RAYTHEON BBN TECHNOLOGIES CORP. Patent applications |
Patent application number | Title | Published |
20160065676 | Control Of Network Connected Systems - Technology for controlling network connected systems is disclosed. A wireless network can be scanned in order to determine a list of active network addresses. The list of active network addresses can be associated with a plurality of wireless devices that are actively communicating within the wireless network. One or more active network addresses of interest can be identified from the list of active network addresses. An address profile associated with the active network addresses of interest can be identified. One or more network connected systems can be controlled according to a predefined set of rules in the address profile. | 03-03-2016 |
20160036691 | ADAPTOR IMPLEMENTATION FOR INTERNET PROTOCOL ADDRESS AND PORT HOPPING - A system and method of deploying a network hopping adaptor is disclosed. In some embodiments, a network hopping adaptor may be configured to manipulate network traffic so as to change at least one network characteristic of the network traffic, and at least one network interface of a machine selected from a group of machines may be configured to send the network traffic to the network hopping adaptor. The network hopping adaptor may manipulate such characteristics as an IP address, a port number, an encryption algorithm or a compression algorithm. The group of machines may be deployed as virtual machines being executed by a virtualization server, and the network hopping adaptor may be implemented on another virtual machine being executed by the virtualization server. Alternatively, or in addition, the group of machines or the network hopping adaptor may be implemented as physical machines. | 02-04-2016 |
20160034426 | Creating Cohesive Documents From Social Media Messages - A technique to construct a cohesive document is described including accessing a communication system having a plurality of social media message units accessible; collecting a plurality of related social media message units among users over a predetermined period of time; outputting to a single file the plurality of related social media message units when the file reaches a predetermined size to construct a cohesive document; and outputting to a single file a plurality of related social media message units after a maximum predetermined period of time to construct a different cohesive document. | 02-04-2016 |
20160034024 | Performance of Services Based On Power Consumption - Technology for performing services based on power consumption is disclosed. A plurality of power consumption levels can be identified at a service area. The plurality of power consumption levels can be characterized into current power consumption behavior. The current power consumption behavior can be compared to at least one power consumption behavioral model, the power consumption behavioral model including historical power consumption behaviors for the service area. A service can be performed when the current power consumption behavior diverges from the power consumption behavioral model outside of a predefined threshold. | 02-04-2016 |
20160004271 | Accelerator Pedal Assembly - An accelerator pedal assembly is disclosed. The accelerator pedal assembly can include a pedal configured to be movable by a vehicle operator to control a speed of a vehicle. In addition, the accelerator pedal assembly can include an electromagnetic resistance mechanism coupled to the pedal. The electromagnetic resistance mechanism can be configured to provide a force to resist movement of the pedal by the operator to indicate an operational condition of the vehicle to the operator. | 01-07-2016 |
20150358285 | DESTINATION ADDRESS CONTROL TO LIMIT UNAUTHORIZED COMMUNICATIONS - Systems and methods for protecting a network including preventing data traffic from exiting the network unless a domain name request has been performed by a device attempting to transmit the data traffic. In an embodiment, a device within the protected network attempting to send data outside the protected network requests an address for a destination outside the protected network from a domain name server (DNS). In response, the DNS provides an address of the destination to the device and a gateway. In response to receiving the address, the gateway temporarily allows access to the address. In an embodiment, a DNS is coupled to a protected network and the gateway, the DNS provides an external address to a device in response to a request; and a mapping to the gateway; the gateway, coupled to a protected network and an external network, allows traffic according to the mapping. | 12-10-2015 |
20150358279 | DESTINATION ADDRESS REWRITING TO BLOCK PEER-TO-PEER COMMUNICATIONS - Systems and methods for protecting a network including providing a mapping between internal addresses as seen by devices of the protected network and external addresses; providing devices with a mapped address for a destination in response to a lookup request; rewriting, at a gateway, destination addresses of packets exiting the protected network based on the mapping; and rewriting, at the destination-network gateway, source addresses of packets entering the protected network based on the mapping. Embodiments include a gateway coupled to a protected network, an external network, and a name server. The name server, in response to a hostname lookup request, configured to provide a network device with the internal address; and the gateway with a mapping including the internal address, the addresses of the device, and the hostname. The gateway configured to rewrite destination addresses of outbound packets, and source addresses of inbound packets, based on the mapping. | 12-10-2015 |
