Patent application number | Description | Published |
20100016630 | ANTIMICROBIAL DERIVATIVES OF ANACARDIC ACID AND PROCESS FOR PREPARING THE SAME - Derivatives of anacardic acid having antimicrobial properties and method for preparing said derivatives. The antimicrobial properties include bacteriostatic and bacteriocidal activity. | 01-21-2010 |
20110070161 | ACTIVE ENANTIOMER - The present invention provides a PET tracer that has improved properties for imaging the peripheral benzodiazepine receptor (PBR) as compared with known such PET tracers. The present invention also provides a precursor compound useful in the preparation of the PET tracer of the invention and methods for the preparation of said precursor compound and said PET tracer. Also provided by the present invention is a radiopharmaceutical composition comprising the PET tracer of the invention. Methods for using the PET tracer and the radiopharmaceutical composition are also provided. | 03-24-2011 |
20130121926 | DYE COMPOSITIONS AND DYE SYNTHESES - The present invention relates to sulfonated optical dye compositions, especially dyes suitable for biological applications in vitro, and for in vivo imaging. Improved dye compositions and intermediates are provided, which enable the suppression of undesirable newly-identified impurities. Also provided is the use of the improved dye compositions in the preparation of conjugates with biological targeting molecules. | 05-16-2013 |
20150133663 | NOVEL SYNTHESIS METHOD - The present invention relates to a method of making compounds having affinity for the 1 A subtype of the serotonin receptor, i.e. 5HT | 05-14-2015 |
Patent application number | Description | Published |
20090016430 | Software Video Encoder with GPU Acceleration - Embodiments of a software video encoder with GPU acceleration include a software encoder that partitions video processing tasks and assigns them to both a graphics processing unit (GPU) and a central processing unit (CPU). The partitioning and assigning is configurable for operation in different modes. The modes include a mode in which the total time for video processing (such as when transcoding a large existing file) is reduced, a mode in which less CPU cycles are consumed, thus freeing the CPU for other work, ad mode in which the latency of processing (e.g., for video conferencing) is reduced, and a mode in which information from a game or other real-time activity being displayed on the screen is encoded. | 01-15-2009 |
20090147852 | Spatial Filtering of Differential Motion Vectors - Embodiments include a video data encoding method comprising receiving video input frames, and performing motion estimation on the video received frames. The motion estimation comprises performing a hierarchical motion search to find motion vectors with optimum sum of absolute difference (SAD) values, and performing spatial filtering of the motion vectors, wherein spatial filtering comprises making some pairs of motion vectors the same to achieve a zero differential. | 06-11-2009 |
20110292057 | Dynamic Bandwidth Determination and Processing Task Assignment for Video Data Processing - A method and apparatus for dynamic bandwidth determination and processing task assignment is disclosed. Embodiments include a video driver/interface that communicates with a video processing application such as a video editor. The video driver/interface is configurable to determine a best configuration of the system in order optimally perform the chosen video processing task. Configuration of a system includes dividing the task into subtasks and assigning the subtasks to processors of the system, including central processing units (CPUs) and graphics processing units (GPUs). Configuration of the system also includes optimizing use of available memory of different kinds. | 12-01-2011 |
20130141443 | SOFTWARE LIBRARIES FOR HETEROGENEOUS PARALLEL PROCESSING PLATFORMS - Systems, methods, and media for providing libraries within an OpenCL framework. Library source code is compiled into an intermediate representation and distributed to an end-user computing system. The computing system typically includes a CPU and one or more GPUs. The CPU compiles the intermediate representation of the library into an executable binary targeted to run on the GPUs. The CPU executes a host application, which invokes a kernel from the binary. The CPU retrieves the kernel from the binary and conveys the kernel to a GPU for execution. | 06-06-2013 |
Patent application number | Description | Published |
20110237999 | SYSTEMS AND METHODS FOR APPLYING AND MONITORING EYE THERAPY - Devices and approaches for activating cross-linking within corneal tissue to stabilize and strengthen the corneal tissue following an eye therapy treatment. A feedback system is provided to acquire measurements and pass feedback information to a controller. The feedback system may include an interferometer system, a corneal polarimetry system, or other configurations for monitoring cross-linking activity within the cornea. The controller is adapted to analyze the feedback information and adjust treatment to the eye based on the information. Aspects of the feedback system may also be used to monitor and diagnose features of the eye | 09-29-2011 |
