Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Qing Li

Qing Li, Princeton Junction, NJ US

Patent application numberDescriptionPublished
20080225981SYSTEM AND METHOD FOR SYNCHRONIZATION, POWER CONTROL, CALIBRATION, AND MODULATION IN COMMUNICATION TRANSMITTERS - A system is provided for processing a communication signal including a baseband amplitude component and a baseband phase component. The system includes an amplitude predictor configured for closed-loop pre-distortion of a baseband amplitude component, an amplitude lookup table configured for open-loop pre-distortion of the baseband amplitude component, and an amplitude interpolator configured to build up the amplitude lookup table during a closed-loop calibration period. The system also includes a phase predictor configured for closed-loop pre-distortion of a baseband phase component, a phase lookup table configured for open-loop pre-distortion of the baseband phase component, and a phase interpolator configured to build up the phase lookup table during a closed-loop calibration period.09-18-2008
20080225984Digital Polar Transmitter - A digital polar transmitter includes a baseband processor configured to receive an input signal and to convert the input signal into a baseband amplitude component and a baseband phase component. The transmitter also includes a phase modulator in communication with the baseband processor. The phase modulator is configured to modulate an RF carrier signal based on the phase component and to generate a phase-modulated RF carrier signal. A power amplifier is provided in communication with the baseband processor and the phase modulator. The power amplifier is configured to amplify the phase-modulated RF carrier signal based on the baseband amplitude component and to generate an amplified RF signal. The transmitter also includes a digital feedback loop in communication with the power amplifier and the baseband processor. The digital feedback loop is configured to detect the amplified RF signal and to provide a digital amplitude feedback signal and a detected phase feedback signal to the baseband processor.09-18-2008
20090251195CALIBRATION TECHNIQUES FOR NON-LINEAR DEVICES - An apparatus may include a non-linear module, a control module, and a calibration module. The non-linear module produces an output signal from an input signal. The control module selects, upon an occurrence of a calibration condition, a calibration operation from two or more calibration operations. Each of the two or more calibration operations may generate one or more correction values for the non-linear module. Further, each of the calibration operations produces the input signal from a pre-input signal. This selected calibration operation is performed by the calibration module. The two or more calibration operations include a first calibration operation and a second calibration operation. The first calibration operation produces the input signal from the pre-input signal according to a predictive technique. The second calibration operation produces the input signal from the pre-input signal according to a non-predictive technique.10-08-2009
20110085619SYSTEM AND METHOD FOR SYNCHRONIZATION, POWER CONTROL, CALIBRATION, AND MODULATION IN COMMUNICATION TRANSMITTERS - A system is provided for processing a communication signal including a baseband amplitude component and a baseband phase component. The system includes an amplitude predictor configured for closed-loop pre-distortion of a baseband amplitude component, an amplitude lookup table configured for open-loop pre-distortion of the baseband amplitude component, and an amplitude interpolator configured to build up the amplitude lookup table during a closed-loop calibration period. The system also includes a phase predictor configured for closed-loop pre-distortion of a baseband phase component, a phase lookup table configured for open-loop pre-distortion of the baseband phase component, and a phase interpolator configured to build up the phase lookup table during a closed-loop calibration period.04-14-2011
20130279373METHOD AND APPARATUS FOR PROVIDING AN INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM TRIGGERING SERVICE - A method and apparatus are described for providing triggering services over multiple access networks. A triggering service server (TSS) architecture includes a triggering identity function (TIF) which maintains a database of device and application identifier mappings across multiple access networks, triggering capabilities and triggering preferences. The TSS also includes a triggering decision function (TDF) that uses information from the TIF and determines how triggers should be performed towards a device and/or an application hosted on a particular device. The TSS also includes triggering gateways (T-GWs) that perform triggering in different domains. A “not-registered-triggerable” state may be used to indicate whether an entity, such as a device, application or user can receive triggers although it is not registered in a specific access network. Methods and apparatus are also described for implementing various unassisted triggering and assisted triggering procedures using wireless transmit/receive units (WTRUs), application servers (ASs) and service capability servers (SCSs).10-24-2013
20140067902METHOD AND APPARATUS FOR USING MULTIPLE UNIVERSAL RESOURCE IDENTIFIERS IN M2M COMMUNICATIONS - A method and apparatus may use multiple URIs (MU) in a single request message for machine-to-machine (M2M) communication networks. Multiple single URI (SU)-type request messages may be received from an application client (e.g. a constrained application protocol (CoAP)/hypertext transfer protocol (HTTP) client) at a (CoAP/HTTP) intermediary node. The multiple SU-type request messages may be aggregated into a single MU-type request message at the intermediary node, and the single MU-type request message may be transmitted to a (CoAP/HTTP) server. A multiple value (MV)-type response message may be received from the (CoAP/HTTP) server. The MV-type response message may be deaggregated into multiple single value (SV)-type response messages. The multiple SV-type response messages may be transmitted to the (CoAP/HTTP) client.03-06-2014
20140379804CONTEXT MANAGEMENT - Systems, methods, and apparatus embodiments are described herein for context information management at the medium access control layer. In one embodiment, a system comprises a plurality of peers which communicate via peer-to-peer communications. In the system, context information may be exchanged at the MAC layer. Examples of context information include, without limitation, location information, mobility information, device capability, user information, an application category, multi-hop information, a channel condition, application information, association identifiers, and device information. Each of the plurality of peers may include a context manager that resides on each peer device. For example, a first context manager that resides on a first peer of the plurality of peers may exchange context information with a second context manager that resides on a second peer of the plurality of peers. In another example embodiment, the first peer, and in particular the first context manager that resides on the first peer, can retrieve the context information from a layer that is different than the MAC layer.12-25-2014
20150016359PEER-TO-PEER COMMUNICATIONS ENHANCEMENTS - An enhanced general superframe structure for peer-to-peer communications in proximity is disclosed, which may be implemented in connection with a variety of different channel access techniques. Additionally, methods are disclosed for enabling multiple P2PNWs in proximity operating under different control schemes, including virtually centralized control, distributed control, and hybrid control, to co-exist. A hyperframe structure is also disclosed, which may comprise two or more superframes, each superframe corresponding to a different one of the corresponding P2PNW control schemes.01-15-2015
20150019717CONTEXT-AWARE PROXIMITY SERVICES - Disclosed herein are a variety of systems, operations, MAC primitives, and procedures for context-aware Peer-to-Peer communications and multi-application Peer-to-Peer communications. An example system for a context-aware Peer-to-Peer communications system may include a physical and Medium Access Control (PHY/MAC) layer and an upper layer above the PHY/MAC layer. The PHY/MAC layer may include at least one of a discovery function, an association function, a data transceiving function, a channel management function, a general scan function, a synchronization function, a power control function, or management and reporting function. The upper layer may be one of a service layer or an application layer.01-15-2015
20150055640METHOD AND APPARATUS FOR SUPPORTING MACHINE-TO-MACHINE COMMUNICATIONS - A method and apparatus for distributed services and data in a machine-to-machine (M2M) communication network are disclosed. A network server, an M2M gateway, and M2M devices include an M2M service capability layer for supporting M2M service capabilities, respectively. Reference points may be defined for interactions between network service capability layers, between gateway service capability layers, between a gateway service capability layer and a device service capability layer of an M2M device, between M2M device applications, and/or between a network, gateway, or device service capability layer and an M2M application. The network server may be split into a control server and a data server at a service capability layer to provide service capabilities for control functions and service capabilities for data functions, respectively. The data server may be configured to interact with another data server to push or pull data or resources either directly or indirectly via the control server.02-26-2015
20150127733CONTEXT-AWARE PEER-TO-PEER COMMUNICATION - Methods and systems are disclosed for determining context information for one or more peers to be used in a peer discovery and/or peer association process(es) and/or to otherwise facilitate P2P proximity communications. For example, a method for determining peer context information may include receiving a context-aware identifier (CAID). The CAID may include one or more items of context information associated with the peer in addition to an indication of an identity of the peer. A first portion of the CAID may be decoded to determine a first item of context information associated with the peer. The first portion of the CAID may be decodable without having to process a payload portion of the message. It may be determined whether to continue processing one or more of the CAID or the message based on the first item of context information. The CAID may be used in discovery and/or association procedure(s).05-07-2015
20150263833Multi-Hop Peer-To-Peer Communications - Frame structures may be designed and channels may be allocated in a manner to support multi-hop for fully distributed and infrastructure-less peer-to-peer communications in proximity. Frame structures may have a dedicated multi-hop period near the end of a superframe.09-17-2015
20150263880CROSS-LAYER CONTEXT MANAGEMENT - In peer-to-peer (P2P) communications, it has been recognized herein that various context information needs to be exchanged between peer devices (PDs) or between different layers/protocols within a peer device (PD). Various embodiments described herein address how to design effective management functions, services, and primitives for context management across and/or within different protocol layers to enable context-aware peer-to-peer communications in proximity. This disclosure proposes multiple embodiments for cross-layer context management in context-aware peer-to-peer communication in proximity. For example, embodiments described herein provide context management to efficiently enable context-aware P2P communications, such as, for example, social networks.09-17-2015
20150282177METHOD AND APPARATUS FOR NEGOTIATING "KEEP-ALIVE" MESSAGE FREQUENCIES OF APPLICATIONS RUNNING ON A MOBILE STATION - A method and apparatus are described for negotiating “keep-alive” message frequencies of applications running on a wireless transmit/receive unit (WTRU). A node may include a negotiation and synchronization function (NSF) configured to collect information including frequencies of keep-alive messages required by application servers for different applications running on the WTRU, and send a keep-alive message frequency negotiation request message to the application servers to negotiate for a more proper frequency for each application on behalf of the WTRU. The node may further include a buffering and caching function (BCF) configured to cache and buffer application specific attributes including an indication of whether each of the applications needs to send periodic keep-alive messages to an associated application server. The node may be a packet data network gateway, a negotiation and caching gateway, or a serving gateway.10-01-2015
20150312700DEVICE INITIATED TRIGGERS - Embodiments contemplate wireless communication that may include sending machine type communication (MTC) application data from a services capability server (SCS) to an MTC user equipment (UE/WTRU) using a device trigger. The device trigger may be used to instruct an MTC device application to initiate communications with an SCS. Embodiments also contemplate that a first device trigger (DT) request may be received from a first wireless transmit/receive unit (WTRU) and a machine-type-communication inter-working function (MTC-IWF) may be determined in response to the first DT request. A second DT request may be sent to the MTC-IWF; and a first DT response may be received from the MTC-IWF. The first DT response may include a first information regarding a second WTRU.10-29-2015
20150312953Reliable Multicast/Broadcast for P2P Communications - Methods and apparatus may be used to provide reliable multicast or broadcast for peer-to-peer (P2P) communications. A wireless transmit/receive unit (WTRU) may receive a medium access control (MAC) data frame. The MAC data frame may indicate a flexible acknowledgement (ACK) type (e.g., a subset of peers, a single peer, location based, context based, and/or packet type based). The MAC data frame may indicate an ACK sequence. The ACK sequence may indicate an ACK transmission sequence among peers. The WTRU may determine whether to send an ACK message based on the flexible ACK type and/or the ACK sequence. The WTRU may receive an ACK message from a peer. The WTRU may send the ACK message when it is determined that the ACK message should be sent.10-29-2015
20150319759APPARATUS AND METHOD OF USING TIME REUSE FRAME STRUCTURES FOR MULTI-HOP COMMUNICATIONS - A system and method of using time reuse frame structures for improving multi-hop communications are disclosed. Namely, the system is networked and includes a superframe structure for multi-hop communication including tiers. The system also includes a computer-implemented device located in an initiator subframe of a first tier frame of the superframe. The device including a non-transitory memory including executable instructions for multi-hop communication and a processor operably coupled thereto for executing the multi-hop communication. The system also includes a second tier frame of the superframe including at least two hopper subframes. Each of the at least two hopper subframes including a contention access period and a contention free period.11-05-2015
20160044621METHOD AND APPARATUS FOR CONTEXT-AWARE SYNCHRONIZATION FOR PEER-TO-PEER COMMUNICATION - Apparatuses, computer readable media, and methods are disclosed for context aware synchronization for peer-to-peer communication. A method may include extracting from a super beacon synchronization information. The method may further include synchronizing with a beacon of an application based on the synchronization information. Another method may include extracting synchronization information from a received beacon, if the received beacon is for a first application. The method may further include if the received beacon is not for a first application, then extracting common beacon synchronization information from the received beacon, scanning for the common beacon based on the extracted common beacon synchronization information, receiving the common beacon, and extracting common channel synchronization information from the common beacon. Another method may include transmitting synchronization information in a data packet to a WTRU, if there is data to be transmitted, and otherwise transmitting synchronization information in a dummy packet to the second WTRU.02-11-2016

