Patent application number | Description | Published |
20080211039 | Nonvolatile memory devices having metal silicide nanocrystals, methods of forming metal silicide nanocrystals, and methods of forming nonvolatile memory devices having metal silicide nanocrystals - A nonvolatile memory device includes a semiconductor substrate. A charge storage insulating film containing metal silicide nanocrystals is on the substrate. A gate electrode is on the charge storage insulating film. Related methods of forming metal silicide nanocrystals, and methods of forming nonvolatile memory devices including metal silicide nanocrystals, are also disclosed. | 09-04-2008 |
20090289322 | MEMORY DEVICES HAVING A CARBON NANOTUBE - In a memory device having a carbon nanotube and a method of manufacturing the same, the memory device includes a lower electrode, an upper electrode having a first void exposing a sidewall of a diode therein, an insulating interlayer pattern having a second void exposing a portion of the lower electrode between the lower electrode and the upper electrode, and a carbon nanotube wiring capable of being electrically connected with the diode of the upper electrode by a voltage applied to the lower electrode. The memory device may reduce generation of a leakage current in a cross-bar memory. | 11-26-2009 |
20110073841 | NANO LINE STRUCTURES IN MICROELECTRONIC DEVICES - A method of forming a microelectronic device includes forming a groove structure having opposing sidewalls and a surface therebetween on a substrate to define a nano line arrangement region. The nano line arrangement region has a predetermined width and a predetermined length greater than the width. At least one nano line is formed in the nano line arrangement region extending substantially along the length thereof and coupled to the surface of the groove structure to define a nano line structure. Related devices are also discussed. | 03-31-2011 |
20120064692 | METHODS OF MANUFACTURING A MEMORY DEVICE HAVING A CARBON NANOTUBE - A method of manufacturing a memory device having a carbon nanotube can be provided by forming a lower electrode on a substrate and forming an insulating interlayer on the lower electrode. An upper electrode including a diode can be formed on the insulating interlayer, where the upper electrode can have a first void exposing a sidewall of the diode and a portion of the insulating interlayer. A portion of the insulating interlayer can be partially removed to form an insulating interlayer pattern having a second void that exposes a portion of the lower electrode, where the second void can be connected with the first void. A carbon nanotube wiring can be formed from the lower electrode through the second and first voids, where the carbon nanotube wiring may be capable of being electrically connected with the diode of the upper electrode by a voltage applied to the lower electrode. | 03-15-2012 |
Patent application number | Description | Published |
20090312733 | ABSORBENT PRODUCT HAVING A MINIATURE MODEL - Absorbent product including a package, at least one absorbent article and a miniature model. | 12-17-2009 |
20100161260 | SYNCHRONIZED DATA SAMPLING SYSTEMS AND METHODS - A battery management system with synchronized data sampling for a battery pack including multiple battery cells is disclosed. The battery management system includes a plurality of local monitors coupled to a plurality of battery cells and operable for sampling status information for the battery cells. The battery management system further includes a central controller coupled to the local monitors and operable for broadcasting a sample command to the local monitor synchronously, wherein the local monitors start to sample the status information for the battery cells in response to the sample command. | 06-24-2010 |
20120064078 | Novel Tumor Biomarket - The present invention relates to the diagnosis and treatment of cancer, and specifically to a method of diagnosing the presence or metastasis of cancer by detecting plasma Hsp90α having the amino acid sequence of SEQ ID No.1 as a tumor marker. In addition, the present invention also relates to a method for the treatment of cancer and metastasis. | 03-15-2012 |
20120071695 | Synthetic Method of 5,5-Dimethyl-2,4-Adipaldehyde-0,0-Boron Difluoride - This invention, which involves synthetic method of 5, 5- dimethyl-2, 4-adipaldehyde-0, 0-Boron difluoride, belongs to the field of organic synthesis. Synthetic method of 5, 5-dimethyl-2, 4-adipaldehyde-0, 0-Boron difluoride is to react pinacolone and boron trifluoride diethyl ether at low temperature, and then add aqueous alkaline solution in after treatment to extract product from ether, after that, separate fluid, condense organic phase and final product is obtained. Yield of this method is 2 to 3 times higher than that in literature, and apart from that, mild reaction condition, simple procedures, easy operation, and low cost make it easy for industrial production. The product can be used directly in next step reaction without any special purification. | 03-22-2012 |
20130243757 | METHOD FOR CANCER DETECTION - The present invention relates to the diagnosis and treatment of cancer, and specifically to a method of diagnosing the presence, status or metastasis of cancer by detecting plasma Hsp90α having the amino acid sequence of SEQ ID NO:1 as a tumor marker. In addition, the present invention also relates to a method for the treatment of cancer and metastasis. | 09-19-2013 |
