Software Patents for Sale or License

Dual Proprietary and Universal Mobile Barcode Reader

A method of presenting content to viewers in a computer network environment which includes scanning a barcode with a mobile device, retrieving content directly associated with the barcode, and retrieving associated proprietary content. The dual content is then separately displayed on the mobile device.
...

Barcode Scanner on Webpage

A hybrid electronic barcode reader application sharing the processes between document formats of the world wide web with associated native executables or hardware from a mobile device. The two disparate platforms exchange information between the mobile device and web page and allow the web page to operate device hardware to complete the application. The focus then returns to the originating web page.
...

Event data translation system

...

Method for visual manipulations of all kinds of programming objects

Visual object manipulation modernized IDE’s. This patent innovates a technique of an intermedia class, restrictions on visually-manipulate-able objects can be removed for an IDE. Thus, all software objects are visually manipulate-able. It opens doors for further IDE technology advancements, such as more automated software engineering operations, visual and codeless programming, and other innovations.
...

System and method for virtual touch sensing

Virtual Touch Sensing is patent method that applied advanced 3D computer vision and motion detection technologies for resolving the bottleneck of touch control in small panel device such as smart watch, small sized smart phone and other hand held devices. It uses two or more sensors to detect the 3D coordinates of fingertip above the physical touch screen of a hand held device. Then it projects cursor on the respective coordination of touch screen. As the area of the operation surface of the vir
...

System, apparatuses, methods, and computer program products for electric motor testing and analysis

Systems, apparatuses, methods, and computer program products (i.e., software) for electric motor testing and analysis. Electric motor winding resistance and motor temperature are measured. The resistance measurement is normalized to a common temperature and electronically displayed in a resistance versus time graph including one or more previously normalized resistance values from previous resistance and temperature measurements. Based on information from the graph, a prediction or estimation ca
...

Method for Optimizing Resource Allocation

In many service businesses, providers need to allocate their resources, which typically consist of a finite number of resource slots, to their customers through either an appointment process or a booking process. However, conventional resource allocation process has intrinsic inefficiency because of the resource fragmentation. The fragmented slots may become difficult to accommodate the customers' requests. Moreover, the fragmented slots may also cause lower utilization rate of the provider's re
...

Marketing Method Mobile Shopping

The 130’ Patent is a business process method – (covers all technologies and platforms – iOs, Android, HTML, XML, WAP, GSM, etc.) used today in all mobile shopping applications. The 130’ Patent is essential to the present and future of mobile shopping. The IP covered in the 130” Patent is being practiced by all North America’s leading retail shopping mall owners / and retailers by way of their current shopping applications. CLAIM CHARTS and further info on practicing entities availabl
...

Ultra-low Dimensional Representation for Face Recognition Under Varying Expressions

A method, apparatus and computer program product are provided for identifying an unknown subject using face recognition. In particular, upon receiving a plurality of images depicting a subject, the method may include deriving and storing a common component image and a gross innovation component image associated with the subject, wherein the subject can later be identified in a new image using these two stored images. The common component image may capture features that are common to all of the r
...

Systems and Methods for Reducing Rain Effects in Images

Systems and methods for reducing the visibility of rain in acquired images are provided. One or more inputs relating the scene desired to be acquired by the user are used to retrieve camera settings that will reduce the visibility of rain in acquired images. Additionally, features relating to the scene may be automatically determined and used alone, or in combination with user inputs, to retrieve camera settings. The acquired images may be part of a video. Another feature of the invention is its
...

Software-controlled Maskless Optical Lithography Using Fluorescence Feedback

A software-controlled maskless optical lithography system uses fluorescence feedback to control an aspect of the lithography, such as light source dose, wavelength, or flashing instances or duration, spatial light modulator (SLM) pattern, an optics parameter, a beamsplitter control parameter, or movement or positioning of a stage carrying a target workpiece, such as a semiconductor wafer.
...

System and Method for Hardware Acceleration of a Software Transactional Memory

In a transactional memory technique, hardware serves simply to optimize the performance of transactions that are controlled fundamentally by software. The hardware support reduces the overhead of common TM tasks-conflict detection, validation, and data isolation-for common-case bounded transactions. Software control preserves policy flexibility and supports transactions unbounded in space and in time. The hardware includes 1) an alert-on-update mechanism for fast software-controlled conflict det
...

Method and Software Tool for Automatic Generation of Software for Integrated Circuit

A method of generating software code for a processor of an IC based on a simple input description of the IC's standards. The method includes generating a macros description of each of the primitives from the standards and the response corresponding to each of the primitives, wherein the macros description includes information relating to a number of first fields for each of the primitives and a number of second fields for each response. The method further includes generating a blank version of a
...

Method and Software Tool for Designing an Integrated Circuit

A method of designing an integrated circuit for use in an application having standards having a plurality of primitives, wherein each of the primitives has a corresponding response. The method includes generating a macros description of each of the primitives and the response corresponding to each of the primitives, generating a template relating to the response corresponding to each of the primitives, receiving information specifying a behavior of the integrated circuit in response to the primi
...

Automated Learning of Model Classifications

A method of providing an automated classifier for 3D CAD models wherein the method provides an algorithm for learning new classifications. The method enables existing model comparison algorithms to adapt to different classifications that are relevant in many engineering applications. This ability to adapt to different classifications allows greater flexibility in data searching and data mining of engineering data.
...

Method and system for execution monitor-based trusted computing

A system and method of providing trusted service transactions includes associating a commitment with a remote service. The commitment includes a trusted list of runtime dependencies to execute a transaction. The method includes monitoring an actual list of runtime dependencies invoked during execution of the transaction using a trusted monitor. Execution is blocked if a deviation of the actual list from the trusted list is detected. Therefore, a completed transaction is allowed only if no deviat
...

Visual Background Extractor

The present invention relates to a Visual Background Extractor ( VIBE ) consisting in a method for detecting a background in an image selected from a plurality of related images. Each one of said set of images is formed by a set of pixels, and captured by an imaging device. This background detection method comprising the steps of: establishing, for a determined pixel position in said plurality of images, a background history comprising a plurality of addresses, in such a manner as to have a samp
...

Animation Tool

An animation tool which is configured to enable a user to generate one or more animations for subsequent execution on a computer platform is described. The animation tool provides a plurality of graphical integers which a user can use to generate an animation. The graphical integers are divisible into graphical elements and graphical element effects, the effects being applied by a user onto an element and defining the viewing properties of that element.
...

Ditributed Turbo Coding and Relaying Protocols

This invention concerns distributed turbo coding and relaying protocols wireless relay networks. In particular, the invention concerns a method for relaying signals at a relay node, a method for processing signals at a destination node, a relay system and software to perform the methods. The wireless relay networks comprise a source node, a destination node and one or more relay nodes. At a relay node, the invention comprises the steps of receiving a signal from a first node; decoding the receiv
...

Software Platform and System for Grid Computing

A software platform for providing grid computing on a network of computing nodes, comprising a configurable service container executable at the nodes, including message dispatching, communication, network membership and persistence modules, and adapted to host pluggable service modules. When executed at the nodes at least one instance of the container includes a membership service module for maintaining network connectivity between the nodes, at least one instance of the container includes a sch
...

System and Method for Evaluating Streaming Multimedia Quality

A system and computer program for evaluating in real-time streaming multimedia quality. The system including a multimedia server connected to a multimedia source and a remote client in communication with the multimedia server over a network. The multimedia server is configured to receive multimedia content from the multimedia source and to transmit the multimedia content as a multimedia stream. The multimedia stream includes a plurality of audio frames and a plurality of video frames. The remote
...

Programming Model and Software System for Exploiting Parallelism in Irregular Programs

Systems and methods for parallelizing applications that operate on irregular data structures, hi an embodiment, the methods and systems enable programmers to use set iterators to express algorithms containing amorphous data parallelism. Parallelization can be achieved by speculatively executing multiple iterations of the iterator in parallel. Conflicts between speculatively executing iterations can be detected and handled using information in class libraries.
...

Control Flow Deviation Detection for Software Security

Provided are methods and systems for control flow deviation detection. Provided are methods for software security, comprising executing a software program, generating a run-time signature variable, updating the run-time signature variable as the software program executes, comparing the run-time signature variable with a pre-computed signature, and detecting a deviation in control flow of the software program based on the comparison between the run-time signature variable and the pre-computed sig
...

Software Development Tool

A method for improving the development and/or review of a computer program. The method comprises the steps of: adapting one or more design side components of the computer program to send and receive information on changes that occur therein; adapting one or more code side components of the computer program to send and receive information on changes that occur therein; synchronising design side components and code side components by conveying details of a change in a design side component to one
...

Renewal Method, Device and System of Programs

A renewal method, device and system of programs are disclosed in the embodiments of the present invention. The method includes the steps of: according to the set renewed program, obtaining the related programs of the renewed program; setting one or more programs of the obtained related programs as the continued programs of the renewed program; carrying out the automatic renewal for the continued programs. The embodiments of the present method have the following beneficial effects that: the autom
...

