invention also does not need the multiple inputs found in, e.g., directional antenna combining or reference interference subtraction. The present invention relates generally to a process
...

Apparatus for Categorizing and Accumulating Events

The invention provides an apparatus for categorizing and accumulating a plurality of different event types wherein the characteristics of each event are detected by a detector and presented to the apparatus as an electrical signal of variable analog or digital value which may indicate the type, speed, energy level or the like of an event. The apparatus includes a table look-up storage device having a plurality of individually addressable memory locations, which receives the electrical or digital
...

Address Sequence Generation by Means of Reverse Carry Addition

An apparatus and method are disclosed for generating a bit reversed sequence. The apparatus includes a reverse addition means for adding binary words in most significant to least significant bit order with the overflow or carry bit propagated to the left. The invention is used to generate a bit reversed address and/or an address sequence that is mapped into a "closed" space.
...

Computer-Controlled Neurological Stimulation System

Implanted electrical stimulation devices have been employed in the management of chronic intractable pain for over twenty years. The most common electrode implantation site has been the dorsal spinal epidural space. Spinal cord stimulation, like peripheral nerve or thalamic stimulation, evokes paresthesias at amplitudes that produce analgesia; the location of these paresthesias varies with electrode location. Empirically, it has proved to be necessary for therapeutic effect that these paresthesi
...

A Better and Faster Design and Evaluation Tool for Large Systems

Complex systems have a large number of design parameters that control or affect the performance of the overall system. As systems become larger, the possible number of combinations of these design parameters explodes combinatorially. Evaluating potential system performance with current techniques such as Modeling and Simulation (M&S) requires exploring all possible combinations, which becomes cost and time prohibitive to run. In addition, these large numbers of compute runs and voluminous output
...

Functional Memory Custom Computing Machine (FMCCM)

Description The FMCCM implements and combines ideas from Field Programmable Gate Array (FPGA) Custom Computing Machines (FCCMs), reduced instruction set computing (RISC) and spreadsheet (tabular) programming. The FMCCM approach differs from others in that it follows the conventional processor/memory architecture except there is no computational circuitry inside the processor where it is normally implemented. Instead of expressions taking several steps to compute in a conventional microprocessor,
...

Partial Handoff in MIMO-OFDM Cellular Systems

Background MIMO technology allows high data-rate transmission to a single user using spatial multiplexing techniques, space-time coding, and other methods known in the art. In a wireless cellular network, when the mobile receiver is moving from one cell to another, multiple transmit antennas provide a unique opportunity to increase system performance during handoff by using antennas from both base stations of the adjacent cells. The problem addressed has to do with the optimization of these hand
...

Multi-band Modulation, Coding, and Medium Access Control for Wireless Networks

Background The IEEE 802.11n standard, which some enterprises are already adding into their wireless plans, promises to replace the Ethernet and bring WLANS and UWB into one virtually seamless web. This technology enhances 802.11n and similar standards by jointly designing the MAC and PHY layers of multiple frequency networks. Invention Description The technology is a protocol and design scaffolding that can be used to create high-performance, very high-throughput wireless local area networks
...

Method and System for Background Replication of Data Objects

Background Prefetching is used to improve the speed of data requests by anticipating the next request and prefetching the respective data. Currently prefetching is hand-tuned, which risks being too aggressive or too timid, consequently hurting demand traffic or diminishing prefetching performance. Moreover, hand-tuning requires extra administration costs. Furthermore, most background transfer rates are set by magic numbers to control aggressiveness; however, this method lacks the real-time respo
...

Codebook Tables for Encoding and Decoding Partial Channel State Information in a Multiple-Input Multiple-Output (MIMO) System

Background Multiple-input multiple-output (MIMO) communication systems can use channel state information to improve performance in wireless links. A practical way to obtain channel state information at the transmitter is through codebook-based closed-loop transmit diversity methods, known broadly as limited feedback techniques. Codebook-based closed-loop transmit diversity method utilizes codebook tables known to both the transmitter and the receiver. Codebook methods have been included in the I
...

Workload-guided Application Scheduling in Multi-core Systems

Background Heterogeneous multi-core processors have emerged more efficient as compared to homogeneous multi-core processors. This is due to the ability of heterogeneous multi-core processors to meet the different resource requirements of applications, and hence achieve power-efficient computing. However, one of the challenges of using a heterogeneous multi-core processor is to schedule different programs in a workload to the most suited core that can deliver the most efficient program execution.
...

Workload-guided Application Scheduling in Multi-core Systems

Background Heterogeneous multi-core processors have emerged more efficient as compared to homogeneous multi-core processors. This is due to the ability of heterogeneous multi-core processors to meet the different resource requirements of applications, and hence achieve power-efficient computing. However, one of the challenges of using a heterogeneous multi-core processor is to schedule different programs in a workload to the most suited core that can deliver the most efficient program execution.
...

University of Texas At Austin

Background Analyze vibration of cars: Noise levels for comfort, quality Simulation models needed; physical prototypes not practical Detailed (huge) model needed Historically, Cray supercomputers were required: Expensive Slow job turnaround Limited benefit from analysis Invention Description New numerical algorithm: Divide and conquer Thousands of substructures Automated multilevel substructuring (AMLS) Reduction via small substructure problems Fits into industry standard software Benefit
...

UTWID 5.0 for Injection Water Management

Background Injection water management is a critical component to offshore well operation. Invention Description UTWID allows the user to address: How clean is clean? What filtration specs should I use? Can I inject raw seawater? How much oil in produced water will my injection well tolerate? How fast is a fracture growing? How often will the injection well require remedial treatment to regain injectivity? What is the right balance between injection water treatment costs and injection well st
...

UTRTM Computer Software

Background The program calculates skin factor evolution during an acidizing treatment by measured pressure and injection rate data while pumping. The software can be used to evaluation acid treatment effectiveness, identify damages during injection, and optimize subsequent treatments. Invention Description The program is divided into three sections: Pre-Treatment Test to obtain reservoir information such as permeability and initial skin factor Real-Time Monitoring to process the real-time fi
...

UTMAST (UT Matrix Acidizing Simulation Tool )

Background The program can be used to create a damage assessment model prior to applying the acidizing process in the well to reduce risk of damage to the well. Invention Description UTMAST has two main parts, the formation damage assessment and acidizing simulation. The formation damage assessment model collects the necessary information about the well system and possible damage existing in the system from the user, and then suggests a treatment strategy to remove the damage. The suggestion
...