Patent applications by Qing Li, Princeton Junction, NJ US

Qing Li, Niskayuna, NY US

Patent application numberDescriptionPublished
20110074944SYSTEM AND METHODS FOR GENERATING A BRIGHTFIELD IMAGE USING FLUORESCENT IMAGES - A method for generating a brightfield type image, which resembles a brightfield staining protocol of a biological sample, using fluorescent images is provided. The steps comprise acquiring two or more fluorescent images of a fixed area on a biological sample, mapping said fluorescent image into a brightfield color space, and generating a bright field image. Also provided is an image analysis system for generating a brightfield type image of a biological sample using fluorescent images.03-31-2011
20140185905ANALYZING THE EXPRESSION OF BIOMARKERS IN CELLS WITH CLUSTERS - A data set of cell profile data is stored. The cell profile data includes multiplexed biometric image data describing the expression of a plurality of biomarkers. Cell profile data is generated from tissue samples drawn from a cohort of patients having an assessment related to the commonality. Multiple sets of clusters of similar cells are generated from the data set; the proportion of cells in each cluster is examined for an association with a diagnosis, a prognosis, or a response; and a predictive set of clusters is selected based on model performance. One predictive set of clusters is selected based on a comparison of the performance of at least one model of the plurality of sets of clusters. Display techniques that aid in understanding the characteristics of a cluster are disclosed.07-03-2014
20140314299System and Method for Multiplexed Biomarker Quantitation Using Single Cell Segmentation on Sequentially Stained Tissue - Improved systems and methods for the analysis of digital images are provided. More particularly, the present disclosure provides for improved systems and methods for the analysis of digital images of biological tissue samples. Exemplary embodiments provide for: i) segmenting, ii) grouping, and iii) quantifying molecular protein profiles of individual cells in terms of sub cellular compartments (nuclei, membrane, and cytoplasm). The systems and methods of the present disclosure advantageously perform tissue segmentation at the sub-cellular level to facilitate analyzing, grouping and quantifying protein expression profiles of tissue in tissue sections globally and/or locally. Performing local-global tissue analysis and protein quantification advantageously enables correlation of spatial and molecular configuration of cells with molecular information of different types of cancer.10-23-2014
20150133321QUANTITATIVE IN SITU CHARACTERIZATION OF BIOLOGICAL SAMPLES - The present disclosure relates to characterization of biological samples. By way of example, a biological sample may be contacted with a plurality of probes specific for targets in the sample, such as probes for immune markers and segmenting probes. Acquired image data of the sample may be used to segment the images into epithelial and stromal regions to characterize individual cells in the sample based on the binding of the probes. Further, the biological sample may be characterized by a distribution, location, and type of a plurality of the characterized cells.05-14-2015
20150285720METHOD OF FORMALIN BASED TISSUE FIXATION - Disclosed are novel cold fixation methods and reagents comprising contacting a biological sample with a reagent for fixation at a temperature of less than 20° C. where the reagent comprises an aqueous buffer, a water soluble alkylnitrile, C2 to C6 alkyl ester, or combination thereof, and formaldehyde to the aqueous buffer solution and removing the biological sample from contact with the reagent.10-08-2015