Automated Voice-operated User Support

An information device for voice-operated support of a user includes a storage medium, a knowledge database, a processing unit, an input device, a recording component, a transcription component, and an ontological analysis component. A signal is detected by the input device and stored by the recording component via the processing unit in the storage medium. The signal is transformed into a corresponding text by the transcription component via the processing unit and stored in the storage medium.
...

Method, System and Computer Program Product for the Decentralized Distribution of Digital Content

A method for the decentralized distribution of digital content via a network includes providing content with a tag configured to allow at least one of an operator of a download portal and a content provider to track distribution of the content so as to collect data about a number of downloads of the content and about distributors of the content. A distributor downloads the content via the download portal and selects a content consumer for further distribution of the content. The content consumer
...

System and method for computer aided design

The invention provides a system and method for computer aided design. The system can include an electronic design tool configured to model a mechanical system. A first view type window can be in communication with the electronic design tool. In addition, a second view type window can be in communication with the electronic design tool. The second view type window can be simultaneously viewable with the first view type window. A drawing interface can be provided that is common to the first view t
...

Portable Imperial College Surgical Assessment Device (pICSAD)

Background Dexterity is a crucial aspect of surgical competence. Technical ability to perform a procedure is considered to be crucial for a safe and effective outcome and is also an important aspect of surgical training. However, a lack of haptic feedback particularly in laparascopic surgery training is a major obstacle and there exists a need for the development of objective methods for surgical assessment. Invention This invention relates to a training package that aims to provid
...

DeckChair Learning Systems Inc.

For Teaching and Training professionals who need to assess, track, and train time-critical skills and knowledge. Our Product is a Software as a Service online learning system that trains and assesses learners based on their personal learning profiles. At the same time, the system analyses curriculum and content effectiveness. Our new online technology and automatic adaptive learning methods improve training success and certification rates in all situations. Unlike other Survey and T
...

CyborGlog: a Computer Program for Capture, Sharing, and Annotation of Content

This invention relates to a system, method and computer program for capture, sharing, and annotation of content. Specifically the invention relates to at least one content capture devices linked to a wireless medium operable to communicate and register via the wireless medium with at least one computer remote from the content capture device. The content capture device is operable to capture content based on user defined parameters on a continuous basis and to transmit the content via a wireles
...

Generic Synchronized Motion Control of Multiple Flying Vehicles

Motion synchronization addresses the cooperative or coordinated schemes of multi-composed systems when they work in an integrated fashion and are required to show the same kind of dynamic behaviour. It requires high accuracy regulation of motion states such as the position, velocity and orientation. Therefore, the challenge lies in its synchronized control strategy and real-time communications among the multi-composed systems. The Opportunity With the ever-increasing demand of efficiency
...

Virtual Musical Instrument

Currently, there are no products available that enable a child with special needs to express themselves fully in a creative manner. The Virtual Musical Instrument represents a significant leap in this direction. The Opportunity By moving their hands into different areas of space, the child is able to play different notes, chords, instruments and musical passages. This novel software will directly help to create a Canadian based software company or licensing opportunity to fulfill a demand
...

Method, System and Apparatus for Real-Time Classification of Muscle Signals from Self-Selected Intentional Movements

Externally powered prosthetic hands are typically controlled using electromyographic (EMG) signals. These signals originate from the polarization and depolarization of the muscle membrane during voluntary contractions and can be measured at the skin surface using either dry or wet-type electrodes. The EMG control signal can be derived from a single site or from multiple sites. Past studies have employed two up to eight recording sites with varying levels of success. However, some studies have sh
...

Automated Detection Algorithm for Human Activities and Travel Utilizing GPS-enabled Cellular Phones

Modern GPS (Global Positioning Systems) enabled cellular phones and advances in Geomatics offer considerable new opportunity for tracking humans and supporting Location-Based Services (LBS). These existing technologies are capable of wirelessly transmitting a person's location to a central server for storage and display. Existing research has shown that the resulting data can provide a highly accurate trace of personal or vehicular movements over a day or longer. The main challenge and additiona
...

BumpTop - Method and Computer Program for Enriching the Desktop

Current virtual desktops bear little to no resemblance compared to the look and feel of a real world desktop. A workspace in the physical world typically has piles of documents, binders and other objects arranged in a way that provides considerable subtle information to the owner. For example, items are often casually placed but their spatial position and orientation are usually meaningful. Closer items can indicate urgency, and piles of items are “automatically” ordered chronologically be
...

A Fast and Secure Polynomial Hashing Function

Standard NIST Key HASH algorithm SHA-1 was compromised on February 8, 2005. Data integrity and authentication through various means of transmission has been an impeding issue with respect to security. Here we present a system and method of ensuring data integrity that incorporates security features. The method, developed by UTM researchers, is a novel authentication system comprising a hash function wherein the function requires solving at least two problems in order for a collision to occur.
...

3D Sketching Software with Suggestive Interface

Architecture, industrial, interior, product, and structural and mechanical engineering disciplines all operate within a design context that is primarily spatial and 3 dimensional. Pen & paper has always been the primary creative tool set used to both explore ideas and to communicate them. Most designers rely on the familiarity, simplicity and immediacy of the pen/paper interface, yet will admit to a common frustration in the limitations of the medium when used to describe ideas that are inherent
...

A Fast Protocol for Computationally Private Information Retrieval

Private Information retrieval (PIR) is any protocol that allows a database user to obtain information from a database in a manner that prevents the database from determining which data were retrieved. PIR is useful for any entity, commercial or governmental, that seeks information from database sources but does not want others to know its specific areas or topics of interest. The trivial protocol consists of downloading the entire database which clearly preserves privacy. The goal of PIR prot
...

A Flexible Computational Framework for Systems Optimization

Existing software products for process integration and design optimization are not specifically implemented for systems engineering applications, and thus do not define a formal structured approach for system evaluation. Also, with existing products, the specialists must often create customized and highly interdependent computer codes to address the problem from operations research, systems engineering and physical modeling perspectives. Developers at the Johns Hopkins University Applied Phys
...

Color-to-Lineweight Plotting Program for AutoCAD® Software

Color printing has always been a more costly way of producing materials than black and white printing. Many offices do not have color printers as easily accessible nor in the number that they have black and white printers. The construction industry has recognized this and has created a scaled grayscale Industry Standard format with distinguishable lineweights instead of distinguishing with color in Autocad construction drawings. Currently, this color-to-lineweight process uses a manual conversio
...

Towards Higher Assurance Software Construction via Aspects

Security evaluations for software systems can be time consuming and expensive endeavors. In particular, the tracing of security requirements into code and the accurate maintenance of that mapping as a system evolves over time can be tedious and error-prone. Currently evaluators must maintain a mapping of security requirements into application code via manual processes. There is a need for an approach to help minimize evaluation cost and time and to improve the overall accuracy. This JHU/APL t
...

CollabSpace - an Advanced Geospatial Collaboration Environment

Most collaboration environments (chat, instant messaging, etc) are not geospatially aware. The collaboration in the Command and Control domain typically revolves around 3 general spaces: geographic location of objects (aircraft, troops, etc), temporal information (when objects will arrive, depart, etc) and process information (where in a detailed series of events are users). Researchers at The Johns Hopkins University Applied Physics Laboratory have developed COLLABSPACE - An Advanced Geospat
...

An Information Visualization Software System to Manage Resource Access Control Policies

Information security must be assured as sharing information becomes more prevalent and more flexible in multi-national and multi-organizational environments. Complex digital Access Control policies/ rules can be difficult to author, analyze, update, approve, and reverse-engineer. Management of the policies, rules, and their interactions can become intractable and overwhelming to human administrators, therefore there is a need to improve comprehension of access control policies and conflict resol
...

APL-SASEA-An Oceanographic Data Analysis System

Real time oceanographic information from multiple sensors is critical for current maritime activities and future exploration activities. Researchers at the Johns Hopkins University Applied Physics Laboratory (JHU/APL) have developed the System for At-Sea Environmental Analysis to accomplish this task and present the information to operators and scientists in meaningful graphical displays. Current software covers selected oceanographic parameters and displays them in a post-test processing mod
...

QTViewer - Software for Three-Dimensional Visualization of Large Models

The recent emergence of high-resolution interferometric synthetic-aperture radar (IFSAR) and lidar has offered the potential for producing high-resolution digital topography automatically at near real-time rates. The significant advantage of IFSAR is an all-weather collection capability. The main advantage of lidar is a generally higher data quality. The recent availability of these data collection systems has opened up multiple possibilities for exploiting high-resolution digital topography. Ho
...

A Procedure for Enabling Big-Endian Software to Run on Little-Endian Hardware and Vice Versa

This invention consists of a methodology and associated software tools to support the porting of software applications between big-endian computers and little-endian computers. Big-endian computers store binary data such that the most significant byte resides in the lowest register address and vice versa for little-endian computers. While this choice is arbitrary, it is a fixed attribute of processor hardware which can lead to compatibility problems. Specifically, when a software application wit
...

Database and Knowledge-base Enhancements

Healthcare costs continue to escalate at a steep rate. Cost increases have occurred in all areas, including insurance premiums, medical equipment, medicines and costs for visits to doctors. A great deal of energy has gone into finding ways to reduce healthcare costs, from government control of aspects of health care to insurance company managed care plans to control patient utilization of the healthcare system and provider actions. The present invention provides protocols and environment for
...