UTFracT Computer Software

Background Knowing the location and height of a fracture in a well bore can help the operator to plan and optimize production of the well and to improve future fracturing operations. Temperature logs have been used to determine the locations and the heights of fractures created by hydraulic fracturing treatments. Invention Description UTFracT consists of a pseudo 3-D heat transfer model with a Windows interface. Since the temperature log is an inexpensive and reliable tool, it has been a pop
...

Telephone Call Center with Method for Providing Customer with Wait Time Updates

Background There are some customer service tasks that arise when a customer calls into a call center and would rather deal with an automated self-service system than with a human agent e.g., they cannot pay their entire bill. For those customers, they can schedule a series of payments automatically. Some of the steps in payment scheduling require the automated self-service system to gather data from company databases (e.g., bill amount), and this may take time. The customer must wait while the s
...

SimSite Computer Program

Background The need exists for students at all levels to study real-world problems. However, time and financial constraints prevent such real-world studies. SimSite was written to simulate real-world situations. Invention Description SimSite is a computer simulation application programmed in Microsoft Visual C++ for the Windows 95 environment. The purpose of this program is to simulate a Superfund site investigation to evaluate the need for remediation. (A Superfund site is an uncontrolled o
...

Program to Detect MOVEs of Numeric Fields to Alpha Fields in NATURAL Programs

Background When NATURAL v2.2.x code contains a numerical field holding the value '02' (xF0F2), it is moved into an alpha field; the alpha field holds the value '2' (xF240) instead of '02' (xF0F2). Invention Description A NATURAL v2.3 program reads NATURAL v2.2.x object code and detects MOVE instructions of numeric format source fields to target fields whose format is alphabetic. Benefits Detects and reports erroneous MOVE statements Features Reads NATURAL v2.2.x object code rath
...

PLAPACK Server Interface (PSI)

Background Mathematical software packages perform complex analysis and modeling; however, these systems can only solve a limited size of problems because of memory and CPU power limitations. Other software applications have attempted to apply the use of a parallel machine, but they are still limited in the complexity of problems they can solve because data is continuously passing back and forth between the machines. Invention Description PSI is an interface that allows PLAPACK (Parallel Line
...

Parallel Linear Algebra Package (PLAPACK) Release R3.1

Background Previously created software packages for parallel computers are inefficient because data is continuously passed back and forth between separate parallel machines. These applications have been unsuccessful in building parallel linear algebra libraries for distributed memory supercomputers. Invention Description PLAPACK is a library infrastructure for the parallel implementation of linear algebra algorithms and applications on distributed memory supercomputers such as the Intel Para
...

Neuroevolution: Real-Time Creation of Sequential Digital Systems for Control, Design, and Decision Making

Background Many applications lack a method of evolving networks for learning tasks. In difficult real-world learning tasks such as controlling robots, playing games, or pursuing or evading an enemy, there are no direct targets that can specify the correct action for every situation. Neural networks promise to solve this problem, but a long process of training must occur before it can be effective. A new system for the training of neural networks is needed and can be used to solve a number of pro
...

ModSite Computer Program

Background There exists a need to teach groundwater modeling skills at the university and professional level. Invention Description Prior to the creation of the ModSite program, no computer software existed that could be used to teach contaminant transport modeling. ModSite is a Windows-based program written in Microsoft Visual C++. Benefits The advantages of the software are that it can present users with a visual experience of modeling sites with groundwater contamination and can pr
...

Control Flow Deviation Detection for Intrusion Prevention in Embedded Software

Background Computer systems are prone to security attacks which exploit software bugs. The security attacks typically try to make the computer system execute portions of code which would not have been executed otherwise. This can result in compromising the data on the system or relinquishing control of the system to the attacker. An invention is presented by which the software is modified such that it can detect if portion of code is being executed as a result of an attack. Remedial actions can
...

Compatibility Assessment of Educational Programs

Background The nation's public school system is poorly designed to aid certain students who are at risk, entering the mainstream educational system. The accelerated school concept works to bring at-risk students into the educational mainstream by building on their natural strengths and by having consistently high expectations for them, regardless of their backgrounds. Invention Description This tool allows schools to analyze existing programs and/or potential programs to see if they are comp
...

ARL: UT GPS Software Toolkit (GPSTK)

Background Many GPS algorithms experience processing problems when the number of data components and state elements vary widely and change rapidly. Moreover, many aspects of these algorithms have never been published. Nor were they devised by bringing together different results from widely different areas. Invention Description The ARL: UT GPS Software Toolkit is a collection of reusable software modules implementing GPS, GPS-related, and ionospheric algorithms. It is written entirely in C++
...

Texas Geographic, Geographic America, and Geografía de las Americas Periodic Journals for Education of Students Across Texas, plus North, Central, and South America

Background Textbooks are expensive, can become outdated shortly after publication, and are oftentimes unaffordable by school districts. Invention Description The instructional materials are developed using the Texas InfoMart, a web-based data dissemination system developed in cooperation with NASA and the Raytheon Systems Company. The Texas InfoMart vertically integrates remotely-sensed data and products, acquired by satellites belonging to NASA's Earth Observing System (EOS) Program, with o
...

Model-based Framework for the Detection of Spiculated Masses on Mammography

Background The detection of lesions on mammography is a repetitive and fatiguing task. Only three or four out of a thousand examined cases are malignant, and thus an abnormality may be overlooked. As a result, radiologists fail to detect 10% to 30% of cancers. Computer-Aided Detection (CADe) systems have been developed to aid radiologists. These systems act as a second reader, thus eliminating the need for a second radiologist. However, the detection accuracy of current systems is much higher
...

Method and Apparatus for Adapting Display to Match User-Specific Information Preferences

Background The human brain is only capable of processing a limited amount of information at one time, but the amount of information that is available to a person in a given situation is infinite. Sifting through all of the information available and pulling out data relevant to the task at hand shifts time and energy away from the primary task. Researchers at UT Austin have developed an adaptive display technology that solves this problem. Invention Description The invention is an adaptive di
...

Digital Earth Science Materials

Background Currently, printed textbooks are used in the classroom for an eight-year time period, but a great deal can change before textbooks are updated. This project seeks the most effective methods of teaching students by using technology, specifically in the area of earth science. Invention Description Geologic maps with reduced file size, simplified attributes, improved labeling, and standardized formats in order to import data into specified geographic information system (GIS) and virt
...