Patent applications by Qing Li, Niskayuna, NY US

Qing Li, San Jose, CA US

Patent application numberDescriptionPublished
20090141738Reservation-Based Distributed Collision Avoidance Channel Access For Wireless Local Area Networks - Each station on a wireless network comprises memory indicating whether it is in an IN or an OUT state; a reservation store storing reserved time slots of other stations on the network; a backoff counter (BC) value determination engine for selecting an unreserved time slot in the reservation store as the next time slot for a next transmission if in the IN state, and for determining the next time slot according to a predetermined algorithm if in the OUT state; and a medium access engine for initiating a current transmission during a previously reserved time slot and after a first idle interval if in the IN state, and for initiating the current transmission during a previously determined time slot and after a second idle interval shorter than the first idle interval if in the OUT state, the current transmission identifying the next time slot.06-04-2009
20090175251Multiple Wireless Local Area Networks For Reliable Video Streaming - A media center system comprises a first wireless controller operative to communicate with a first set of devices on a first WLAN using a first wireless standard; a first network processor coupled to the first wireless controller and operative to establish wireless communication over a first channel with the first set of devices on the first WLAN; a second wireless controller operative to communicate with a second set of devices on a second WLAN using a second wireless standard, the second wireless controller substantially dedicated for multimedia content delivery; and a second network processor coupled to the second wireless controller and operative to establish wireless communication over a second channel with the second set of devices on the second WLAN, the second channel being different than the first channel.07-09-2009
20110062563NON-VOLATILE MEMORY WITH REDUCED MOBILE ION DIFFUSION - Mobile ion diffusion causes a shift in the threshold voltage of non-volatile storage elements in a memory chip, such as during an assembly process of the memory chip. To reduce or avoid such shifts, a coating can be applied to a printed circuit board substrate or a leader frame to which the memory chip is surface mounted. An acrylic resin coating having a thickness of about 10 μm may be used. A memory chip is attached to the coating using an adhesive film. Stacked chips may be used as well. Another approach provides metal barrier traces over copper traces of the printed circuit board, within a solder mask layer. The metal barrier traces are fabricated in the same pattern as the copper traces but are wider so that they at least partially envelop and surround the copper traces. Corresponding apparatuses and fabrication processes are provided.03-17-2011
20110075482MAINTAINING INTEGRITY OF PRELOADED CONTENT IN NON-VOLATILE MEMORY DURING SURFACE MOUNTING - A non-volatile memory chip package is prepared for surface mounting to a substrate in a solder reflow process by programming erased blocks to higher threshold voltage levels, to improve data retention for blocks which are preloaded with content, such as by an electronic device manufacturer. Following the surface mounting, the previously-erased blocks are returned to the erased state. The threshold voltage of storage elements of the preloaded blocks can change during the surface mounting process due to a global charge effect phenomenon. The effect is most prominent for higher state storage elements which are surrounded by erased blocks, in a chip for which the wafer backside was thinned and polished. The erased blocks can be programmed using a single program pulse without performing a verify operation, as a wide threshold voltage distribution is acceptable.03-31-2011
20140063502Image Intensifier Tube Design for Aberration Correction and Ion Damage Reduction - The disclosure is directed to image intensifier tube designs for field curvature aberration correction and ion damage reduction. In some embodiments, electrodes defining an acceleration path from a photocathode to a scintillating screen are configured to provide higher acceleration for off-axis electrons along at least a portion of the acceleration path. Off-axis electrons and on-axis electrons are accordingly focused on the scintillating screen with substantial uniformity to prevent or reduce field curvature aberration. In some embodiments, the electrodes are configured to generate a repulsive electric field near the scintillating screen to prevent secondary electrons emitted or deflected by the scintillating screen from flowing towards the photocathode and forming damaging ions.03-06-2014
20160025645System and Method for Simultaneous Dark Field and Phase Contrast Inspection - An inspection apparatus for simultaneous dark field (DF) and differential interference contrast (DIC) inspection includes an illumination source and a sample stage configured to secure a sample. The inspection apparatus includes a first sensor, a second sensor and an optical sub-system. The optical sub-system includes an objective, one or more optical elements arranged to direct, through the objective, illumination from the one or more illumination sources to a surface of the sample. The objective is configured to collect a signal from the surface of the sample, wherein the collected signal includes a scattering-based signal and/or a phase-based signal from the sample. The inspection apparatus includes one or more separation optical elements arranged to spatially separate the collected signal into a DF signal and a DIC signal by directing the DF signal and the DIC signal along a DF path and DIC path respectively.01-28-2016

Patent applications by Qing Li, San Jose, CA US

Qing Li, Broomfield, CO US

Patent application numberDescriptionPublished
20090282159CONTENT DELIVERY IN A NETWORK - An embodiment of a method includes receiving a request for the content from a requester, retrieving the content from a media access server, and while retrieving the content from the media access server, simultaneously streaming the content to the requester. An embodiment of a system includes an edge server having a media streaming server configured to receive the request and stream the specified content to a requester from a local memory, and a stream caching server configured to retrieve the requested content from a media access server while the media streaming server is streaming at least a specified portion of the content, and wherein the stream caching server is further configured to store the retrieved content in a local cache and notify the media streaming server that content is stored in local cache.11-12-2009
20100325303CONTENT DELIVERY IN A NETWORK - An embodiment of a method includes receiving a request for the content from a requester, retrieving the content from a media access server, and while retrieving the content from the media access server, simultaneously streaming the content to the requester. An embodiment of a system includes an edge server having a media streaming server configured to receive the request and stream the specified content to a requester from a local memory, and a stream caching server configured to retrieve the requested content from a media access server while the media streaming server is streaming at least a specified portion of the content, and wherein the stream caching server is further configured to store the retrieved content in a local cache and notify the media streaming server that content is stored in local cache.12-23-2010

Qing Li, Vancouver CA

Patent application numberDescriptionPublished
20100318891PEEKING INTO THE Z-DIMENSIONAL DRAWER - Described herein are methods and systems for analyzing multidimensional data that use tangential exploration of data via a third or Z-dimension to the current two-dimensional view. The tangential exploration allows higher dimensionality to be explored without causing visual clutter.12-16-2010

Qing Li, Blacksburg, VA US

Patent application numberDescriptionPublished
20100044726Method for Packaging White-Light LED and LED Device Produced Thereby - This invention relates to light-emitting diodes or devices (LEDs), such as LED lighting assemblies and methods of manufacturing them. More particularly, this invention relates to white-light LED lighting assemblies, devices, and components, methods for packaging white-light LEDs, and LED devices produced thereby. A method for packaging a white-light LED is provided comprising providing a substrate with a resin injection hole and a vent hole, a packaging housing, at least one LED chip, a supporting frame and resin, installing the LED chip on the substrate, coating an inner wall of the packaging housing with fluorescent powder, connecting the packaging housing to the substrate by way of the supporting frame, so that a cavity is formed therebetween, injecting the resin into the cavity between the packaging housing and the substrate by way of the resin injection hole so that gas within the cavity is discharged by way of the vent hole, and curing the resin. LED assemblies made according to this method are also provided.02-25-2010
20100302789LED Light Source Module and Method for Producing the Same - Provided is an LED light source module, comprising a PCB board with electrically conductive pathways, for example wire lines, and at least one through hole; at least one semiconductor light-emitting device; electronic components forming a driving circuit; a metal housing with a groove; and at least one heat sink; wherein the semiconductor light-emitting device is electrically connected to the PCB board, electronic components are disposed on the PCB board, the PCB board is disposed in the groove of the metal housing, the heat sink is disposed in the through hole and connected to the PCB board, the semiconductor light-emitting device is disposed on the upper surface of the heat sink and the bottom of the heat sink is welded with the metal housing.12-02-2010