Java Enhanced Distributed System Instrumentation (JEDSI) for Measuring the Performance of Large Distributed Systems

One of the challenges in developing large distributed systems is measuring its performance. Historically, the only way to capture data from the system was to log it to file and analyze it afterward. This approach was cumbersome and forced time-consuming sequential iterations of application test runs and results analysis to explore system performance. Developers at the Johns Hopkins University Applied Physics Laboratory have developed the JAVA Enhanced Distributed System Instrumentation (JEDSI
...

HAIRCUT (Cross Language Info Retrieval)

It is often difficult to determine the gist of a body of text, such as a document or group of documents, when the body of text is not considered in its entirety. This can cause problems for computerized text-based information retrieval systems. Such systems are now in widespread use for database, intranet and internet-based (e.g. World Wide Web) applications. In many such systems, search terms, such as words, stemmed words, n-grams, phrases, etc., are provided by a user to information retrieval
...

Software Protection for Single and Multiple Microprocessor Systems

Protection is provided for software and data in single and multiple microprocessor system, including, but not limited to, local area networks (LANs), wide area networks (WANs), backplane connected architectures, etc. The data can include databases, streaming data and code. The protection is provided by employing, singly or in combination, obscurant IC coatings, tamper detection and response circuitry, multiple component modules and software code encryption to prevent software from being stolen o
...

Method and Apparatus for Segmenting Small Structures in Images

What is needed is a segmentation method and apparatus without statistical models, local statistics, or thresholds to be selected manually, and with significantly lower computational complexity compared to the multi-tolerance and active contours methods, for enhanced speed. In particular, what is needed is a method and apparatus to segment pixels in an image, such as a mammogram, containing a plurality of extra dark or extra bright objects just a few pixels in extent, that gives edges similar
...

Polygraph Automated Scoring Systems

A polygraph automated scoring system was developed in which polygraph signals are input and a probability of deception is output. To begin the process, digitized polygraph signals are transformed into more fundamental signals. These fundamental signals are then subjected to standardization, a critical step. The standardized signals then have certain features extracted at each question. The features for all of the relevant questions are then standardized against the features for all of the contro
...

Online Fishing Quota Data Management

For the past 18 months, we've been developing an online system to help the various parties within the fishing sector, to manage their annual quota allocations easier and more accurately. Currently quotas are managed by various agencies using spreadsheets or at best an Access type database. Our system is fully online and allows the PO (producer organisation) to manage their member's catch data and update their quota in real time. Vessel owners can login to their account and see what quota they
...

Commercial Vehicle Electronic Screening Hardware/Software System

Commercial Vehicle Screening uses a selection mechanism to make use of limited fixed Weigh/Inspection Station resources. E-Screening is the application of technology to this process, in order to make an informed and automated decision about whether further examination of a vehicle is required. Properly implemented, E-Screening results in improved station traffic flow, focused vehicle enforcement, increased compliance, and ultimately achieves the goals of increased highway safety and reduced trav
...

Java Enhanced Distributed System Instrumentation (JEDSI) for Measuring the Performance of Large Distributed Systems

One of the challenges in developing large distributed systems is measuring its performance. Historically, the only way to capture data from the system was to log it to file and analyze it afterward. This approach was cumbersome and forced time-consuming sequential iterations of application test runs and results analysis to explore system performance. Developers at the Johns Hopkins University Applied Physics Laboratory have developed the JAVA Enhanced Distributed System Instrumentation (JEDSI
...

Multi-Scale Retinex with Color Restoration (TOP1-478)

Abstract: The Retinex method is an automatic, generalpurpose algorithm that greatly improves the visual realism, quantity, and quality of perceived information in the digital image.
...

A Method and System for Formal Analysis, Simulation, and Verification of Knowledge-Based Systems, Rule-Based Systems, and Expert Systems (GSC-14942)

Abstract: A method is claimed whereby the rules embodying a rule-based, knowledge-based or expert system, combined with the inference engine underlying the system (implementations of various algorithms) can be viewed as a process-based specification which may be used for analysis and verification, both formally and informally. The output of the process-based system is mathematically equivalent to the execution of rules that would be output from the rule-based, knowledge-based or expert system i
...

Windows-Based Scaling and Measurement Software for Photographic Images (KSC-12505)

Abstract: The National Aeronautics and Space Administration (NASA) seeks to license a Windows-Based Scaling and Measurement Software for Photographic Images.
...

Perilog Contextual Search and Retrieval Software Tools (ARC-14512)

Abstract: Perilog unearths data that is contextually relevant to the subject being investigated. The software measures the degree of contextual association for large numbers of term pairs in text (or any other sequence) to produce models that capture the structure of the text.
...

Optimized Image Compression (DCTune) (ARC-12015)

Abstract: DCTune is a computer software that significantly improves digital image compression. NASA now seeks a development partner to license this technology and take it to market.
...

A Novel Software for Detection of Hidden Messages Within Digital Images

Steganography is the art and science of hiding information for the purpose of covert communication. Steganography has a long history that includes techniques such as invisible inks, null ciphers, microdots, and embedded messages. With the advent of the digital age, steganography has seen a resurgence, with applications in the protection of copyrights in digital media, unobtrusive military and intelligence communication, covert criminal communication, and for the trafficking of illegal pornograph
...

A Technology and Process for Encrypted Execution of Encrypted Programs

The focus in most modern encryption technology has been on the encryption of data and programs "in transit" between trusted computers within a network. An eavesdropper or interceptor of the data would have difficulty interpreting the encrypted data if the cryptosystem used has been soundly designed using techniques accepted as state-of-the-art today. However, if a computer in such a network has been compromised (hacked into or physically controlled by an adversary for example), then the encrypt
...

Decision Support System for Agrotechnology Transfer (DSSAT)

Description DSSAT (pronounced "dee'-sat") is microcomputer software program combining crop, soil, and weather data bases and programs to manage them, with crop models and application programs, to simulate multi-year outcomes of crop management strategies. DSSAT also provides for validation of the crop models; thus allowing users to compare simulated outcomes with observed results. Crop model validation is accomplished by inputting the user's minimum data set, running the model, and comparing ou
...

VISAR - Video Image Stabilization and Registration (MFS-31243)

Abstract: At the request of the FBI in 1996,NASA MSFC offered this state-of-the-art video image processing software to help investigate the Atlanta terrorist bombing. After the initial success in the Atlanta probe,VISAR has been further developed and refined for a variety of custom and consumer applications, and is now commercially licensed and available in Video AnalysTM.
...

Discrete Event Simulation Tool for Analysis of Qualitative Models of Continuous Processing Systems (CONFIG) (MSC-21465)

Abstract: The CONFIG tool supports modeling of system configurations that include combinations of continuous and batch processes and discrete events. CONFIG provides a flexible object-oriented capability to model reconfigurable equipment with operating and failure modes, and to model procedures executed by automation equipment and plant operators.
...

ROSS 3D Reconstruction of Serial Sections Software (ARC-14441)

Abstract: The ROSS 3D reconstruction software allows reconstruction of any complex three dimensional object.
...

Integrated GPS Antenna/Receiver for Attitude Determination (GSC-13907)

Abstract: The National Aeronautics and Space Administration (NASA) seeks a qualified company to commercialize a significant improvement in satellite control. Goddard Space Flight Center (GSFC) has developed some of the hardware for this system and much of the necessary software. The new system will enable satellite manufacturers to determine satellite attitude (rotational positions) solely through information gathered from the Global Positioning Satellite (GPS) System. Autonomous operation is m
...

Integrated Structural Dynamic Analysis and Test Program (GSC-14775)

Abstract: NASA Goddard Space Flight Center (GSFC) is developing an Integrated Structural Dynamic Analysis and Test Program software package that enables near real-time test and analysis performance as well as organization and integration of both test and analysis data. The software helps address the limitations faced by many repetitive structural dynamics test and analysis data processes for mechanical verification that lack standardization, interfacing and integration.
...

Windows-Based Scaling and Measurement Software for Photographic Images (KSC-12505)

Abstract: Remote measurement of small features on an object can be accomplished by projecting a set of parallel laser points on the object with NASA's Scaling Device, where the distance between points is a known value. By first acquiring a digital image of the object's features with the superimposed laser points, the size of the object's features can be found by processing the digital image using appropriate software. The software first calibrates the laser points and then transfers the calibra
...

Heart Simulation Software

The Heart Simulation 1 and Heart Simulation 2 programs provide a computer model of the electrical activity of the heart. More specifically, these programs allow for the simulation of cardiac arrhythmias and strategies for defibrillation. Heart Simulation 1 runs on a PC and is more suited for defibrillation studies, while Heart Simulation 2 runs on a SUN workstation and is more suited for studies of arrhythmias.
...

UT-LabMan Computer Program

Background The management of microcomputer labs can be labor-intensive and costly for the facility provider, and time-consuming for the user who must wait at the facility for a workstation to become free. Invention Description In an effort to better manage and control campus microcomputer facilities and to provide students with a convenient method for accessing those facilities, we have developed a client-server-based software tool designed to manage the day-to-day tasks associated with a mi
...

