The MITRE Corporation Patent applications |
Patent application number | Title | Published |
20160140340 | SIDE-CHANNEL LEAKAGE EVALUATOR AND ANALYSIS KIT - A method for analyzing side-channel leakage of an application running on a device including loading the application on a system comprising a device simulator, wherein the application is configured to accept public inputs and secret inputs and selecting a set of public inputs. The method includes, for each public input in the set of public inputs, executing the application on the system comprising the device simulator based on a respective public input and a first value for a secret input and extracting first intermediate values for the simulated device, and executing the application on the system based on the respective public input and a second value for the secret input and extracting second intermediate values for the simulated device. The method includes determining an amount of dependency of a location of the simulated device on the secret input based on a plurality of the first and second intermediate values. | 05-19-2016 |
20160134666 | PROVIDING SURVIVABLE CALLING AND CONFERENCING - Disclosed herein are system, apparatus, method and/or computer program product embodiments for providing survivable calling and conferencing. An embodiment operates by providing, by a first server, a first sub-conference to a plurality of user devices over first lines. The first sub-conference is combined with a second sub-conference to form a collective conference of the plurality of user devices. The first server accesses the conference. A second server is configured to provide the second sub-conference of the collective conference to the plurality of user devices over second lines, the first and second lines being distinct from each other. The collective conference may provide resilient and reliable sharing of information among participants and may leverage dispersed elements or diverse links simultaneously without impediments of echoes, loops, or other impacts. | 05-12-2016 |
20160032349 | MITRECIN A POLYPEPTIDE WITH ANTIMICROBIAL ACTIVITY - The present invention provides a Mitrecin A polypeptide useful in prevention and treatment of one or more bacteria. Also provided is a method to kill or prevent growth of one or more bacteria comprising contacting the one or more bacteria with a Mitrecin A polypeptide. The target bacteria can be selected from the group consisting of a Gram-positive bacterium, a Gram-negative bacterium, or both. In one embodiment, the present invention is drawn to a polynucleotide encoding a Mitrecin A polypeptide, a vector comprising the polynucleotide, a host cell comprising the polynucleotide, or a composition comprising the Mitrecin A polypeptide, the polynucleotide, the vector, or the host cell. | 02-04-2016 |
20150302906 | DATA STORAGE USING ANALOG CODING - In an embodiment, a memory system is provided. The memory system can include one or more memory elements, a quantity associated with each of the one or more memory elements can take a value in a continuous range of values; an encoder configured to determine a value for a quantity of a first memory element of the one or more memory elements based on data to be stored; and a memory controller configured to control the first memory element such that the quantity of the first memory element is set to the determined value. | 10-22-2015 |
20150293234 | Positioning, Navigation, and Timing Device Interference and Spoofing Detector With Timing Mitigation - Disclosed herein are system, method, and computer program product embodiments for a GNSS interference and spoofing fast detection and mitigation system. A RF signal associated with a PNT device, such as a GNSS receiver, is received. The received RF signal is split into a plurality of sub-data signals. The received RF signal is re-routed by sending each of the plurality of sub-data signals to at least one of a processing module and a switching module. An anomaly associated with a second sub-data signal is detected. The anomaly is detected during a capture period of an adversarial attack on the PNT device, prior to corruption of any associated system depending on outputs from the PNT device. An output of a first sub-data signal of the plurality of sub-data signals is terminated based on the anomaly detected with the second sub-data signal. | 10-15-2015 |
20150241558 | Track Associator - Disclosed here are system, apparatus, article of manufacture, method and/or computer program product embodiments for track association. An embodiment operates by receiving a first set of track identification data from a first tracking system. The first set of track identification data is associated with a global track identifier (GID). The first set of track identification data associated with the GID is broadcasted to the first tracking system and a second tracking system. A second set of track identification data is received from the second tracking system. The second set of track identification data identifies any tracks of the second tracking stystem that match the first set of track identification data. The GID is associated with the second set of track identification data. | 08-27-2015 |
20150226858 | GPS Spoofing Detection Techniques - Disclosed herein are system, method, and computer program product embodiments for detecting spoofing of a navigation device. A plurality of anti-spoofing techniques are provided. The plurality of anti-spoofing techniques detect interference with data provided by one or more navigation devices for a plurality of threat situations. Positioning, timing and frequency characteristics associated with the one or more navigation devices are analyzed in order to identify a threat situation among the plurality of threat situations. Based on the identified threat situation one or more of the anti-spoofing techniques are executed. The one or more anti-spoofing techniques can be executed in parallel in order to provide various anti-spoofing detection techniques at the same time. | 08-13-2015 |
20150178487 | METHODS AND SYSTEMS FOR BIOMETRIC-BASED USER AUTHENTICATION BY VOICE - Disclosed herein are system, method, and computer program product embodiments for authentication of users of electronic devices by voice biometrics. An embodiment operates by comparing a power spectrum and/or an amplitude spectrum within a frequency range of an audio signal to a criterion, and determining that the audio signal is one of a live audio signal or a playback audio signal based on the comparison. | 06-25-2015 |
20150121522 | PERIODIC MOBILE FORENSICS - A forensics analysis is conducted on each of multiple mobile devices in an enterprise system to detect malicious activity. The systems and methods described include storing a single baseline image for the multiple mobile devices at a server. A client-side application on each mobile device scans storage locations to identify changes in data compared to a previous scan. At least a portion of the information about the changes is sent to the server. The server reconstructs snapshot images for each mobile device based on the baseline image and the received information. Malicious activity is detected by comparing the reconstructed snapshot image to a previous snapshot image for each mobile device. | 04-30-2015 |
20150120755 | DECODERS FOR PREDICTING AUTHOR AGE, GENDER, LOCATION FROM SHORT TEXTS - Disclosed are systems and methods for predicting demographics about authors of social media. A dataset relates features from social media messages to known demographic information about authors of the social media messages. The social media messages and known demographics may be retrieved from different social media services. Adjustable weights are associated with alternative demographic values for the features. The dataset is used to predict unknown demographics of users based on the adjustable weights associated with the alternative demographic values for extracted features from social media messages. A confidence level may be output for a predicted demographic that corresponds to a difference between a sum of weights associated with the predicted value and another demographic value. The predicted demographic value may be output when the confidence level exceeds a threshold. The weights may be updated when the confidence level is below the threshold even when the prediction is correct. | 04-30-2015 |
