Samsonov
Alexey Samsonov, Madison, WI US
Patent application number | Description | Published |
---|---|---|
20130343625 | SYSTEM AND METHOD FOR MODEL CONSISTENCY CONSTRAINED MEDICAL IMAGE RECONSTRUCTION - A method for reconstructing an image of a subject with a medical imaging system, such as a magnetic resonance imaging system, is provided. Medical image data is acquired from the subject with the medical imaging system, and one or more images of the subject are reconstructed from the medical image data while constraining the one or more images to be consistent with a signal model that relates image intensity values in the image to a free parameter that is associated with a physical property of the subject. The signal model may be an analytical signal model or an approximate signal model learned from acquired medical image data. The model consistency condition may be enforced using an operator that projects an image estimate onto the space of all functions satisfying the signal model. | 12-26-2013 |
Oleg V. Samsonov, Bashkortostan RU
Patent application number | Description | Published |
---|---|---|
20150025207 | Cyclopropyl Substituted Metallocene Catalysts - This invention relates to a novel group 2, 3 or 4 transition metal metallocene catalyst compound having at least one arenyl ligand substituted with: 1) a cyclopropyl group and, optionally, 2) at least one other group, such as a hydrocarbyl, a heteroatom or a heteroatom containing group. | 01-22-2015 |
Oleg V. Samsonov, Buzdyak RU
Patent application number | Description | Published |
---|---|---|
20140316089 | Pyridyldiamide Metal Catalysts and Processes to Produce Polyolefins - Disclosed are new classes of pyridyldiamide catalyst components useful in olefin polymerization, an example of which includes: | 10-23-2014 |
Valery Vasilievich Samsonov, Moscow Region RU
Patent application number | Description | Published |
---|---|---|
20150017693 | Auto-Indicible Expression System, and the Use Thereof for Producing Useful Metabolites Using a Bacterium of the Family Enterobacteriaceae - The present invention describes a method for producing a useful metabolite using a bacterium of the family Enterobacteriaceae, particularly a bacterium belonging to the genus | 01-15-2015 |
Valery Vasilievich Samsonov, Podolsk RU
Patent application number | Description | Published |
---|---|---|
20140315261 | METHOD FOR PRODUCING AN L-AMINO ACID USING A BACTERIUM OF THE FAMILY ENTEROBACTERIACEAE HAVING ATTENUATED EXPRESSION OF THE yjjK GENE - The present invention provides a method for producing L-amino acids by fermentation using a bacterium of the family Enterobacteriaceae, particularly a bacterium belonging to the genus | 10-23-2014 |
Yevgeniy A. Samsonov, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20160105280 | Identifying Security Boundaries on Computing Devices - During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a portion of the computing device, with a program executing in one security boundary being prohibited from accessing data and programs in another security boundary. As part of booting the computing device measurements of (e.g., hash values or other identifications of) various modules loaded and executed as part of booting the computing device are maintained by a boot measurement system of the computing device. Additionally, as part of booting the computing device, a public/private key pair of one of the security boundaries is generated or otherwise obtained. The private key of the public/private key pair is provided to the one security boundary, and the public key of the public/private key pair is provided to the boot measurement system. | 04-14-2016 |
Yevgeniy Anatolievich Samsonov, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20150319160 | Secure Management of Operations on Protected Virtual Machines - Deploying an encrypted entity on a trusted entity is illustrated herein. A method includes, at a trusted entity, wherein the trusted entity is trusted by an authority as a result of providing a verifiable indication of certain characteristics of the trusted entity meeting certain requirements, receiving an encrypted entity from an untrusted entity. The untrusted entity is not trusted by the authority. At the trusted entity, a trust credential from the authority is used to obtain a key from a key distribution service. The key distribution service is trusted by the authority. The key is used to decrypt the encrypted entity to allow the encrypted entity to be deployed at the trusted entity. | 11-05-2015 |