Qing Li, San Diego, CA US

Patent application numberDescriptionPublished
20090087866HUMAN T2R RECEPTORS FOR RANITIDINE, STRYCHNINE AND DENATONIUM AND RELATED ASSAYS FOR IDENTIFYING HUMAN BITTER TASTE MODULATORS - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter ligands, i.e., acetaminophen, ranitidine, strychnine and denatonium. The present invention further relates to the use of these receptors in assays for identifying ligands that modulate the activation of these taste receptors and which may be used as additives in foods, beverages and medicinals for modifying (blocking) T2R-associated bitter taste.04-02-2009
20090274632Identification of human T2R receptors that respond to bitter compounds that elicit the bitter taste in compositions, and the use thereof in assays to identify compounds that inhibit (block) bitter taste in composition and use thereof - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds present in, e.g., coffee. Also, the invention relates to the discovery of specific compounds and compositions containing that function as bitter taste blockers and the use thereof as bitter taste blockers or flavor modulators in, e.g., coffee and coffee flavored foods, beverages and medicaments. Also, the present invention relates to the discovery of a compound that antagonizes numerous different human T2Rs and the use thereof in assays and as a bitter taste blocker in compositions for ingestion by humans and animals.11-05-2009
20100304402CHIMERIC HUMAN SWEET-UMAMI AND UMAMI-SWEET TASTE RECEPTORS - This invention relates to chimeric taste receptors comprising the extracellular portion of one T12-02-2010
20110136112IDENTIFICATION OF BITTER LIGANDS THAT SPECIFICALLY ACTIVATE HUMAN T2R RECEPTORS AND RELATED ASSAYS FOR IDENTIFYING HUMAN BITTER TASTE MODULATORS - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds. Also, the invention relates to the discovery of specific hT2R9 alleles and their disparate activity in functional assays with the same biter ligands. The invention further relates to the use of these T2R receptors in assays for identifying ligands that modulate the activation of these taste receptors by specific bitter ligands and related compounds. These compounds may be used as additives and/or removed from foods, beverages, cosmetics and medicinals in order to modify (block) T2R-associated bitter taste. Also T2R ligands may be used as therapeutics to treat and modulate T2R associated gastrointestinal and metabolic functions as well as treat gastrointestinal and metabolic diseases such as eating disorders, food sensing, food absorption, obesity, diabetes, Crohn's diseae, celiac disease, et al.06-09-2011
20110207937Compounds that inhibit (block) bitter taste in composition and methods of making same - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds present in, e.g., coffee. Also, the invention relates to the discovery of specific compounds and compositions containing that function as bitter taste blockers and the use thereof as bitter taste blockers or flavor modulators in, e.g., coffee and coffee flavored foods, beverages and medicaments. Also, the present invention relates to the discovery of a compound that antagonizes numerous different human T2Rs and the use thereof in assays and as a bitter taste blocker in compositions for ingestion by humans and animals.08-25-2011
20110223618ASSAYS USING CHIMERIC T1R POLYPEPTIDE - This invention relates to chimeric taste receptors comprising the extracellular portion of one T1R or a variant or fragment thereof, either T1R1 or T1R2, and the transmembrane portion of another T1R or a variant or fragment thereof, either T1R1 or T1R2, preferably associated with a T1R3 polypeptide and a suitable G protein. These chimeric taste receptors and cells which express such chimeric taste receptors are useful in assays for identifying sweet and umami ligands as well in assays for identifying sweet and umami enhancers. Additionally, these chimeric taste receptors and cells which express same can be used to map and determine where specific sweet and umami ligands interact with their respective receptors and to elucidate the mechanism of receptor activation.09-15-2011
20110281749HUMAN T2R RECEPTORS FOR ACETAMINOPHEN, RANITIDINE, STRYCHNINE AND DENATONIUM AND RELATED ASSAYS FOR IDENTIFYING HUMAN BITTER TASTE MODULATORS - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter ligands, i.e., acetaminophen, ranitidine, strychnine and denatonium. The present invention further relates to the use of these receptors in assays for identifying ligands that modulate the activation of these taste receptors and which may be used as additives in foods, beverages and medicinals for modifying (blocking) T2R-associated bitter taste.11-17-2011
20120015378IDENTIFICATION OF BITTER LIGANDS THAT SPECIFICALLY ACTIVATE HUMAN T2R RECEPTORS AND RELATED ASSAYS FOR IDENTIFYING HUMAN BITTER TASTE MODULATORS - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds. The invention further relates to the use of these receptors in assays for identifying ligands that modulate the activation of these taste receptors by these bitter ligands and related compounds and which may be used as additives and/or removed from foods, beverages, cosmetics and medicinals in order to modify (block) T2R-associated bitter taste.01-19-2012
20120100832Authentication of access terminal identities in roaming networks - Various methods of authenticating an access terminal are presented in the case where the access terminal is roaming within a visited network. An access terminal sends a device authentication message to a visited validation server or a home validation server, where the device authentication message includes an access terminal identifier and authentication data generated at least in part using the validation key. In some embodiments, the authentication data may include a digital signature by a validation key associated with the access terminal identifier. Such a signature can be authenticated by either the visited validation server or the home validation server. In other embodiments, the authentication data may include an access terminal authentication token sent to the visited validation server. The visited validation server can authenticate the device authentication message by comparing the access terminal authentication token with an access terminal authentication token obtained from the home validation server.04-26-2012
20130007857Anti-shoulder surfing authentication method - Disclosed is a client device that includes: a user interface to receive a username and a first password associated with a server site visited by a user; a random number generator to generate a random number; and a processor to generate a second password by implementing a function based upon the first password and the random number and to command storage of the random number, the username, and the associated server site. If the user attempts to log onto the server site by inputting their username and the second password, the processor extracts the random number associated with the username and the server site and implements the function based upon the second password and the random number to generate the first password which replaces the second password entered by the user and is submitted to the server site.01-03-2013
20130132734Computing device integrity protection - A method of operating a computer system includes: obtaining, at the computer system, verification-input information associated with each of multiple hardware components of the computer system; cryptographically processing, at the computer system, the verification-input information to obtain a cryptographic result; and determining, at the computer system, whether to allow or inhibit, depending upon a comparison of the cryptographic result with a verification value, further operation of at least one of the hardware components.05-23-2013
20140302528IDENTIFICATION OF BITTER LIGANDS THAT SPECIFICALLY ACTIVATE HUMAN T2R RECEPTORS AND RELATED ASSAYS FOR IDENTIFYING HUMAN BITTER TASTE MODULATORS - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds. Also, the invention relates to the discovery of specific hT2R9 alleles and their disparate activity in functional assays with the same biter ligands. The invention further relates to the use of these T2R receptors in assays for identifying ligands that modulate the activation of these taste receptors by specific bitter ligands and related compounds. These compounds may be used as additives and/or removed from foods, beverages, cosmetics and medicinals in order to modify (block) T2R-associated bitter taste. Also T2R ligands may be used as therapeutics to treat and modulate T2R associated gastrointestinal and metabolic functions as well as treat gastrointestinal and metabolic diseases such as eating disorders, food sensing, food absorption, obesity, diabetes, Crohn's disease, celiac disease, et al.10-09-2014