20150332054 | PROBABILISTIC CYBER THREAT RECOGNITION AND PREDICTION - Generally discussed herein are systems, apparatuses, or processes to recognize that a cyber threat exists or predict a future track of a cyber threat in a network. According to an example, a process for recognizing a cyber threat can include (1) determining a network layout of a network based on received network layout data, (2) receiving cyber sensor data indicating actions performed on the network, (3) calculating a first score associated with the cyber sensor data indicating that a cyber threat is present in the network by comparing a cyber threat profile of the cyber threat that details actions performed by the cyber threat to actions indicated by the cyber sensor data, (4) determining whether the calculated first score is greater than a specified threshold, or (5) determining that the cyber threat is present in response to determining the calculated first score is greater than the specified threshold. | 11-19-2015 |
20150304287 | SYSTEM AND METHOD FOR MERGING ENCRYPTION DATA WITHOUT SHARING A PRIVATE KEY - A method for data privacy in a distributed communication system including a plurality of client terminals merges encrypted streaming data using tree-like encryption key switching and without sharing any private keys in a distributed communication system. The merged data is then sent to client terminals to be further process by respective client terminals. | 10-22-2015 |
20150277906 | INSTRUCTION SET FOR ARBITRARY CONTROL FLOW IN ARBITRARY WAVEFORM GENERATION - Embodiments for providing an arbitrary control flow architecture for an arbitrary waveform generator (AWG) are generally described herein. In some embodiments, an arbitrary control flow instruction set defines control operations for generating an arbitrary waveform. A processor is arranged to execute the arbitrary control flow instruction set from data stored in a system memory to generate an arbitrary waveform. A system memory may include a low-latency memory and a high-latency memory, wherein a cache controller may use prediction mechanisms to reduce the latency of fetching instruction and waveform data by copying that data to the low-latency memory before it is requested. | 10-01-2015 |
20150249650 | SYSTEM AND METHOD TO MERGE ENCRYPTED SIGNALS IN DISTRIBUTED COMMUNICATION SYSTEM - In a computer implemented method for data privacy in a distributed communication system, the method includes: storing a plurality of secret keys, each secret key for a respective one of a plurality of client terminals; identifying a mixer key; generating a plurality of key switch hints for the client terminals, each of the key switch hints generated for a respective client terminal of the client terminals, using the mixer key and a respective secret key for each respective client terminal; sending the key switch hints to a mixer; switching a first encrypted data stream received from a first client terminal of the client terminals to an encrypted output data stream using the key switch hints; and sending the encrypted output data stream to a receiving client terminal of the client terminals to be decrypted by the receiving client terminal. | 09-03-2015 |
20150237020 | SYSTEM AND METHOD FOR OPERATING ON STREAMING ENCRYPTED DATA - Method for data privacy in a distributed communication system includes: receiving first and second encrypted data from first and second client terminals, each having a different data representation; analyzing the first and second data representations to determine a common data representation; translating the first and second encrypted data to a shared data representation using the common data representation; performing operations on the first encrypted data and second encrypted data to generate a first and second operated encrypted data; reverting the first operated encrypted data back to said first data representation and sending the reverted first encrypted date to the first client terminal for decryption by the first client terminal; and reverting the second operated encrypted data back to said second data representation and sending the reverted second encrypted date to the second client terminal for decryption by the second client terminal. | 08-20-2015 |
20150237019 | SYSTEM AND METHOD FOR MERGING ENCRYPTION DATA USING CIRCULAR ENCRYPTION KEY SWITCHING - A method for data privacy in a distributed communication system, in which a plurality of client terminals are arranged in a ring configuration merges encrypted streaming data using circular encryption key switching and without sharing any private keys in a distributed communication system. The merged data is then sent to client terminals to be further process by respective client terminals. | 08-20-2015 |
20150236752 | METHOD FOR SELECTION OF UNIQUE NEXT-TIME-INTERVAL INTERNET PROTOCOL ADDRESS AND PORT - Embodiments for providing a next-time-interval routing parameter to a destination node are generally described herein. In some embodiments, a hopped routing parameter is calculated at a sending node using a static routing parameter of a destination node. The hopped routing parameter and source timing are encoded. The encoded hopped routing parameter and source timing are provided in the address fields of packets. | 08-20-2015 |
20150223139 | REPRESENTATION AND SOLUTIONS FOR SIMULTANEOUS TRANSMISSIONS OVER BROADCAST MEDIUM - Embodiments of a system and method for finding optimal routes for simultaneous transmissions over broadcast medium are generally described herein. In some embodiments, nodes are placed into a cost matrix representing a connected graph of nodes, virtual nodes are identified by applying matrix operations to the cost matrix and backtracking is performed incrementally to build candidates of virtual nodes for a solution set from the identified virtual nodes and to eliminate unsuitable candidates. | 08-06-2015 |
