CARMEL-HAIFA UNIVERSITY ECONOMIC CORPORATION LTD.
|CARMEL-HAIFA UNIVERSITY ECONOMIC CORPORATION LTD. Patent applications|
|Patent application number||Title||Published|
|20150018285||ANTAGONISTS OF Bcl-2 AND USES THEREOF IN INDUCTION OF APOPTOSIS - The present invention provides an antagonist of a Bcl-2 pro survival protein containing a BH3-like domain. The antagonist of the invention comprises ARTS and any fragment or peptide that comprises a BH3-like domain. The invention further provides compositions, combined compositions and kits as well as methods for treating Bcl-2 over-expressing disorders.||01-15-2015|
|20140235663||BUPRENORPHINE FOR THE TREATMENT OF ACUTE SUICIDALITY - Methods and compositions for treating acute suicidality by administration of buprenorphine are disclosed herein. An exemplary method is effected by administering to a subject determined as having acute suicidality a first therapeutically effective amount of buprenorphine, or a pharmaceutically acceptable salt thereof, whereby the administration is ceased once the subject is no longer determined as having acute suicidality. The first therapeutically effective amount is less than 0.2 mg per day. A higher therapeutically effective amount may optionally be administered if the subject is determined as not fully responsive to the first therapeutically effective amount. Unit dosage forms of buprenorphine, comprising less than 0.2 mg (e.g., 0.1 mg) buprenorphine are also disclosed.||08-21-2014|
|20130262368||DETECTING CHANGE POINTS IN DATA STREAMS - A computerized method for detecting a change point in a data stream by testing whether two sets of samples from the data stream were derived from the same distribution, wherein the test uses the unique convergence properties of the two sample tests to probabilistically find the point which maximizes their value, said point closely approximating the change point.||10-03-2013|
|20130232061||REDUCING UNSOLICITED TRAFFIC IN COMMUNICATION NETWORKS - A computerized method of associating an economic transaction with messages being sent across a communication network. The method comprises providing a message to be sent from a sender to at least one intended recipient, constructing at least one transaction securely associating an economic value to be transferred from the sender to at least one intended recipient, associating between the transaction and the message, and transmitting the message from the sender to at least one intended recipient.||09-05-2013|
|20130142820||EXTRACTS OF CYATHUS STRIATUS MUSHROOMS, PHARMACEUTICAL COMPOSITIONS COMPRISING THEM AND A NEW CYATHUS STRIATUS STRAIN - A new and distinct variety of higher Basidiomycetes mushroom||06-06-2013|
|20120173538||STRUCTURAL ANALYSIS OF PROTEINS - The present invention is directed to systems and methods for fast and accurate structural representation and comparison of proteins. Specifically, the present invention provides a method for retrieval of a candidate set of near structural neighbors or structurally similar proteins of a query protein. The method is based on a representation of a protein structure as a “bag of words”—a collection of small disjoint backbone protein fragments. The representation allows quick comparison procedures of the query protein structure to a large number of known protein structures obtained for example, from a repository or database of proteins.||07-05-2012|
|20110217679||DIAGNOSIS METHOD AND SYSTEM BASED ON HANDWRITING ANALYSIS - A diagnosis system and method comprising a handwriting data collection and analysis software and accompanying tools for diagnosing a given condition such as an illness, a mental illness, a physiological condition, a mental or emotional state, medication effect, a personality trait, a skill, an expertise, deception or truth writing. The handwriting of a control group known to have a condition is analyzed in order to determine the detectable characteristic indicators of that group. Such measured indicators comprise spatial, temporal and pressure measures for each writing stroke. The handwriting of a subject is then analyzed to determine if the measured indicators indicate statistically that the subject can be diagnosed with a condition.||09-08-2011|
|20110026781||SYSTEM FOR SECURE FACE IDENTIFICATION (SCIFI) AND METHODS USEFUL IN CONJUNCTION THEREWITH - A method for privacy-retaining face identification comprising dividing at least one input face into a first set of patches, providing an assortment of patch profiles for each patch in the first set of patches, each patch profile in the assortment being associated with a unique index thereby to define an assortment of unique indices, for each individual patch in the input face, finding at least one patch profile within the assortment of patch profiles which most resembles the individual patch, thereby to define a first set of indices from among the assortment of unique indices whose corresponding patch profiles most resemble the input face's patches respectively, and using a privacy preserving computation to generate a physical output indicative of a comparison of the input face and at least one target face by comparing first and second functions of the first set of indices and of a second set of indices respectively, the second set of indices corresponding to patch profiles which most resemble a second set of patches into which the target face has been divided.||02-03-2011|
|20100163621||UAV DECISION AND CONTROL SYSTEM - The present invention relates to a hierarchical system and method for task assignment (TA), coordination and communication of multiple Unmanned Aerial Vehicles (UAV's) engaging multiple attack targets and conceives an ad-hoc routing algorithm for synchronization of target lists utilizing a distributed computing topology. Assuming limited communication bandwidth and range, coordination of UAV motion is achieved by implementing a simple behavioral flocking algorithm utilizing a tree topology for target list routing. The TA algorithm is based on a graph-theoretic approach, in which a node locates all the detectable targets, identifies them and computes its distance to each target. The node then produces an attack plan that minimizes the sum of distances of the UAV's in the subtree of a given node to the targets.||07-01-2010|
Patent applications by CARMEL-HAIFA UNIVERSITY ECONOMIC CORPORATION LTD.