Patent application number | Description | Published |
20090006301 | MULTI-PLATFORM BUSINESS CALCULATION RULE LANGUAGE AND EXECUTION ENVIRONMENT - Computer-readable storage media, computer-implemented methods, and systems are disclosed for a multi-platform calculation rule language and its environment. A calculation rule, presented in an expression language and specifying one or more functions, is received. The expression language, for a plurality of different platforms, allows each of a plurality of functions to be expressed using a common syntax. A selected platform is identified on which the calculation rule is to be executed. The calculation rule is resolved to the attributes of the data model in the selected platform to apply the calculation rule to the data model. The calculation rule is executed by performing the one or more functions specified in the calculation rule, and the results from executing the calculation rule are reported. | 01-01-2009 |
20090006370 | ADVANCED TECHNIQUES FOR SQL GENERATION OF PERFORMANCEPOINT BUSINESS RULES - Computer-implemented methods and computer-readable storage media are disclosed to facilitate the application of business rules. A rule is received, the rule defining one or more calculations to be performed on specified data stored in a multidimensional database to yield at least one result. At least one database query is generated seeking the specified data to be retrieved from the multidimensional database. An intermediary table is created to accommodate the specified data retrieved from the multidimensional database. The specified data is stored in the intermediary table and the specified data is manipulated when the data is retrieved or after the specified data is stored in the intermediary table. | 01-01-2009 |
20090292730 | SPREADSHEET FORMULA TRANSLATION OF SERVER CALCULATION RULES - Architecture includes for translating server calculations into client application formulas. The architecture determines dependencies, performs formulae translation, and processes data retrieval queries using the translated formulae. In one implementation, the architecture translates performance management server calculations into spreadsheet application formulas so that the impact of changes can be reflected immediately. Moreover, this technique does not require updating and querying of the performance management server. An algorithm is provided that allows translation of the backend formula (e.g., MDX—multidimensional expressions) directly into the spreadsheet application such that the impact on calculated values by an input change can be reflected instantaneously in the sheet. | 11-26-2009 |
Patent application number | Description | Published |
20100174712 | EXPERTISE RANKING USING SOCIAL DISTANCE - Tools and techniques for expertise ranking using social distance are provided. These tools may receive search queries from users, and extract from these search queries record identifiers associated with the users. In addition, the tools may extract query strings from the search queries. In connection with processing these queries, the tools may identify other users associated with a given user, with some of these other users being first-level colleagues of a given user, and some of these other users being second-level colleagues. The tools may identify documents within a search store that are associated with the other users, and may search these documents for any occurrences of the query string. In turn, results of the search may be ranked based on a social distance between the user and the other users, with the social distance indicating whether the other users are first-level or second-level colleagues of the user. | 07-08-2010 |
20110106850 | Relevant Individual Searching Using Managed Property and Ranking Features - Embodiments are configured to provide information relevant to individuals of interest to a searching user. In an embodiment, a method includes identifying relevant individuals of a network using a relevance model that includes the use of a number of managed properties and ranking features to identify relevant individuals of a defined network. The relevance model of one embodiment is defined by a schema that includes a textual matching ranking feature, social distance ranking feature, a levels to top ranking feature, and a proximity ranking feature. | 05-05-2011 |
20110145218 | SEARCH SERVICE ADMINISTRATION WEB SERVICE PROTOCOL - The embodiments described herein generally relate to a method and system for enabling a client to configure and control the crawling function available through a crawl configuration Web service. A client is able to configure and control the crawling function by defining the URL space of the crawl. Such space may be defined by configuring the starting point(s) and other properties of the crawl. The client further configures the crawling function by creating and configuring a content source and/or a crawl rule. Further, a client defines authentication information applicable to the crawl to enable the discovery and retrieval of electronic documents requiring authentication and/or authorization information for access thereof. A protocol governs the format, structure and syntax (using a Web Services Description Language schema) of messages for communicating to and from the Web crawler through an application programming interface on a server hosting the crawler application. | 06-16-2011 |
20120102024 | Result Types For Conditional Data Display - A set of user interfaces is provided to an administrator of a website. The user interfaces enable the administrator to configure search functionality of the website to present different types of search results differently. For instance, the administrator can use the user interfaces to configure the search functionality to present different properties for search results belonging to different result types. | 04-26-2012 |
20120102095 | Templates For Displaying Data - A client device presents a resource to a user. In order to present the resource, the client device generates and renders one or more presentation strings. The client device generates a presentation string by identifying a template module that corresponds to an content resource object in a dataset downloaded by the client device. The client device then performs a template execution operation on the content resource object. The template module corresponding to the content resource object specifies the template execution operation. | 04-26-2012 |
20120102386 | Customization of Display Templates - A server system enables users to configure user interfaces. A generic presentation string is stored at a data storage system. The generic presentation string is renderable to present an unfilled template that may include one or more slots. A template module is generated from the generic presentation string. The generic presentation string specifies a transformation operation. A template execution operation generates presentation strings renderable to present filled templates. In the filled templates, data based on objects belonging to a given type replace the slots of the unfilled template. | 04-26-2012 |
20120278304 | RELEVANT INDIVIDUAL SEARCHING USING MANAGED PROPERTY AND RANKING FEATURES - Embodiments are configured to provide information relevant to individuals of interest to a searching user. In an embodiment, a method includes identifying relevant individuals of a network using a relevance model that includes the use of a number of managed properties and ranking features to identify relevant individuals of a defined network. The relevance model of one embodiment is defined by a schema that includes a textual matching ranking feature, social distance ranking feature, a levels to top ranking feature, and a proximity ranking feature. | 11-01-2012 |
20130133046 | SEARCH SERVICE ADMINISTRATION WEB SERVICE PROTOCOL - The embodiments described herein generally relate to a method and system for enabling a client to configure and control the crawling function available through a crawl configuration Web service. A client is able to configure and control the crawling function by defining the URL space of the crawl. Such space may be defined by configuring the starting point(s) and other properties of the crawl. The client further configures the crawling function by creating and configuring a content source and/or a crawl rule. Further, a client defines authentication information applicable to the crawl to enable the discovery and retrieval of electronic documents requiring authentication and/or authorization information for access thereof. A protocol governs the format, structure and syntax (using a Web Services Description Language schema) of messages for communicating to and from the Web crawler through an application programming interface on a server hosting the crawler application. | 05-23-2013 |
Patent application number | Description | Published |
20090042790 | TRANSMUCOSAL DELIVERY OF PEPTIDE DERIVATIVES - What is described is a biological agent, comprised of a biologically active protein, or a fragment or a mimetic thereof, conjugated to at least one poly(alkylene oxide) chain having a size less than about 20 kDa, pharmaceutical formulations for intranasal delivery of said biological agent, or uses of said biological agent in the manufacture of said pharmaceutical formulation for administering said biological agent to a mammal. | 02-12-2009 |
20100166811 | GRAS COMPOSITION FOR INTRANASAL DELIVERY OF PARATHYROID HORMONE - What is described is an aqueous pharmaceutical composition for intranasal delivery of PTH, comprising a PTH molecule, and one or more excipients selected from the group consisting of a chelating agent, an alcohol, and a surface active agent, wherein the PTH molecule selected from the group consisting of SEQ NO: 1, SEQ NO: 2, and SEQ NO: 3. | 07-01-2010 |
20100184688 | COMPOSITIONS AND METHODS FOR ENHANCED MUCOSAL DELIVERY OF PARATHYROID HORMONE - Pharmaceutical compositions and methods are described comprising at least a parathyroid hormone peptide (PTH) preferably PTH | 07-22-2010 |
Patent application number | Description | Published |
20080260744 | G PROTEIN COUPLED RECEPTORS AND USES THEREOF - The present invention provides GPCR polypeptides and polynucleotides, recombinant materials, and transgenic mice, as well as methods for their production. The polypeptides and polynucleotides are useful, for example, in methods of diagnosis and treatment of diseases and disorders. The invention also provides methods for identifying compounds (e.g., agonists or antagonists) using the GPCR polypeptides and polynucleotides of the invention, and for treating conditions associated with GPCR dysfunction with the GPCR polypeptides, polynucleotides, or identified compounds. The invention also provides diagnostic assays for detecting diseases or disorders associated with inappropriate GPCR activity or levels. | 10-23-2008 |