20150160358 | SYSTEMS AND METHODS FOR COMBINING TRIAXIAL GEOPHONE DATA FOR LOCALIZING NEARBY TRANSIENT SEISMIC SOURCES - In one embodiment, a method of processing seismic data using a single triaxial geophone is disclosed, where the method comprises acts of calibrating the single triaxial geophone sensor to determine a position and an orientation relative to a surrounding environment, configuring the single triaxial geophone sensor to receive seismic data from the surrounding environment along three orthogonal axes, measuring, with the single triaxial geophone sensor, a plurality of time series of seismic data from the surrounding environment for the three orthogonal axes, storing, with a computer system coupled to the single triaxial geophone sensor, the time series of seismic data from the surrounding environment for the three orthogonal axes, and processing, with the computer system, the time series of seismic data to identify a plurality of seismic waves of different polarizations. | 06-11-2015 |
20150091756 | RECONFIGURABLE APERTURE FOR MICROWAVE TRANSMISSION AND DETECTION - A reconfigurable aperture includes a plurality of metallic particles confined to a volume extending across an aperture area. The metallic particles are repositioned within the volume to form opaque regions in the aperture area. The opaque regions, and transmissive regions between the opaque regions, can form a reconfigurable zone plate that can change the collimation of a microwave beam via diffraction therethrough. The zone plate can be located a fixed distance away from a microwave source and a detector in a housing, so that for any specified wavelength produced by the microwave source, the zone plate can reconfigure to have a focal length equal to the fixed distance. The reconfigurable zone plate can effectively collimate microwaves produced by the microwave source, can direct the collimated microwaves in a specified direction, can receive microwaves returning along the specified direction, and can focus the received microwaves onto the detector. | 04-02-2015 |
20150077734 | BIPHOTON RANGING WITH HOM INTERFERENCE - A method for range finding of a target including: generating a first photon and a second photon identical to the first photon; transmitting the first photon towards the target and delaying the second photon by a time delay; receiving the first photon reflected from the target and the delayed second photon; interacting the reflected first photon and the delayed second photon to produce HOM interference; detecting photo-statistics at an output of the HOM interference; when the two photons are output at the same output port, repeating the above processes; when the reflected first single photon and the delayed second single photon are output at different output ports, changing the time delay and repeating the above processes; repeating the above processes for a number of times to arrive at a final estimate for a value of the time delay corresponding to the final estimate of the target range. | 03-19-2015 |
20150067409 | DETECTION OF CODE INJECTION ATTACKS - A method for detecting foreign code injected into a computer system including a processor and memory, the processor being configured to execute instructions stored in the memory, includes: detecting, on the computer system, an illegal instruction error; recording the illegal instruction error; determining whether a threshold condition is met; and generating an alert if the threshold condition is met. | 03-05-2015 |
20150057984 | SMART GARMENT AND METHOD FOR DETECTION OF BODY KINEMATICS AND PHYSICAL STATE - A body garment including sensors distributed throughout the garment, each sensor senses body state information from a local surface area of a body; and sensor nodes in proximity to the plurality of sensors, each sensor node including a processor to receive sensing body state information from at least one of the plurality of sensors. Each processor is configured to receive body state information locally from sensors, to utilize the information to determine a local surface shape of the surface of a portion of the body part; and to exchange local surface shape information with neighboring sensor nodes. At least one processor of utilizes the local surface shape information received from the sensor nodes to generate one overall model of a surface shape of the entire surface of the body part covered by the garment. | 02-26-2015 |
20150050904 | WIDEBAND INTERFERENCE MITIGATION SYSTEM WITH NEGATIVE GROUP DELAY AND METHOD FOR WIDEBAND INTERFERENCE CANCELLATION - Embodiments of a wideband interference mitigation (IM) system with negative group delay (NGD) compensation and method for wideband interference cancellation are generally described herein. In some embodiments, the wideband IM system may include first frequency-selective circuitry to capture interfering signals within a bandwidth of interest from a primary signal path after removal of a desired signal, cancellation circuitry to implement a negative group delay (NGD) on output signals from the first frequency-selective circuitry to generate negative group-delayed signals, and second frequency-selective circuitry to generate interference cancellation signals from the negative group-delayed signals for combining with signals from the primary signal path. The negative group delay provided by the cancellation circuitry may compensate for a group delay of the first frequency-selective circuitry, a group delay of the second frequency-selective circuitry and a group delay of primary signal path so that the interference cancellation signals have little or no group delay with respect to signals of the primary signal path within the bandwidth of interest. | 02-19-2015 |