20150120583 | PROCESS AND MECHANISM FOR IDENTIFYING LARGE SCALE MISUSE OF SOCIAL MEDIA NETWORKS - The described systems and methods compare behavior between multiple users of social media services to determine coordinated activity. An index is created and used to extract uncommon features from social media messages. A collision between users is detected when their messages have the same uncommon feature. A number and/or frequency of collisions may indicate a probability that users are engaged in coordinated activity. A comparison of user accounts with multiple collisions may be executed to identify similar content as coordinated activity. A visualization tool constructs a network graph that shows relationships between users in social networks, and can be used to discover coordinated users engaged in misuse of social media. | 04-30-2015 |
20150100239 | Message Filtering Based on Destination, Plan, Intent, Expectation, or Route - Systems and methods for disseminating messages to a user via a mobile computing device are provided. In an embodiment, a route of the mobile computing device that includes at least a destination and one or more segments is determined, and one or more generally-broadcast messages, each corresponding to a geographic region, are received. A determination is made as to whether the mobile computing device, while traveling along the route to the destination, will traverse a particular geographic region associated with a particular generally-broadcast message of the one or more generally-broadcast messages; and if/when the mobile computing device will traverse the particular geographic region, the particular generally-broadcast message is disseminated, through the mobile computing device, to the user. | 04-09-2015 |
20140327573 | Detecting Timing Anomalies - Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system. An embodiment operates by detecting an active adversary operating malware on a compromised system. A stream of data traffic associated with active adversary is intercepted. The stream of data traffic includes a command and control channel of the active adversary. The stream of data traffic is accessed. An emulation of the command and control channel is provided. An analysis of the accessed stream of traffic is executed. A plurality of response mechanisms is provided. The plurality of response mechanisms is based in part on the analysis of the stream of data traffic and a custom policy language tailored for the malware. | 11-06-2014 |
20140326840 | Adjustable and Portable Mounting System for a Tablet Computing Device and Solar Based Charging System - An adjustable and portable mounting system for a tablet computing device and solar based charging system is described. An example mounting system for a tablet computing device includes a tablet enclosure with a plurality of gripping portions adjustable to hold tablets with different sizes and shapes, and each gripping portion is configured to grip a corner of the tablet computing device. The mounting system further includes an adjustable solar panel support, which is pivotally attached to the tablet enclosure and where a solar panel placed within the support can be configured to provide trickle charging to the tablet and to orient 360 degrees about three axes of rotation. The mounting system also includes a table stand, which is mounted to the tablet enclosure and provides support of the tablet computing device on a flat surface with a wide range of viewing angles. The mounting system also includes a connector configured to couple to a tripod stand mount, or a similar device. | 11-06-2014 |
20140304765 | Identity-Based Internet Protocol Networking - A network architecture that eliminates anonymous traffic, reduces a threat surface, and enforces policies is described herein. A method based on this network architecture includes receiving, by a processor, an IP packet entering a network, inserting, by the processor, an identity-based interne protocol (IMP) shim between a header and a body of the IP packet and incorporating, by the processor, an identity of a source and a destination of the IP packet in the shim. | 10-09-2014 |
20140245811 | Fluid Percussion System And Method For Modeling Penetrating Brain Injury - A fluid percussion system for modeling penetrating brain injury includes a fluid percussion device that takes inputs in the form of pressurized gas and electrical signals from a computer and outputs a single hydraulic pulse, or multiple hydraulic pulses in quick succession. The fluid percussion device may include a pneumatic cylinder assembly and a hydraulic cylinder assembly that is actuated by the pneumatic cylinder assembly to produce the hydraulic pulse(s) of pressurized fluid. Each pulse may be used to rapidly inflate and deflate an attached balloon (representing a brain penetrating device). The balloon may be inserted in a test specimen, and the rapid inflation and deflation of the balloon creates a lesion that simulates a penetrating brain injury. A calibration system that employs an optical sensor may be used to determine maximum balloon diameter achieved during rapid inflation. | 09-04-2014 |
20140195139 | Audio Monitor and Event-Conflict Signaling System - Disclosed herein are system, method, and computer program product embodiments for an audio monitoring and event-conflict signaling system. An embodiment operates by receiving airport audio communication originating from an airport control tower (ATCT) of an airport with one or more runways or a flight deck of an aircraft. The system determines one or more keywords corresponding to a runway event affecting operations of a particular runway of the airport. The system detects, within the airport audio communication, a conflict comprising a correspondence between the airport audio communication and one or more of the keywords, and notifies the ACT of the conflict. | 07-10-2014 |
20140185864 | PROBABILISTIC IDENTIFICATION OF SOLID MATERIALS IN HYPERSPECTRAL IMAGERY - Systems, methods and computer program products, for identification of materials based on hyperspectral imagery, are disclosed. An example system comprises one or more processors, a memory, a library of spectral signatures, a receiver, a model generator, and a material identifier. The receiver module is configured to receive a first spectral signature corresponding to a region of interest contained in the hyperspectral image. The model generator is configured to create a model search space including one or more model signatures based on the spectral signatures in the library, wherein each of the one or more model signatures approximate the first spectral signature. The material identifier is a material identifier configured to calculate a probability associated with a presence or absence of a material within the first spectral signature, based on the first spectral signature and the model search space and determine the presence or absence of the material in the region of interest based on the probability. | 07-03-2014 |
20140172488 | SYNTHESIS OF A SCHEDULE REPRESENTATION FROM A PROCESS MODEL - Synthesizing a schedule representation from a process model includes: defining a process model for a project plan by capturing model parameters and process flow; performing quantitative analysis on the process model, such as, for example, stochastic and queuing analysis; and synthesizing a schedule representation from the process model. In an exemplary embodiment, a discrete event simulation engine is used to synthesize a schedule representation from a process model. In an exemplary embodiment, the synthesized schedule is exported to a project viewer capable of interacting with one or more users. The system and method may include receiving one or more plan change and/or decision inputs, modifying the process model based on such inputs, performing quantitative analysis on the modified process model, and synchronizing the modified process model and the schedule representation. | 06-19-2014 |