20090178153 | G PROTEIN COUPLED RECEPTORS AND USES THEREOF - The present invention provides GPCR polypeptides and polynucleotides, recombinant materials, and transgenic mice, as well as methods for their production. The polypeptides and polynucleotides are useful, for example, in methods of diagnosis and treatment of diseases and disorders. The invention also provides methods for identifying compounds (e.g., agonists or antagonists) using the GPCR polypeptides and polynucleotides of the invention, and for treating conditions associated with GPCR dysfunction with the GPCR polypeptides, polynucleotides, or identified compounds. The invention also provides diagnostic assays for detecting diseases or disorders associated with inappropriate GPCR activity or levels. | 07-09-2009 |
20110185439 | G PROTEIN COUPLED RECEPTORS AND USES THEREOF - The present invention provides GPCR polypeptides and polynucleotides, recombinant materials, and transgenic mice, as well as methods for their production. The polypeptides and polynucleotides are useful, for example, in methods of diagnosis and treatment of diseases and disorders. The invention also provides methods for identifying compounds (e.g., agonists or antagonists) using the GPCR polypeptides and polynucleotides of the invention, and for treating conditions associated with GPCR dysfunction with the GPCR polypeptides, polynucleotides, or identified compounds. The invention also provides diagnostic assays for detecting diseases or disorders associated with inappropriate GPCR activity or levels. | 07-28-2011 |
20110214189 | G PROTEIN COUPLED RECEPTORS AND USES THEREOF - The present invention provides GPCR polypeptides and polynucleotides, recombinant materials, and transgenic mice, as well as methods for their production. The polypeptides and polynucleotides are useful, for example, in methods of diagnosis and treatment of diseases and disorders. The invention also provides methods for identifying compounds (e.g., agonists or antagonists) using the GPCR polypeptides and polynucleotides of the invention, and for treating conditions associated with GPCR dysfunction with the GPCR polypeptides, polynucleotides, or identified compounds. The invention also provides diagnostic assays for detecting diseases or disorders associated with inappropriate GPCR activity or levels. | 09-01-2011 |
20130247233 | G PROTEIN COUPLED RECEPTORS AND USES THEREOF - The present invention provides GPCR polypeptides and polynucleotides, recombinant materials, and transgenic mice, as well as methods for their production. The polypeptides and polynucleotides are useful, for example, in methods of diagnosis and treatment of diseases and disorders. The invention also provides methods for identifying compounds (e.g., agonists or antagonists) using the GPCR polypeptides and polynucleotides of the invention, and for treating conditions associated with GPCR dysfunction with the GPCR polypeptides, polynucleotides, or identified compounds. The invention also provides diagnostic assays for detecting diseases or disorders associated with inappropriate GPCR activity or levels. | 09-19-2013 |
Patent application number | Description | Published |
20090094378 | Software Deployment Using Client Location - A software distribution mechanism evaluates network addresses of requesting clients to determine a location for each client. The clients from a particular location are grouped together and a fraction of those clients in a particular group are recipients of a software distribution. The faction is adjusted to enable more or fewer clients to download, thus effectively throttling the amount of bandwidth consumed by a mass distribution event. The fraction may be adjusted for particular geographical locations and the time of day to make more effective use of network bandwidth. | 04-09-2009 |
20130067064 | NETWORK ADAPTIVE CONTENT DOWNLOAD - Techniques for managing content downloads to a computing device. The techniques include an agent on the computing device determining for each network of a plurality of networks available to the computing device, costs of downloading content and an exemption list. The exemption list includes content downloads that are exempted from costs charged by a particular network. The agent determines possible content downloads for the computing device. The agent also assesses potential costs associated with the possible content downloads based upon the costs and exemption lists determined for the plurality of networks. Based upon the assessment, the agent selects one of the networks for downloading at least part of the possible content downloads. | 03-14-2013 |
20130067599 | Software distribution service federation - Software update distribution techniques are disclosed. Authentication information is received, from a content source authenticator, by an update agent included in a client device. The authentication information comprises a list of a plurality of content sources, wherein the plurality of content sources have been verified by the content source authenticator as being authentic content sources for legitimate software applications. The update agent selects a first content source of the plurality of content sources, where the first content source is configured to provide updates for a first software application. The update agent checks the first content source for updates for the first software application. | 03-14-2013 |
20140047425 | INITIATING UPDATE OPERATIONS - Techniques for initiating update operations are described. In implementations, updates are gathered for a computing device, and grouped based on whether the updates involve a device restart and/or shutdown operation to be installed. Thus, updates that involve a restart can be installed as a group, such as part of a single update and restart operation. In at least some implementations, an update and restart operation for installing updates can be scheduled. A user can be notified of the upcoming update and restart operation, such as via notifications presented in various ways on a computing device. When a scheduled time for an update and restart operation arrives for a device, a variety of factors can be considered in determining whether to initiate the operation. For instance, user presence information and device state information can be considered. | 02-13-2014 |
20140101779 | Software Distribution Service Federation - Software update distribution techniques are disclosed. Authentication information is received, from a content source authenticator, by an update agent included in a client device. The authentication information comprises a list of a plurality of content sources, wherein the plurality of content sources have been verified by the content source authenticator as being authentic content sources for legitimate software applications. The update agent selects a first content source of the plurality of content sources, where the first content source is configured to provide updates for a first software application. The update agent checks the first content source for updates for the first software application. | 04-10-2014 |
Patent application number | Description | Published |
20110258198 | USING BEHAVIOR DATA TO QUICKLY IMPROVE SEARCH RANKING - Systems and methods for applying user behavior data to improve serach query result ranking are provided. Upon receiving an update file indicating that recent, significant user behavior data is available for a document associated with an inverted index, the update file is published periodically and frequently to an index server. After filtering out the relevant update information from the update file, the index server extracts identifiers of the documents having the associated user behavior data. The update file and the identifier of the documents are utilized to update an in-memory index containing representations of metadata indicative of the user behavior. The in-memory index is continuously updated and utilized to serve search query results in response to user search queries. Search query results from the in-memory index are ranked using the user behavior data prior to serving. Thus, results associated with recent, significant user-behavior metadata receive prominent placement on the search results page. | 10-20-2011 |
20110295844 | ENHANCING FRESHNESS OF SEARCH RESULTS - Methods, systems, and computer-storage media for improving the freshness, or the apparent freshness, of search results are described. In an embodiment, the first portion of search results presented on a search results page are based on responsiveness to the search query and a second portion of results describe only recently published documents that are responsive to the search query. In an embodiment, a more recent version of the document, which is not directly used to determine responsiveness, is used to build the caption for a search result. Another way to make search results appear fresh is to include a publication time within the search result caption. In one embodiment, the publication time is generated by calculating a point in time between when a document is first added to a search index and the previous time the search engine visited the site where the document was found. | 12-01-2011 |
20120150833 | USING SOCIAL-NETWORK DATA FOR IDENTIFICATION AND RANKING OF URLS - Methods, systems, and computer-readable media are provided for updating a search index with new uniform resource locators (URLs) and with metadata for new and known URLs. Data associated with communications made by users using a social network is received. The communications include a URL therein that a user has shared, posted, or otherwise communicated to one or more other users using the social network. When the URL is not found in a search index it is identified as a new URL and is added to the search index. A measure of a trending interest, or virality, of the URL is determined from the data. The determined virality is associated with the URL in a search index as metadata. The virality is useable to inform a ranking of the URL against a plurality of other URLs for identification and presentation as a search result in a search engine results page. | 06-14-2012 |
Patent application number | Description | Published |
20110182481 | VOICE-BODY IDENTITY CORRELATION - A system and method are disclosed for tracking image and audio data over time to automatically identify a person based on a correlation of their voice with their body in a multi-user game or multimedia setting. | 07-28-2011 |