The Sensitive Number Finder (SENF) Preprocessor for Networks

Background The SENF Client algorithm was originally developed for university staff and faculty to identify sensitive numbers (social security numbers and credit card numbers) residing on individual computers. The client algorithm has been adopted widely, primarily to detect legacy data. The SENF Preprocessor is a derivative work based on the SENF Client, designed to detect sensitive numbers in open protocols traversing any high-speed, multi-gigabit computer network. A real-time detection of a
...

T-Spline Isogeometric Analysis

Background The creation of new airplanes, ships, cars, and most other durable goods involves the technologies of computer aided design (CAD) and computer aided engineering (CAE). As a result of separate historical development paths, CAD and CAE use completely different geometric representations of the design. Accordingly, for a CAE system to use a CAD design, the CAD model must be decomposed into small "finite elements," such as quadrilaterals and triangles in 2D or hexahedral and tetrahedral sh
...

Software Package for Inverse Design of Enclosures with Radiative Transfer

Background Inverse thermal radiative design problems are those in which the desired result is specified (i.e., heating rate and temperature distribution) and the necessary conditions for achieving this result are found directly (i.e., heater or burner configuration and energy input distribution). The mathematics of inverse problems result in an ill-conditioned matrix requiring special techniques to find the solution. Invention Description Inverse radiative design techniques can eliminate muc
...

Optimized Metaheuristic Tabu Search Algorithm (Instantiated for Bio-Conservation Networks and Groundwater Management)

Background NP-hard (nondeterministic polynomial-time hard) optimization problems are notoriously difficult. Finding an optimal solution requires an exponential amount of time; it is impossible to search through all combinations and permutations; and approximate algorithms may deliver extremely sub-optimal solutions. For many industries, this is more than just a mathematical inconvenience--it is a major setback in efficiency, productivity, and performance. (The classic example is the optimization
...

Morphster: Image-Based Ontology Editor

Background Ontologies are maps of deep interconnected relationships between objects. In the sciences, they are used pervasively to map relationships between a wide variety of objects, from animal species to natural languages. Ontologies are complex to build and maintain, typically requiring artificial intelligence expertise. On the "semantic web," the primary goal of ontologies is to give machines a better understanding of data on the web. The OWL Web Ontology Language is the main ontology forma
...

Knowledge Machine

Background Computers can make reasoned decisions regarding specific domains of expertise through the use of Knowledge Reasoning and Representation (KRR) systems that are populated with domain-specific knowledge bases that include relationships among the knowledge components included in the knowledge base. By allowing the computer to make reasoned decisions on its own, KRR supports automating systems and allows them to make decisions based on a particular set of environmental factors. Once a comp
...

Dry Dock: a Document Firewall

Background Auditing web site content is an arduous task. For any given page on a web server, system administrators are often ill equipped to determine who created the document, why it's being served, how long it's been publicly viewable, and how it's changed over time. Invention Description DryDock is a web publishing application that governs the replication of content from an internal, developmental web server to a stripped-down, external, production web server. DryDock codifies a formal ap
...

R. O. B. U. S. T. - Rational Obstetric Utilization of Staffing and Time (20067)

Today's healthcare institutions are faced with the challenge of increasing individual and community wellness and improving patient satisfaction, while at the same time driving costs down. This challenge can be met by bringing advanced information technology to healthcare institutions. Prentice Women's Hospital at the McGaw Medical Center of Northwestern University is the busiest delivery center in Illinois with over 7,000 deliveries annually. Furthermore, in an academic setting, a productive Obs
...

Fast and Accurate Simulation of High Speed VLSI Circuits (21004)

This invention makes it feasible to analyze high frequency VLSI circuit interconnects over multiple design iterations, because it analyzes circuits quickly and accurately. Commercially available Electronic Design Automation (EDA) Software performs quickly and well for certain applications, but either accuracy or speed suffers when applied to high frequency VLSI interconnects. The invention has analyzed one circuit in 10-25 seconds that the popular “SPICE” method could not analyze in several
...

Plan-It Purple Event Calendar (21031)

"Northwestern's portal is among the nation's best and provides the finest calendar of events we've ever seen." (Yahoo! Internet Life, October 2001. "America's Most Wired Colleges," p. 96) In response to over 52 online calendars scattered across the Northwestern University web site, Plan-It Purple was developed to be the single web site where information about all Northwestern events could be found. Multiple university users can input events into an institution-wide online calendar. The calend
...

A System to Prevent Power Outages in Optical Transmission Lines (21073)

This breakthrough method provides the only known practical means by which to predict power outage probabilities and bit-error rates in fiber optic lines caused by "polarization mode dispersion (PMD)." Today’s stringent standards permit only very infrequent power outages, so system designers need to have a way to predict and prevent such outages. The Northwestern invention provides a way to do this. It has been used in the form of software, but potentially can be implemented in hardware. Co
...

Northwestern Oncology Trial Information System (NOTIS) (22042)

The NORTHWESTERN Oncology Trial Information System (NOTIS) is a web-enabled database that was developed to comprehensively capture data generated by cancer clinical trials. Unlike state-of-the-art clinical software solutions, NOTIS is event-driven rather than time-driven – a fundamental feature that makes it ideal for oncology trials. However, NOTIS can be applied to areas outside of oncology and of medicine in general. As concerns a clinical trial application, an experimental protocol use
...

Library Validating Tool for MARC Records, “ValidIt” (22053)

Mistakes sometimes occur as records are entered into a library database. ValidIt is an ActiveX™ dynamic link library (DLL) that inspects library records to ensure that they are structurally sound and contain valid codes. Lacking in today’s systems is a way to inspect the content of records. Many library systems provide a certain level of error-checking, but usually not to the level required by institutions that share records among themselves, or with bibliographic utilities such as “OCL
...

Facility Online Manager (22093)

Facility Online Manager (FOM) is an online (internet) accounting system for multi-user service facilities. Authorized users can reserve and access equipment online. The software’s security controls enable facility managers to limit equipment usage to authorized groups and individuals. Security controls apply rules to restrict equipment usage in accordance with the user’s level of training for the procedure and equipment in question. FOM supports automated billing, it maintains a real-time ac
...

Improved Method for Mixed Integer Programming (24047)

This invention is an optimization tool with general applicability. It solves problems that otherwise are difficult to solve. It also solves problems more quickly than can be solved by currently available methods. For instance, in solving a set of market share problems, the inventors compared results of their invention with results using state-of-the-art commercial software. Some of the results are presented below. So for instance, the invention solves the last problem with only 0.5% of t
...

EDA Tool to Estimate Coupling Power (27108)

The invention can be used in EDA software to estimate the so-called “coupling power” of integrated circuits. By taking into consideration timing dependencies in circuits, the invention can reduce errors to estimate coupling power by as much as sixty percent (60%). As far as we know, the invention is the first work to take timing dependencies into consideration. It is a major challenge to minimize thermal dissipation in today’s densely packed integrated circuits. One result is that incr
...

Method for Minimum Area Retiming (27163)

The invention can be practically implemented in EDA software to efficiently produce minimized register area in large VLSI circuits without changing circuit timing or functionality. It can achieve this, because it solves the minimum area retiming problem efficiently and optimally with minimal runtime and memory usage. For a circuit with more than 180k gates, the best known currently available algorithm failed to solve the problem after running for 2 hours and using up 2GB memory, while the invent
...

Vibro-Mechanical Texturing (27159)

INVENTION: The invention utilizes a standard lathe and simple control system to create micro-textured surfaces. The invention is able to rapidly implement micro-textured surfaces at very low cost. The initial equipment setup cost of the invented apparatus is about 90% less than that of a comparable laser-based texturing system. Anticipated applications of this technique are to surface texture mechanical bearings and die/forging components in order to control the friction between surfaces.
...

BioNetGen - Software to Discover Novel Biotransformations

INVENTION: This software solution has been extensively used at Northwestern to identify novel reaction pathways. This offers an opportunity to look for ways to produce materials from renewable resources, such as plants and crops, or to produce novel products. ADVANTAGES: There have been other attempts to identify novel reaction pathways. However, these competing methods require users to specify known enzymes and targeted reaction products, as well as known metabolic intermediates. In this se
...

Automate White Matter Parcellation Based on Diffusion Tensor Imaging

Brain white matter looks homogeneous in conventional MR. This makes it difficult to identify specific white matter regions (similar to locate a place in desert). DTI provides contrasts based on axonal fiber orientations, with which locations of specific white matter tracts can be visualized. This invention provides means to automatically parcellate the white matter based on this new contrasts. Description (Set) [1] Automated white matter tract reconstruction: 1) Choose a common anatomical temp
...

A Gene Expression Barcode for Normal and Diseased Tissue Classification

This invention measures absolute gene expression and shows that with hundreds of samples it is possible to demarcate expressed from unexpressed genes. The utility of the method is demonstrated by defining a gene expression barcode for human and mouse tissues, which is then used to differentiate diseased tissue from normal tissue. With clinical data, we find near perfect predictability of normal from diseased tissue for three cancer studies and one Alzheimer's disease study. The barcode method a
...