Color Rendering of Phase Information in Acoustic Images

Background In certain environments, objects with very different structure can generate echoes that appear very similar in conventional acoustic displays. Examples in underwater acoustics applications are trapped gas and rigid reflectors, both of which can be responsible for very bright acoustic returns in echo soundings. However, a trapped gas pocket will invert the phase of an echo, while a rigid object will not. Invention Description The technology is a method for identifying objects by ge
...

Automatic Filter Configuration for Acoustic Color Visualization

Background Existing acoustic color visualization methods rely on acoustic colormapping filters that are either static or manually adjustable by the user. If the spectral balance of the colormapping filters does not match that of the data, the resulting color image will be skewed toward one or more shades of color, affecting image contrast. Manual balancing of the filters can be a tedious and imprecise process, and when it is accomplished for a given image, standardization is lost. Invention
...

Voltage Controlled Oscillator

Background Most digital electronic circuits require clocks to coordinate the processing of data. The clocks are often formed using phase-locked loops. Phase-locked loops require an oscillator (a basic source for the clock) that has a frequency that can be adjusted by means of a control voltage. Such oscillators are referred to as voltage controlled oscillators (or VCOs). Invention Description Most voltage controlled oscillators are implemented via ring oscillators, which consist of an odd nu
...

Versatile disposable FET-based biosensors

Background Conventional CHEMFETs (chemical field effect transistors) are silicon MOSFETs with the gate uncovered to make it chemically sensitive. These gates, made of poly-silicon or metal which are replaced with a chemically sensitive metal, are widely used but are not very effective. Furthermore, due to inefficiencies in removing trapped charges/dipoles after a sensing event, CHEMFET sensors experience a lot of drift in their characteristics with regard to time. Invention Description The k
...

TRIPS: a Third-Generation Computer Architecture

Background Conventional CPU architectures are hitting hard limits in the following areas: operating frequency, efficiency, and power consumption. The historical 55% annual increase in CPU performance is likely to drop to 20%. In addition, computer applications are becoming more diverse: many types of specialized solutions have emerged and many applications have varying phase behaviors. The TRIPS project has developed technology scalable processor and memory system technologies for nanoscale
...

Quantum Dot Applications for Flash Memory, Semiconductor Lasers and Photodetectors

Background The mobile electronic devices of the future will need lower voltage and power data storage capabilities to continue offering consumers increased functionality and extended battery life. Current non-volatile flash memory technology is reaching the limits of its ability to shrink down. A new approach is needed to keep pace with the technological evolution predicted by Moore?s Law. Invention Description Non-volatile flash memory technology can continue to scale down for lower voltage
...

Packaging enhanced board-level optoelectronic interconnects

Background Advances in multiprocessor and supercomputing technology are paving the way for massively parallel computing systems. However, conventional bus technology is inhibiting this progress. Propagation delays are an inherent side effect of traditional copper interconnect technology. This delay causes scalability issues such as clock skew and limitation of the bus length because of signal degradation. Optoelectronic interconnect systems address both these concerns, but to date fabrication is
...

Non-Uniform Cache Apparatus (NUCA), System, and Method

Background Traditional cache hierarchies are broken up into levels (L1, L2, L3, etc.) where each successive level is much larger and slower than the previous one. If a needed datum is not found in the fastest level, L1, in one to three cycles, the slower L2 is searched, taking 6 to 12 cycles, and so on. The increase in wire delays makes these discrete levels infeasible for caches integrated with the processor on the same silicon die, as, even within one level, the number of cycles will vary depe
...

Methods for Compact Strip/Slot Waveguide Coupling with 20dB Efficiency Enhancement

Background The market for optical networking components will grow from approximately $2.8 billion in 2007 to $7.9 billion in 2012, according to CIR forecasts. Within this market is the market segment which includes photonic crystal waveguides. This invention provides a means to efficiently couple light into a slot photonic crystal waveguide with a compact structure. Stimulation indicates that the slot photonic crystal waveguide exhibits low group velocity near the band edge and therefore lead
...

Method for Reduction of High Speed Multipliers Minimizing the Number of Half Adders Required

Background There have been tremendous advancements in the field of microprocessors and digital signal processors, marked by an increasing demand for high-speed arithmetic circuits. In particular, the demand for high-speed multiplier circuits with reduced complexity has increased. To meet this demand, the common method set that is being used in current implementations of multipliers is the Wallace methods. Wallace multipliers use full adders and half adders in the tree reduction tiers. Half ad
...

Method and Apparatus for Capacitance Multiplication Within a Phase-Locked Loop

Background Often phase-locked loops are used to filter phase noise and jitter from a reference clock. These are referred to as "clean-up" phase-locked loops. They require large values of capacitance to achieve a low loop bandwidth. Traditionally the large values of capacitance are realized with physically large on-chip capacitors or with discrete capacitors off-chip. Both of these are undesirable: on-chip capacitors may require 1 square mm of chip area which is prohibitively expensive, and off-c
...

High-performance, low-power delta-sigma analog-to-digital conversion

Background The Delta-Sigma ADC is an important building block for numerous electronic circuits today. In the market of high-performance data conversion, it is the ever-increasing thirst for wider bandwidths and lower power consumption without compromise in resolution that drives demand. Examples of high-performance Delta-Sigma ADC applications include cellular basestations, digital media receivers, automated test equipment, and medical imaging. This technology advances the state-of-the-art in sw
...

Fabrication of Oriented Silicon Nano-Structures by e-Beam Lithography and Anisotropic Wet Etching

Background Based on prior work for development of angstrom-scale measurement standards for the semiconductor industry, this innovation has made significant advancements in the alignment and control for etching lines/channels in silicon and silicon-on-insulator (SOI) structures. Prior alignment and etching methods were not precise enough to provide the necessary control. The resulting advancement allows production of nano-scale channels of very high quality, for example mechanical integrity, surf
...

Efficient Heat Dissipation for Active Optical Components on Printed Circuit Boards

Background As chips become more complex, interconnects need to be placed more densely on printed circuit boards to carry data in and out of these chips. Copper interconnects, in widespread use today, are quickly approaching their physical limits because of heat and crosstalk problems, thereby threatening to create a bottleneck in system design. These problems can be eliminated with optical interconnects. However, the devices that convert electrical signals on the chip to optical signals for t
...

CMOS Integrated Biosensor Microarrays

Background Today, biosensors are one of the most important analytical tools in biotechnology. These sensors take advantage of the selective interaction and binding of certain biological receptors to identify and detect different analytes such as toxins, hormones, DNA strands, proteins, bacteria, etc., in a variety of applications such as molecular diagnostics, pathogen detection, and environmental monitoring Currently there are many commercially available biosensor systems; however, their cur
...