20110190055 | VISUAL BASED IDENTITIY TRACKING - A video game system (or other data processing system) can visually identify a person entering a field of view of the system and determine whether the person has been previously interacting with the system. In one embodiment, the system establishes thresholds, enrolls players, performs the video game (or other application) including interacting with a subset of the players based on the enrolling, determines that a person has become detectable in the field of view of the system, automatically determines whether the person is one of the enrolled players, maps the person to an enrolled player and interacts with the person based on the mapping if it is determined that the person is one of the enrolled players, and assigns a new identification to the person and interacts with the person based on the new identification if it is determined that the person is not one of the enrolled players. | 08-04-2011 |
20120165097 | VISUAL BASED IDENTITIY TRACKING - A video game system (or other data processing system) can visually identify a person entering a field of view of the system and determine whether the person has been previously interacting with the system. In one embodiment, the system establishes thresholds, enrolls players, performs the video game (or other application) including interacting with a subset of the players based on the enrolling, determines that a person has become detectable in the field of view of the system, automatically determines whether the person is one of the enrolled players, maps the person to an enrolled player and interacts with the person based on the mapping if it is determined that the person is one of the enrolled players, and assigns a new identification to the person and interacts with the person based on the new identification if it is determined that the person is not one of the enrolled players. | 06-28-2012 |
20120257797 | BIOMETRIC RECOGNITION - A method for biometric identification for use with a computing device is provided herein. The method includes capturing a temporal sequence of images of the face of a user at different locations within a three-dimensional interaction space. The method further includes extracting one or more face descriptors from the images and generating a biometric template compiling the face descriptors. | 10-11-2012 |
20120327193 | VOICE-BODY IDENTITY CORRELATION - A system and method are disclosed for tracking image and audio data over time to automatically identify a person based on a correlation of their voice with their body in a multi-user game or multimedia setting. | 12-27-2012 |
20130251244 | REAL TIME HEAD POSE ESTIMATION - Methods are provided for generating a low dimension pose space and using the pose space to estimate one or more head rotation angles of a user head. In one example, training image frames including a test subject head are captured under a plurality of conditions. For each frame an actual head rotation angle about a rotation axis is recorded. In each frame a face image is detected and converted to an LBP feature vector. Using principal component analysis a PCA feature vector is generated. Pose classes related to rotation angles about a rotation axis are defined. The PCA feature vectors are grouped into a pose class that corresponds to the actual rotation angle associated with the PCA feature vector. Linear discriminant analysis is applied to the pose classes to generate the low dimension pose space. | 09-26-2013 |
20140105504 | ILLUMINATION SENSITIVE FACE RECOGNITION - Systems and methods for face recognition are provided. In one example, a method for face recognition includes receiving a user image and detecting a user luminance of data representing the user's face. An adaptive low pass filter is selected that corresponds to the user luminance of the user's face. The filter is applied to the user image to create a filtered user image. The filtered user image is projected to create a filtered user image representation. A filtered reference image representation that has been filtered with the same low pass filter is selected from a reference image database. The method then determines whether the filtered reference image representation matches the filtered user image representation. | 04-17-2014 |
20140237587 | Managed Biometric Identity - A computing system such as a game console maintains and updates a biometric profile of a user. In one aspect, biometric data of the user is continuously obtained from a sensor such as an infrared and visible light camera, and used to update the biometric profile using a machine learning process. In another aspect, a user is prompted to confirm his or her identify when multiple users are detected at the same time and/or when the user is detected with a confidence level which is below a threshold. A real-time image of the user being identified can be displayed on a user interface with user images associated with one or more accounts. In another aspect, the biometric profile is managed by a shell on the computing system, where the shell makes the biometric profile available to any of a number of applications on the computing system. | 08-21-2014 |
20140349747 | BIOMETRIC RECOGNITION - A method for biometric identification for use with a computing device is provided herein. The method includes capturing a temporal sequence of images of the face of a user at different locations within a three-dimensional interaction space. The method further includes extracting one or more face descriptors from the images and generating a biometric template compiling the face descriptors. | 11-27-2014 |
20150038230 | VISUAL BASED IDENTITY TRACKING - A video game system (or other data processing system) can visually identify a person entering a field of view of the system and determine whether the person has been previously interacting with the system. In one embodiment, the system establishes thresholds, enrolls players, performs the video game (or other application) including interacting with a subset of the players based on the enrolling, determines that a person has become detectable in the field of view of the system, automatically determines whether the person is one of the enrolled players, maps the person to an enrolled player and interacts with the person based on the mapping if it is determined that the person is one of the enrolled players, and assigns a new identification to the person and interacts with the person based on the new identification if it is determined that the person is not one of the enrolled players. | 02-05-2015 |
Patent application number | Description | Published |
20090083272 | Role-based user tracking in service usage - Devising a centralized usage database for tracking and recording the usage of various services by various users may be difficult for several reasons, including the volume of data generated by each user in interacting with each service. Techniques are disclosed for streamlining usage data transmitted between the services, the users, and the usage database, such as by redistributing a portion of the computational burden to the users, and by characterizing the usage data based on the role of each user in interacting with each service. Additional techniques are disclosed for caching and authenticating the usage data, and for improving the response rate in the interaction of the usage database with users in order to provide a better user experience. | 03-26-2009 |
20090083367 | User profile aggregation - User profile data that may be spread across different service providers and that may vary across different service providers can be aggregated to provide an aggregate user profile. An aggregate user profile can be generated regardless of, among other things, varying user profile semantics, differing data formats, data item conflicts, evolving server protocols and interfaces, and updates to the number, identity, location, and type of servers upon which the service providers are maintained. | 03-26-2009 |
20130198085 | APPLICATION LICENSING FOR DEVICES - A method, system, and computer-readable storage media for licensing an application for a device are provided herein. The method includes providing a license for an application from a licensing service to a number of computing devices associated with a user, wherein the license includes credentials. The method also includes associating the credentials with each computing device and periodically determining a state of a subscription corresponding to the license on each computing device. Each computing device is configured to call the licensing service at configurable time periods in order to determine the state of the subscription. | 08-01-2013 |
20130198852 | APPLICATION LICENSING USING MULTIPLE FORMS OF LICENSING - A method, system, and computer-readable storage media for licensing an application using multiple forms of licensing are provided herein. The method includes providing a first form of a license to a first computing device via a licensing service and providing a second form of the license to a second computing device via the licensing service. The method also includes determining a first state of the first form of the license and a second state of the second form of the license, synchronizing the first state and the second state to form a combined license state, and adjusting conditions of the license based on the combined license state. | 08-01-2013 |
20130198855 | DYNAMIC SELECTION OF AUTHORIZATION PROCESSES - Systems, methods, and software are disclosed herein for licensing applications using a preferred authorization process dynamically identified based on conditions associated with an initiation of an application. Authorization is then attempted using the preferred authorization process. In some examples, the preferred authorization process is selected from at least a keyless authorization process and a key-based authorization process. | 08-01-2013 |
20130198856 | USER BASED LICENSING FOR APPLICATIONS - A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a computing device at a licensing service in response to an input by a user and providing a license for an application to the computing device, wherein the license includes device specific information associated with the user. The method also includes activating the application on the computing device using the device specific information. | 08-01-2013 |
20130198864 | LICENSING FOR SERVICES - A method, system, and computer-readable storage media for providing licensing for services are provided herein. The method includes determining, via a service partner, whether a user exists in a user provisioning cache and whether the user is provisioned to use a service provided by the service partner. The method also includes querying a licensing service to determine updates to the user provisioning cache if the user does not exist in the user provisioning cache or is not provisioned to use the service, or both. Further, the method includes determining whether the user is provisioned to use the service based on the updates to the user provisioning cache and, if the user is provisioned to use the service, allowing the user access to the service. | 08-01-2013 |