20140139384 | MULTI-BAND HELICAL ANTENNA SYSTEM - A multi-use antenna system that can be used in, for example, integrated communications and navigation capability is provided. In an embodiment, an antenna system is provided. The antenna system includes a first antenna having a plurality of radiating elements substantially wrapped around an axis and a second antenna located within the first antenna. The first and second antennas are coupled to the same ground plane and are configured to operate in different frequency bands. | 05-22-2014 |
20140104363 | Telepresence for Remote Collaboration with a Gestural Interface - Methods, systems and computer-readable storage mediums encoded with computer programs executed by one or more processors for providing a telepresence with gestural interface for remote collaboration are disclosed. An electronic presentation including a background object and a foreground object is received. A real-time video of a presenter is received over a network for display within the electronic presentation. A layered presentation is composited. The layered presentation including the background object composited behind the opaque representation of the presenter composited behind the foreground object composited behind the translucent representation of the presenter. The layered presentation is provided for rendering in real-time. | 04-17-2014 |
20140094401 | MITRECIN A POLYPEPTIDE WITH ANTIMICROBIAL ACTIVITY - The present invention provides a Mitrecin A polypeptide useful in prevention and treatment of one or more bacteria. Also provided is a method to kill or prevent growth of one or more bacteria comprising contacting the one or more bacteria with a Mitrecin A polypeptide. The target bacteria can be selected from the group consisting of a Gram-positive bacterium, a Gram-negative bacterium, or both. In one embodiment, the present invention is drawn to a polynucleotide encoding a Mitrecin A polypeptide, a vector comprising the polynucleotide, a host cell comprising the polynucleotide, or a composition comprising the Mitrecin A polypeptide, the polynucleotide, the vector, or the host cell. | 04-03-2014 |
20140022139 | Conformal Electro-Textile Antenna and Electronic Band Gap Ground Plane for Suppression of Back Radiation From GPS Antennas Mounted on Aircraft - An antenna system having reduced back radiation is disclosed. The antenna system includes an antenna and ground plane. The antenna includes electro-textiles and is configured to operate in at least the frequency range between 1.1-1.6 GHz. The ground plane includes electro-textiles and is configured to operate as a frequency selective surface with electronic band gap characteristics to suppress edge and curved surface diffraction effects. In this system, the antenna and ground plane are configured to be located on a curved surface and to radiate with a directional radiation pattern having attenuated back lobes. | 01-23-2014 |
20130301333 | Photonic Quantum Memory - A photonic quantum memory is provided. The photonic quantum memory includes entanglement basis conversion module configured to receive a first polarization-entangled photon pair and to produce a second entangled photon pair. The second polarization-entangled photon pair can he a time-bin entangled or a propagation direction-entangled photon pair. The photonic quantum memory further includes a photonic storage configured to receive the second entangled photon pair from the basis conversion module and to store the second entangled photon pair. | 11-14-2013 |
20130301094 | Method and Apparatus for Quantum Mechanical Entanglement Protection - Embodiments of the present invention provide systems and methods to robustly inter-convert between polarization-entangled photon pairs and time-entangled photon pairs, such that produced polarization-entangled photons pairs can be converted into time-entangled photon pairs, stored as time-entangled photon pairs to preserve the entanglement for longer periods of time, and then converted back to polarization-entangled photon pairs when ready for manipulation, processing, and measurement by a quantum application. | 11-14-2013 |
20130275352 | Identifying and Forecasting Shifts in the Mood of Social Media Users - Quantitatively identifying and forecasting shifts in a mood of social media users is described. An example method includes categorizing the textual messages generated from the social media users over a selected period of time into a plurality of word categories, with each word category containing a set of words associated with the mood of social media users. A score indicating an intensity of the mood of the social media users is calculated for each word category, wherein a value of the score and its corresponding time point define a data point for the word category. Subsequently, breakpoints in the mood of social media users are determined so that the breakpoints minimize a sum of square errors representing a measurement of a consistency of all data points from inferred values of the scores of the data points derived using the breakpoints over the selected period of time. Further, space of all possible breakpoints for the word categories are searched to identify a defined number and locations of the breakpoints. Finally the breakpoints over the selected period of time are interpreted to identify the shifts in the mood of social media users and trends between breakpoints. | 10-17-2013 |
20130262039 | Systems and Methods for Criteria Analysis Prototyping - A flight procedure criteria prototyping system and method is described herein. According to embodiments, the system is configured to generate a prototype, generate a dependency tree based on the prototype, wherein the dependency tree is comprised of one or more dependency tree nodes, translate the dependency tree into one or more construction steps, wherein there is a mapping between the one or more dependency tree nodes and the one or more construction steps, maintain an ordered list of the one or more construction steps, and generate one or more software specifications based on the one or more construction steps. | 10-03-2013 |
20130241783 | Ultra-High Frequency (UHF)-Global Positioning System (GPS) Integrated Antenna System for a Handset - Embodiments provide an integrated antenna system that enables dual-use operation (e.g., communications and navigation). In an embodiment, the integrated antenna system includes a sleeve monopole antenna system and stacked shorted annular ring (SAR) patch antenna system, which are compactly integrated to fit on a military handset or a smart phone. In an embodiment, the integrated antenna system enables communication in the 225-450 MHz Ultra-High Frequency (UHF) band and reception of various Global Navigation Satellite System (GNSS) bands. | 09-19-2013 |
20130231852 | METHODS AND SYSTEMS FOR DETERMINING REQUIRED INTERVAL MANAGEMENT PERFORMANCE (RIMP) - One embodiment provides a method of characterizing an airborne spacing operation. The method includes determining, using a computer, a spacing tolerance based on a performance objective for the airborne spacing operation, determining, using a computer, a minimum state data performance level and a minimum speed performance level based on the spacing tolerance, and providing, using a computer, a required interval management performance (RIMP) category for the airborne spacing operation, the RIMP category specifying the spacing tolerance, the minimum state data performance level, and the minimum speed performance level. | 09-05-2013 |
20130229298 | Threaded Track Method, System, and Computer Program Product - A system, method, and computer program product for determining a trajectory of an item includes segmenting surveillance point data of sensors, by sensor, into track segments for the item, associating the track segments for the item in a segment group for the item, and fusing the track segments in the segment group for the item into a synthetic threaded track for the item. The fusing may include filtering of the track segments for the item across track segments. The filtering across track segments may be based on a weighting of the point track data of the track segments for the item. A system for determining a trajectory of an item may include a processing device configured to execute a threaded track process to convert a data set of surveillance point data into a synthetic threaded track for the item. | 09-05-2013 |