20120215155 | CONTROLLED CROSS-LINKING INITIATION AND CORNEAL TOPOGRAPHY FEEDBACK SYSTEMS FOR DIRECTING CROSS-LINKING - Devices and approaches for activating cross-linking within corneal tissue to stabilize and strengthen the corneal tissue following an eye therapy treatment. A feedback system is provided to acquire measurements and pass feedback information to a controller. The feedback system may include an interferometer system, a corneal polarimetry system, or other configurations for monitoring cross-linking activity within the cornea. The controller is adapted to analyze the feedback information and adjust treatment to the eye based on the information. Aspects of the feedback system may also be used to monitor and diagnose features of the eye. Methods of activating cross-linking according to information provided by a feedback system in order to improve accuracy and safety of a cross-linking therapy are also provided. | 08-23-2012 |
20120310083 | SYSTEMS AND METHODS FOR MONITORING TIME BASED PHOTO ACTIVE AGENT DELIVERY OR PHOTO ACTIVE MARKER PRESENCE - Devices and approaches for monitoring time based photo active agent delivery or photo active marker presence in an eye. A monitoring system is provided for measuring the presence of a photo active marker by illuminating the eye so as to excite the photo-active marker and then observing characteristic emission from the photo active marker. Example systems incorporate Scheimpflug optical systems or slit lamp optical systems to observe cross sectional images of an eye to monitor instantaneous distribution, diffusion pattern, and rate of uptake of a photo active agent applied to an eye. Systems and methods further allow for utilizing the monitored distribution of photo active agent in the eye as feedback for a cross-linking system. | 12-06-2012 |
20130131664 | Eye Therapy System - A system for applying therapy to an eye selectively applies coolant to the corneal surface to minimize heat-related damage to the corneal surface during thermokeratoplasty. Embodiments may include an energy source, a conducting element, a coolant supply, and a coolant delivery system. The conducting element is operably connected to the energy source and extends from a proximal end to a distal end. The conducting element directs energy from the energy source to the distal end, which is positionable at the eye. The coolant delivery system is in communication with the coolant supply and is operable to deliver a micro-controlled pulse of coolant to the distal end. | 05-23-2013 |
20130245536 | SYSTEMS AND METHODS FOR CORNEAL CROSS-LINKING WITH PULSED LIGHT - A method for controlling activation of a cross-linking agent applied to an eye includes applying the cross-linking agent to a selected region of a cornea of the eye and initiating cross-linking activity in the selected region by activating the cross-linking agent with pulsed light illumination. The pulsed light illumination has a selectable wavelength, irradiance, dose, and on/off duty cycle. The wavelength, the irradiance, the dose, and the on/off duty cycle are adjusted in response to a determination of photochemical kinetic pathways for cross-linking activity and to control photochemical efficiency, depth of cross-linking, and density of cross-linking. | 09-19-2013 |
20150265762 | SYSTEMS AND METHODS FOR MONITORING TIME BASED PHOTO ACTIVE AGENT DELIVERY OR PHOTO ACTIVE MARKER PRESENCE - Devices and approaches for monitoring time based photo active agent delivery or photo active marker presence in an eye. A monitoring system is provided for measuring the presence of a photo active marker by illuminating the eye so as to excite the photo-active marker and then observing characteristic emission from the photo active marker. Example systems incorporate Scheimpflug optical systems or slit lamp optical systems to observe cross sectional images of an eye to monitor instantaneous distribution, diffusion pattern, and rate of uptake of a photo active agent applied to an eye. Systems and methods further allow for utilizing the monitored distribution of photo active agent in the eye as feedback for a cross-linking system. | 09-24-2015 |
Patent application number | Description | Published |
20090220092 | Probabilistic Mitigation of Control Channel Jamming Via Random Key Distribution in Wireless Communications Networks - An embodiment includes methods that generate random cryptographic keys, and send the keys to client devices. These methods may send representations of channel locator functions to the client devices, which may use the channel locator functions to locate particular control channels, using the random keys as input. | 09-03-2009 |
20100161999 | Scalable RFID systems: a privacy preserving protocol with constant-time identification - A protocol with constant-time complexity solves the problem of private identification of tags in low-cost, large-scale radio frequency identification (RFID) systems—assuming that an adversary has complete control over the communication channel. Each RFID tag has an internal counter, c, and is preloaded with a unique pseudonym, ψ, and a secret key, k. A RFID reader attempting to identify and authenticate a tag within its range generates and transmits a random nonce to the RFID tag, which returns a first hash of its current pseudonym and counter, and a second hash that is a function of the secret key. The reader uses the returned data to identify the RFID tag and its secret key by reference to a database and returns other hash values that authenticate the reader to the RFID tag. The most expensive operation that RFID tags are required to perform is a hash function. | 06-24-2010 |
20110057830 | METHOD FOR VALIDATING AIRCRAFT TRAFFIC CONTROL DATA - A method for group travel and group communications, wherein the group travel parameters and group communications are combined for verifying and validating ADS-B data on aircraft. The full connectivity within a navigating group of aircraft allows all the group members to communicate spatial/temporal observations and collaborate in group protocols, e.g., majority voting protocol, which can determine if a received ADS-B message is corrupted or from a false target aircraft. Well-established distributed protocols based on group communications and majority voting exist for (1) detecting compromised members, i.e., false target aircraft, and (2) verifying message integrity, i.e., ADS-B data, given a minority fraction of members are compromised/colluding. Such protocols can be based on IP multicast communications over the IP networking data links available on the aircraft. | 03-10-2011 |