20130198866 | APPLICATION LICENSING USING SYNC PROVIDERS - A method, system, and computer-readable storage media for licensing an application using sync providers are provided herein. The method includes receiving a request for a license for an application from a client sync provider at a licensing service and receiving information relating to the license from a commerce partner offering the application via a commerce partner sync provider. The method also includes returning the license for the application to a client computing device, receiving information relating to a state of the license from the client sync provider, and adjusting conditions of the license according to the state of the license. | 08-01-2013 |
20140068783 | DYNAMIC SELECTION OF AUTHORIZATION PROCESSES - Systems, methods, and software are disclosed herein for licensing applications using a preferred authorization process dynamically identified based on conditions associated with an initiation of an application. Authorization is then attempted using the preferred authorization process. In some examples, the preferred authorization process is selected from at least a keyless authorization process and a key-based authorization process. | 03-06-2014 |
20140109237 | APPLICATION MODES DETERMINED FROM PREVIOUS AND CURRENT STATES OF A LICENSE - Disclosed herein are systems, methods, and software for facilitating application licensing. In at least one implementation, a previous state of a license for an application is identified upon launching or otherwise engaging the application. In addition, a current state of the license for the application is identified. A determination is made with respect to in which mode to present the application based on the previous state and the current state. Presentation of the application in the determined mode may then be initiated. | 04-17-2014 |
Patent application number | Description | Published |
20080241031 | Fast-regenerable sulfur dioxide adsorbents for diesel engine emission control - Disclosed herein are sorbents and devices for controlling sulfur oxides emissions as well as systems including such sorbents and devices. Also disclosed are methods for making and using the disclosed sorbents, devices and systems. In one embodiment the disclosed sorbents can be conveniently regenerated, such as under normal exhaust stream from a combustion engine, particularly a diesel engine. Accordingly, also disclosed are combustion vehicles equipped with sulfur dioxide emission control devices. | 10-02-2008 |
20090114093 | Methods, Systems, And Devices For Deep Desulfurization Of Fuel Gases - A highly effective and regenerable method, system and device that enables the desulfurization of warm fuel gases by passing these warm gasses over metal-based sorbents arranged in a mesoporous substrate. This technology will protect Fischer-Tropsch synthesis catalysts and other sulfur sensitive catalysts, without drastic cooling of the fuel gases. This invention can be utilized in a process either alone or alongside other separation processes, and allows the total sulfur in such a gas to be reduced to less than 500 ppb and in some instances as low as 50 ppb. | 05-07-2009 |
20090258215 | Bulk-Scaffolded Hydrogen Storage and Releasing Materials and Methods for Preparing and Using Same - Compositions are disclosed for storing and releasing hydrogen and methods for preparing and using same. These hydrogen storage and releasing materials exhibit fast release rates at low release temperatures without unwanted side reactions, thus preserving desired levels of purity and enabling applications in combustion and fuel cell applications. | 10-15-2009 |
20110039686 | Fast regeneration of sulfur deactivated Ni-based hot biomass syngas cleaning catalysts - A new regeneration method has been developed which can effectively and efficiently remove sulfur from Ni-based steam reforming catalysts. In its simplest form the present invention comprises the steps of oxidizing a catalyst with a dilute O | 02-17-2011 |
20110185899 | Methods for Abatement of Arsenic and Phosphorous Contaminants From Fuel Gases Prior to Gasification - Methods for abatement of antimony-containing, arsenic-containing and/or phosphorous-containing impurities in fuel gas that is derived from a carbonaceous source can include contacting the fuel gas with an absorbent comprising a capture compound. The capture compound has one or more alkali metals, one or more alkaline earth metals, or a combination of one or more alkali and alkaline earth metals. The fuel gas impurities are reacted with the capture compound, which can be used alone or dispersed on the adsorbent, at a temperature greater than or equal to approximately 300° C. to form solid capture products comprising antimony, arsenic, or phosphorous and the alkali or alkaline earth metal. | 08-04-2011 |
20120077067 | Fe-V Redox Flow Batteries - A redox flow battery having a supporting solution that includes Cl | 03-29-2012 |
20120077068 | Redox Flow Batteries Having Multiple Electroactive Elements - Introducing multiple redox reactions with a suitable voltage range can improve the energy density of redox flow battery (RFB) systems. One example includes RFB systems utilizing multiple redox pairs in the positive half cell, the negative half cell, or in both. Such RFB systems can have a negative electrolyte, a positive electrolyte, and a membrane between the negative electrolyte and the positive electrolyte, in which at least two electrochemically active elements exist in the negative electrolyte, the positive electrolyte, or both. | 03-29-2012 |
20120077079 | Redox Flow Batteries Based on Supporting Solutions Containing Chloride - Redox flow battery systems having a supporting solution that contains Cl | 03-29-2012 |
20120107660 | Redox Flow Batteries Based on Supporting Solutions Comprising a Mixture of Acids - Redox flow battery systems having a supporting solution that contains Cl” ions can exhibit improved performance and characteristics. Furthermore, a supporting solution having mixed SO | 05-03-2012 |
20120244406 | Iron-Sulfide Redox Flow Batteries - Iron-sulfide redox flow battery (RFB) systems can be advantageous for energy storage, particularly when the electrolytes have pH values greater than 6. Such systems can exhibit excellent energy conversion efficiency and stability and can utilize low-cost materials that are relatively safer and more environmentally friendly. One example of an iron-sulfide RFB is characterized by a positive electrolyte that comprises Fe(III) and/or Fe(II) in a positive electrolyte supporting solution, a negative electrolyte that comprises S | 09-27-2012 |
20120273393 | SYSTEMS AND PROCESSES FOR REMOVING ELEMENTAL SULFUR COMPOUNDS FROM DESULFURIZED FUELS - A system and process are disclosed for removing elemental sulfur compounds from hydro-desulfurization (HDS) treated hydrocarbon products including liquid hydrocarbon fuels. Low (sub-ppm) concentrations of sulfur remain in the hydrocarbons, providing, e.g., fuel products suitable for use in various modalities including, e.g., jet fuels and fuel cell Auxiliary Power Units (APUs). | 11-01-2012 |
20130266836 | Hybrid Energy Storage Systems Utilizing Redox Active Organic Compounds - Redox flow batteries (RFB) have attracted considerable interest due to their ability to store large amounts of power and energy. Non-aqueous energy storage systems that utilize at least some aspects of RFB systems are attractive because they can offer an expansion of the operating potential window, which can improve on the system energy and power densities. One example of such systems has a separator separating first and second electrodes. The first electrode includes a first current collector and volume containing a first active material. The second electrode includes a second current collector and volume containing a second active material. During operation, the first source provides a flow of first active material to the first volume. The first active material includes a redox active organic compound dissolved in a non-aqueous, liquid electrolyte and the second active material includes a redox active metal. | 10-10-2013 |
20130287663 | SYSTEM, SORBENTS, AND PROCESSES FOR CAPTURE AND RELEASE OF CO2 - A system, sorbent formulations, methods of preparation, and methods are described that provide selective sorption and release of CO | 10-31-2013 |
20140079976 | Iron-Sulfide Redox Flow Batteries - Iron-sulfide redox flow battery (RFB) systems can be advantageous for energy storage, particularly when the electrolytes have pH values greater than 6. Such systems can exhibit excellent energy conversion efficicency and stability and can utilize low-cost materials that are relatively safer and more environmentally friendly. One example of an iron-sulfide RFB is characterized by a positive electrolyte that comprises Fe(III) and/or Fe(II) in a positive electrolyte supporting solution, a negative electrolyte that comprises S | 03-20-2014 |
20140199607 | REDOX FLOW BATTERIES BASED ON SUPPORTING SOLUTIONS CONTAINING CHLORIDE - Redox flow battery systems having a supporting solution that contains Cl | 07-17-2014 |
20140234753 | REDOX FLOW BATTERIES BASED ON SUPPORTING SOLUTIONS CONTAINING CHLORIDE - Redox flow battery systems having a supporting solution that contains Cl | 08-21-2014 |
20140272482 | ELECTROLYTE PROTECTION COMPOSITIONS AND METHODS - A barrier on the surface of the negative electrolyte solution of a redox flow battery can decrease air oxidation of a charged species in the negative electrolyte solution and can decrease water loss from the negative electrolyte solution. A negative electrolyte tank including a barrier on the surface of the negative electrolyte can have many advantages, including simplified setup, low cost, and low maintenance. | 09-18-2014 |
20140272484 | ELECTROCHEMICAL CELL STACK HAVING A PROTECTIVE FLOW CHANNEL - Disclosed herein are improved electrochemical cell stacks having at least one protective channel on an end of the stack. Redox flow batteries (RFBs) containing the “protected” electrochemical cell stacks, and methods of operating such RFBs, are also provided. | 09-18-2014 |
Patent application number | Description | Published |
20090220092 | Probabilistic Mitigation of Control Channel Jamming Via Random Key Distribution in Wireless Communications Networks - An embodiment includes methods that generate random cryptographic keys, and send the keys to client devices. These methods may send representations of channel locator functions to the client devices, which may use the channel locator functions to locate particular control channels, using the random keys as input. | 09-03-2009 |
20120210387 | Airport Security System - A method, apparatus, and system for managing network security at an airport. A threat level for the airport is identified. A number of policies for a network data processing system is identified at the airport based on the threat level identified for the airport in response to identifying the threat level for the airport. Enforcement of the number of policies is initiated in the network data processing system. | 08-16-2012 |