Patent applications by Qing Li, San Diego, CA US

Qing Li, Cupertino, CA US

Patent application numberDescriptionPublished
20080244085System and Method of Delaying Connection Acceptance to Support Connection Request Processing at Layer-7 - Techniques for suspending a TCP three-way handshake, offering the partial connection to an L-7 application or module at a proxy to perform further processing, and then allowing the L-7 application or module to instruct the proxy's network kernel to perform various actions are described. In various embodiments these actions may include: silently dropping the connection, verbosely rejecting the connection, accepting and processing the connection locally, or forwarding the connection to another proxy or the original destination. This additional functionality is provided, in one particular embodiment, via extensions to the POSIX socket API.10-02-2008
20090040926System and Method of Traffic Inspection and Stateful Connection Forwarding Among Geographically Dispersed Network Appliances Organized as Clusters - A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.02-12-2009
20090046717METHODS TO IMPROVE TRANSMISSION CONTROL PROTOCOL (TCP) PERFORMANCE OVER LARGE BANDWIDTH LONG DELAY LINKS - TCP options are provided to address TCP performance problems during data exchanges over large bandwidth long delay communication links. These options address problems such as in sequence tail drops, inaccurate estimations of available bandwidth over a communication link, and slow responses to dynamic changes in link conditions.02-19-2009
20100027544LAYER-2 PACKET RETURN IN PROXY-ROUTER COMMUNICATION PROTOCOL ENVIRONMENTS - A Layer 2 packet return mechanism in a proxy, such as a web cache, operatively associated with a redirecting router. In a particular embodiment, the present invention provides a Layer 2 packet return mechanism in a Web Cache Communication Protocol (WCCP) network environment. In one embodiment, the present invention provides an efficient mechanism allowing a proxy or web cache to recognize WCCP redirected packets, forwarded using Layer 2 forwarding mechanisms, and subsequently to return unprocessed packets to the original forwarding WCCP router using a Layer 2 packet return mechanism.02-04-2010
20100118869Facilitating Transition of Network Operations from IP Version 4 to IP Version 6 - Methods, apparatuses and systems directed to facilitating transitions from IPv4 to IPv6 networks. In particular implementations, the invention facilitates or enables accessibility of network application services between IPv4 and IPv6 hosts, or traversal of network paths including both IPv6 or IPv4 domains. Particular implementations of the invention are directed to selective mapping of network layer addresses between IPv6 and IPv4 protocols and Domain Name System records under one or more policy controls. Other implementations of the invention are directed to a proxy-to-proxy based tunnel architecture allowing hosts implementing a first network layer protocol, such as IPv4, to traverse a network implementing a second network layer protocol, such as IPv6.05-13-2010
20100281168Assymmetric Traffic Flow Detection - Methods, apparatuses and systems directed to detecting, and in some implementations, responding to, asymmetric routing in network deployments. In a particular embodiment, a first process detects asymmetric routing at connection initiation, while the second process can detect asymmetric routing that may after connection initiation.11-04-2010
20110182291Facilitating Transition of Network Operations from IP Version 4 to IP Version 6 - Methods, apparatuses and systems directed to facilitating transitions from IPv4 to IPv6 networks. In particular implementations, the invention facilitates or enables accessibility of network application services between IPv4 and IPv6 hosts, or traversal of network paths including both IPv6 or IPv4 domains. Particular implementations of the invention are directed to selective mapping of network layer addresses between IPv6 and IPv4 protocols and Domain Name System records under one or more policy controls. Other implementations of the invention are directed to a proxy-to-proxy based tunnel architecture allowing hosts implementing a first network layer protocol, such as IPv4, to traverse a network implementing a second network layer protocol, such as IPv6.07-28-2011
20120226820SYSTEM AND METHOD OF TRAFFIC INSPECTION AND STATEFUL CONNECTION FORWARDING AMONG GEOGRAPHICALLY DISPERSED NETWORK APPLIANCES ORGANIZED AS CLUSTERS - A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.09-06-2012
20120284416Establishing Tunnels Between Selective Endpoint Devices Along Communication Paths - In one embodiment, an intermediary device situated along a communication path between two endpoint devices may receive communication packets sent along the communication path. If the intermediary device receives a connection-initiating packet having a customization indicator and a connection-acknowledgement packet having a customization indicator, then the intermediary device may install a bypass rule.11-08-2012
20120304277System and Method for Building Intelligent and Distributed L2 - L7 Unified Threat Management Infrastructure for IPv4 and IPv6 Environments - A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically identified application programs responsible for producing and/or consuming the network traffic and to enforce policies in accordance with network traffic classifications. The appliance includes an on-box anti-virus/anti-malware engine, on-box data loss prevention engine and on-box authentication engine. One or more of these engines is informed by an on-box dynamic real tie rating system that allows for determined levels of scrutiny to be paid to the network traffic. Security gateways of this type can be clustered together to provide a set of resources for one or more networks, and in some instances as the backbone of a cloud-based service.11-29-2012
20130080611Managing Network Content - In one embodiment, downloading one or more content items; determining which ones of the one or more content items are popular among a plurality of users; categorizing the one or more content items into one or more groups, wherein each group comprises one or more related content items; associating one or more keywords with each group, wherein the one or more keywords describe content of the one or more related content items in the corresponding group; and caching the one or more content items categorized into the one or more groups and the one or more keywords associated with each group.03-28-2013
20130133032System and Method for Capturing Network Traffic - In certain embodiments, a method includes receiving, by a capture device, traffic flows transmitted by a plurality of client devices, each of the traffic flows being associated with one of the plurality of client devices and comprising encrypted data. The method further includes receiving, by the capture device, flow information communicated from a proxy server communicatively coupled to the capture device, the flow information comprising an identification of a particular traffic flow and a session key associated with the particular traffic flow. The method further includes storing, by the capture device, encrypted data of the particular traffic flow identified by the flow information supplied by the proxy server; storing, by the capture device, the session key associated with the particular traffic flow; and discarding, by the capture device, any of the plurality of received traffic flows not identified in the flow information received from the proxy server.05-23-2013
20130179551Split-Domain Name Service - In one embodiment, a method includes receiving an address of a DNS server of a network. A secure communication tunnel is established with a client of the network. The client is notified that requests to the address of the DNS server of the network should not pass through the secure communication tunnel. A request for a DNS lookup of a name of a host of the network is received through the secure communication tunnel. A DNS referral that includes the address of the DNS server of the network is sent to the client.07-11-2013
20130266020Establishing Tunnels Between Selective Endpoint Devices Along Communication Paths - In one embodiment, an intermediary device situated along a communication path between two endpoint devices may receive communication packets sent along the communication path. If the intermediary device receives a connection-initiating packet having a customization indicator and a connection-acknowledgement packet having a customization indicator, then the intermediary device may install a bypass rule.10-10-2013
20140273950Mobile Application Identification and Control through WiFi Access Points - A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones, tablet computers, and the like, that seek to access the Internet (or another network) via the access point and applying network access policies to data communications by those applications according to application, location, context, device and/or user characteristics.09-18-2014
20140373129System and Method for Building Intelligent and Distributed L2 - L7 Unified Threat Management Infrastructure for IPv4 and IPv6 Environments - A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically identified application programs responsible for producing and/or consuming the network traffic and to enforce policies in accordance with network traffic classifications. The appliance includes an on-box anti-virus/anti-malware engine, on-box data loss prevention engine and on-box authentication engine. One or more of these engines is informed by an on-box dynamic real tie rating system that allows for determined levels of scrutiny to be paid to the network traffic. Security gateways of this type can be clustered together to provide a set of resources for one or more networks, and in some instances as the backbone of a cloud-based service.12-18-2014
20160127906Mobile Application Identification and Control through WiFi Access Points - A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones, tablet computers, and the like, that seek to access the Internet (or another network) via the access point and applying network access policies to data communications by those applications according to application, location, context, device and/or user characteristics.05-05-2016

Patent applications by Qing Li, Cupertino, CA US

Qing Li, Guangzhou CN

Patent application numberDescriptionPublished
20100130908METHOD OF USE OF PORPHYRINS IN PREPARING A MEDICAMENT FOR SONODYNAMIC THERAPY AND A METHOD OF SONODYNAMIC THERAPY USING PORPHYRINS - The invention provides method of use of a porphyrin compound as shown below in preparing a medicament for sonodynamic therapy, and a method of sonodynamic therapy using a porphyrin compound. Said therapy comprises administering a porphyrin compound to a patient and applying sonic wave to the patient,05-27-2010

Qing Li, Cleveland, OH US

Patent application numberDescriptionPublished
20100063146METHOD FOR TREATING DISORDERS RELATED TO COMPLEMENT ACTIVATION - A method for treating or preventing a complement activated T-cell mediated disorder in a subject includes administering a therapeutically effective amount of a pharmaceutical composition to the subject. The pharmaceutical composition includes at least one amidine compound or pharmaceutically acceptable salt.03-11-2010

Qing Li, Sunnyvale, CA US

Patent application numberDescriptionPublished
20100002875Slice-Based Prioritized Secure Video Streaming - Slice-based prioritized secure video streaming comprises a transmitter receiving a slice comprising a plurality of macroblocks and selecting an encryption key based at least in part on a relative importance of secure transmission of the macroblocks. If the importance is high, a master key is selected. If the importance is medium, a first key derivable by applying a one-way function to the master key is selected. If the importance is low, a second key derivable by applying the one-way function to the first key is selected. The slice is encrypted using the encryption key. A receiver receives the encrypted slice, decrypts a header of the slice using the master key, to obtain an indication of a relative importance of secure transmission of the macroblocks. The receiver selects a decryption key based at least in part on the indication, and decrypts the slice using the decryption key.01-07-2010
20140280016AUTOCOMPLETE-BASED ADVERTISEMENTS - A system and method of providing advertisements based on autocomplete functionality are disclosed. In some embodiments, user-entered text is received in a search field of a search engine. A predicted query is determined based on the user-entered text. The predicted query comprises predicted text and at least a portion of the user-entered text, the predicted text being absent from the user-entered text. An advertisement for an item is determined based on the predicted query. The advertisement is caused to be displayed to the user concurrently with the predicted query being displayed in an autocomplete user interface element of the search field. In some embodiments, the advertisement for the item comprises an identification of the item and a price of the item.09-18-2014

Qing Li, Novi, MI US

Patent application numberDescriptionPublished
20080272969ANTENNA DEVICE HAVING A NON-ELECTRICAL ENGAGEMENT DURING PRE-LOCK - An antenna device has an antenna main body, a fixing member and a bolt. The antenna main body comprises an antenna element, female connectors provided at a first connector, a female screw section, and an engagement claw inserted into an antenna mount hole to make engagement with a lower side face of a roof panel. A fixing member comprises cables, male connectors provided at a second connector, the male connectors being provided to make mechanical engagement with female connectors without an electrical connection, and being connected to the cable, and a male screw section helically fitted to a female screw section, thereby tightening the female connectors, the male connectors, and a roof panel with one another. A bolt may be mounted between the male and female connectors to allow electrical connection therebetween.11-06-2008