20150141407 | N-Aryl Unsaturated Fused Ring Tertiary Amine Compounds, Preparation Method and Anti-Tumor Applications Thereof - The present invention relates to a compound of Formula I or a pharmaceutically acceptable salt thereof, its preparation method, a pharmaceutical composition comprising the compound, and its use in manufacture of a medicament for treatment of a disease or disorder, wherein R | 05-21-2015 |
20150213297 | PROCESSING VISIBLE CODING SEQUENCE, PLAYING VISIBLE CODING SEQUENCE - Embodiments of the present invention generally relate to data processing, and further the embodiments of the invention relate to a method of processing a visible coding sequence and a system thereof, a method of playing a visible coding sequence and a system thereof. The present invention creatively proposes a scheme of determining sampling rate with synchronized frames to realize effective processing of a visible coding sequence. The scheme of processing a visible coding sequence according to the invention is helpful for visible coding synchronization on the capturing side, enabling the capturing side to determine appropriate sampling rate and sampling timing, and thus effectively acquire the visible coding sequence, which may not only reduce resource waste, but also acquire a complete visible coding sequence. | 07-30-2015 |
20150253899 | TOUCH SCREEN AND MANUFACTURING METHOD - Embodiments of the present invention provide a touch screen and a manufacturing method thereof. The touch screen includes: a substrate, a plurality of first electrodes, a plurality of second electrodes and a blanking component. The blanking component at least includes a first blanking layer and a second blanking layer for reducing reflection of external light, wherein, the first blanking layer and the second blanking layer are different in density; the blanking component is arranged between the substrate and the bridging component; and the substrate is arranged between the blanking component and an external environment. | 09-10-2015 |
20150259432 | METHOD FOR CANCER DETECTION - The present invention relates to the diagnosis and treatment of cancer, and specifically to a method of diagnosing the presence, status or metastasis of cancer by detecting plasma Hsp90α having the amino acid sequence of SEQ ID NO:1 as a tumor marker. In addition, the present invention also relates to a method for the treatment of cancer and metastasis. | 09-17-2015 |
Patent application number | Description | Published |
20130339158 | DETERMINING LEGITIMATE AND MALICIOUS ADVERTISEMENTS USING ADVERTISING DELIVERY SEQUENCES - Known legitimate and malicious display advertisements are selected, and the ordered sequence of entities involved in the delivery of each display advertisement is observed and used to generate advertisement delivery sequences. The entities include the various servers, publishers, and advertising networks that are involved in the delivery of a display advertisement. Attributes of the entities in each sequence are determined and used to generate a set of rules that identify a display advertisement as legitimate or malicious based on the attributes of the advertising delivery sequence associated with the delivery of the display advertisement. The generated rules are used to identify possible malicious advertisements, and to identify one or more sources of malicious display advertisements. | 12-19-2013 |
20140075183 | SECURE AND SCALABLE MAPPING OF HUMAN SEQUENCING READS ON HYBRID CLOUDS - System and methods are provided for performing privacy-preserving, high-performance, and scalable DNA read mapping on hybrid clouds including a public cloud and a private cloud. The systems and methods offer strong privacy protection and have the capacity to process millions of reads and allocate most of the workload to the public cloud at a small overall cost. The systems and methods perform seeding on the public cloud using keyed hash values of individual sequencing reads' seeds and then extend matched seeds on the private cloud. The systems and methods are designed to move the workload of read mapping from the extension stage to the seeding stage, thereby ensuring that the dominant portion of the overhead is shouldered by the public cloud. | 03-13-2014 |
20160044049 | DETECTION OF PILEUP VULNERABILITIES IN MOBILE OPERATING SYSTEMS - A system is provided for detecting pileup vulnerabilities corresponding to mobile operating system updates. The system includes: an exploit opportunity analyzer, configured to identify pileup exploit opportunities corresponding to a plurality of mobile operating system configurations based on mobile operating system upgrades for each of the plurality of mobile operating system configurations, wherein the identification of exploit opportunities is based on information relating to pileup flaws; a risk database, configured to store information regarding the identified pileup exploit opportunities for a plurality of versions of each of the plurality of mobile operating system configurations; and a scanner application, configured to be executed by a mobile device, configured to query identified exploit opportunities relating to a particular mobile operating system configuration and version, and to evaluate third-party applications installed at the mobile device based on the identified exploit opportunities. | 02-11-2016 |
Patent application number | Description | Published |
20140149890 | METHOD AND DEVICE FOR DISPLAYING DATA - Examples of the present disclosure provide a method and device for displaying data. The method includes the follows. Buddy data of user A is pulled. User data of a user, who uses an Application Program (APP) selected by user A, is pulled. User data of a user, who uses the APP and is a buddy of user A, is selected, based on the pulled buddy data and the pulled user data. The selected user data is displayed. | 05-29-2014 |