20120284237 | METHODS AND SYSTEMS FOR VALIDATING INPUT DATA - Methods and systems for use in validating input data in a computing system. Input data associated with a destination software application, such as a database, is received at a computing system. The input data is forwarded to an intermediate software application, such as a web application. When the input includes one or more patterns, a query produced by the intermediate software application based on the input data is validated, such as by comparing the structure of the query to one or more expected query structures. If the validation succeeds, the query is forwarded to the destination software application. Otherwise, the query is discarded. | 11-08-2012 |
Patent application number | Description | Published |
20080247535 | Method and apparatus for mitigating impact of nonlinear effects on the quality of audio echo cancellation - A method is provided for reducing the adverse impact of echo on audio quality in a two-communication system. The method includes two parts. The first part begins by detecting non-linear effects (e.g. clippings and audio glitches). If a non-linear effect is detected, the system temporarily disables adaptation of the adaptive filter. In this way, filter coefficients obtained before the non-linear effect happens will not be corrupted, so the AEC can quickly recover from the non-linear effects. The second part begins by monitoring a parameter reflecting signal quality (e.g., ERLE). If the signal quality parameter falls below a given value the system switches from a full-duplex mode of operation to a half-duplex mode of operation. In this way, when a non-linear effect that is undetectable or occurs repeatedly (e.g., speaker volume changes) and which can corrupt an acoustic echo canceller (AEC) for a relatively long period of time, the system switches from full-duplex operation to half-duplex operation. In half-duplex operation, communication can only happen in one direction at a time, and thus the echo path is broken, effectively eliminating echoes. When the non-linear effect is no longer present and the quality parameter rises to a normal level, communication returns to a full-duplex mode of operation and the AEC once again removes the echoes. | 10-09-2008 |
20080253553 | Filter bank optimization for acoustic echo cancellation - A communications device is presented for providing bi-directional audio communications between a near-end user and a far-end user via a bidirectional communications channel. The communications device includes an adaptive echo canceller receiving a near-end audio signal and a far-end audio signal and providing an echo-canceled near-end audio signal for transmission to the far-end user via the communications channel. The adaptive echo canceller includes a first bank of analysis filters for filtering the near-end audio signal, a second bank of analysis filters for filtering the far-end audio signal, and a bank of synthesis filters for filtering sub-band echo-canceled signals generated within the adaptive echo canceller. The first and second filter banks have a frequency response optimized to reduce echo residual gain. | 10-16-2008 |
20080259828 | Method and apparatus for reducing timestamp noise in audio echo cancellation - A communication end device of a two-way communication system is shown. The device includes an audio signal capture device for capturing local audio to be transmitted to another end device, an audio signal rendering device for playing remote audio received from the other end device, and buffers for buffering the captured and rendered audio signals. The device also includes an audio echo canceller operating to predict echo from the rendered audio signal at a calculated relative offset in the captured audio signal based on an adaptive filter, and subtract the predicted echo from the signal transmitted to the other end device The calculated relative offset that is used by the audio echo canceller for a current signal sample is adjusted if a difference between it and an adjusted relative offset of a preceding sample exceeds a threshold value. | 10-23-2008 |
20120163615 | FILTER BANK OPTIMIZATION FOR ACOUSTIC ECHO CANCELLATION - A communications device is presented for providing bi-directional audio communications between a near-end user and a far-end user via a bidirectional communications channel. The communications device includes an adaptive echo canceller receiving a near-end audio signal and a far-end audio signal and providing an echo-canceled near-end audio signal for transmission to the far-end user via the communications channel. The adaptive echo canceller includes a first bank of analysis filters for filtering the near-end audio signal, a second bank of analysis filters for filtering the far-end audio signal, and a bank of synthesis filters for filtering sub-band echo-canceled signals generated within the adaptive echo canceller. The first and second filter banks have a frequency response optimized to reduce echo residual gain. | 06-28-2012 |
Patent application number | Description | Published |
20080280426 | Gallium nitride-on-silicon interface - A method is provided for forming a matching thermal expansion interface between silicon (Si) and gallium nitride (GaN) films. The method provides a (111) Si substrate and forms a first aluminum (Al)-containing film in compression overlying the Si substrate. Nano-column holes are formed in the first Al-containing film, which exposes regions of the underlying Si substrate. A layer of GaN layer is selectively grown from the exposed regions, covering the first Al-containing film. The GaN is grown using a lateral nanoheteroepitaxy overgrowth (LNEO) process. The above-mentioned processes are reiterated, forming a second Al-containing film in compression, forming nano-column holes in the second Al-containing film, and selectively growing a second GaN layer. Film materials such as Al | 11-13-2008 |
20080296616 | Gallium nitride-on-silicon nanoscale patterned interface - A method is provided for forming a matching thermal expansion interface between silicon (Si) and gallium nitride (GaN) films. The method provides a (111) Si substrate that is heated to a temperature in a range of about 300 to 800° C., and a first film is formed in compression overlying the Si substrate. The first film material may be InP, SiGe, GaP, GaAs, AlN, AlGaN, an AlN/graded AlGaN (Al | 12-04-2008 |
20080296625 | Gallium nitride-on-silicon multilayered interface - A multilayer thermal expansion interface between silicon (Si) and gallium nitride (GaN) films is provided, along with an associated fabrication method. The method provides a (111) Si substrate and forms a first layer of a first film overlying the substrate. The Si substrate is heated to a temperature in the range of about 300 to 800° C., and the first layer of a second film is formed in compression overlying the first layer of the first film. Using a lateral nanoheteroepitaxy overgrowth (LNEO) process, a first GaN layer is grown overlying the first layer of second film. Then, the above-mentioned processes are repeated: forming a second layer of first film; heating the substrate to a temperature in the range of about 300 to 800° C.; forming a second layer of second film in compression; and, growing a second GaN layer using the LNEO process. | 12-04-2008 |
20080315255 | Thermal Expansion Transition Buffer Layer for Gallium Nitride on Silicon - A method is provided for forming a matching thermal expansion interface between silicon (Si) and gallium nitride (GaN) films. The method provides a (111) Si substrate with a first thermal expansion coefficient (TEC), and forms a silicon-germanium (SiGe) film overlying the Si substrate. A buffer layer is deposited overlying the SiGe film. The buffer layer may be aluminum nitride (AlN) or aluminum-gallium nitride (AlGaN). A GaN film is deposited overlying the buffer layer having a second TEC, greater than the first TEC. The SiGe film has a third TEC, with a value in between the first and second TECs. In one aspect, a graded SiGe film may be formed having a Ge content ratio in a range of about 0% to 50%, where the Ge content increases with the graded SiGe film thickness. | 12-25-2008 |
20090008647 | Gallium nitride-on-silicon interface using multiple aluminum compound buffer layers - A thermal expansion interface between silicon (Si) and gallium nitride (GaN) films using multiple buffer layers of aluminum compounds has been provided, along with an associated fabrication method. The method provides a (111) Si substrate and deposits a first layer of AlN overlying the substrate by heating the substrate to a relatively high temperature of 1000 to 1200° C. A second layer of AlN is deposited overlying the first layer of AlN at a lower temperature of 500 to 800° C. A third layer of AlN is deposited overlying the second layer of AlN by heating the substrate to the higher temperature range. Then, a grading Al | 01-08-2009 |
20090032817 | Back-To-Back Metal/Semiconductor/Metal (MSM) Schottky Diode - A method is provided for forming a metal/semiconductor/metal (MSM) back-to-back Schottky diode from a silicon (Si) semiconductor. The method deposits a Si semiconductor layer between a bottom electrode and a top electrode, and forms a MSM diode having a threshold voltage, breakdown voltage, and on/off current ratio. The method is able to modify the threshold voltage, breakdown voltage, and on/off current ratio of the MSM diode in response to controlling the Si semiconductor layer thickness. Generally, both the threshold and breakdown voltage are increased in response to increasing the Si thickness. With respect to the on/off current ratio, there is an optimal thickness. The method is able to form an amorphous Si (a-Si) and polycrystalline Si (polySi) semiconductor layer using either chemical vapor deposition (CVD) or DC sputtering. The Si semiconductor can be doped with a Group V donor material, which decreases the threshold voltage and increases the breakdown voltage. | 02-05-2009 |
Patent application number | Description | Published |
20100212018 | GENERATING HUMAN INTERACTIVE PROOFS - A method for generating one or more human interactive proofs (HIPs) is described herein. A HIP request may be received. One of a plurality of HIP engines may be selected using a randomization algorithm. Each HIP engine may have a distinct algorithm for generating the one or more HIPs. The one or more HIPs may be generated using the one of the plurality of HIP engines. | 08-19-2010 |