20130227694 | HYGIENIC CHARGING STATION FOR MOBILE DEVICE SECURITY - A mobile device charging station configured to analyze, measure and respond to/correct the state of a mobile device. The charging station can employ an embedded cryptographic subsystem that can make use of anti-tamper/tamper evident techniques to protect stored firmware images/cryptographic material. | 08-29-2013 |
20130179685 | SECURE REMOTE PERIPHERAL ENCRYPTION TUNNEL - A Secure Remote Peripheral Encryption Tunnel (SeRPEnT) can be implemented in a portable embedded device for the Universal Serial Bus (USB) with a much more restricted attack surface than a general purpose client computer. The SeRPEnT device can comprise a small, low-power “cryptographic switchboard” that can operate in a trusted path mode and a pass-through mode. In the trusted path mode, the SeRPEnT device can tunnel connected peripherals through the client to a server with Virtual Machine (VM)-hosted applications. In the pass-through mode, the SeRPEnT device can pass-through the connected peripherals to the client system, allowing normal use of the local system by the user. SeRPEnT can also enable secure transactions between the user and server applications by only allowing input to the VMs to originate from the SeRPEnT device. | 07-11-2013 |
20130121196 | Link Supportability in a WCDMA Communications System - A method, computer program product, and system are provided for computing link supportability in a WCDMA communications system. For example, the method can be used to calculate link supportability of a transponder in satellite communications system (e.g. MUOS) in a user-to-base direction. This method can include expressing a carrier signal to noise ratio spectral density for a communication link of interest in terms of a transponder input power of the communication link of interest, a spectral overlap factor representative of one or more interfering communication links, and a transponder input power of the one or more interfering communication links. Assumptions and approximations can be made to simplify the spectral density expression in order to reduce a dimensionality of terms used in the computation of the expression. As such, in reducing dimensionality, the expression becomes a manageable computation for WCDMA communication systems to evaluate. | 05-16-2013 |
20130110388 | Terminal Aircraft Sequencing and Conflict Resolution | 05-02-2013 |
20130094470 | VDL2 Power Control - Power control of a digital datalink system within an aeronautical telecommunication network is described herein. According to embodiments, the system is configured to calculate the transmission power of an air-based communication station, based on the transmission power used by a ground-based communication station, wherein the transmission power of the air-based communication station is sot to a decibel level higher than or equal to the transmission power of the ground-based communication station. | 04-18-2013 |
20130085660 | Air Traffic Analysis Using a Linear Inequalities Solver - Computer-implemented methods, systems, and computer readable mediums for solving large systems of linear equations, such as for aircraft traffic control and analysis, are disclosed. A method for aircraft traffic control, includes receiving as input, airspace sector information and aircraft traffic information, configuring a homogeneous system of linear inequalities comprising a plurality of linear inequalities based upon the airspace sector information and the aircraft traffic information, and resolving the homogeneous linear system to determine a second airspace sector information and a second aircraft traffic information, wherein the second airspace sector information and the second aircraft traffic information are based upon a predetermined future point of time, and wherein the resolving includes at least one of reducing a maximum infeasibility of the homogeneous linear system and reducing a sum infeasibility of the homogeneous linear system. | 04-04-2013 |
20130044023 | Pseudosynchronizer for an Unsynchronized Bistatic Radar System - Methods and systems for post processing synchronization of bistatic radar data are disclosed. A transmitter is configured to transmit pulses at a first rate controlled by a first local oscillator. A receiver is configured to receive pulses at a second rate controlled by a second oscillator. A processing device is configured to synchronize, with respect to the first rate, in-phase quadrature data received from the receiver using a keystone formatting technique. | 02-21-2013 |
20130040269 | Flight Management System Operator - A method of performing a flight simulation is provided. The method includes retrieving a flight action, mapping the flight action to an instruction, the instruction being is configured to bring about a desired state of a flight simulator, identifying a command based on the desired state of the flight simulator and a first state of the flight simulator, and determining if a second state of the flight simulator after executing the command matches the desired state of the flight simulator. | 02-14-2013 |
20120245873 | CLASSIFYING AND IDENTIFYING MATERIALS BASED ON PERMITIVITY FEATURES - Systems and methods are provided for remotely identifying and classifying materials based on their respective complex permittivity features. Materials of interest to be identified in later inspections are cataloged according to their respective complex permittivity features by applying electromagnetic fields to them and determining their complex permittivity features. That library of features is used to compare field measurements taken during an inspection to determine the presence of a material of interest and to identify it. | 09-27-2012 |
20120238218 | Location-based method to specify ratio frequency spectrum rights - The disclosed methods, systems, and computer-program products generate location-based RF spectrum rights for components in a radio frequency (RF) system. In an embodiment, a location-based spectrum right for an RF system's operational use of RF spectrum includes the spectrum rights of each component of the system, a definition of all locations at which each component might possibly operate, and a specified time period of this operational use. In an additional embodiment, the location-based RF spectrum right include a transmitter right and a receiver right, and the transmitter and receiver rights may be based on a combination of maximum power density, spectrum masks, underlay masks, power maps, locations, minimum power density, start times, end times, protocol specifications, and rules. Most transmitter rights and all receiver rights include propagation maps to articulate the rate at which signals attenuate away from transmitters and toward receivers. | 09-20-2012 |
20120237031 | Generating Identical Numerical Sequences Utilizing a Physical Property and Secure Communication Using Such Sequences - Substantially identical numerical sequences known only to stations A and B are generated in a manner not subject to duplication by an eavesdropper and not subject to cryptanalytic attack because they are not derived using a mathematical function (such, as for example, factoring). The sequences are independently derived utilizing a physical phenomena that can only be “measured” precisely the same at stations A and B. Signals are simultaneously transmitted from each station toward the other through a communication channel having a characteristic physical property capable of modifying the signals in a non-deterministic way, such as causing a phase shift. Each signal is “reflected” by the opposite station back toward its station of origin. The effect of the communication channel is “measured” by comparing original and reflected signals. Measured differences are quantized and expressed as numbers. | 09-20-2012 |