Bridged, Three-Path Fused Multiply-Adder

Background Industry floating-point fused multiply-adders (FMA) to date all use a slight derivation of the original FMA serial architecture. Classically this architecture is subject to two major tradeoffs: 1) difficulty in implementation due to massive alignment and end-around-carry components—especially in the face of wire-dominant 65nm and smaller technologies; and 2) the floating-point unit (FPU) architecture faces both a loss of performance due to a reduction in parallel single instruction
...

Automatic Generation of Microprocessor Power/Thermal Stress Benchmarks

Background Microprocessor designers are interested in estimating the maximum power and maximum temperature that the chip can reach, as it helps in designing the power delivery system, packaging, cooling, and power/thermal management schemes. However, due to the lack of any standardized stress benchmarks, the current trend in the industry is to develop hand-coded synthetic "max power" benchmarks or stress marks. This is an extremely tedious and time-consuming task that requires an intimate unders
...

An Interleaving Method Used to Boost Dynamic Performance of Current-Steering Type D/A Converters

Background Current-steering digital-to-analog converters (DACs) with excellent dynamic performance are important building blocks in high-performance electronic systems. This invention significantly boosts the DAC’s dynamic performance in applications where the load is resistive and the output voltage varies with the signal. In conventional current-steering DACs, HD3 and IM3 performance are limited by the data-dependent charging and discharging of parasitic capacitors connected to the common-so
...

UNPROG Practical Automatic Program

Background Programming plans are units of programming knowledge connecting abstract concepts and their implementations. Existing research assumes that plan instances can be recognized to recover the programmer?s abstract concepts and intentions, but this approach has not been confirmed empirically. Invention Description UNPROG is a practical, automatic program that recognizes abstract programming concepts in existing software. Such understanding is useful in software engineering processes su
...

Programming Model and Software System for Exploiting Parallelism in Irregular Programs

Background Irregular programs deal with pointer-based data structures like large graphs and trees. It is well known that it is difficult to exploit parallelism in these programs. We have developed a programming model and an associated software system that make it much easier to exploit parallelism in irregular programs on multicore processors. Invention Description The programming model provides two constructs called optimistic iterators that programmers use to highlight opportunities for ex
...

Hoard: a Scalable Memory Allocator for Multithread Applications

Background For large parallel, multithreaded C and C++ applications such as web and database servers, the memory allocator is often a bottleneck that severely limits program performance and scalability on multiprocessor systems. Previous memory allocators have suffered from these problems in several forms, therefore severely effecting existing applications. Invention Description Hoard is a fast, highly scalable memory allocator software library that largely avoids false sharing and is memory
...

Goto BLAS

Background The Basic Linear Algebra Subprograms (BLAS) library contains a collection of computing routines for performing low-level basic linear algebra operations, including matrix multiplication. Users of high-end supercomputers often rely on routines from the BLAS library as a building block for developing a wide array of scientific and engineering software. Consequently, optimization of key BLAS routines can result in a measurable increase in productivity of both workstation-level computers
...

Fusible Data Structures for Fault Tolerance

Background The use of replication-based approaches for server backup in distributed environments—in which an exact replica of the data on each server is made—is computationally efficient, but can create significant hardware demands. In other domains, such as disk storage, coding theory techniques are employed to recover data in the event of faults in a much more space-efficient method than that used in replication-based approaches. However, in applying these coding theory techniques to se
...

Formal Linear Algebra Methods Environment (FLAME)

Background The development and maintenance of libraries for high-performance distributed-memory parallel computers is simply too complex to be amenable to conventional approaches to implementation. Attempts to employ traditional methodology have led to the production of an abundance of anfractuous code that is difficult and costly to maintain and upgrade. Moreover, it typically attains suboptimal performance. Invention Description FLAME provides a method of formal derivation for the implemen
...

Firewall Decision Diagrams

Background Computer network firewalls operate by a set of rules that act as a gatekeeper for data traffic. These rules are written in a table format by network administrators. The process of creating and maintaining the rules is highly susceptible to error, especially in complex network environments that have multiple firewalls and rules numbering in the hundreds or thousands. Network security breaches are often a result of errors in these rules. While there are many tools available today to ass
...

EVID - a Prolog Program for Interactive Defeasible Reasoning

Background Practical decisionmaking often depends on information which while not directly available to us, can be inferred from other information that is available. For instance, while driving, we may not directly experience the feel of a slick street, but can infer that the street is slick from the visible evidence that it has just begun to rain. This inference is based on the rule-of-thumb that, in typical situations, if rain has begun to fall on a previously dry street, then that street is no
...

Virtuoso: a Computer Resource Marketplace (26060/26075/26076/26077

Virtuoso is a prototype system that creates a marketplace for resource providers to lease computer capacity to resource buyers in a straightforward manner through the use of virtualization technologies. Virtualization simultaneously minimizes the amount of management that providers need to do and maximizes the flexibility that buyers have. A key aspect of the system is its ability to dynamically adapt to changing workloads and resource availability without requiring any application or OS change
...

Customized Power Management Software (26078)

The invention personalizes and optimizes computing speed and power management for a given application user and manufactured computing device. To the best of our knowledge, the invention is the only solution that personalizes and customizes user experience to the levels that it does. The invention can be marketed either as a stand-alone software product or as software pre-incorporated into computing devices. It uses two distinct methods to customize power consumption of the device. Both metho
...

Thermal Management of On-Chip Caches Through Power Density Minimization (26102)

The invention is a set of straightforward methods by which to reduce power consumption on computer chips. The methods result from a discovery by Northwestern investigators that cooling of on-chip cache memory has a significant impact upon computer chip power consumption. To our knowledge, the prior art neither suggests a motive nor a means by which to reduce cache temperature on computer chips (although there is significant prior art directed to reduce temperature elsewhere on computer chips).
...

Time-Sharing Parallel Applications with Performance Isolation and Control (26116)

The inventors have developed a system for time-sharing parallel machines that provides isolation and enables the execution rate of an application to be tightly controlled. Most parallel machines, such as clusters, are space-shared in order to isolate batch parallel applications from each other and maximize their performance. However, this leads to low utilization or potentially long waiting times. Furthermore, the administrator of the parallel machine can only control the admittance of appli
...