The Transcriptome Interaction Database (TID): a Novel Bioinformatic Method and Software Package for Analysis of MicroRNA-mRNA Interactions and their Consequences

Researchers at JHU have developed the Transcriptome Interaction Database (TID), a centralized relational database and analysis toolset for combining microRNA (miRNA) data with large scale microarray mRNA data, to make predictions of miRNA-mRNA interactions in a given cell type. The TID uses a simplified and automated user interface to allow a researcher to efficiently make predictions concerning miRNA function within a cell population, or to compare miRNA expression and function among multiple c
...

EXIGO-MS: a new MS solution platform for the robust identification and characterization of proteins

The major bottleneck of proteomics is no longer the ability to generate data, but the analysis of proteomics data, and mining as much information from it as possible. This new software allows one to rapidly analyze data generated by mass spectrometry in an iterative manner to solve this problem. ? This new software allows one to rapidly analyze data generated by mass spectrometry (MS) in an iterative manner ? One can identify proteins with increased robustness and accuracy, mine MS data for add
...

System for Clinical Workflow and Information Management

Problem-Driven Order Entry (PDOE) is a novel process for computerized physician order entry (CPOE) that dynamically generates problem-specific CPOE pick-lists without the need for static order sets or a formal, pre-determined knowledge base. Through its simple yet unique workflow, it provides highly useful CPOE pick-lists while greatly aiding physicians in maintaining accurate, up-to-date coded problem lists. The Problem-Driven Medical Record (PDMR) is a novel clinical information environment th
...

TMAJ: Database and Software Tools to Manage Tissue Microarrays (Copyright only)

Tissue micro-array based biomarkers studies involve large datasets of clinical, specimen, and image data that require effective data entry, storage, management, and querying tools. An integrated set of software tools have been developed to manage clinical data, pathology data, and image data for arrayed samples. Tools are provided for web-based TMA design, data entry and construction of arrays, direct import of images, display and diagnosis of digital images of arrayed samples and export of all
...

4D Digital Extended Cardiac-Torso (XCAT) Phantom

The four-dimensional (4D) NURBS-based cardiac-torso (NCAT) phantom, previously developed to provide a realistic model of the human anatomy and physiology for nuclear medicine imaging research, currently lacks anatomical details and accurate physiological functions for application to high resolution medical imaging techniques such as x-ray CT and MRI. At the same time, current phantoms used in these areas lack the sufficient realism and flexibility to depict the complex shapes of real human orga
...

4D Digital Mouse Whole Body (MOBY) Phantom

The 4D digital mouse whole body (MOBY) phantom is a realistic and flexible model of the mouse anatomy and cardiac and respiratory motions for use in molecular imaging research. The organ shapes are modeled with non-uniform rational b-spline (NURBS) surfaces, which are widely used in 3D computer graphics. High-resolution 3D magnetic resonance microscopy (MRM) data obtained from Duke Center for In Vivo Microscopy was used as the basis for the formation of the surfaces. With its basis upn actual im
...

Software Tools for Analysis of Chromosomal Abnormalities in Pedigrees Using High Density Genomic Data SNPtrio

Abstract (Set) Description (Set) Chromosomal DNA alterations can be detected using high density single nucleotide polymorphism (SNP) microarrays. These include deletions and duplications (assessed by observing changes in copy number) and regions of homozygosity. The analysis of SNP data from trios can provide an additional category of information about the nature and origin of inheritance patterns, including uniparental disomy (UPD), loss of transmitted allele (LTA), and nonparental relation
...

Three Software Tools for Analysis of Chromosomal Abnormalities in High Density Genomic Data

Abstract (Set) High density single nucleotide polymorphism (SNP) data have been used to identify chromosomal changes in DNA samples. A current challenge is to identify disease associated changes such as deletions and duplications as well as inheritance patterns. JHU scientists have developed a software tool for pairwise comparison of SNP genotype and copy number data. JHU scientists have also developed a software tool to assign meiotic crossover points to data from grandparents and grandchildre
...

ViewGene: a Graphical Tool for SNP Visualization and Characterization

The Human Genome Project has produced an enormous amount of sequence data, based on which single base changes between individuals are being identified. Unfortunately, computer tools that were adequate for sequence assembly are less than ideal for the characterization of single nucleotide polymorphism (SNP) data and its relationship to established sequence features. JHU researchers have developed ViewGene as a flexible tool that takes input from a number of sequence formats and analysis programs
...

Online Mendilian Inheritance in Man (OMIM TM Database)

This database is a catalog of human genes and genetic disorders authored and edited by researchers at Johns Hopkins and elsewhere, and developed for the World Wide Web by NCBI, the National Center for Biotechnology Information. The database contains textual information, pictures, and reference information.
...

Integrated Multidimensional Molecular Tissue Bioinformatics Research, Lab Management and Publishing Databases

PELICAN is an integrated, web-based database application for integrating clinical and life sciences data. Description (Set) Proposed Use (Set) Life Science Laboratory Management Platform. Used to integrate molecular data in functional genomic context. Link clinical data to molecular data Patent (Set) 6,675,166
...

Fiber Reconstruction Method using Data Acquired by Magnetic Resonance Imaging

This is a technique that allows reconstructing three-dimensional trajectories of axonal fiber bundles in human brain white matter. The technique, called diffusion tensor imaging (DTI) is based on magnetic resonance imaging. Specifically, it monitors orientation of water diffusion, which tends to diffuse along axonal tracts. We developed computer programs that can reconstruct the axonal tract by tracing the path of the water diffusion. Description (Set) Proposed Use (Set) Diagnostic radiolo
...

Neonatal Brain Signals Database and Programs

Digitized Data collected during numerous experimental studies in the laboratory. Data include ECG signals during ischemic brain injury and programs include display and analysis routines and algorithms implemented for research use Description (Set) Proposed Use (Set) The recordings and programs could be used for further research and development purposes to improve EEG monitoring.
...

Morgan

MORGAN is an integrated system for finding genes in vertebrate DNA sequences. MORGAN uses a variety of techniques to accomplish this task, the most distinctive of which is a decision tree classifier. The decision tree system is combined with new methods for identifying start codons, donor sites, and acceptor sites, and these are brought together in a frame-sensitive dynamic programming algorithm that finds the optimal segmentation of a DNA sequence into coding and noncoding regions (exons and in
...

Web-based Timeline Presentation Builder (System and method for displaying multimedia and text components in an interactive, web-accessible timeline interface) (Copyright Only)

This invention allows individuals without multimedia development skills to create an interactive timeline for teaching or presentation purposes. This timeline can be published on the World Wide Web or displayed from a non-networked computer. The timeline consists of several parallel axes on which the designer can place data points with descriptive text and linked multimedia files - digital images, audio, and video. These parallel axes can be based in time, distance, or any other linear mode.
...

TechTours

Project Builder is a web-based application developed by Johns Hopkins University Center for Technology in Education that allows educators to create project-based learning experiences called Tech Tours and develop daily lessons using the GLOBE Tech Cycle of Instruction. The research-based framework of Project Builder allows teachers to customize these learning experiences according to state standards and student learning outcomes. The provided template embedded in Project Builder allows teachers
...

The Electronic Portfolio (EP)

CTE?s Electronic Portfolio system is a web-based application that provides an educator with a powerful and dynamic framework for creating, maintaining, and disseminating a professional portfolio. The system also integrates communication tools that allow portfolio owners to request feedback from trusted colleagues and advisors while maintaining the security and confidentiality of the portfolio during the development process. The Electronic Portfolio can then be used by an educator: 1) to demonstr
...

Teacher Compass

Project Builder is a web-based application developed by Johns Hopkins University Center for Technology in Education that allows educators to create project-based learning experiences called Tech Tours and develop daily lessons using the GLOBE Tech Cycle of Instruction. The research-based framework of Project Builder allows teachers to customize these learning experiences according to state standards and student learning outcomes. The provided template embedded in Project Builder allows teachers
...

Student Compass

student performance data in order to improve instructional decision-making and student learning. Using Student Compass, teachers can enter student data easily using handheld or desktop computers, disaggregate results rapidly, and generate easy-to-read reports and graphs related to various academic and non-academic performance areas. Student Compass enhances communication between teachers, students, and parents by giving up-to-date reports on student progress in areas such as reading, academic go
...

Methods for Portraying Three-Dimensional Graphs in Two Dimensions

Problem Solved: Three-Dimensional bar graphs are commonly used in biomedical studies to portray how two categorical variables (e.g., predictors, risk factors) jointly contribute to an outcome. However, most 3-D bar graphs fail to achieve the desired feature of equally representing the relationships between the outcome variable and each of two predictors, including fixing (condition on) one predictor to examine the relationship of the other predictor and the outcome. In addition, 3 D bar graphs a
...

Intermediated Delivery Scheme for Asymmetric Fair Exchange of Electronic Items

A great deal of valuable data - commercial, medical, educational and scientific - is today stored in electronic format in computer databases. The commercialization of this "electronic" data via Internet is beginning to have a significant economic and technological impact. Outside of cyberspace, at each purchase, a receipt is issued simultaneously when receiving the product. The lack of simultaneity in electronic transactions creates important issues. The scheme described in this invention, is de
...