Qing Li, Shanghai CN

Patent application numberDescriptionPublished
20080248450Method for modeling smoke propagation - A method and computer-readable medium for modeling smoke propagation in a structure are presented, along with applications of the method. A model is provided of a multiplicity of compartments within the structure, and the presence of a fire within a compartment is determined. The energy and smoke released by the fire is estimated, and smoke flows out of the compartment are determined. Each compartment having a smoke source is analyzed, individually, for the propagation of smoke. Each compartment is assumed to have a homogenous upper smoke layer and a lower cool air layer. The analysis includes a mass and energy balance to determine the change in characteristics of the upper smoke layer, where a known pressure for the lower cool air layer is used for the balance. For multiple smoke sources into a compartment, the contributions to the mass and energy balance of each smoke source are considered additive.10-09-2008
20120209447COMMUNICATION CONVERTER FOR CONNECTING AN AUTOMATION DEVICE TO A COMPUTER AND METHOD FOR CONTROLLING THE COMMUNICATION CONVERTER - A communication converter for connecting automation devices having different operating voltages to a host computer, including an interface component and a transceiver component coupled to the interface component, the interface component being connected on the input side via a host connector to a host interface of the host computer and the transceiver component being connected via a device connector to a device interface of the automation device, and a voltage transformer, which on the input side is connected via the host interface to an operating voltage and on the output side to a voltage supply line of the device interface. So the communication converter can communicate with devices having different interface standards, the converter has a first current/voltage measuring unit, a second current/voltage measuring unit, and a switching device.08-16-2012
20140172605SAFETY CLOSED-LOOP PAYMENT SYSTEM AND METHOD - The invention relates to a safety closed-loop payment system and method. The safety closed-loop payment system of the invention comprises a user terminal (06-19-2014

Patent applications by Qing Li, Shanghai CN

Qing Li, Draper, UT US

Patent application numberDescriptionPublished
20110212856HUMAN T2R RECEPTORS RECOGNIZING A CLASS OF BITTER MOLECULES FROM COFFEE - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds, i.e., chlorogenic lactone compounds that contribute at least partially to the bitter taste of many coffee beverages. The present invention further relates to the use of these receptors in assays for identifying ligands that modulate the activation of these taste receptors by chlorogenic lactones and related compounds and which may be used as additives and/or removed from foods, beverages and medicinals in order to modify (block) T2R-associated bitter taste. A preferred embodiment is the use of the identified compounds as additives in coffee and coffee-flavored foods, beverages and medicinals.09-01-2011
20130183252COMPOUNDS THAT INHIBIT (BLOCK) BITTER TASTE IN COMPOSITION AND METHODS OF MAKING SAME - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds present in, e.g., coffee. Also, the invention relates to the discovery of specific compounds and compositions containing that function as bitter taste blockers and the use thereof as bitter taste blockers or flavor modulators in, e.g., coffee and coffee flavored foods, beverages and medicaments. Also, the present invention relates to the discovery of a compound that antagonizes numerous different human T2Rs and the use thereof in assays and as a bitter taste blocker in compositions for ingestion by humans and animals.07-18-2013
20160109445IDENTIFICATION OF BITTER LIGANDS THAT SPECIFICALLY ACTIVATE HUMAN T2R RECEPTORS AND RELATED ASSAYS FOR IDENTIFYING HUMAN BITTER TASTE MODULATORS - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds. Also, the invention relates to the discovery of specific hT2R9 alleles and their disparate activity in functional assays with the same biter ligands. The invention further relates to the use of these T2R receptors in assays for identifying ligands that modulate the activation of these taste receptors by specific bitter ligands and related compounds. These comounds may be used as additives and/or removed from foods, beverages, cosmetics and medicinals in order to modify (block) T2R-associated bitter taste. Also T2R ligands may be used as therapeutics to treat and modulate T2R associated gastrointestinal and metabolic functions as well as treat gastrointestinal and metabolic diseases such as eating disorders, food sensing, fod absorption, obesity, diabetes, Crohn's disease, celiac disease, et al.04-21-2016

Patent applications by Qing Li, Draper, UT US

Qing Li, Shenzhen CN

Patent application numberDescriptionPublished
20110269469METHOD, APPARATUS AND SYSTEM FOR HANDOVER BETWEEN MULTI-CARRIER CELLS - The present invention relates to the wireless network communication field, and discloses a method for handover between multi-carrier cells to avoid repeated handover decisions caused by delay of the triggering event. The method includes: the source cell receives a measurement report triggered by an event reported by a served User Equipment (UE); and the source cell executs a handover decision according to measurement reports triggered by multiple events after receiving the measurement reports triggered by the multiple events within an estimated interval, and hands over the UE to the corresponding carrier of the corresponding target cell. With the present invention, the resources of the source cell and the target cell may be saved, and the handover efficiency may be improved.11-03-2011
20110286433METHOD, APPARATUS AND SYSTEM FOR HANDOVER BETWEEN MULTI-CARRIER CELLS - The present invention relates to the radio communication field and discloses a method, an apparatus, and a system for handover between multi-carrier cells, so that a user equipment (UE) can be handed over to carriers of different cells on multiple target evolved NodeBs (eNBs). The handover method includes: after performing handover request acknowledge, receiving serial numbers (SNs) of data to be transferred and identifier information of target eNBs of other carriers to which the UE is handed over sent by a source eNB; and transferring scheduling information to the target eNBs of other carriers to which the UE is handed over.11-24-2011
20140045564ANTI-CHEATING METHOD AND SYSTEM FOR ONLINE GAMES - An anti-cheating method for online games between a server and a client is provided. The server receives launch parameters of a projectile from the client, wherein the launch parameters are determined based on user operation commands obtained by the client. The server calculates a trajectory of the projectile based on the launch parameters. The server sends the trajectory of the projectile to the client such that the client shows launch of the projectile based on the trajectory of the projectile.02-13-2014
20140320161TESTING SYSTEM AND METHOD FOR DC-TO-DC BUCK CONVERTER CIRCUIT - A testing system for a DC-to-DC buck converter circuit includes a multi-meter connected to the DC-to-DC buck converter circuit, an oscilloscope, and a control device. The control device is connected to the multi-meter and the oscilloscope and is configured to adjust the multi-meter and the oscilloscope, and gather data and waves measured by the multi-meter and the oscilloscope. The control device generates a test report according to the data and waves measured by the multi-meter and the oscilloscope. The present disclosure further discloses a testing method based upon the above testing system.10-30-2014

Qing Li, Hitachinaka JP

Patent application numberDescriptionPublished
20120000268ACCURACY MANAGEMENT METHOD - It is convenient and useful in inspection work to assess a fluctuation pattern of accuracy management results based on operation events occurring in a clinical laboratory and detect an abnormal fluctuation pattern before a control range is exceeded. However, an accuracy management system having such a function is not provided. When the cause of fluctuations in accuracy management results or calibration results is to be estimated, one depends on a variety of related information and one's specialized knowledge and experience. Much time and efforts are required to sort out useful pieces of information from useless ones and obtain organized information.01-05-2012
20120261260ELECTROLYTE ANALYZER - Electrolyte analyzers are used in a variety of ways, and problems vary from reagent deterioration due to reagent replenishment, mixing of foreign substances during reagent replenishment, electrode deterioration due to the passage of the validity date, to the operator's inputting errors. It is thus necessary to judge abnormalities of measured values resulting from such inappropriate usage, based on the fluctuation patterns of the results of daily electrolyte calibration.10-18-2012
20130151189QUALITY CONTROL SYSTEM - In a clinical laboratory, the degree of contamination of an automatic analyzer may constantly change due, for instance, to the operation of the automatic analyzer and newly added examinations, and there is a risk of failure to adequately maintain the performance of the automatic analyzer by performing calibration at conventional intervals. Meanwhile, the result of quality control varies depending on the performance of an unsealed reagent. Hence, performing calibration at predetermined intervals may fail to flexibly calibrate the reagent when the performance of the reagent is changed by reagent replenishment or by contamination. Provided is a quality control method for issuing a warning to indicate an optimum calibration method and calibration intervals in accordance with the contents of a quality control screen and with the pattern of variation in the result of calibration.06-13-2013