20120225636 | Methods, Systems, and Computer Program Products for Message Filtering Based on Previous Path Trajectories and Probable Destination - Methods, systems and computer program products for filtering generally-broadcast messages received by a movable unit based on current spatial position, stored trajectory history, and probable future trajectories. A current spatial position of the movable unit is received and stored to form a stored trajectory history. A generally-broadcast message relating to a target geographical region is also received and stored. Potential trajectories of the movable unit are then computed over a pre-determined time based on at least one of the current spatial position, a current travel direction of the movable unit, and the stored trajectory history of the movable unit. The generally-broadcast message is then disseminated in response to at least one potential trajectory crossing into the target geographical region during the pre-determined time period. The generally-broadcast message may also be disseminated on the basis of specified user preferences. | 09-06-2012 |
20120215463 | Rapid Genomic Sequence Homology Assessment Scheme Based on Combinatorial-Analytic Concepts - The present invention relates to methods and apparatus for rapid assessment of genomic sequences using the difference set model. The invention provides methods to determine the presence and identity of similarities and differences in genomic sequences. In particular, the invention provides methods and apparatus to assess homology, the presence and identity of insertion and deletion segments and the presence and identity of single nucleotide polymorphisms in genomic sequences. | 08-23-2012 |
20120164666 | Glycoprotein Vesicles and Their Methods of Use - Provided are methods of collecting, detecting and altering cells and molecular entities using glycoprotein micelles and vesicles. Glycoprotein vesicles comprising a glycoprotein micelle, at least a monolayer of lectin and/or a monolayer of biologically active glycoproteins are also provided. The invention further provides methods of detecting protein glycosylation using the vesicles of the invention. | 06-28-2012 |
20120078883 | ACCESSING DOCUMENTS USING PREDICTIVE WORD SEQUENCES - Methods and systems for accessing documents in document collections using predictive word sequences are disclosed. A method for accessing documents using predictive word sequences include creating a candidate list of word sequences where respective ones of the word sequences comprise one or more elements derived from the document corpus; expanding the candidate list by adding one or more new word sequences, where each new pattern is created by combining one or more elements derived from the document corpus with one of the word sequences currently in the candidate list; determining a predictive power with respect to the subject for respective ones of entries of the candidate list, where the entries include the word sequences and the new word sequences; pruning from the candidate list ones of said entries with the determined predictive power less than a predetermined threshold; and accessing documents from the document corpus based on the pruned candidate list. The expanding of the candidate list can include creating each new pattern as a gapped sequence, where the gapped sequence comprises one of the word sequences and one of said elements separated by zero or more words. Corresponding system and computer readable media embodiments are also disclosed. | 03-29-2012 |
20120063600 | APPRAISING SYSTEMS WITH ZERO KNOWLEDGE PROOFS - A system, method, and computer program product are provided for requesting a proof of a security policy in a Ghent system. Additionally, a system, method, and computer program product are provided for proving a security policy to an interrogator system. | 03-15-2012 |
20120032071 | MULTI-MODAL PARTICLE DETECTOR - Systems, methods and computer program products for the multi-modal detection of particles are described herein. An embodiment of the present invention is a particle detector that includes a first chamber wherein analyte particles are subjected to a first particle detection mechanism, and a second chamber coupled to the first chamber, wherein the analyte particles are subjected to a second particle detection mechanism, and wherein the detection characteristics of second particle detection mechanism are orthogonal to detection characteristics of the first particle detection mechanism. According to another embodiment, the present invention is a particle detection method including the steps of detecting presence of at least one predetermined particle type in an analyte particle sample using a first particle detection mechanism, and confirming the presence of the predetermined particle type in the analyte particle sample using a second particle detection mechanism, wherein detection characteristics of the second particle detection mechanism are orthogonal to detection characteristics of the first detection mechanism. | 02-09-2012 |
20110118981 | METHOD AND SYSTEM FOR AIRCRAFT CONFLICT DETECTION AND RESOLUTION - Methods, systems, and computer program products for aircraft conflict detection and resolution are proposed. Embodiments of the present invention detect potential conflicts without a predetermined look-ahead time threshold and determine the time for issuing resolution alerts dynamically based on the relative movements of the aircraft. A method embodiment for detecting a potential airborne conflict between an ownship and at least one intruder includes, determining a relative motion trajectory of the ownship and the intruder, generating a plurality of resolution advisories based upon the determined relative motion trajectory and corresponding to respective motion dimensions of the ownship, determining an alert time for each of the plurality of RAs responsive to the corresponding motion dimension and the determined relative motion trajectory, and transmitting at least one of the plurality of RAs to at least one of the ownship or an aircraft control entity. | 05-19-2011 |
20110071750 | Airport Surface Conflict Detection - Method, system, and computer program product embodiments for conflict detection of vehicles, including aircraft, are presented. According to an embodiment, a method for conflict detection of an aircraft, comprises: reducing one or more vehicle travel paths in a three dimensional space to a first dimension; receiving data corresponding to a motion of the aircraft; mapping the motion to the one or more vehicle travel paths in the first dimension; and transmitting an alert if a potential conflict is determined in the one or more vehicle travel paths in the first dimension. Corresponding system embodiments and computer program product embodiments are also disclosed. | 03-24-2011 |
20110008057 | Rate Adjustable Differential Phase Shift Key (DPSK) Modulation - In a fixed delay optical communication system, rate adjustable differential phase shift key (DPSK) techniques eliminate the need for multiple comparing modules, each corresponding to a different data rate. Setting alternative data rates at integer multiples of the fundamental data rate of the optical communication system allows the system to process the respective integer number of symbols per period of the system, wherein the period of the system is the inverse of the fundamental data rate. Pulse carving techniques may be used to set the duty cycle of clock levels associated with a clock signal. The clock levels may be combined with respective symbols to provide optical symbols having a duty cycle less than 100%. | 01-13-2011 |
20100286848 | INTEGRATING AVIONICS FUNCTIONS - Systems, methods and computer program products for integrating one or more avionics functions are provided herein. In an embodiment avionics functions (e.g., ADS-B functions) are integrated by (1) receiving input from at least one avionics function module that executes at least one avionics function; (2) determining which of the avionics functions to allow to be engaged simultaneously, based on at different factors. In addition, embodiments select from different algorithms for the connected avionics functions. | 11-11-2010 |
20100284440 | Time-Multiplexed Binary Offset Carrier Signaling and Processing - Methods and systems for direct sequence spread spectrum (DSSS) signals are described herein. In an embodiment, a DSSS signal includes a time multiplexed spreading time series. The time multiplexed spreading time series includes a data spreading time series includes at least a first spreading symbol, and a pilot spreading time series includes at least a second spreading symbol and a third spreading symbol. The second spreading symbol and the third spreading symbol are different. | 11-11-2010 |