20110072498 | TEARING AND CONFORMAL TRANSFORMATION HUMAN INTERACTIVE PROOF - The HIP creation technique described herein pertains to a technique for creating a human interactive proof (HIP) by applying tearing and/or a conformal transformation to a string of characters while maintaining readability of text. In one embodiment, the technique tears a character string into two or more pieces and applies conformal transformation to warp the pieces in order to create a HIP. The transformation changes the shape and orientation of the characters but preserves angles of the characters which makes it easy for humans to recognize the characters after the transformation. Other embodiments of the technique create HIPs by applying tearing only to a string of characters, or by applying conformal transformation only to the character string. | 03-24-2011 |
20110113147 | ENHANCED HUMAN INTERACTIVE PROOF (HIP) FOR ACCESSING ON-LINE RESOURCES - A method is provided for protecting an on-line resource using a HIP challenge. The method includes receiving a request to access the on-line resource from a remote client. A HIP challenge is presented to a user associated with the remote client. If a successful response to the HIP challenge is received from the user, a previous response pattern of the user is compared to known response patterns of humans and machines. The user is allowed to access to the on-line resource if the comparison indicates that the user is likely a human. | 05-12-2011 |
20110283346 | OVERLAY HUMAN INTERACTIVE PROOF SYSTEM AND TECHNIQUES - The overlay human interactive proof system (“OHIPS”) and techniques described herein operate in conjunction with any known or later developed computer-based applications or services to provide secure access to resources by reliably differentiating between human and non-human users. Humans have a generally superior ability to differentiate misaligned characters or objects from correctly aligned ones. As such, the OHIP splits an image including one or more visual objects into two or more partial images to form a HIP. The partial images may also be further split into groups of sub-partial images, and/or the partial images (or the sub-partial images) may be moved, so that at any given alignment position, a user can recognize only some visual objects. A user is instructed to reassemble the partial images at one or more predetermined alignment positions using a GUI, and the user is asked to identify information regarding one or more visible objects. | 11-17-2011 |
20110314540 | PREVENTING ABUSE OF SERVICES THROUGH INFRASTRUCTURE INCOMPATIBILITY - Spammers, and other abusers of web services, may be deterred in their attempts to sign up for these services at large scale by making changes to the service registration procedure, where the changes are designed to break the spammer's infrastructure. In one example, a procedure to register for a web service involves presenting a Human Interaction Proof (HIP, or “captcha”) to the user, and gating access to the service upon receipt of a correct solution. If spammers use botnets and/or image capture techniques to initiate registration processes and to transport the HIPs to human or automated solvers, then the registration procedure can be changed in a way that is incompatible with capturing these images, or in a way that is incompatible with receiving HIP solutions from someplace other than the location at which registration was initiated. | 12-22-2011 |
20130347067 | DYNAMIC HUMAN INTERACTIVE PROOF - In one embodiment, a human interactive proof portal | 12-26-2013 |
20140101739 | SEMANTIC CHALLENGE FOR AUDIO HUMAN INTERACTIVE PROOF - In one embodiment, a human interactive proof portal | 04-10-2014 |
20150052207 | FILTERING ELECTRONIC MESSAGES BASED ON DOMAIN ATTRIBUTES WITHOUT REPUTATION - A messaging application filters electronic messages based on domain attributes without a reputation. A message with a uniform resource identifier (URI) is received and determined to not be included within a trusted or a block list. A total score is computed from weighted scores assigned to factors associated with the message. The message is evaluated for an unsolicited message determination by comparing the total score against a predetermined threshold. | 02-19-2015 |
Patent application number | Description | Published |
20090313508 | MONITORING DATA CATEGORIZATION AND MODULE-BASED HEALTH CORRELATIONS - Architecture for aggregating health alerts from a number of related components into a single aggregated health state that can be analyzed to isolate the component responsible for the fault condition. In a hierarchy of related components within various component groups in a computer system, a number of health indicators can indicate alerts occurring in one or more of the related components whereas the fault condition occurs in only one component upon which the other components depend. The health indicators of related components are aggregated into an aggregated health state for each component group. These aggregated health states are analyzed to identify the related component associated with a root cause of the alert condition for an affected component group. | 12-17-2009 |
20120159268 | Alerting Recipients to Errors Occurring when Accessing External Services - A hosting provider operates a server system that provides a service to one or more tenants. The server system receives configuration data from the tenants. As part of providing the service to a given tenant, the server system attempts to access an external service due to the configuration data received from the given tenant identifying the external service. Service access errors can occur when attempting to access the external service. In response to determining that an error has occurred when attempting to access the external service, the server system sends a service access alert to a recipient associated with the given tenant. The service access alert notifies the recipient that the error has occurred. | 06-21-2012 |
20120271594 | MONITORING DATA CATEGORIZATION AND MODULE-BASED HEALTH CORRELATIONS - Architecture for aggregating health alerts from a number of related components into a single aggregated health state that can be analyzed to isolate the component responsible for the fault condition. In a hierarchy of related components within various component groups in a computer system, a number of health indicators can indicate alerts occurring in one or more of the related components whereas the fault condition occurs in only one component upon which the other components depend. The health indicators of related components are aggregated into an aggregated health state for each component group. These aggregated health states are analyzed to identify the related component associated with a root cause of the alert condition for an affected component group. | 10-25-2012 |
20130086203 | MULTI-LEVEL MONITORING FRAMEWORK FOR CLOUD BASED SERVICE - A multi-level monitoring system is provided for monitoring multiple performance aspects of a cloud service concurrently in order to generate a full and reliable performance analysis of the cloud service. The multi-level monitoring system may include a set of components for carrying out the performance analysis of the cloud service which may be deployed together to operate externally, internally, or concurrently with the cloud service. The component framework of the multi-level monitoring system may include a main component, a plug-in associated with the main component, a definition database, a log database, and an output database. The main components of an example multi-level monitoring framework may include a probe runner component for probing the cloud service, a monitor component for generating alerts based on probe results, and a responder component for processing the alerts and taking appropriate actions to improve the cloud service performance. | 04-04-2013 |
20140258435 | ALERTING RECIPIENTS TO ERRORS OCCURRING WHEN ACCESSING EXTERNAL SERVICES - A hosting provider operates a server system that provides a service to one or more tenants. The server system receives configuration data from the tenants. As part of providing the service to a given tenant, the server system attempts to access an external service due to the configuration data received from the given tenant identifying the external service. Service access errors can occur when attempting to access the external service. In response to determining that an error has occurred when attempting to access the external service, the server system sends a service access alert to a recipient associated with the given tenant. The service access alert notifies the recipient that the error has occurred. | 09-11-2014 |
Patent application number | Description | Published |
20090258215 | Bulk-Scaffolded Hydrogen Storage and Releasing Materials and Methods for Preparing and Using Same - Compositions are disclosed for storing and releasing hydrogen and methods for preparing and using same. These hydrogen storage and releasing materials exhibit fast release rates at low release temperatures without unwanted side reactions, thus preserving desired levels of purity and enabling applications in combustion and fuel cell applications. | 10-15-2009 |
20100047656 | Dense Gd-doped Ceria Layers on Porous Substrates and Methods of Making the Same - Solid-state ionic or electrochemical devices can depend critically on the proper formation of a dense, Gd-doped ceria (GDC) layer on a porous substrate. Devices and methods of the present invention are characterized by the formation of a transitional buffer layer, which is less than 10 microns thick and comprises GDC, located between the porous substrate and the dense GDC layer. The transitional buffer layer provides a practical way to form the dense GDC layer on the porous substrate without cracks in the GDC layer and without clogging the pores of the substrate. | 02-25-2010 |
20130287663 | SYSTEM, SORBENTS, AND PROCESSES FOR CAPTURE AND RELEASE OF CO2 - A system, sorbent formulations, methods of preparation, and methods are described that provide selective sorption and release of CO | 10-31-2013 |
20140322518 | POROUS MULTI-COMPONENT MATERIAL FOR THE CAPTURE AND SEPARATION OF SPECIES OF INTEREST - A method and porous multi-component material for the capture, separation or chemical reaction of a species of interest is disclosed. The porous multi-component material includes a substrate and a composite thin film. The composite thin film is formed by combining a porous polymer with a nanostructured material. The nanostructured material may include a surface chemistry for the capture of chemicals or particles. The composite thin film is coupled to the support or device surface. The method and material provides a simple, fast, and chemically and physically benign way to integrate nanostructured materials into devices while preserving their chemical activity. | 10-30-2014 |
Patent application number | Description | Published |
20080207969 | Tailored Fischer-Tropsch Synthesis Product Distribution - Novel methods of Fischer-Tropsch synthesis are described. It has been discovered that conducting the Fischer-Tropsch synthesis over a catalyst with a catalytically active surface layer of 35 microns or less results in a liquid hydrocarbon product with a high ratio of C | 08-28-2008 |