20150055777 | METHOD OF ESTABLISHING PUBLIC KEY CRYPTOGRAPHIC PROTOCOLS AGAINST QUANTUM COMPUTATIONAL ATTACK - The present invention relates to information security and discloses a method of establishing public key cryptographic protocols against the quantum computational attack. The method includes the following steps: definition of an infinite non-abelian group G; choosing two private keys in G by two entities; a second entity computing y, and sending y to a first entity; the first entity computing x and z, and sending (x, z) to the second entity; the second entity computing w and v, and sending (w, v) to the first entity; the first entity computing u, and sending u to the second entity; and the first entity computing K | 02-26-2015 |
20150215953 | Method and system for establishing bearer supporting uplink semi-persistent scheduling and user equipment thereof - Disclosed are a method and system for establishing a bearer supporting uplink Semi-Persistent Scheduling (SPS) and a User Equipment (UE) thereof, and the method includes: an RRC entity of a UE parses an RRC connection reconfiguration message transmitted from an eNB to obtain logic channel configuration information, EPS bearer activation request information and RBID information, transmits the logic channel configuration information to an MAC entity of the UE and transmits the EPS bearer activation request information and the RBID information to an NAS of the UE; the MAC entity of the UE establishes an LC and an LCG between itself and an RLC entity according to the received logic channel configuration information, and establishes a mapping between the RBID and the LCG; the NAS of the UE establishes an EPS bearer between itself and an NAS of an EPC according to the received EPS bearer activation request information, and establishes correspondences between classifiers and LCs; and parses a QCI and the RBID from the EPS bearer activation request information, establishes a mapping between the parsed QCI and the received RBID, and transmits the mapping to the MAC entity. The present disclosure enables a UE to identify LCGs that can be scheduled by SPS, thereby using efficiently uplink SPS resource and improving quality of uplink services scheduling. | 07-30-2015 |
Patent application number | Description | Published |
20150078432 | CODING POSITION DATA FOR THE LAST NON-ZERO TRANSFORM COEFFICIENT IN A COEFFICIENT GROUP - Methods and devices for video coding are described. When encoding a non-zero coefficient group (CG) prior to the last such group in a group scan ordering within a transform block, data representative of the true (x,y)-position of the last non-zero transform coefficient in a scan ordering within that CG is modified, to improve coding efficiency, based upon at least one of (a) an intra-prediction mode used to encode the block and (b) at least one coefficient group neighbouring that CG. Upon decoding a CG thus encoded, the modification is un-done to retrieve the true (x,y)-position. | 03-19-2015 |
20150078445 | TRANSPOSING A BLOCK OF TRANSFORM COEFFICIENTS, BASED UPON AN INTRA-PREDICTION MODE - Methods and devices for video coding are described. If an intra-prediction mode to be used in encoding a block of residual data is in a specific predetermined class, e.g., the horizontal class, then at least a portion of a quantized transformed block of residual data is transposed during encoding. Likewise, if an intra-prediction mode that was used to generate an encoded block of residual data is in such a class, then at least a portion of an entropy-decoded block of residual data is transposed during decoding. | 03-19-2015 |
20150334425 | ADAPTIVE CONTEXT INITIALIZATION - Methods of encoding and decoding video are described. The encoder and decoder include a buffer storing at least two context model states, each being the context model state after context-adaptive encoding/decoding of a respective previously-encoded/decoded picture. One of the at least two stored context model states is selected from the buffer and used to initialize the context model for context-adaptively decoding a current picture. The current picture is then context-adaptively entropy encoding/decoded. | 11-19-2015 |
20150358621 | CONTEXT DETERMINATION FOR ENTROPY CODING OF RUN-LENGTH ENCODED TRANSFORM COEFFICIENTS - Methods and devices for encoding and decoding video using mode-dependent context determination in the case of level-run pair coding of transform coefficients are described. Intra-coding modes may be grouped into classes and each class may be associated with a partitioning of a coefficient group into regions. The region in which a coefficient falls determines, in part, the context selected for encoding bins associated with that coefficient, including a level, if the coefficient is non-zero, and a run if the coefficient correspond to the bin of a binarized run value. | 12-10-2015 |
20160080749 | TRANSFORM COEFFICIENT CODING FOR CONTEXT-ADAPTIVE BINARY ENTROPY CODING OF VIDEO - Methods and devices for encoding and decoding video are described that partition transform blocks into coefficient groups. The coefficients within non-zero coefficients are run-length coded in a reverse scan order within the group. Prior to coefficient coding, data is encoded indicating which coefficient group in group scan order is the last to contain a non-zero coefficient. Then data is encoded indicating the position within that last non-zero coefficient group of the last non-zero coefficient in scan order inside the coefficient group. Thus the decoder is able to decode run-length data knowing the positions of the coefficients and eliminating the need for end-of-block flags. | 03-17-2016 |