20100283661 | Observability of unmanned aircraft and aircraft without electrical systems - The present invention relates to a lightweight beacon system, affixable, for example, to UAS, aircraft without electrical systems, airport surface vehicles, skydivers, gliders, and/or balloons. The lightweight beacon system uses a small, low-powered, portable radio beacon to broadcast the location of the aircraft, vehicle, or person to which the beacon system is attached. The lightweight beacon system is compatible with the FAA's Automatic Dependent Surveillance-Broadcast (ADS-B) service, thereby providing a means for unmanned aircraft systems (UAS), aircraft without electrical systems, airport surface vehicles, or persons to be observable to other general aviation aircraft operating in their proximity. | 11-11-2010 |
20100214954 | Reliable Neighbor Node Discovery - Methods and systems for reliable neighbor discovery in wireless ad hoc networks are provided herein. In one aspect, embodiments of the present invention provide methods and systems for analyzing the quality of a communication link. In embodiments, several factors affecting link quality may be incorporated in the analysis, and basic and/or complex statistical and/or probabilistic analysis may be used. In another aspect, embodiments of the present invention provide methods and systems for neighbor node discovery that adapt to network and/or node operating conditions and that dynamically maintain a neighbor node set at a given node according to these conditions. In a further aspect, embodiments of the present invention extend the utility of neighbor node discovery beyond the customary role of data routing support into the problem of deploying an ad hoc network by providing a display module for displaying node connectivity information. | 08-26-2010 |
20100208253 | Multi-Modal Surface Plasmon Polariton - Raman Scattering Based Bio-Detection - Methods and systems for combined SPP and Raman scattering-based bio-detection are provided. Embodiments include a bio-detection system having a microfluidics chip, a Surface Plasmon Polariton (SPP)-based system component, and a Raman scattering-based system component. The SPP-based and the Raman scattering-based system components can be used simultaneously or individually separately to detect biological and/or chemical analytes. The bio-detection system further includes an aerosol collector chip. Embodiments of the present invention can be used aboard means of propagation of biological and/or chemical analytes, including, for example, commercial aircrafts. Embodiments of the present invention can be used to enable an aircraft warning system. | 08-19-2010 |
20100161526 | Ranking With Learned Rules - Systems, methods and computer program products for the ranking of a target data set based on learned rules are disclosed. One embodiment is a method that includes generating a learned rule set from a training data record set, creating at least one prototype for each rule in the learned rule set to generate a prototype set, and ranking the target data record set using learned rule set and the prototype set. The generating of a learned rule set includes dividing the training data record set to a positive class and a negative class, and deriving the learned rule set for the positive class. Learning of rules includes deriving the most general projected rules with respect to remaining training data and then refining those rules, eventually selecting the best rules using an F-measure. | 06-24-2010 |
20100131599 | Methods, Systems, and Computer Program Products For Instant Messaging - Systems, methods and computer program products for monitoring the receipt of instant messages between two or more participants in a messaging environment are described herein. An embodiment of the invention operates by receiving a message from a sender. The message is displayed in a chat client of a recipient. Such message is displayed in an encrypted form to prevent human intelligible display of the message. An indication of selection of the message by the recipient is received. Thereafter, the message is displayed in the chat client in an unencrypted form, and an acknowledgement is sent to the sender. The sender updates a message status identifier by filling the message status identifier with a color or updating an icon or any other visual cue or identifier, uniquely identifying the message recipient, to thereby note the selection of the message by the recipient. In this way, the recipient of a message must select the message in order to view the message in its unencrypted form. When the recipient selects the message with a mouse pointer or any other interaction method, an acknowledgement is sent to the sender, indicating that the message has been viewed by the recipient. This prevents an assumption by the sender that the message has been viewed by the recipient until it is actually viewed in its unencrypted form. | 05-27-2010 |
20100123091 | Quantum Sensor Miniaturization Utilizing Entangled Photon Signals - The resolution obtained by an imaging system utilizing separable photons can be achieved by an imaging system making use of entangled photons. Since resolution is not being increased from the separable-photon system, the imaging system utilizing entangled photons can take advantage of a smaller aperture. This results in a smaller and lighter system, which can be especially valuable in satellite imaging where weight and size play a vital role. | 05-20-2010 |
20100120007 | Fluid Percussion System and Method for Modeling Penetrating Brain Injury - A fluid percussion system for modeling penetrating brain injury includes a fluid percussion device that takes inputs in the form of pressurized gas and electrical signals from a computer and outputs a single hydraulic pulse, or multiple hydraulic pulses in quick succession. The fluid percussion device may include a pneumatic cylinder assembly and a hydraulic cylinder assembly that is actuated by the pneumatic cylinder assembly to produce the hydraulic pulse(s) of pressurized fluid. Each pulse may be used to rapidly inflate and deflate an attached balloon (representing a brain penetrating device). The balloon may be inserted in a test specimen, and the rapid inflation and deflation of the balloon creates a lesion that simulates a penetrating brain injury. A calibration system that employs an optical sensor may be used to determine maximum balloon diameter achieved during rapid inflation. | 05-13-2010 |
20100080386 | Generating Identical Numerical Sequences Utilizing a Physical Property and Secure Communication Using Such Sequences - Substantially identical numerical sequences known only to stations A and B are generated in a manner not subject to duplication by an eavesdropper and not subject to cryptanalytic attack because they are not derived using a mathematical function (such, as for example, factoring). The sequences are independently derived utilizing a physical phenomena that can only be “measured” precisely the same at stations A and B. Signals are simultaneously transmitted from each station toward the other through a communication channel having a characteristic physical property capable of modifying the signals in a non-deterministic way, such as causing a phase shift. Each signal is “reflected” by the opposite station back toward its station of origin. The effect of the communication channel is “measured” by comparing original and reflected signals. Measured differences are quantized and expressed as numbers. | 04-01-2010 |
20100076996 | SYSTEM AND METHOD FOR AUDIO HOT SPOTTING - Audio hot spotting is accomplished by specifying query criterion to include a non-lexical audio cue. The non-lexical audio cue can be, e.g., speech rate, laughter, applause, vocal effort, speaker change or any combination thereof. The query criterion is retrieved from an audio portion of a file. A segment of the file containing the query criterion can be provided to a user. The duration of the provided segment can be specified by the user along with the files to be searched. A list of detections of the query criterion within the file can also be provided to the user. Searches can be refined by the query criterion additionally including a lexical audio-cue. A keyword index of topic terms contained in the file can also be provided to the user. | 03-25-2010 |