Speculative Remote Display (26119)

Speculative Remote Display is the only known solution that eliminates network round-trip time for remote display systems, making the system more responsive in a wide-area environment. Remote display systems allow a distant user to control a computer or application with a graphical user interface. Increasingly, remote display systems are being used over wide-area networks where round trip latencies are inherently much higher than are those in local-area networks (Latencies also have far great
...

PICSEL (28064)

INVENTION: Computer scaling techniques attempt to optimize a tradeoff between computer performance (speed) and power consumption. User studies have shown that such optimizations greatly improve if a user’s personal tastes are considered during usage. In response to this observation, the investigators have invented PICSEL (Perception-Informed CPU performance Scaling to Extend battery Life). PICSEL is a dynamic voltage and frequency scaling (DVFS) technique that tailors computer speed and po
...

IDnet Mesh: for a More Secure Intranet and Internet (28118)

INVENTION: IDnet Mesh increases security and authentication on Intranets and the Internet. It accounts for a user’s real identity without publicly revealing his identity. IDnet Mesh helps ensure that all participating users on a web site are who they claim to be to a trusted authority, including their age and gender. In addition, IDnet Mesh’s technology can be used for VPN to significantly upgrade the performance of the current security-token-based authentication systems. IDnet Mesh: Pro
...

Remote Hardware Enabling/Disabling Techniques Using Manufacturing Variability

This invention proposes the first active hardware metering scheme that symmetrically protects the IP designer and the foundry by providing a key-exchange mechanism. The active metering method uniquely locks the IC at the fabrication house by utilizing the unclonable variability-based ID of each silicon circuit, known as the random unique block (RUB). This does not alter the functionality of the original design, and only the designer can provide the key to the locked IC. Experimental evaluations
...

Compressed Sensing Camera

Advantages . Design enables simultaneous sensing and compression of images. . Compression is part of the analog acquisition process, so the need for data compression algorithms is eliminated. . The image or video sequence is automatically encrypted without additional computational expense. . Design is appropriate for remote sensing applications where computational power is at a premium. Technology This invention is a new kind of imaging device or camera. The design combines advanced sig
...

Throughput Maximization in Wireless Communications Systems

Current theory tells us the ultimate throughput, or ergodic capacity, of an idealized communications system. The ergodic capacity is achieved in idealized systems by using codewords that are infinitely long and thus averaged over an infinite number of instances of the fading channel. Practical systems have a strict coding delay constraint: the codewords used must have finite length and therefore span a finite number of instances of the fading channel. In such systems, ergodic capacity is unattai
...

Sensor-assisted motion estimation for efficient video encoding

It is very important to note that motion in a successive video sequence consists of two parts: global motion and local motion. The global motion is generally engendered by camera movement, while the local motion results from object movement in the scene. Most existing motion estimation algorithms do not distinguish them and use a block matching algorithm (BMA) block by block for the encoded picture. Since every block is possible to embed both global and local motions, existing solutions often ha
...

Remote Hardware Enabling/Disabling Techniques Using Manufacturing Variability

This invention proposes the first active hardware metering scheme that symmetrically protects the IP designer and the foundry by providing a key-exchange mechanism. The active metering method uniquely locks the IC at the fabrication house by utilizing the unclonable variability-based ID of each silicon circuit, known as the random unique block (RUB). This does not alter the functionality of the original design, and only the designer can provide the key to the locked IC. Experimental evaluations
...

Continuous Remote Control and Authentication of Integrated Circuits

This invention is a new approach for remote enabling, disabling and metering of integrated circuits. The approach leverages inherent manufacturing variability of modern and pending Si technologies. The key conceptual novelty is that designers can control ICs remotely, continuously, and concurrently with execution. The remote activation protocol is designed to protect both the designer and the fab by requiring a key exchange mechanism for IC activation. It can be summarized using the followin
...

EtherFuse: an Ethernet Watchdog

This invention is a device that can be inserted into existing Local Area Networks (Ethernet) to significantly enhance its reliability. The functionality of this device can be integrated into existing Ethernet switches to eliminate the need for adding new devices. However, implementing the EtherFuse as a standalone device is more flexible as it does not require modifying existing Ethernet switches. Specifically, EtherFuse is characterized by how quickly it responds to network failures, its abilit
...

Integrated single embedded processor based laser spectroscopic sensor

This is an ultra-compact laser based gas sensor with fully integrated hardware, software, and optics. This device can automatically adjust laser wavelength and optical output, convert sensor power, measure and control target parameters, and communicate and/or process the acquired data for analysis. This platform consists of a spectroscopic source, an optical absorption module, and a detection element with the associated control electronics hardware and software. Such a fully integrated system ha
...

Compressed Sensing Camera

Advantages . Design enables simultaneous sensing and compression of images. . Compression is part of the analog acquisition process, so the need for data compression algorithms is eliminated. . The image or video sequence is automatically encrypted without additional computational expense. . Design is appropriate for remote sensing applications where computational power is at a premium. Technology This invention is a new kind of imaging device or camera. The design combines advanced sig
...

A Parameterized VLSI Architecture for Binary Multipliers based on Optimal Partitioning and Redundancy Removal

A parameterized VLSI architecture for performing binary multiplication on signed and unsigned binary numbers or variable widths is the invention. The archictecture consists of two basic units. The first unit optimally paritions the computations that are involved in the multiplication of two binary numbers into a set of all possible distinct partial products. The second unit appropriately combines the distinct partial products generated by the first unit to obtain the desired product of the two b
...

Global Threshold Method and Apparatus

Thresholding or binarization of images is an important step in image processing applications that uses different criteria to separate foreground objects from the background. This invention describes a novel weight based clustering algorithm, a real-t ime single pass global thresholder suitable for images (including trimodal and low contrast) with a single chip realization. The values are: 1.No external memory storage required; parameters easily modified to suit other applications. 2.Simple l
...

Jerk Limited Techniques for Minimizing Vibration of Maneuvering Structures

Control of machine vibrations is very important in design of flexible motion systems. This technology describes a technique to design time-delay filters which modify the input to the dynamic system such that the residual vibration at the end of the maneuver is eliminated or minimized in the presence of modeling uncertainties. The proposed technique will permit the designer to select the level of permitted jerk, which is directly correlated to the acoustic noise generated by the vibrating struc t
...

Augmentative Communications Device for the Speech Impaired Using Commercial Grade Technology

The invention is a software package that can be installed on any Windows based computer that offers features not presently available in the augmentative communications market. Standard functions such as text-to-speech and pictures-to-speech are fund amental to the software, but a number of other features separate this invention from present market offerings. These new features allow more efficient communication, allow a new depth of individualized communication, and allow a new element of fun a
...