Qing Li, Beijing CN

Patent application numberDescriptionPublished
20120190356Method and Apparatus for Performing Channel Measurement for Cell - Embodiments of the present invention provide a method and an apparatus for performing channel measurement for a cell. The method includes: sending information about a location of a to-be-measured reference signal to a user equipment, where the location of the to-be-measured reference signal is a part of a location occupied by a reference signal of the cell; and receiving a channel measurement report of the cell. The channel measurement report is sent by the user equipment and is obtained after the user equipment performs channel measurement for the cell according to the information about the location of the to-be-measured reference signal.07-26-2012
20140360266NOVEL BELL-SHAPED VIBRATOR TYPE ANGULAR RATE GYRO - The present invention provides an angular rate gyro in which a bell-shaped vibrator having nonuniform thickness, axially symmetric and multi curved surface combined structural features is used as a sensitive element. The angular rate gyro is composed of the bell-shaped vibrator, a vibrator fixing shaft, a vibrator base, an airtight hood, a housing and a circuit system. The bell-shaped vibrator includes a bell shoulder having a hemispheric shell structure, a bell waist having a cylindrical shell structure and a bell lip having a hyperboloidal shell structure. The bell-shaped vibrator, the base and a central shaft are mechanically and fixedly connected together to be formed into an integral core having sensitive gyratory effect. A circuit system is used to control vibration forms of the bell-shaped vibrator, perform signal processing and solve the applied angular rate.12-11-2014

Qing Li, Guangdong CN

Patent application numberDescriptionPublished
20120198900COMPOSITE FOLIAGE SI FERTILIZER FOR LOWERING CONTENTS OF HEAVY METALS AND NITRATE IN VEGETABLE, AND PREPARATION METHOD THEREOF - The present invention is related to the field of environmental protection, more specifically, to a foliage silicon fertilizer and a method for production of the fertilizer, which is a molybdenum-silica compound sol used for reducing heavy metal and nitrates in vegetables. The fertilizer, which is a molybdenum-silica compound sol, comprises 10-25 wt % silica, 0.05-5.5 wt % molybdenum ions. More preferably, the fertilize, which is a rare earth-molybdenum-silica compound sol, comprises 10-25 wt % silica, 0.05-5.5 wt % molybdenum ions and 0.1-7.5 wt % rare earth ions. By the combination of silica with molybdenum in the present invention, it is effective for preventing the absorption/accumulation of nitrates in vegetables. In addition, by the further combination with rare earth element, the prevention ability of the fertilizer from absorbing heavy metal and nitrates into vegetables is even enhanced. With a preparation method with normal pressure and relatively, low temperature, that is, with mild condition, simple process and high operability, large scale production of the present invention may be readily executed.08-09-2012

Qing Li, Hangzhou CN

Patent application numberDescriptionPublished
20120253675METHOD AND APPARATUS FOR REMOTE SIPHON DRAINAGE TYPE RAINFALL MEASUREMENT WITH SELF-COMPENSATION FUNCTION - A siphon drainage type rainfall remote measurement device with self-compensation function is provided. The bottom existence of a rain collection barrel (10-04-2012
20140312907Sensing Cable with Parallel Spiral Transmission Line Structure for Distributed Sensing and Measuring of Rock-Soil Mass Deformation - This present disclosure provides a sensing cable of parallel spiral transmission line structure for distributed sensing and measuring of rock-soil mass deformation. A circular cross-section of a silicone strip is tightly wounded by two mutually-insulated wires. The two mutually-insulated wires form the spiral cable. The two mutually-insulated wires are wrapped around and covered by a silicone shroud. They constitute a sensing cable. A termination matching impedance is connected to one end of each of the two mutually-insulated wires. A time domain reflectometry measurement instrument is connected to the other end of the two mutually-insulated wires. The present disclosure implements a distributed positioning and measurement of rock-soil mass deformation.10-23-2014

Qing Li, Boulder, CO US

Patent application numberDescriptionPublished
20130097415Central Processing Unit Monitoring and Management Based On A busy-Idle Histogram - The aspects enable a computing device or microprocessor to adjust the operations of a processor in view of a current processor workload based on a histogram-like data structure. A histogram-like data structure characterizing one of processor busy and/or idle durations or busy/idle ratios is generated at runtime and used to model the processor workload. The processor workload is used to predict future processing requirements and to adjust the processor's operations such that they are commensurate with the processing and workload requirements. The histogram-like data structure may alternatively be used to estimate a current quality of service (QoS) of a communication link so that link management actions may be taken.04-18-2013
20130097443DYNAMIC VOLTAGE AND CLOCK SCALING CONTROL BASED ON RUNNING AVERAGE, VARIANT AND TREND - The aspects enable a computing device or microprocessor to scale the frequency and/or voltage of a processor to an optimal value balancing performance and power savings in view of a current processor workload. Busy and/or idle duration statistics are calculated from the processor during execution. The statistics may include a running average busy and/or idle duration or idle/busy ratio, a variance of the running average and a trend of the running average. Current busy or idle durations or an idle-to-busy ratio may be computed based on collected statistics. The current idle-to-busy ratio may be compared to a target idle-to-busy ratio and the frequency/voltage of the processor may be adjusted based on the results of the comparison to drive the current running average toward the target value. The target value of idle-to-busy ratio may be adjusted based on the calculated variance and/or trend values.04-18-2013
20130097609System and Method for Determining Thermal Management Policy From Leakage Current Measurement - Various embodiments of methods and systems for determining the thermal status of processing components within a portable computing device (“PCD”) by measuring leakage current on power rails associated with the components are disclosed. One such method involves measuring current on a power rail after a processing component has entered a “wait for interrupt” mode. Advantageously, because a processing component may “power down” in such a mode, any current remaining on the power rail associated with the processing component may be attributable to leakage current. Based on the measured leakage current, a thermal status of the processing component may be determined and thermal management policies consistent with the thermal status of the processing component implemented. Notably, it is an advantage of embodiments that the thermal status of a processing component within a PCD may be established without the need to leverage temperature sensors.04-18-2013
20130301218PIEZOELECTRIC ACTIVE COOLING DEVICE - Methods, systems, and devices for providing cooling for a mobile device using piezoelectric active cooling devices. Some embodiments utilize piezoelectric actuators that oscillate a planar element within an air channel to fan air within or at an outlet of the air channel. The air channel may be defined by at least one heat dissipation surface in thermal contact with components of the mobile device that generate excess waste heat. For example, the air channel may include a surface that is in thermal contact with a processor of the mobile computing device. In embodiments, the piezoelectric active cooling device may be used in an air gap between stacked packages in a package on package (PoP) processor package. The described embodiments provide active cooling using low power, can be controlled to provide variable cooling, use highly reliable elements, and can be implemented at low cost.11-14-2013
20140333281METHOD AND DEVICES FOR NON-INTRUSIVE POWER MONITORING - A method and device are disclosed for estimating a power demand level of an active circuit on a power supply line. A ripple amplitude and a ripple frequency associated with operation of the active circuit may be monitored on the power supply line. The ripple amplitude and ripple frequency may be compared with corresponding references. The ripple amplitude and ripple frequency may be associated with an estimated power demand level of the active circuit on the power supply line based on the comparison. A ripple generator generates a controlled ripple on the power supply line for calibration.11-13-2014
20150229303POWER DISTRIBUTION NETWORK (PDN) CONDITIONER - Systems and methods for conditioning a power rail (e.g., reducing voltage droops and/or voltage overshoots on the power rail) are described herein. In one embodiment, a power circuit comprises a capacitor coupled to a high-voltage rail, and a droop slope limiter (DSL) coupled between the high-voltage rail and a power rail. The DSL is configured to detect a downward voltage slope on the power rail, and to control current flow from the high-voltage rail to the power rail through the DSL based on the detected downward voltage slope.08-13-2015

Patent applications by Qing Li, Boulder, CO US

Qing Li, Fremont, CA US

Patent application numberDescriptionPublished
20130290993SELECTIVE ADJUSTMENT OF PICTURE QUALITY FEATURES OF A DISPLAY - Systems, apparatus, articles, and methods are described including operations for selectively adjusting picture quality features of a display based at least in part on whether a user can perceive a loss in video quality and/or on power supply data.10-31-2013