20100040035 | Interference canceling CDMA mobile station receiver - A receiver that provides interference cancellation in conjunction with RAKE processing. Signal parameters corresponding to each of a plurality of fingers corresponding to RAKE processing are maintained. Synthesized pilot signals are estimated using the signal parameters by interpolating waveforms for respective ones of the plurality of synthesized pilot signals to a common sampling lattice of the received set of data, and are then cancelled out. According to another aspect, a receiver ensures completion of a time-critical process such as signal demodulation and adaptively applies a non-time-critical process such as interference cancellation to the extent that computational resources become available subject to ensuring the completion of the time-critical process. | 02-18-2010 |
20100031047 | ATTESTATION ARCHITECTURE AND SYSTEM - An architecture and system are provided for flexible, composable attestation systems. Systems built according to this attestation architecture can be composed to accomplish complex attestation scenarios. The system is designed around composable components to permit flexible recombination. A system, method, and computer program product are provided for proving attestations to an appraiser regarding a target system. In an embodiment, an attestation request is sent from an appraiser to a target system, wherein the attestation request includes queries regarding properties of the target system needed by the appraiser to make trust decisions regarding the target system. The attestation request is forwarded from the target system to an attester which collects the requested data. The attester sends an attestation response to the appraiser, wherein the response includes at least information regarding properties of the target system requested by the appraiser in order to make a trust decision regarding the target system. | 02-04-2010 |
20100014675 | Appraising Systems With Zero Knowledge Proofs - A system, method, and computer program product are provided for requesting a proof of a security policy in a client system. Additionally, a system, method, and computer program product are provided for proving a security policy to an interrogator system. | 01-21-2010 |
20100008228 | Network Cross-Domain Precedence and Service Quality Conflict Mitigation - A method, computer program product, and system are provided for prioritizing data in a network system. For example, an embodiment of the method may include allocating network system resources to high-priority data with an identifier and dynamically changing a threshold level from a pre-assigned, minimum level in the allocation of network resources based on data traffic with the identifier received by a communication device in the network system. In allocating network system resources, the data with the identifier may be filtered into a separate data stream from data without the identifier. For instance, the data stream containing data with the high-priority identifier may be directed to a high-priority buffer that has a minimum allocation of network resources dedicated to the buffer to ensure unencumbered data transfer between the communication device and a destination within the network system. Further, in dynamically changing the threshold level, network resources may be allocated to data with a high-priority identifier as the high-priority data is received by the communication device. A prioritization of network resource queue space for the data with the high-priority identifier and then a prioritization of data without the high-priority identifier in the remaining queue space, if any, according to Quality of Service (QoS) requirements may be required when allocating network resources. Therefore, the method described above may be used to propagate prioritized data across a network while accommodating for QoS requirements. | 01-14-2010 |
20090276416 | Comparing Anonymized Data - Systems, methods and computer program products for the comparison of anonymized data entries are disclosed. In one embodiment the present invention is a computer-implemented method for comparing anonymized data entries, including separately processing data entries in a query list and a search database by: normalizing, generating variants, scoring, and anonymizing. The expanded and anonymized data entries in the query list and the search database are then compared to find an exact match. In another embodiment, the present invention is a system for comparing anonymized data entries, having a list expansion module, an anonymizer module, and a matching module. | 11-05-2009 |
20090238723 | Multi-modal particle detector - Systems, methods and computer program products for the multi-modal detection of particles are described herein. An embodiment of the present invention is a particle detector that includes a first chamber wherein analyte particles are subjected to a first particle detection mechanism, and a second chamber coupled to the first chamber, wherein the analyte particles are subjected to a second particle detection mechanism, and wherein the detection characteristics of second particle detection mechanism are orthogonal to detection characteristics of the first particle detection mechanism. According to another embodiment, the present invention is a particle detection method including the steps of detecting presence of at least one predetermined particle type in an analyte particle sample using a first particle detection mechanism, and confirming the presence of the predetermined particle type in the analyte particle sample using a second particle detection mechanism, wherein detection characteristics of the second particle detection mechanism are orthogonal to detection characteristics of the first detection mechanism. | 09-24-2009 |
20090192974 | Decomposing Human Behavior Into Quantified Layers of Perception - A method, computer program product, and system are provided for decomposing human behavior into quantifiable layers of perception. The method for decomposing human behavior into quantifiable layers of perception may be referred to as “DAP-E,” which is an acronym representative of four main phases of the method. Theses phases include the following: decompose; aggregate; propagate; and, evaluate. For example, an embodiment of the method may include aggregating one or more outputs from one or more behavioral models to represent a statistically significant conclusion and propagating the conclusion across a social network to allow opinions of a first entity within the social network to influence a conclusion of a second entity. The method may also include updating the one or more behavioral models based on new data. In aggregating the one or more outputs, the one or more behavioral models, which may be from a field of psychology, may be correlated to one or more layers of perception relating to a topic of interest. Further, the outputs may be aggregated using a Bayesian belief network to calculate an impact that the one or more outputs have on beliefs of a decision maker. A token passing behavior algorithm may be used to weigh an opinion of an entity receiving a token when propagating the conclusion across the social network. An increase in a percent confidence score from the Bayesian belief network may result from an aggregation of updated behavioral model outputs. | 07-30-2009 |
20090168861 | Link Supportability In A WCDMA Communications System - A method, computer program product, and system are provided for computing link supportability in a WCDMA communications system. For example, the method can be used to calculate link supportability of a transponder in satellite communications system (e.g. MUOS) in a user-to-base direction. This method can include expressing a carrier signal to noise ratio spectral density for a communication link of interest in terms of a transponder input power of the communication link of interest, a spectral overlap factor representative of one or more interfering communication links, and a transponder input power of the one or more interfering communication links. Assumptions and approximations can be made to simplify the spectral density expression in order to reduce a dimensionality of terms used in the computation of the expression. As such, in reducing dimensionality, the expression becomes a manageable computation for WCDMA communication systems to evaluate. | 07-02-2009 |