Automated Facial Action Coding System

Automated Facial Action Coding SystemLaw enforcement tool, national security and law (Biometrics)Consumer Market Research -Computer SciencesPrograms for recognition of facial identity from digital images Automated Facial Action Coding System Categories: Imaging: Display Devices, Computer
...

Referent Tracking

Referent tracking is a simple yet powerful way to organize electronic data and coordinate databases. The ability to track not only information but also data relationships is invaluable in various fields including healthcare, intelligence, and digital media. Currently, the creation and flow of new and existing information overwhelms databases due to the lack uniformity and efficiency. With the ever-growing amount of data and the need to extract useful information, a new system of data organizatio
...

Hyperspace Diagonal Counting (HSDC) for Multidimensional Database Visualization and Data Mining.

This technology describes a new mathematical technique to graphically visualize and present objects and shapes in hyperspaces, i.e., in extensions of space beyond the third dimension. Currently, these are visualized only as mathematical abstractions, although there have been attempts to capture and visualize the fourth and fifth dimensions by employing colors and shades. This invention enables a secure and mathematically precise method of using mathematical diagonal-counting techniques (devised
...

Hyperspace Diagonal Counting (HSDC) for Multidimensional Visualization

This technology describes a new mathematical technique to graphically visualize and present objects and shapes in hyperspaces, i.e., in extensions of space beyond the third dimension. Currently, these are visualized only as mathematical abstractions, although there have been attempts to capture and visualize the fourth and fifth dimensions by employing colors and shades. This invention enables a secure and mathematically precise method of using mathematical diagonal-counting techniques (devised
...

Jerk Limited Techniques for Minimizing Vibration of Maneuvering Structures

Control of machine vibrations is very important in design of flexible motion systems. This technology describes a technique to design time-delay filters which modify the input to the dynamic system such that the residual vibration at the end of the maneuver is eliminated or minimized in the presence of modeling uncertainties. The proposed technique will permit the designer to select the level of permitted jerk, which is directly correlated to the acoustic noise generated by the vibrating struc t
...

Global Threshold Method and Apparatus

Thresholding or binarization of images is an important step in image processing applications that uses different criteria to separate foreground objects from the background. This invention describes a novel weight based clustering algorithm, a real-t ime single pass global thresholder suitable for images (including trimodal and low contrast) with a single chip realization. The values are: 1.No external memory storage required; parameters easily modified to suit other applications. 2.Simple l
...

FieldXtract - a software toolkit for extraction and automated reading of machine printed and handwitten form fields for indexing and retrieval

FieldXtract - A software toolkit for extraction and automated reading of machine printed and handwitten form fields for indexing and retrieval
...

Referent Tracking

Referent tracking is a simple yet powerful way to organize electronic data and coordinate databases. The ability to track not only information but also data relationships is invaluable in various fields including healthcare, intelligence, and digital media. Currently, the creation and flow of new and existing information overwhelms databases due to the lack uniformity and efficiency. With the ever-growing amount of data and the need to extract useful information, a new system of data organizatio
...

Hyperspace Diagonal Counting (HSDC) for Multidimensional Database Visualization and Data Mining

This technology describes a new mathematical technique to graphically visualize and present objects and shapes in hyperspaces, i.e., in extensions of space beyond the third dimension. Currently, these are visualized only as mathematical abstractions, although there have been attempts to capture and visualize the fourth and fifth dimensions by employing colors and shades. This invention enables a secure and mathematically precise method of using mathematical diagonal-counting techniques (devised
...

Nanowire-Based Nonvolatile Memory

Summary This invention concerns a novel non-volatile super dense computer memory. The memory is based on ferrooxide material coated inorganic semiconductor nanowires, such as barium titanate coated silicon. The nanowire is used to make a FET composed of the nanowire core in ohmic contact with the source and drain electrodes and a gate in contact with the ferrooxide coating similar to an industry standard MRIS planar FET. A great advantage of the nanowire-based FET of the invention over the prior
...

Inking Methods and Compositions for Production of Digitized Stereoscopic Polariz

Summary The Technology The Stereo Imaging Research Group developed methods, materials and applications for stereoscopic hardcopy. The group's StereoJet process forms polarizing images by inkjet printing, using commercial desktop printers without modification. Key inventions include specialized substrates, inks and procedures. Each StereoJet print or transparency consists of a pair of superimposed, oppositely polarizing digital images, one representing the left-eye view and the other repre
...

Production of Improved Digitized Stereoscopic Polarizing Images

Summary The Technology The Stereo Imaging Research Group developed methods, materials and applications for stereoscopic hardcopy. The group's StereoJet process forms polarizing images by inkjet printing, using commercial desktop printers without modification. Key inventions include specialized substrates, inks and procedures. Each StereoJet print or transparency consists of a pair of superimposed, oppositely polarizing digital images, one representing the left-eye view and the other repre
...

Coating Methods and Compositions for Production of Digitized Stereoscopic Polari

Summary The Technology The Stereo Imaging Research Group developed methods, materials and applications for stereoscopic hardcopy. The group's StereoJet process forms polarizing images by inkjet printing, using commercial desktop printers without modification. Key inventions include specialized substrates, inks and procedures. Each StereoJet print or transparency consists of a pair of superimposed, oppositely polarizing digital images, one representing the left-eye view and the other repre
...

High-speed, high-density nanowire memory elements

Summary The microelectronics industry’s continued success with scaling devices faces a number of physical limitations using current materials and device configurations. As demand surges for portable, high-density, low-cost memory, new technologies become increasingly attractive compared to the billion-dollar manufacturing requirements for conventional silicon. With revenues already in the tens of billions, memory for consumer electronics and PCs is a rapidly growing market demanding stabl
...

Basic Soft Lithography/Microcontact Printing

Summary These patents and applications cover the basic techniques of soft lithography and microcontact printing. They allow one to pattern a surface, with micrometer precision, with SAMs (Self-Assembling Monolayers) and then to carry out numerous other process steps to produce functionalized surfaces with numerous applications. They are available for non-exclusive licensing in the biomedical field. US Patent 5,512,131 entitled "Formation of Microstamped Patterns on Surfaces and Derivative Ar
...