Qing Li, Los Alamos, NM US

Patent application numberDescriptionPublished
20130292260Catalytic Oxidation of Dimethyl Ether - A composition for oxidizing dimethyl ether includes an alloy supported on carbon, the alloy being of platinum, ruthenium, and palladium. A process for oxidizing dimethyl ether involves exposing dimethyl ether to a carbon-supported alloy of platinum, ruthenium, and palladium under conditions sufficient to electrochemically oxidize the dimethyl ether.11-07-2013

Qing Li, Knoxville, TN US

Patent application numberDescriptionPublished
20130264747SELF-ASSEMBLY PATTERNING OF ORGANIC MOLECULES ON A SURFACE - The embodiments disclosed herein include all-electron control over a chemical attachment and the subsequent self-assembly of an organic molecule into a well-ordered three-dimensional monolayer on a metal surface. The ordering or assembly of the organic molecule may be through electron excitation. Hot-electron and hot-hole excitation enables tethering of the organic molecule to a metal substrate, such as an alkyne group to a gold surface. All-electron reactions may allow a direct control over the size and shape of the self-assembly, defect structures and the reverse process of molecular disassembly from single molecular level to mesoscopic scale.10-10-2013

Qing Li, Milpitas, CA US

Patent application numberDescriptionPublished
20140281750DETECTING EFFECT OF CORRUPTING EVENT ON PRELOADED DATA IN NON-VOLATILE MEMORY - A method includes determining a read threshold voltage corresponding to a group of storage elements in a non-volatile memory of a data storage device. The method also includes determining an error metric corresponding to data read from the group of storage elements using the read threshold voltage. The method includes comparing the read threshold voltage and the error metric to one or more criteria corresponding to a corrupting event.09-18-2014
20140281772DETECTING EFFECT OF CORRUPTING EVENT ON PRELOADED DATA IN NON-VOLATILE MEMORY - A method includes determining a read threshold voltage corresponding to a group of storage elements in a non-volatile memory that includes a three-dimensional (3D) memory of a data storage device. The method also includes determining an error metric corresponding to data read from the group of storage elements using the read threshold voltage. The method includes comparing the read threshold voltage and the error metric to one or more criteria corresponding to a corrupting event.09-18-2014

Qing Li, Changzhou City CN

Patent application numberDescriptionPublished
20140332613SHREDDER SUPPORT FRAME - A shredder mechanism is disclosed herein including first and second shredder portions positioned opposite one another and defining a slot therebetween. The first and second shredder portions each include a longitudinal support having more upper fins and a plurality of lower fins. each defining a shaft receptacle. A shaft is positioned between the upper and lower fins positioned within the shaft receptacles. A plurality of cutting blades are mounted to the shaft and extend into the slot. Each of the one or more upper fins and the plurality of lower fins extend among the plurality of cutting blades. The longitudinal support includes upper and lower support portions having the one or more upper fins secured to the upper support portion and the plurality of lower fins secured to the lower support portion.11-13-2014

Qing Li, Princeton, NJ US

Patent application numberDescriptionPublished
20140349614Access Network Assisted Bootstrapping - The Generic Bootstrapping Architecture is used in a method for assigning the bootstrapping transaction ID so that a machine-to-machine server or other device can locate and communicate with a bootstrapping server function. The bootstrapping server function assigns the bootstrapping transaction ID and updates a DNS server with an entry that maps the bootstrapping transaction ID to a network node IP Address.11-27-2014
20140351592Machine-To-Machine Network Assisted Bootstrapping - The service layer may leverage the access network infrastructure so that applications on a device may bootstrap with a machine-to-machine server without requiring provisioning beyond what is already required by the access network.11-27-2014
20140372774Context And Power Control Information Management For Proximity Services - Management of context and power control information enables different power control schemes for point-to-point or point-to-multipoint based on proximity services or applications. Context information may be defined as situation data about a service or application that is used to help define a power control scheme to be implemented. Power control information may be defined as control or status data for power control, which can be used for reporting or controlling the transmitting power of a peer in a P2P network. Context and power control information may be managed across multiple layers such as the application layer, service layer, media access control layer, or physical layer. Context and power control information is updated and exchanged between or among peers for context-related power control in proximity services.12-18-2014
20140372775Context And Power Control Information Management For Proximity Services - Management of context and power control information enables different power control schemes for point-to-point or point-to-multipoint based on proximity services or applications. Context information may be defined as situation data about a service or application that is used to help define a power control scheme to be implemented. Power control information may be defined as control or status data for power control, which can be used for reporting or controlling the transmitting power of a peer in a P2P network. Context and power control information may be managed across multiple layers such as the application layer, service layer, media access control layer, or physical layer. Context and power control information is updated and exchanged between or among peers for context-related power control in proximity services.12-18-2014
20140376521Cross-Layer And Cross-Application Acknowledgment For Data Transmission - Systems and methods may integrate acknowledgments, such as application-level acknowledgments and medium access control layer acknowledgments. In an embodiment of a cross-layer acknowledgment method, a medium access control layer acknowledgment and application-layer acknowledgment may be integrated as a single medium access control layer acknowledgment. In an embodiment of a cross-application acknowledgment method, an application-layer acknowledgment for a first application and application-layer acknowledgment for a second application may be integrated into a single medium access control layer frame.12-25-2014

Qing Li, Las Vegas, NV US

Patent application numberDescriptionPublished
20150043211LED CANDLE BULB AND LED CANDLE LIGHT - The present invention is directed generally to electric lighting, and more particularly to a light emitting diode (LED) candle bulb and LED candle light. More particularly, the present invention relates to a candle light assembly comprising: a bulb enclosing a volume and having an opening at a longitudinal end, wherein the opening has an interior circumference which is threaded; a heat sink base with an opening at a longitudinal end, wherein the opening has an interior circumference which is threaded; a connector for securing the bulb to the heat sink base, which has an upper exterior threaded portion for communicating with the threaded bulb and a lower exterior threaded portion for communicating with the threaded base; and an optics assembly comprising an LED, a lens, and a drive circuit for operating the LED. The LED candle lights according to embodiments of the invention can provide bright lighting similar to that of traditional incandescent candle light without overheating.02-12-2015

Qing Li, Tokyo JP

Patent application numberDescriptionPublished
20150232375GLASS CERAMIC SUBSTRATE AND PORTABLE ELECTRONIC DEVICE HOUSING USING THE SUBSTRATE - A glass ceramic substrate includes: an inner layer part having a first thermal expansion coefficient; and a surface layer part having a second thermal expansion coefficient smaller than the first thermal expansion coefficient. The inner layer part contains a first glass matrix and flat alumina particles. The flat alumina particles are dispersed in the glass matrix in a direction in which individual thickness directions are substantially perpendicular to a surface direction of one of main surfaces of the inner layer part. Further, a mean aspect ratio of the flat alumina particles is 3 or more in one of cross sections along the thickness directions of the flat alumina particles out of cross sections of the inner layer part.08-20-2015

Qing Li, Pleasanton, CA US

Patent application numberDescriptionPublished
20160065446MOBILE RELAY NETWORK INTELLIGENT ROUTING - A method for determining a route for communication across a network in real-time, said method including: collecting a set of network delay information at a caller device; storing the set of network delay information at the caller device; based on a stored set of network delay information at the caller device and the callee device, determining, by the caller device, in cooperation with the callee device, a set of relay server candidates to be used to relay data packets between the caller device and the callee device; and based on calculated round trip times for probing data packets set out and sent back, selecting, by the caller device in cooperation with the callee device, a shortest routing path as an active routing path for use for transporting a first data packet between the caller device and the callee device.03-03-2016

Qing Li, Chen Zhou City CN

Patent application numberDescriptionPublished
20160141813ELECTRICAL CONNECTOR AND COMMUNICATION DEVICE - The disclosure provides an electrical connector and a communication device. The electrical connector includes an insulator, on which at least one docking socket and at least one module socket are provided; a housing provided outside the insulator; a plug-in module provided on the insulator; and a signal display unit, which comprises a signal display circuit board, at least one SMD (surface-mounted-device) LED electrically coupled to the signal display circuit board, and at least two connection terminals electrically coupled to the signal display circuit board used to transmit signal of the signal display unit.05-19-2016
Website © 2016 Advameg, Inc.