Computer Assisted Method for Conducting Library Research from a Remote Locat

This invention is of great potential significance to the library, publishing, archives, and records management communities, among others. It addresses a long-felt need, namely, for improved access to materials (often existent in large quantity) which have not been digitized and, through limitations of space, have been moved offsite. This invention offers immediate access and viewing from one location of printed materials which have been stored at a second location. A person at the first location
...

NonBlocking Broadcast Switching Network

This novel invention presents a design for a broadcast network which provides nonblocking connecting capability in a multistage switching network without any disturbance of other broadcast connections already existing in the network. It is notable for its economy of required switching elements and its reduced crosspoint and control algorithm complexity. In this design, a middle stage of switches, in communication with the input and output stages, is always available to form connections between a
...

Using Certification Trails to Achieve Software Fault Tolerance

This novel invention comprises a method and apparatus to achieve fault tolerance in hardware and software systems. The method involves the steps of executing a first algorithm and a second algorithm on input which produces a first output and certification trail, and second output respectively. Comparing the first andsecond outputs, the system produces an error result if the first and second outputs are not the same. The apparatus involves an improved central processing unit having the first and
...

NOMAD, C++ software for derivative-free optimization

The underlying algorithm in NOMAD is MADS, a direct search algorithm with a very strong theoretical and practical justification. The user provides �blackbox� code that NOMAD can call to evaluate the objective and constraints for the nonlinear programming problem the user wishes to solve. Convergence is guaranteed under very general hypotheses. Advantages NOMAD does not need sensitivity information from the user. This is a major advantage over methods that are more efficient that NOMAD i
...

Remote Hardware Enabling/Disabling Techniques Using Manufacturing Variability

This invention proposes the first active hardware metering scheme that symmetrically protects the IP designer and the foundry by providing a key-exchange mechanism. The active metering method uniquely locks the IC at the fabrication house by utilizing the unclonable variability-based ID of each silicon circuit, known as the random unique block (RUB). This does not alter the functionality of the original design, and only the designer can provide the key to the locked IC. Experimental evaluations
...

Compressed Sensing Camera

Advantages . Design enables simultaneous sensing and compression of images. . Compression is part of the analog acquisition process, so the need for data compression algorithms is eliminated. . The image or video sequence is automatically encrypted without additional computational expense. . Design is appropriate for remote sensing applications where computational power is at a premium. Technology This invention is a new kind of imaging device or camera. The design combines advanced sig
...

Remote Hardware Enabling/Disabling Techniques Using Manufacturing Variability

This invention proposes the first active hardware metering scheme that symmetrically protects the IP designer and the foundry by providing a key-exchange mechanism. The active metering method uniquely locks the IC at the fabrication house by utilizing the unclonable variability-based ID of each silicon circuit, known as the random unique block (RUB). This does not alter the functionality of the original design, and only the designer can provide the key to the locked IC. Experimental evaluations
...

Continuous Remote Control and Authentication of Integrated Circuits

This invention is a new approach for remote enabling, disabling and metering of integrated circuits. The approach leverages inherent manufacturing variability of modern and pending Si technologies. The key conceptual novelty is that designers can control ICs remotely, continuously, and concurrently with execution. The remote activation protocol is designed to protect both the designer and the fab by requiring a key exchange mechanism for IC activation. It can be summarized using the followin
...

Rapid Colored Prototypes (RCP)

A rapid colored prototype (RCP) process is a rapid process of producing colored three-dimensional objects. This method is a marked improvement over the colorless traditional rapid prototyping techniques. Adding functional color into rapid prototype s benefits the user by increasing visualization, understanding and communication of a computer model such as complex CAD models and mechanical and scientific data. It accomplishes this feat by alllowing the user to physically manipulate, feel and se e
...

Biometric Convolution: a system and method for securing biometric data using multiple biometrics

Biometrics (signature, finger print, facial recognition, etc) are used in a growing number of security applications. There is major public concern/unease with using biometric data, particularly concerning the level of security and robustness of encr yption of personal information. This invention addresses these concerns through a software algorithm and method that mathematically convolves two or more biometric inputs in combination with each other to produce a new, unique code. For example ,
...

Referent Tracking

Referent tracking is a simple yet powerful way to organize electronic data and coordinate databases. The ability to track not only information but also data relationships is invaluable in various fields including healthcare, intelligence, and digital media. Currently, the creation and flow of new and existing information overwhelms databases due to the lack uniformity and efficiency. With the ever-growing amount of data and the need to extract useful information, a new system of data organizatio
...

Hyperspace Diagonal Counting (HSDC) for Multidimensional Database Visualization and Data Mining.

This technology describes a new mathematical technique to graphically visualize and present objects and shapes in hyperspaces, i.e., in extensions of space beyond the third dimension. Currently, these are visualized only as mathematical abstractions, although there have been attempts to capture and visualize the fourth and fifth dimensions by employing colors and shades. This invention enables a secure and mathematically precise method of using mathematical diagonal-counting techniques (devised
...

Hyperspace Diagonal Counting (HSDC) for Multidimensional Visualization

This technology describes a new mathematical technique to graphically visualize and present objects and shapes in hyperspaces, i.e., in extensions of space beyond the third dimension. Currently, these are visualized only as mathematical abstractions, although there have been attempts to capture and visualize the fourth and fifth dimensions by employing colors and shades. This invention enables a secure and mathematically precise method of using mathematical diagonal-counting techniques (devised
...

FieldXtract - a software toolkit for extraction and automated reading of machine printed and handwitten form fields for indexing and retrieval

FieldXtract - A software toolkit for extraction and automated reading of machine printed and handwitten form fields for indexing and retrieval
...

Referent Tracking

Referent tracking is a simple yet powerful way to organize electronic data and coordinate databases. The ability to track not only information but also data relationships is invaluable in various fields including healthcare, intelligence, and digital media. Currently, the creation and flow of new and existing information overwhelms databases due to the lack uniformity and efficiency. With the ever-growing amount of data and the need to extract useful information, a new system of data organizatio
...

Secure Fingerprint Matching by Hashing Localized Information

This invention discusses and discloses a unique method of protecting fingerprint biometric data. The method uses algorithms to determine a set of specialized points on a fingerprint, and then uses the pattern to hash (encrypt) the fingerprint recogn ition information. This invention is unique in that it overcomes drawbacks of other recognition methods by using a series of algorithms based on linear and rotational geometry that conclusively determines a pattern on a fingerprint. This is unlike cu
...

Hyperspace Diagonal Counting (HSDC) for Multidimensional Database Visualization and Data Mining

This technology describes a new mathematical technique to graphically visualize and present objects and shapes in hyperspaces, i.e., in extensions of space beyond the third dimension. Currently, these are visualized only as mathematical abstractions, although there have been attempts to capture and visualize the fourth and fifth dimensions by employing colors and shades. This invention enables a secure and mathematically precise method of using mathematical diagonal-counting techniques (devised
...

Hyperspace Diagonal Counting (HSDC) for Multidimensional Visualization

This technology describes a new mathematical technique to graphically visualize and present objects and shapes in hyperspaces, i.e., in extensions of space beyond the third dimension. Currently, these are visualized only as mathematical abstractions, although there have been attempts to capture and visualize the fourth and fifth dimensions by employing colors and shades. This invention enables a secure and mathematically precise method of using mathematical diagonal-counting techniques (devised
...

Hyperspace Diagonal Counting (HSDC) for Multiobjective Pareto Frontier Visualization

This technology describes a new mathematical technique to graphically visualize and present objects and shapes in hyperspaces, i.e., in extensions of space beyond the third dimension. Currently, these are visualized only as mathematical abstractions, although there have been attempts to capture and visualize the fourth and fifth dimensions by employing colors and shades. This invention enables a secure and mathematically precise method of using mathematical diagonal-counting techniques (devised
...

Biometric Convolution: a system and method for securing biometric data using multiple biometrics

Biometrics (signature, finger print, facial recognition, etc) are used in a growing number of security applications. There is major public concern/unease with using biometric data, particularly concerning the level of security and robustness of encr yption of personal information. This invention addresses these concerns through a software algorithm and method that mathematically convolves two or more biometric inputs in combination with each other to produce a new, unique code. For example ,
...

Rapid Colored Prototypes (RCP)

A rapid colored prototype (RCP) process is a rapid process of producing colored three-dimensional objects. This method is a marked improvement over the colorless traditional rapid prototyping techniques. Adding functional color into rapid prototype s benefits the user by increasing visualization, understanding and communication of a computer model such as complex CAD models and mechanical and scientific data. It accomplishes this feat by alllowing the user to physically manipulate, feel and se e
...

Signal Amplification Method for SPR-based Chemical Detection

Introduction Surface plasma resonance (SPR) is a general spectroscopic method for sensing refractive index changes near the surface of a metal film. Its sensitivity to these changes provides a versatile platform for the observation and quantitation of chemical reactions and intermolecular binding at the metal/solution interface. The generality of the technique has led to its application to a variety of chemical systems, including biological interactions and reactions. Technology description Rese
...

Parametric Cost Model

The Parametric Cost Model can be used to work out unit, sub-system, system and total project costs for a variety of projects. The model has been used by BA Systems, ESTEC, Airospatial plus many other major companys. The full source code and intellectual propert rights are for sale.
...