20100160463 | FISCHER-TROPSCH SYNTHESIS USING MICROCHANNEL TECHNOLOGY AND NOVEL CATALYST AND MICROCHANNEL REACOTR - The disclosed invention relates to a process for converting a reactant composition comprising H | 06-24-2010 |
20100297531 | IMMOBILIZED FLUID MEMBRANES FOR GAS SEPARATION - Provided herein are immobilized liquid membranes for gas separation, methods of preparing such membranes and uses thereof. In one example, the immobilized membrane includes a porous metallic host matrix and an immobilized liquid fluid (such as a silicone oil) that is immobilized within one or more pores included within the porous metallic host matrix. The immobilized liquid membrane is capable of selective permeation of one type of molecule (such as oxygen) over another type of molecule (such as water). In some examples, the selective membrane is incorporated into a device to supply oxygen from ambient air to the device for electrochemical reactions, and at the same time, to block water penetration and electrolyte loss from the device. | 11-25-2010 |
20110155662 | Thin, Porous Metal Sheets and Methods for Making the Same - Thin, porous metal sheets and methods for forming them are presented to enable a variety of applications and devices. The thin, porous metal sheets are less than or equal to approximately 200 μm thick, have a porosity between 25% and 75% by volume, and have pores with an average diameter less than or equal to approximately 2 μm. The thin, porous metal sheets can be fabricated by preparing a slurry having between 10 and 50 wt % solvent and between 20 and 80 wt % powder of a metal precursor. The average particle size in the metal precursor powder should be between 100 nm and 5 μm. | 06-30-2011 |
20140017805 | DEVICE AND METHOD FOR ENHANCED COLLECTION AND ASSAY OF CHEMICALS WITH HIGH SURFACE AREA CERAMIC - A method and device for enhanced capture of target analytes is disclosed. This invention relates to collection of chemicals for separations and analysis. More specifically, this invention relates to a solid phase microextraction (SPME) device having better capability for chemical collection and analysis. This includes better physical stability, capacity for chemical collection, flexible surface chemistry and high affinity for target analyte. | 01-16-2014 |
Patent application number | Description | Published |
20110256184 | Non-ordered Mesoporous Silica Structure for Biomolecule Loading and Release - A non-ordered geometric mesoporous structure that provides for enhanced loading of antibodies such as IgG as compared to ordered mesoporous structures. This structure is formed by treating silica precursors at a hydrothermal aging temperature between 100 and 200 degrees C. This creates the non-ordered mesoporous structure. Biomolecules such as IgG can then be spontaneously loaded via non-covalent bonding within the as-made or functionalized mesoporous structure. | 10-20-2011 |
20110300186 | Functionalized Nano- and Micro-materials for Medical Therapies - Compositions containing an optionally surface-functionalized mesoporous support and a biologically active agent, and pharmaceutical compositions of the same, are provided herein. Such compositions can be useful in the treatment of tumors, for example, by injection of the composition at a location near the site of the tumor. | 12-08-2011 |
20120088154 | Graphene-Sulfur Nanocomposites for Rechargeable Lithium-Sulfur Battery Electrodes - Rechargeable lithium-sulfur batteries having a cathode that includes a graphene-sulfur nanocomposite can exhibit improved characteristics. The graphene-sulfur nanocomposite can be characterized by graphene sheets with particles of sulfur adsorbed to the graphene sheets. The sulfur particles have an average diameter less than 50 nm. | 04-12-2012 |
20120178001 | Graphene-based Battery Electrodes Having Continuous Flow Paths - Some batteries can exhibit greatly improved performance by utilizing electrodes having randomly arranged graphene nanosheets forming a network of channels defining continuous flow paths through the electrode. The network of channels can provide a diffusion pathway for the liquid electrolyte and/or for reactant gases. Metal-air batteries can benefit from such electrodes. In particular Li-air batteries show extremely high capacities, wherein the network of channels allow oxygen to diffuse through the electrode and mesopores in the electrode can store discharge products. | 07-12-2012 |
20130040204 | Functional Nanocomposite Materials, Electrodes, and Energy Storage Systems - Particular functional nanocomposite materials can be employed as electrodes and/or as electrodes in energy storage systems to improve performance. In one example, the nanocomposite material is characterized by nanoparticles having a high-capacity active material, a core particle having a comminution material, and a thin electronically conductive coating having an electronically conductive material. The nanoparticles are fixed between the core particle and the conductive coating. The comminution material has a Mohs hardness that is greater than that of the active material. The core particle has a diameter less than 5000 nm and the nanoparticles have diameters less than 500 nm. | 02-14-2013 |
20140203469 | GRAPHENE-SULFUR NANOCOMPOSITES FOR RECHARGEABLE LITHIUM-SULFUR BATTERY ELECTRODES - Rechargeable lithium-sulfur batteries having a cathode that includes a graphene-sulfur nanocomposite can exhibit improved characteristics. The graphene-sulfur nanocomposite can be characterized by graphene sheets with particles of sulfur adsorbed to the graphene sheets. The sulfur particles have an average diameter less than 50 nm. | 07-24-2014 |
20140295298 | Graphene-based Battery Electrodes Having Continuous Flow Paths - Some batteries can exhibit greatly improved performance by utilizing electrodes having randomly arranged graphene nanosheets forming a network of channels defining continuous flow paths through the electrode. The network of channels can provide a diffusion pathway for the liquid electrolyte and/or for reactant gases. Metal-air batteries can benefit from such electrodes. In particular Li-air batteries show extremely high capacities, wherein the network of channels allow oxygen to diffuse through the electrode and mesopores in the electrode can store discharge products. | 10-02-2014 |
Patent application number | Description | Published |
20090070112 | Automatic reading tutoring - A method of providing automatic reading tutoring is disclosed. The method includes retrieving a textual indication of a story from a data store and creating a language model including constructing a target context free grammar indicative of a first portion of the story. A first acoustic input is received and a speech recognition engine is employed to recognize the first acoustic input. An output of the speech recognition engine is compared to the language model and a signal indicative of whether the output of the speech recognition matches at least a portion of the target context free grammar is provided. | 03-12-2009 |
20110172988 | ADAPTIVE CONSTRUCTION OF A STATISTICAL LANGUAGE MODEL - A statistical language model (SLM) may be iteratively refined by considering N-gram counts in new data, and blending the information contained in the new data with the existing SLM. A first group of documents is evaluated to determine the probabilities associated with the different N-grams observed in the documents. An SLM is constructed based on these probabilities. A second group of documents is then evaluated to determine the probabilities associated with each N-gram in that second group. The existing SLM is then evaluated to determine how well it explains the probabilities in the second group of documents, and a weighting parameter is calculated from that evaluation. Using the weighting parameter, a new SLM is then constructed as a weighted average of the existing SLM and the new probabilities. | 07-14-2011 |
20110231394 | BOOTSTRAP AND ADAPT A DOCUMENT SEARCH ENGINE - Architecture that employs a modeling technique based on language modeling to estimate a probability of a document matching the user need as expressed in the query. The modeling technique is based on the data mining results that various portions of a document (e.g., body, title, URL, anchor text, user queries) use different styles of human languages. Thus, the results based on a language can be adapted individually to match the language of query. Since the approach is based on adaptation, the framework also provides a natural means to progressively revise the model as user data are collected. Different styles of languages in a document can be recognized and adapted individually. Background language models are also employed that offer a fallback approach in case the document has incomplete fields of data, and can utilize topical or semantic hierarchy of the knowledge domain. | 09-22-2011 |
20120323948 | DIALOG-ENHANCED CONTEXTUAL SEARCH QUERY ANALYSIS - Embodiments of the present invention relate to systems, methods, and computer-storage media for a method of contextually analyzing terms within a search query. In one embodiment, a received search query is classified into a domain category. Additionally, information is assigned to a schema associated with the domain by analyzing the search query. Further, at least one search result that helps a user complete a task within the domain is provided based on the information in the schema. | 12-20-2012 |
20130085970 | INTELLIGENT INTENT DETECTION FROM SOCIAL NETWORK MESSAGES - An intent engine that automatically detects user intent from messages of a social network (e.g., messages with questions to ask) and outputs intent data. The engine is intelligent in that it can process natural language input such as questions and terms. The user is then directed to an answer page filtered according to the intent data and which proviJoshdes answers related to a question, for example. The intent engine can be designated (e.g., tagged, or “friended”) and then linked into a specialized relationship (e.g., a “friend”). Accordingly, in one example, a URL link is constructed that points to the answer page, with filters configured based on the intent data. The URL is then sent back to the user as a friendly response. When the user selects the link, the user is presented with an answer page that provides answers which match the user intent derived from the user messages. | 04-04-2013 |