DNA Memory

Summary The invention provides methods through which high-density data storage can be achieved through the use of nucleic acid molecules as recording media. It is useful as a computer memory device or in real-time or other high-throughput or multiplexed monitoring/recording of molecular and cellular events. The invention is covered by published U.S. patent application number 20030228611, which is available for field-exclusive or non-exclusive license. Applications Computer memory; biologic
...

Circular Dichroism Imaging Microscope

Introduction Circular dichroism (CD) instruments are typically limited in their ability to image and analyze samples in organized media. Twinned crystals, liquid crystals, fibers, and biological tissues can be challenging to work with and CD imaging has typically been restricted to samples in isotropic solutions. Technology description Our researchers have developed a solid state microscope-based device with integrated analysis software that produces CD spectra and images from solid samples. Thr
...

Conductive Composite Polymer and Its Dielectric Polymer Actuator Application

Introduction Elastomers loaded with electrically conductive powders are commonly used in gaskets for EMI shielding applications in electronic devices such as computers, telecommunication equipment and medical devices. It is a challenge to provide the shielding while meeting application-specific elastomer requirements such as hardness and tensile properties. Technology description Researchers at the University of Washington have invented a flexible composite and a polymer based electro-optic disp
...

Method for Fast Crosslinking of Silicone Compounds at Low Temperature By in Situ Water Generation

Introduction Deposition of small amounts of functional materials has recently become a matter of intensive research. Inkjet printing technology is a promising and widely used technique for the fabrication of small parts with specific functionalities into welldefined locations. The limits of this technology are largely based on materials science properties of the “inks” used, such as viscosity, amount of solid in the dispersant liquid, shrinkage of the product, and temperatures required. Proc
...

Contact Lens as Computing Interface

Introduction The study of human-computer interaction (HCI) strives to understand and evolve how people interact with computers in order to develop systems that are more usable and more responsive to a user’s actual needs. One important aspect of this field is the design of interfaces, best exemplified by the keyboard and the mouse, and the search for novel approaches for interfacing with computers. For instance, eye tracking and gaze tracking offer many exciting interface possibilities, but th
...

Algorithm for User Activity Anticipation

The Invention The Algorithm for User Activity Anticipation is capable of anticipating the user’s next “click” with the mouse, therefore increasing the application’s efficiency. This is especially useful in applications that require a great deal of use of the mouse, such as video games, word processors, CAD software and graphic programs. In such applications, cutting down on the response time is crucial, and will make the experience much more user friendly. As of today, no other techn
...

On-Chip Optical Ring Bus (ORB) Communication Architecture for Embedded Systems on Chip

Background: As application complexity continues to increase, multi-processor systems-on-chip (MPSoC) with tens to hundreds of processing cores are becoming the norm. While computational cores have become faster with each successive technology generation, communication between them has become a bottleneck that limits overall chip performance. In the past, both global and local interconnects were made of copper (or aluminum). The long global interconnects in particular, suffered from several deep
...

Pointer-Based Instruction Queue for Out-of-Order Processors

Background: Out-of-order processors issue instructions even before their source operands are available. The processor component central to out-of-order processing is the Instruction Queue (IQ). Its performance is critical to overall processor speed and power consumption. For instance, the issue logic consumes near 25% of CPU power in. The IQ operates as follows: First, instructions are entered (or allocated) into the IQ where they wait for their operands. An instruction is ready to issue to its
...

Asymmetric Clustered Processor Architecture based on Value Content

Background: Most conventional clustered processor architectures are symmetric systems. It is known that the scalability of ahigh-performance processor architecture has been limited in new system designs by various factors, including increasing clock frequencies, issue widths, and greater wire delays. In addition, many high-performance processor families have extended their Instruction Set Architecture (ISA), or have introduced new ones, to handle 64 bit integers, which further exacerbates the a
...

A Platform for Seamless Multi-device Interactive Digital Content

Background: Previous mechanisms for connecting two or more devices in the same physical space have been cumbersome, and offered little advantage over connecting two devices that are hundreds of miles apart. There are two general methods: first, the automatic triggering of content when a device enters a certain proximity and/or orientation to another device, and second, having a seamless information space between the two devices once they are within the appropriate proximity and/or orientation.
...

Trace-Driven, Just-In-Time Compilation with a New Application of Static Single Assignment Form

Background: A decade after Java arrived, there have been improvements in the runtime performance of platform-independent virtual-machine based software. However, using such machine-independent software on resource-constrained devices such as mobile phones and PDAs remains a challenge, as both interpretation and just-in-time compilation of the intermediate VM language run into technological limitations. Running VM based code strictly in interpreted mode has severe performance overheads, and as a
...

Efficient Transaction Based Modeling with Cycle Count Accurate at Transaction Boundary (CCATB) Models

Background: In the past, several modeling abstraction levels were proposed to improve simulation speed and modeling time over detailed cycle accurate (CA) models. The Pin Accurate Bus Cycle Accurate (PA-BCA) modeling abstraction maintained cycle accuracy at every cycle boundary for communication in a system, while capturing all the pins at every component interface. These models were faster to simulate and model than CA models. The Transaction based BCA (T-BCA) modeling abstraction used the con
...

Fluorescing Materials for 3D Memory Devices

Background: Photochromic fulgides are capable of reversible light-induced coloration. These organic compounds exhibit several important physical properties such as thermal stability of both colorless and colored forms, high photoreaction efficiency, high fatigue resistance to repeated coloration-bleaching cycles and light power. Photochromic fulgides are therefore promising candidates for many technological applications including use in recording media, particularly in erasable optical memory d
...

High Speed Circuit Board Writing

A method of printing lines on circuit boards from computer information in a manner similar to using an inkjet printer. Utilizing capillary stream break-up of molten metal droplets, this novel approach is capable of printing very fine lines on the order of 10 microns wide and many centimeters long at very high speed, thus resulting in a system that is faster and cheaper than other current methods of circuit board writing such as traditional etching, chemical vapor deposition, focused ion beam wri
...

Protocol and Software Organization Method for Real-Time Fault-Tolerant Multicasts in Computer Networks

Background: Components of application systems based on a network of computing nodes (e.g., PC's and workstations) often maintain the client-server relationship among themselves. For the sake of attaining high system reliability and performance, servers are often replicated. These servers must then maintain strict consistency among their states. Each message from a client must be received consistently by these server replicas. Also, clients and diverse servers are often tightly coupled in the se
...