Interactive Program for Determining Implicit Attitudes

Summary This interactive web-based software (and its growing database of responses) measures implicit attitudes and knowledge of users, including such unconscious, preformed attitudes about race, age, gender, ethnicity, sexual preference, and obesity.
...

MicroArray Spot LINEar Regression (MASLINER) software

Summary Signal intensities between samples on a microarrary typically vary by as much as three to four orders of magnitude, frustrating efforts at comparative analysis of samples assayed in parallel. At any given laser power or photomultiplier tube gain (PMTG), some signals will be below detection threshold, while others will have saturated the signal-collection capacity of the scanning device. MicroArray Spot LINEar Regression ("MASLINER") is a software tool that addresses this critical deficie
...

A Novel Screening Method for Assessment of Psychopathologic Disorders

Summary Background: The advancement in psychiatric genetics and clinical neuroscience is hindered by the heterogeneity of psychiatric disorders and by difficulties in defining and characterizing the phenotype under investigation. A promising endophenotype is anhedonia, the loss of pleasure or lack of reactivity to pleasurable stimuli. Anhedonia is one of the core symptoms of depression and has been considered a potential trait marker related to vulnerability of depression. Anhedonia is not only
...

An Ultra Low Power System Architecture for Sensor Network Applications

Summary Ultra-low-power chip for sensor network applications Application and Benefits: Wireless sensor networks (WSNs) are used in a wide variety of applications including environmental monitoring, vehicle tracking, health-care, and business supply-chain management. Often such networks must provide continuous sensing for long periods of time, resulting in a need for inexpensive, long-lasting, highly reliable devices. Power consumption is usually the most important design constraint, as energ
...

A Framework for Wavelet-Based Analysis and Processing of Color FIlter Array Images

Summary Background In digital imaging applications, data are typically obtained via a spatial subsampling procedure implemented as a color filter array (CFA). CFA assigns a separate primary color to each pixel by placing a filter of that color over the pixel. The most well known CFA is the Bayer pattern which uses a checkerboard pattern with alternating rows of filters. The Bayer filter has twice as many green pixels as red or blue and takes advantage of the human eye’s tendency to see
...

A Novel Color Filter Array Design

Summary Background In digital imaging applications, data are typically obtained via a spatial subsampling procedure implemented as a color filter array (CFA). CFA assigns a separate primary color to each pixel by placing a filter of that color over the pixel. The most well known CFA is the Bayer pattern which uses a checkerboard pattern with alternating rows of filters. The Bayer filter has twice as many green pixels as red or blue and takes advantage of the human eye’s tendency to see
...

A Framework for Wavelet-Based Analysis and Processing of Color FIlter Array Images

Summary Background In digital imaging applications, data are typically obtained via a spatial subsampling procedure implemented as a color filter array (CFA). CFA assigns a separate primary color to each pixel by placing a filter of that color over the pixel. The most well known CFA is the Bayer pattern which uses a checkerboard pattern with alternating rows of filters. The Bayer filter has twice as many green pixels as red or blue and takes advantage of the human eye’s tendency to see
...

Text Annotator

Summary The Text Annotator is a web-based authoring program that allows faculty to add written notes, images (jpg, gif, bmp, png) audio files (aif, mp3, wav, avi) video clips (mgp, mpeg, wma) or links to other web sites to texts that students can access from a web browser. Texts in any language using the Roman alphabet can thus be adapted to a particular course, with glosses corresponding to both the specific context in which a word is used and the level of language appropriate for students. Aut
...

DEREK Software

Summary The computer program DEREK (an acronym for Deductive Estimation of Risk from Existing Knowledge) is designed to assist chemists and toxicologists in predicting likely areas of possible toxicological risk for new compounds, based on an analysis of their chemical structures. DEREK is derived from the LHASA program for computer-assisted synthetic analysis (see 375/Corey), which has been under development at Harvard and various other universities for more than 25 years. Like LHASA, DEREK
...

LHASA Software Program: Chemical Synthesis Analysis

Summary The computer program LHASA (an acronym for Logic and Heuristics Applied to Synthetic Analysis), which has been under continuous development at Harvard and various collaborating universities for more than 25 years, is intended to assist organic chemists in designing multistep routes to complex molecules. The program accepts as input a target molecule drawn in the language of structural formulae that is common to all organic chemists. A perception of the target is conducted to identify mol
...

Hardware Architecture of Programmable Reduced Instruction Set computers ("PRISC"

Summary The invention is a computer system capable of operating at speeds and efficiency levels generally associated with reduced instruction set computers ("RISC"), while also executing complex functions often associated with a complex instruction set computer ("CISC"). This is accomplished by forming a complex instruction form a group of instructions, each of which is individually executable by a first processor. The instruction is subsequently assigned an identifier and stored in memory. Duri
...

Jake

Summary JAKE is a database written in 4th Dimension for both the Windows and Macintosh platforms. The database tracks patent prosecution and technology information, government compliance, license agreements, company data, contact management, legal expenses, and biomaterial transfers. On a financial level the database assists in analyzing, paying and invoicing legal expenses, and recording and distributing income, as well as producing extensive reports. Applications For Further Information Ple
...

AlignAce motif searching software

Summary Developed by genomics researchers at Harvard Medical School, AlignAce employs an algorithm that scans non-coding nucleic acid sequences at high resolution for motifs that occur with non-random frequency. This algorithm is built into a multi-level sequence analysis program that highlights gene-specific regulatory elements for further analysis. AlignAce offers both efficiency and convenience. Its high signal-to-noise ratio preferentially reduces false positives in the program output, w
...

Time and concentration warping software for RNA and protein expression data

Summary The predominant strategies for drug discovery today employ high-throughput screens and microarray-based methods that generate large data sets. Increasingly, these techniques are being used to study biological processes as a function of time and/or chemical concentration. Functionally-related processes may vary in timecourse or strength in different experiments or individuals. Current clustering methods do not highlight their similarities, because while their expression- or reaction profi
...

Compressed Bloom Filter

Summary A Bloom filter is a simple space-efficient randomized data structure for representing a set in order to support membership queries. Compressed Bloom filters improve performance when the Bloom filter is passed as a message; its transmission size is a limiting factor. Bloom filters have been suggested as a means for sharing Web cache information. In this setting, proxies do not share the exact contents of their caches, but instead periodically broadcast Bloom filters representing their cac
...

TreeDock protein docking software

Summary Predicting protein-protein and protein-ligand docking remains one of the challenging topics of structural biology. The main problems are (i) to reliably estimate the binding free energies of docked states, (ii) to enumerate possible docking orientations at a high resolution, and (iii) to consider mobility of the docking surfaces and structural rearrangements upon interaction. The invention provides a novel algorithm, TreeDock, that addresses the enumeration problem in a rigid-body dockin
...

Algorithm for Haplotype Construction of Single Nucleotide Polymorphism

Summary The Haplotyper software program utilizes a novel algorithm called Partition-Ligation to reconstruct individual haplotype phase information from unphased genoptype data. The Partition-Ligation method uses an ingenious Markov chain Monte Carlo approach both to construct the partial haplotypes of each segment and to assemble all the segments together. It has the ability to deal with ambiguous or missing genotypes, it has the ability to handle hundreds or thousands of single nucleotide polym
...

GoFish gene annotation and database query software

Summary GoFish, a genomics software tool developed at Harvard Medical School, provides methods for improved gene annotation and query of gene annotation databases. The software enables efficient analysis of large genomics data sets by allowing the user to search for genes that possess investigator-defined combinations of characteristics or, alternatively, of features that approximate those characteristics. GoFish is useful both for basic research applications (e.g., pathway analysis) and pharmac
...

MicroArray Spot LINEar Regression (MASLINER) software

Summary Signal intensities between samples on a microarrary typically vary by as much as three to four orders of magnitude, frustrating efforts at comparative analysis of samples assayed in parallel. At any given laser power or photomultiplier tube gain (PMTG), some signals will be below detection threshold, while others will have saturated the signal-collection capacity of the scanning device. MicroArray Spot LINEar Regression ("MASLINER") is a software tool that addresses this critical deficie
...

Phenotype Drug Screening Platform ; Based on Quantitative Morphometric Analysis of Cells

...

A Framework for Wavelet-Based Analysis and Processing of Color FIlter Array Images

Summary Background In digital imaging applications, data are typically obtained via a spatial subsampling procedure implemented as a color filter array (CFA). CFA assigns a separate primary color to each pixel by placing a filter of that color over the pixel. The most well known CFA is the Bayer pattern which uses a checkerboard pattern with alternating rows of filters. The Bayer filter has twice as many green pixels as red or blue and takes advantage of the human eye’s tendency to see
...

DEREK Software

Summary The computer program DEREK (an acronym for Deductive Estimation of Risk from Existing Knowledge) is designed to assist chemists and toxicologists in predicting likely areas of possible toxicological risk for new compounds, based on an analysis of their chemical structures. DEREK is derived from the LHASA program for computer-assisted synthetic analysis (see 375/Corey), which has been under development at Harvard and various other universities for more than 25 years. Like LHASA, DEREK
...