20090128401 | SYSTEM AND METHOD FOR MONITORING TARGETS - A system comprising a moving radar, a processing device, and a phase difference determination device is used to monitor a target. The moving radar has first and second phase centers that transmit and receive signals normal to a direction of movement of the radar. The processing device receives first and second ones of the received signals from the first and second phase centers, respectively, and performs a target motion compensation and target acceleration correction for each of the first and second received signals to produce first and second images. The phase difference determination device determines a phase difference image from a comparison of the first and second images. | 05-21-2009 |
20090103729 | HAIPE Peer Discovery Using BGP - A system, method, and computer program product are provided for performing peer discovery of HAIPE devices. | 04-23-2009 |
20090091492 | Detection and mitigation radio frequency memory (DRFM)-based interference in synthetic aperture radar (SAR) images - Methods and systems for detecting and mitigating DRFM-based interference in SAR images are provided. Embodiments include methods and systems for detecting and removing DRFM-based interference from SAR images by exploiting multi-channel SAR data. Embodiments provide an Electronic Counter Counter Measure (ECCM) technique that is effective against, among others, SAR DRFM-based repeater jamming, false target images, noise jamming, and vector multiplier jamming for false scene generation. When used, embodiments of the present invention reduce jammer effectiveness to a small range strip (a strip parallel to the range dimension) in the direction of the jammer. In addition, jammer mitigation is performed without losing SAR image data at the affected SAR pixels. Furthermore, embodiments of are compatible with time variable ECCM techniques, including orthogonal waveforms or pulse jitter techniques, for example. | 04-09-2009 |
20090000198 | Mechanical Arm System for Opening a Door - A mechanical arm system for opening a door includes an actuator assembly having an output shaft and an arm driven by the output shaft so as to move the door from a closed position toward an open position. The arm is free from contact with the door when the door moves from the open position to the closed position. The actuator assembly is mounted to a support member adjacent the door. The arm extends between the output shaft and the door. The arm may be moveable between a position in which the arm contacts the door in the open position and a retracted position in which the arm is free from contact with the door in the closed position. The arm may be moved to the retracted position before the door reaches the open position so as to abort the opening of the door. | 01-01-2009 |
20080273743 | Synthesis of databases of realistic, biologically-based 2-D images - A method and computer program product to create an unlimited number of synthetic but realistic, biologically-based, 2-D images like irises and magnetic resonance images (MRIs), as well as other images is presented. New metrics for measuring the mathematical distance of such synthetic images from a source (original) image have also been proposed. These metrics and the synthesis procedure are applicable to the development of image retrieval systems. The presented method can be extended to synthetic images of non-biological origins too. | 11-06-2008 |
20080271143 | Insider threat detection - Methods, systems, and computer program products for insider threat detection are provided. Embodiments detect insiders who act on documents and/or files to which they have access but whose activity is inappropriate or uncharacteristic of them based on their identity, past activity, and/or organizational context. Embodiments work by monitoring the network to detect network activity associated with a set of network protocols; processing the detected activity to generate information-use events; generating contextual information associated with users of the network; and processing the information-use events based on the generated contextual information to generate alerts and threat scores for users of the network. Embodiments provide several information-misuse detectors that are used to examine generated information-use events in view of collected contextual information to detect volumetric anomalies, suspicious and/or evasive behavior. Embodiments provide a user threat ranking system and a user interface to examine user threat scores and analyze user activity. | 10-30-2008 |
20080263197 | Passively attributing anonymous network events to their associated users - Systems, methods, and computer program products for passively attributing anonymous network events to their associated users are provided herein. Embodiments include filtering network events over a pre-determined time interval to generate a filtered event list. In an embodiment, event attribution includes attributing an anonymous network event to a user associated with a nearest-neighbor event relative to the anonymous network event. In another embodiment, event attribution includes attributing an anonymous network event to a user associated with an event in the filtered event list, wherein that user maximizes an event attribution function. In a further embodiment, event attribution includes determining a first potential attribution user for an anonymous network event based on a nearest-neighbor attribution approach; determining a second potential attribution user for the anonymous network event based on an event attribution function approach; and comparing the first and second potential attribution users to determine the attribution of the anonymous event. | 10-23-2008 |
20080260001 | Time-multiplexed binary offset carrier signaling and processing - Methods and systems for direct sequence spread spectrum (DSSS) signals are described herein. In an embodiment, a DSSS signal includes a time multiplexed spreading time series. The time multiplexed spreading time series includes a data spreading time series includes at least a first spreading symbol, and a pilot spreading time series includes at least a second spreading symbol and a third spreading symbol. The second spreading symbol and the third spreading symbol are different. | 10-23-2008 |
20080219327 | Spreading code derived from weil sequences - Methods and systems relating to Weil-based spreading codes are described herein. In an embodiment, a method includes generating a set of Weil sequences, adapting a plurality of sequences of the set of Weil sequences to form a first plurality of codes, and selecting a second plurality of codes from the first plurality of codes. A code of the first plurality of codes is selected based at least on a correlation associated with the code. Each code of the first plurality of codes has a predetermined length. | 09-11-2008 |
20080218316 | RFID Tag Detection And Re-Personalization - Systems, methods and computer program products for detecting and re-personalizing are provided herein. In an embodiment, the invention operates by obtaining an ID (i.e., an identification, such as a Dynamic Unique Identifier) from a RFID tag, generating a new ID, and writing the new ID to the RFID tag. The ID read from the tag is used to lookup a subject's record in a database. If the write of the new ID to the tag is verified, then database changes are committed to link the new ID to the subject. In an alternative embodiment, the invention operates by obtaining data from a memory of a RFID tag, wherein the memory has a first partition and a second partition, generating a new ID, and writing the new ID to either of the first partition or the second partition of the RFID tag. If such write is verified, then the new ID is written to the other partition of the RFID tag. The data from the tag is used to lookup a subject's record in a database. If either write to the first partition or second partition is verified, then database changes are committed to link the new ID to the subject. | 09-11-2008 |