Data Compression of Time-Varying Images

Background: Current methods of transmitting time-varying images involve encoding the digital image information into a set of still frames. To reduce the bandwidth necessary to transmit the full image, compression techniques are used to eliminate statistically redundant information in the pixel intensity distribution in each image frame and between each pair of successive image frames. These spatial compression techniques have now reached their compression limits with compression ratios of sever
...

Molecular Fan

Abstract This invention provides a heat dissipation structure for use in optoelectronic devices. More specifically, this technology is an innovative heat dissipation thick/thin organic-inorganic coating containing active molecularly functionalized vibrational lattice modes designed to act as a molecular cooling fan. The molecular fan is powered directly from the heat generated by the device it is cooling, so it is a powerless heat sink with a spaceless nanoassembly. The "molecular fan" is used
...

Get Connected

Software program that connects and configures first-time users to a campus network TECH FIELD(S) Software security for higher education networks FEATURES Get Connected eases the burden of initially linking thousands of students in university living residences to a campus network. Every year thousands of new students must access a university’s network for the first time. Their computers often present security and compatibility problems that Get Connected circumvents.
...

Diabetes

TECH FIELD(S) Software and Information Technology ……………………………………………………………………………………………………………… FEATURES Diabetes is a stereoscopic and standard video resolution computer generated animation of causes and effects of diabetes in humans to help educate middle school students. This three minute and forty-eight second piece was created with narration and custom music for use as a method tool to help visualize and d
...

AST - Atomic Simulation Tool

The University of Virginia has developed a user-friendly personal computer-based atomic scale simulation code for designing and evaluating ion beam deposition systems. This work entails first defining an ion gun-target-substrate geometry, material system(s), and a chamber background pressure, and then modeling the ion-beam sputtering of metal atoms from the target, and computationally tracking the propagation of both the sputtered atoms and any energetic neutrals to a substrate. The output of th
...

An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks

Smartcards, cards where information is stored locally on an embedded integrated circuit rather than a magnetic strip, are examples of secure hardware devices that are becoming prolific in use. Such devices are used for everything ranging from toll payment and secure access identification cards to ATM and supermarket frequent shopping cards. One of the major advantages of using such secure hardware devices is that the data is stored on the actual device rather than on a central computer server. T
...

Multi-Functional Field Effect Switches Utilizing Anodized V/VO2/V Junctions

Vanadium oxides have a rich history because of the metal insulator transitions that several of the oxides and sub-oxides exhibit. In particular, VO2 has a metal–semiconductor transition just above room temperature in which this compound goes from a monoclinic crystal structure semiconductor below 340K to a rutile crystal structure metal above 345K with resistivity changes of more than four orders of magnitude. It has recently been discovered that there is also a current or charge-driven electr
...

In Plane Metal-Oxide-Oxide-Metal Diode Prepared by Selective Anodization

It is expected that the Moore’s law progression of CMOS technology will end in less than two decades, and there is a worldwide search for new devices that can either extend Moore’s law or provide a totally new pathway for information processing and communication. Using metals instead of semiconductors and in-plane structures rather than transverse to the plane structures can increase the operating frequency of a diode since the RC time constant can be significantly reduced at any lithographi
...

Smart Barrier for Spin Torque Transfer Random Access Memory (STTRAM)

As the scaling of traditional CMOS devices goes beyond the 32-nm node, the present memory technology will face numerous technical hurdles. MRAM is an emergent memory technology that has the potential to replace all other current memory technologies, including SRAM, DRAM and FLASH. Conventional MRAM utilizes current generated magnetic fields to switch the magnetization of the free layer. As scaling decreases and current densities required to switch the magnetic free layer increase, heat dissipati
...

VoxelVision Software for 3D Object Segmentation

General Information VoxelVision is imaging software that interactively segments and displays images of 3D anatomy derived from MRI, CT, or ultrasound scans. While other 3D imaging software is available, it is either too simplistic or takes too long to be of value. VoxelVision works with a few mouse strokes and is less prone to error. This is the first program to utilize algorithms that provide segmented images of previously hard to isolate tissues in an interactive fashion. Its interactive 3D
...

Oil Reservoir Simuluation

A new method has been developed to quickly determine fine-grid reservoir simulation pressures. It is estimated that the pressures in a one-billion cell simulation model can be determined in less than one percent of the time required by other state-of-the-art solvers. Increased accuracy is obtained by using new finite-difference equations to approximate partial the differential equations governing the flow through porous media. Unlike traditional Taylor-series approximations that are based on pol
...

Icesheets

ICESHEETS is a brand new spreadsheet technology that combines the power of a large database with the ease of use of a spreadsheet. It gives a user the ability to view and access to multiple data sets in the same spreadsheet. Information such as monthly statements, financial reports, cost breakdowns, multiple experimental data, and many more can all be embedded within a subset of cells in one worksheet allowing the user easy access for calculations, corrections, and analysis. General Informati
...

Simple Authentication for the Web - SAW

A secure and convenient alternative to the numerous User IDs and passwords used for online accounts. Securely authenticates users through their email accounts to avoid difficulties in managing and remembering site specific User IDs and passwords. Users can access an online account by simply inputting their email address instead of setting up and remembering User IDs and passwords. The website then generates a random token which is split into two shares, and one of the shares is sent to the us
...

MousePuter

Imagine setting down your Smart Phone and PDA on the desk of a conference room, and connecting wireless to a flat panel TV on the wall. You connect a wireless keyboard to your PDA and begin to run a spreadsheet that is displayed on the 60” flat panel TV. Your Smart phone becomes a mouse to move around and enter data as others look on . The team works together and each member has the opportunity to share their views and opinions as well as enter data that is relevant to the discussion. Mouse
...

Direct Machining (DMAC)

Direct Machining (DMAC)-The process of driving production machines directly from a higher order part description such as CAD. DMAC integrates the part description software and machine controller on the same PC, eliminating numerous intermediate post-processing and control steps and much of the controller hardware. General Information Currently, multiple codes intercept progression from one data source to the next operation. Each operation requires a new set of code that must interpret the
...

Automated Traffic Stopped Delay Data Acquisition

The traffic stopped delay algorithm rapidly determines the stopped delay of the traffic (which is the time each vehicle is stopped in the queue of a lighted intersection) from the video feed provided by intersection cameras. This information is traditionally gathered manually and used for operational analyses of the intersection and to obtain the level-of-service ranking. Traffic control software is used to optimize the delay times at an intersection through indirect measurements such as vehicle
...

Notify me of New Entries on this Page

You can receive an email whenever a new patent is added to this category. You can unsubscribe at any time.