20140101119 | META CLASSIFIER FOR QUERY INTENT CLASSIFICATION - Systems and methods are provided for classifying a search query. A first group of query classifiers can be used to evaluate a query relative to various subject matter domains. The evaluation results from the first group of domain classifiers can then be used by a second group of meta-classifiers. The meta-classifiers are based on non-linear classification models. The meta-classifiers are associated with meta-classifier categories that may correspond to a domain or that may correspond to a plurality of domains. The assigned meta-classifier category for a query can be used in any convenient manner, such as by triggering additional uses of the search query to match images or other alternative types of documents, or such as by allowing a subject matter domain to be assigned to the query. | 04-10-2014 |
20140149108 | ADAPTIVE CONSTRUCTION OF A STATISTICAL LANGUAGE MODEL - A statistical language model (SLM) may be iteratively refined by considering N-gram counts in new data, and blending the information contained in the new data with the existing SLM. A first group of documents is evaluated to determine the probabilities associated with the different N-grams observed in the documents. An SLM is constructed based on these probabilities. A second group of documents is then evaluated to determine the probabilities associated with each N-gram in that second group. The existing SLM is then evaluated to determine how well it explains the probabilities in the second group of documents, and a weighting parameter is calculated from that evaluation. Using the weighting parameter, a new SLM is then constructed as a weighted average of the existing SLM and the new probabilities. | 05-29-2014 |
Patent application number | Description | Published |
20110195104 | INTEGRATED ANTIMICROBIAL AND LOW FOULING MATERIALS - Cationic polymers hydrolyzable to zwitterionic polymers, monomers for making the cationic polymers, surfaces that include the polymers, and methods for making and using the cationic polymers and surfaces. The cationic polymers include counterions and/or hydrolyzable groups that release active agents. | 08-11-2011 |
20130046052 | Polymer Synthesis - A method of preparing a block copolymer of Formula (B) wherein P | 02-21-2013 |
20130178125 | MARINE COATINGS - Marine coatings including cationic polymers hydrolyzable to nonfouling zwitterionic polymers, coated marine surfaces, and methods for making and using the marine coatings. | 07-11-2013 |
20130244249 | HIERARCHICAL FILMS HAVING ULTRA LOW FOULING AND HIGH RECOGNITION ELEMENT LOADING PROPERTIES - Hierarchical films with structurally regulated functionalities through the integration of two-dimensional and three-dimensional structures to achieve ultra low nonspecific binding and high loading of molecular recognition elements, and methods for making and using the films. | 09-19-2013 |
20140275614 | PRODUCTION AND PURIFICATION OF CARBOXYLIC BETAINE ZWITTERIONIC MONOMERS - A method is provided for the production and purification of carboxylic betaine-based zwitterionic vinyl monomers, such as (meth)acrylic or (meth)acrylamide monomer containing a betaine-type group of the formula: | 09-18-2014 |
Patent application number | Description | Published |
20090103773 | SMART PICKING IN 3D POINT CLOUDS - An embodiment of the invention includes a method for identifying a point representing a feature in a 3D dataset. The method includes performing a pick, which includes filtering the dataset to extract a subset of points based on certain criteria including a seed point and evaluating a metric for each point in the subset of points. The metric is a non-normalized probability that the point being evaluated represents the feature. The point or points with the highest metric is identified as representing the feature. Another embodiment of the invention includes a computer-readable medium comprising computer-executable instructions for identifying a point representing a feature in a 3D dataset. Another embodiment of the invention includes a method for displaying a view of a feature in a 3D dataset. | 04-23-2009 |
20140082611 | APPARATUS AND METHOD FOR MONITORING APPLICATION PERMISSIONS - An apparatus and a method for monitoring an application to be installed on a mobile device are provided. The apparatus includes a display unit, a monitoring unit for determining whether a user has selected an application for installation in the mobile device, the application requiring at least one permission predetermined by the user, and a controller for controlling the mobile device to present an alert to the user when the user selects the application, wherein each of the at least one permission represents an action performed by an application. | 03-20-2014 |
20140113550 | APPARATUS, SYSTEM, AND METHOD FOR TRANSFERRING DATA ACROSS MOBILE TERMINALS PAIRED USING NEAR FIELD COMMUNICATION (NFC) - An apparatus and method for transferring data from a first mobile terminal to a second mobile terminal are provided. The method includes pairing the first mobile terminal and the second mobile terminal using Near Field Communication (NFC), selecting at least one item on the first mobile terminal to be transferred to the second mobile terminal, and confirming transfer of the at least one item to the second mobile terminal, and transferring the at least one item from the first mobile terminal to the second mobile terminal. | 04-24-2014 |
20140194066 | APPARATUS AND METHOD FOR SHARING SCREENS FROM MULTIPLE MOBILE DEVICES - An apparatus and method for sharing screens among multiple mobile devices are provided. The mobile device includes a sensor, a communication unit for determining whether at least one other mobile device is substantially in contact with the mobile device, based on information received from the sensor, and for communicating with the at least one other mobile device, a display unit including a physical screen for displaying a graphical component, and a controller for combining the physical screen of the display unit with physical screens of the at least one other mobile device into a single logical screen such that graphical components displayed on one physical screen may be moved to another physical screen as if both physical screens were part of a single screen. | 07-10-2014 |
20140331166 | CUSTOMIZE SMARTPHONE'S SYSTEM-WIDE PROGRESS BAR WITH USER-SPECIFIED CONTENT - An apparatus and method for customizing an Operating System (OS) function of a mobile terminal are provided. The method includes determining content data to be displayed when the OS function is called by an application running on the mobile terminal, when the OS function is called by the application, displaying the content data superimposed over the application in a display, and, when the OS function is released by the application, returning to a display of the application in the display. | 11-06-2014 |
Patent application number | Description | Published |
20110126281 | Controlling Resource Access Based on Resource Properties - Described is a technology by which access to a resource is determined by evaluating a resource label of the resource against a user claim of an access request, according to policy decoupled from the resource. The resource may be a file, and the resource label may be obtained by classifying the file into classification properties, such that a change to the file may change its resource label, thereby changing which users have access to the file. The resource label-based access evaluation may be logically combined with a conventional ACL-based access evaluation to determine whether to grant or deny access to the resource. | 05-26-2011 |
20110239293 | AUDITING ACCESS TO DATA BASED ON RESOURCE PROPERTIES - Described is a technology, such as implemented in an operating system security system, by which a resource's metadata (e.g., including data properties) is evaluated against an audit rule or audit rules associated with that resource (e.g., object). The audit rule may be associated with all such resources corresponding to a resource manager, and/or by a resource-specific audit rule. When a resource is accessed, each audit rule is processed against the metadata to determine whether to generate an audit event for that rule. The audit rule may be in the form of one or more conditional expressions. Audit events may be maintained and queried to obtain audit information for various usage scenarios. | 09-29-2011 |
20120253959 | LICENSE UPGRADE MANAGEMENT - The claimed subject matter provides a method for managing license upgrades in a computing environment. An exemplary method includes sending a request to upgrade a license status of application software program. The method further includes receiving licensing information indicating a change to the license status of the software program, the change to the license status of the software program being sufficient to allow the user to use the software program under the changed status automatically, and without further action by a user. | 10-04-2012 |
20120254047 | SOFTWARE APPLICATION LICENSE ROAMING - A master license entry that links a software application to a user identification can be made. Application licenses to use the software application can be roamed to multiple computing machines. Feature licenses for added features of the software application can be roamed to those computing machines as well. Multiple overlapping license rights for the software application may be linked to the master license entry. A count of how many license rights for the software application are linked to the master license entry can be maintained. Requests for licenses may be refused if the count of license rights has reached zero. | 10-04-2012 |
20120254610 | REMOTE DISABLING OF APPLICATIONS - The claimed subject matter provides a method for revoking licensed software in a computing environment. An exemplary method includes receiving a machine ID from a computer system. An application program and a license credential for the application program are sent to the computer system. Subsequently, upon theft or other loss of the computer system, a request to revoke the license credential is received. The request identifies the machine ID. When the computer system subsequently initiates a connection, the connection is detected based on the machine ID. An indication that the license credential for the application program is revoked is sent to the computer system. When the application program is later initiated, its operation is disabled because of the revocation of the license credential. | 10-04-2012 |
20120255033 | LICENSING SOFTWARE ON A SINGLE-USER BASIS - The claimed subject matter provides a method for licensing software in a computing environment. An exemplary method includes initiating application software program on a computer system having a plurality of authorized users, one of the authorized users having a single-user license to use the software program. An identity of a current user of the computer system is checked. Operation of the software program is prohibited if the current user is one of the plurality of authorized users other than the user who is granted the single-user license. | 10-04-2012 |