20110248878 | METHOD FOR PROTECTING LOCATION PRIVACY OF AIR TRAFFIC COMMUNICATIONS - Methods of protecting location privacy of air traffic communications from unauthorized monitoring of aircraft locations in an uncontrolled airspace include designating a bounded region of uncontrolled airspace; ceasing transmission of a traffic beacon by each aircraft of a plurality of aircraft upon the aircraft entering the bounded region; and updating a unique identifier associated with each of the aircraft while the aircraft is traversing the bounded region. | 10-13-2011 |
20130145169 | EFFICIENT AUTHENTICATION FOR MOBILE AND PERVASIVE COMPUTING - A method and system for authenticating messages is provided. A message authentication system generates an encrypted message by encrypting with a key a combination of a message and a nonce. The message authentication system generates a message authentication code based on a combination of the message and the nonce modulo a divisor. To decrypt and authenticate the message, the message authentication system generates a decrypted message by decrypting with the key the encrypted message and extracts the message and the nonce. The message authentication system then regenerates a message authentication code based on a combination of the extracted message and the extracted nonce modulo the divisor. The message authentication system then determines whether the regenerated message authentication code matches the original message authentication code. If the codes match, then the integrity and authenticity of the message are verified. | 06-06-2013 |
20130207780 | SCALABLE RFID SYSTEMS: A PRIVACY-PRESERVING PROTOCOL WITH CONSTANT-TIME IDENTIFICATION - A protocol with constant-time complexity solves the problem of private identification of tags in low-cost, large-scale radio frequency identification (RFID) systems—assuming that an adversary has complete control over the communication channel. Each RFID tag has an internal counter, c, and is preloaded with a unique pseudonym, ψ, and a secret key, k. A RFID reader attempting to identify and authenticate a tag within its range generates and transmits a random nonce to the RFID tag, which returns a first hash of its current pseudonym and counter, and a second hash that is a function of the secret key. The reader uses the returned data to identify the RFID tag and its secret key by reference to a database and returns other hash values that authenticate the reader to the RFID tag. The most expensive operation that RFID tags are required to perform is a hash function. | 08-15-2013 |
20130317377 | Generative Model-Driven Resource-Efficient Monitoring in Body Sensor Networks - Body sensor networks (BSNs) and methods for monitoring an electrocardiogram using such BSNs include a base station that generates an ECG model and an output ECG signal for displaying on a display device, and a sensor platform in electrical communication with the base station. The sensor platform may be configured to receive a sensed ECG signal from one or more sensors, receive an instance of the ECG model, and produce a model ECG signal from the instance. The sensor platform compares the sensed ECG signal to the model ECG signal and, if a deviation of the sensed ECG signal from the model ECG signal exceeds a threshold, transmits deviation data describing the deviation to the base station module. The sensor platform module does not transmit any data to the base station if there is no such deviation. | 11-28-2013 |
20130343360 | Optimization of Polling Protocols in Sensor Networks - A communication-management method involves a recurring polling scheme, wherein network nodes are polled by a base station according to optimized and/or user-preferred polling intervals assigned to each network node. The polling interval assigned to a given node may be optimized to minimize and/or achieve user-preferred thresholds for energy consumption and latency associated with each network node in the sensor network. Optimized and/or user-preferred polling intervals may be constrained in accordance with various network performance considerations, for example, a recommended update interval for each network node, characteristics of the network nodes themselves, the duration of the timselots at which the network nodes are polled, and/or other network performance considerations. | 12-26-2013 |
20140096256 | JOINT PERFORMANCE-VULNERABILITY METRIC FRAMEWORK FOR DESIGNING AD HOC ROUTING PROTOCOLS - A system for routing data along a path that is both efficient and secure is provided. A performance and vulnerability routing system selects a path for routing using a joint metric for a link in a network of nodes. The system calculates the joint metric based on a combination of a performance metric and a vulnerability metric of a link. The performance metric for a link indicates the cost of transmitting data over the link, and the vulnerability metric for the link indicates the security of data that is transmitted over the link. The system combines the performance metric and the vulnerability metric to generate the joint metric, which indicates a joint cost of transmitting data. The system then selects paths for transmitting data that tend to minimize the sum of the joint costs of the links along the paths. | 04-03-2014 |