Time and concentration warping software for RNA and protein expression data

Summary The predominant strategies for drug discovery today employ high-throughput screens and microarray-based methods that generate large data sets. Increasingly, these techniques are being used to study biological processes as a function of time and/or chemical concentration. Functionally-related processes may vary in timecourse or strength in different experiments or individuals. Current clustering methods do not highlight their similarities, because while their expression- or reaction profi
...

TreeDock protein docking software

Summary Predicting protein-protein and protein-ligand docking remains one of the challenging topics of structural biology. The main problems are (i) to reliably estimate the binding free energies of docked states, (ii) to enumerate possible docking orientations at a high resolution, and (iii) to consider mobility of the docking surfaces and structural rearrangements upon interaction. The invention provides a novel algorithm, TreeDock, that addresses the enumeration problem in a rigid-body dockin
...

GoFish gene annotation and database query software

Summary GoFish, a genomics software tool developed at Harvard Medical School, provides methods for improved gene annotation and query of gene annotation databases. The software enables efficient analysis of large genomics data sets by allowing the user to search for genes that possess investigator-defined combinations of characteristics or, alternatively, of features that approximate those characteristics. GoFish is useful both for basic research applications (e.g., pathway analysis) and pharmac
...

MicroArray Spot LINEar Regression (MASLINER) software

Summary Signal intensities between samples on a microarrary typically vary by as much as three to four orders of magnitude, frustrating efforts at comparative analysis of samples assayed in parallel. At any given laser power or photomultiplier tube gain (PMTG), some signals will be below detection threshold, while others will have saturated the signal-collection capacity of the scanning device. MicroArray Spot LINEar Regression ("MASLINER") is a software tool that addresses this critical deficie
...

A Novel Screening Method for Assessment of Psychopathologic Disorders

Summary Background: The advancement in psychiatric genetics and clinical neuroscience is hindered by the heterogeneity of psychiatric disorders and by difficulties in defining and characterizing the phenotype under investigation. A promising endophenotype is anhedonia, the loss of pleasure or lack of reactivity to pleasurable stimuli. Anhedonia is one of the core symptoms of depression and has been considered a potential trait marker related to vulnerability of depression. Anhedonia is not only
...

Multilevel Modulation for Free Space Optical (FSO Communications and Error Correction Methodology

Introduction Wireless optical links, or free space optics (FSO , enable point-to-point, high-speed communication with low installation costs and high levels of security, and they are especially useful in situations where fiberoptics are impractical. Unfortunately, this technique suffers from signal scattering and attenuation during certain weather conditions—such as rain, fog, or smog—that can deteriorate or even sever the connection.
...

True Three-Dimensional (3-D Display with Focus Cues

Introduction When viewing a real scene, not everything in the scene is in focus at any given time. Instead the individual viewing the scene accommodates (adjusts the focus of the eye to bring objects at various distances into focus. Current stereographic displays tend to cause profound eye fatigue often accompanied by headache. The eye fatigue is likely in part due to the result of a mismatch between the depth information provided by accommodation and that provided by vergence (the ext
...

Networked Surgical Robot Control System

Introduction The individual soldier remains the most valuable asset of the military and in spite of the current emphasis on the threat of weapons of mass destruction, and biological warfare, attending to the soldier's needs when they become a casualty remains a top priority. There is a significant opportunity to save the lives of soldiers by using forward deployed telesurgical capabilities to control the consequences of abdominal vascular injury. The surgical robots now being deployed and
...

Three-Dimensional Imaging Towards Three-Dimensional Velocity

Introduction Particle Image Velocimetry has become a widely used quantitative flow visualization technique in today’s fluid mechanics research due to its ability to provide non-intrusive, highly resolved measurement of planar velocity fields. With the use of ever-advancing CCD cameras, digital data acquisition systems, and sophisticated algorithms, DPIV continues to evolve and flourish. One of the key advancements is the development of Three-Dimensional Defocusing Particle Image Velocime
...

Vision Chip

BACKGROUND Conventional computer vision systems comprise a sensor/camera with a separate computer system for data processing. Computer vision is one of the most intensive data processing applications and until recently this has been the only feasible approach. However, this architecture suffers from data transmission (I/O) bottlenecks (between the sensor, processor and memory devices) when higher performance sensors are used. Conventional systems are also power-hungry, thus constraining the use
...

DQF-MRI Strain Maps of Blood Vessel Walls

The Invention Two images that display a 2D map of a bovine coronary artery, unstressed (Left) and 55% elongated (Right). Strain maps of blood vessels walls, tissue composition and strain distribution are now possible through the use of DQF-MRI (Double Quantum Filtered-MRI). This innovative method is extremely powerful easily achieving images of distinct tissue layers, especially the tunica adventitia. The most significant feature is the additional spectroscopic dimension of the DQF-MRI w
...

MRI Sequence for Macromolecule Characterization of Brain Tissue

The Invention Brain macromolecules can now be detected and identified according to contrasting macromolecular characteristics of the tissues, using this new MRI sequence. The dynamics and rigidity of a host of macromolecules can be identified, including proteins and lipid membranes. In the brain and spinal cord, the new MRI sequence gives an enhanced signal for the white matter - an invaluable tool in the detection of related diseases. The new MRI sequence may also track the amyloid plaques i
...

New software for high speed inspection of volume printing processes

BACKGROUND: In a culture of rising print costs, high print run wastage rates, and yet rising demand for printed products, often with a need for precision, high definition printing, there is more than ever a need for accurate inspection of the finished product. Compuweb Online Ltd is a Manchester based company. It has developed a number of unique IT solutions which benefit from access to cutting edge research from Manchester universities. In response to the need for high-speed and high resolutio
...

Enhanced Software for Image Feature Detection and Tracking

BACKGROUND The division of Imaging Science and Biomedical Engineering at Manchester has expertise in the statistical analysis of image data. Image analysis is widely employed in sectors such as life sciences, security, defence, biometrics, forensics and medicine. THE TECHNOLOGY A method for modelling deformable objects has been developed (e.g. faces, hands, organs. The approach is general and involves building a statistical model of an image of a particular object e.g. a body part through a manu
...

eLUNSERS: a SOFTWARE TOOL FOR MONITORING THE SIDE-EFFECTS OF NEUROLEPTIC DRUGS

BACKGROUND Neuroleptics are the drugs of choice in the treatment of schizophrenia, bipolar mania and related disorders but suffer from troublesome side-effects such as drug induced parkinsonism, restlessness, facial tics etc. The severity and patient acceptability of these effects varies widely. Research by Dr Jennie Day into the side-effects of neuroleptic drugs has led to the development of a widely recognised questionnaire-based tool, the LUNSERS Scale, for monitoring patients on such medicat
...

Multi-Projector Displays Using Plug and Play Projectors

Background: Plug and play projectors (PPP) have been used for several years and combining multiple projectors to display a single image is desirous in order to display large, synchronized displays tiled arrays in high resolution. When it comes to screen size, bigger is only better when resolution is maintained and economics are reasonable. Technology: Researchers at UC Irvine have developed an efficient and useful apparatus and method for self-calibrating multi-projector displays via plug an
...

Automatic Detection and Diagnostics of Diabetic Retinopathy

Background: Diabetes is a condition that affects blood vessels throughout the body, particularly in the kidneys and eyes. Diabetic retinopathy is a complication of diabetes and is the leading cause of new blindness in the United States. Diabetic retinopathy results when diabetes affects vessels in the eyes, producing abnormalities such as microaneurysms and hemorrhages. These abnormalities are the same color as that of blood vessels, causing some areas of the normal blood vessel system in the r
...

Mobile Code for Computers

Background: The Java Virtual Machine's byte-code format (JVM-code) has become the de facto standard for transporting mobile code across the Internet. However, it is generally acknowledged that JVM-code is far from being an ideal mobile code representation - a considerable amount of preprocessing is required to convert JVM-code into a representation more amenable to an optimizing compiler, and in a dynamic compilation context, this preprocessing takes place while the user is waiting. Further, du
...

Method for Distributed Redundant Execution of Program Modules

Background: Several schemes have been implemented in distributed computer systems which recover execution of program modules when hardware and software failures occur. The distributed recovery block scheme executes a primary and backup copy of a program on multiple processors. The processors communicate to determine which version failed such that the successful processor passes its result on to the next stage. Unfortunately, if one version crashes (fails to execute) the recovery time is prolong
...

Global Qualitative Flow Path Modeling for Local State Determination (MSC-22618)

The technology supports reconfigurable models needed for analysis and simulation of industrial process automation where operations change the active flow paths in the system. The technology can be used to validate advanced process automation designs and software, where the active system structure changes during asynchronous interactive dynamic simulation. The technology can be used to analyze and predict global effects of local control actions and other events on the plant in various modes, whet
...

Energy Simulation Software for Buildings

APPLICATIONS OF TECHNOLOGY: Modeling building heating, cooling, lighting, ventilating, and other energy flows ADVANTAGES: Simulation capabilities include: time steps of less than an hour modular systems and plant integrated with heat balance-based zone simulation multizone air flow, thermal comfort, and photovoltaic systems ABSTRACT: EnergyPlus is a building energy simulation program for modeling building heating, cooling, lighting, ventilating, and other energy flows. While it is base
...

Notify me of New Entries on this Page

You can receive an email whenever a new patent is added to this category. You can unsubscribe at any time.