20140341227 | DISRUPTED ADAPTIVE ROUTING - According to one aspect, embodiments of the invention provide a node comprising a processor, a memory including a predefined mapping, the predefined mapping correlating network characteristics to related critical thresholds at which a delivery ratio of the node is close to a maximum level and at which a total number of transmissions by the node is close to a minimum number necessary to achieve the delivery ratio, and a component configured to communicate with one-hop neighbors of the node and configured to determine at least one characteristic of a dynamic network based on information received from the one-hop neighbors of the node, wherein, in reference to the predefined mapping, the processor is configured to identify a critical threshold associated with the at least one characteristic of the network and is configured to transmit a first packet to at least one one-hop neighbor based on the critical threshold. | 11-20-2014 |
20140314419 | SYSTEM AND METHOD FOR QUANTUM INFORMATION TRANSFER BETWEEN OPTICAL PHOTONS AND SUPERCONDUCTIVE QUBITS - An electro-optical system for exchanging quantum information between optical qubits and including a superconductive microwave cavity; an electro-optical material: a superconductive qubit circuit formed on the electro-optical material including a superconductive qubit; a dipole antenna, formed on the electro-optical material for directly coupling the superconductive qubit to the superconductive microwave cavity; an optical input for receiving input optical photons; a microwave input for receiving input microwave photons; and an optical output for outputting modulated optical photons, wherein a frequency and a phase of the optical photon is modulated with a state of the superconducting qubit by the dipole antenna. | 10-23-2014 |
20140307761 | SYSTEM AND METHOD FOR COMMUNICATING WITH SHAPED CYCLIC TIME-DOMAIN WAVEFORMS - Embodiments of a system and method for generating a shaped cyclic time-domain waveform are generally described herein. In some embodiments, a first transform may be performed on an input symbol vector to generate a transformed input vector in a transform domain. The transformed input symbol vector may be expanded to generate an expanded symbol vector. At least some elements of the expanded symbol vector may be weighted with a weighting vector selected for pulse shaping to generate a weighted symbol vector. A second transform may be performed on the weighted symbol vector to generate an output symbol vector for subsequent processing and transmission. The second transform may be an inverse of the first transform and may comprise a greater number of points than the first transform. | 10-16-2014 |
20140304708 | DISTRIBUTED APPLICATION EXECUTION IN A HETEROGENEOUS PROCESSING SYSTEM - A method for distributing execution of a computer program to a plurality of hardware architectures of different types including: analyzing the computer program to identify a plurality of execution boundaries; selecting one or more execution boundaries from the plurality of execution boundaries; linking the computer program to the selected one or more execution boundaries; executing the computer program with linked execution boundaries; saving a hardware agnostic state of the execution of the computer program, when the execution encounters a boundary from the selected one or more execution boundaries; and transmitting the hardware agnostic state to a remote hardware architecture to be executed on the remote hardware architecture, responsive to the hardware agnostic state. | 10-09-2014 |
20140297038 | NETWORK, CONTROL SYSTEM FOR CONTROLLING THE NETWORK, NETWORK APPARATUS FOR THE NETWORK, AND METHOD OF CONTROLLING THE NETWORK - A control system for controlling a network including a plurality of network apparatuses, includes a network site controller for controlling a cooling system in the network and extracting network resource and ambient information from the plurality of network apparatuses into topological information, and a network controller for controlling the plurality of network apparatuses based on the topological information. | 10-02-2014 |
20140289596 | SYSTEMS AND METHODS FOR FACILITATING PLAYBACK OF MEDIA - A system facilitates the browsing of information of interest. The system obtains a transcription of the information and provides the transcription to a user. The system also retrieves the information in its original format and presents the information to the user in the original format. The system visually synchronizes the presentation of the information in the original format with the transcription of the information | 09-25-2014 |
20140286448 | SYSTEM AND METHOD FOR TRANSMITTING A QUADRATURE AMPLITUDE MODULATION (QAM) WAVEFORM TO A RECEIVER - An encoder can convert a stream of data into three or four synchronized 4-PSK signals, for 64-QAM and 256-QAM, respectively. Three or four mixers can combine the three or four synchronized PSK signals with a common local oscillator signal to form three or four respective amplifiable signals, which can all have the same amplitude. One amplifier receives a first of the amplifiable signals and powers one radiator. Two amplifiers both receive a second of amplifiable signals and power two respective radiators. Four amplifiers receive a third of the amplifiable signals and power four respective radiators. The amplifiers can all operate in near or full saturation. Each radiator radiates in one of a plurality of discrete, specified states. The radiated states from the radiators combine through far-field electromagnetic propagation and effectively sum at the receiver to mimic transmission from a single amplifier. | 09-25-2014 |
20140269267 | METHODS FOR DYNAMIC TRANSCEIVER RESOURCE ALLOCATION IN MULTI-TRANSCEIVER SYSTEMS - Embodiments of a system and method for managing transceiver resources in a wireless network are generally described herein. In some embodiments, a transceiver resource manager (MXRM) dynamically adapts the number of transceivers to an offered load. A node computes the number of transceiver it needs based on queue depth and queue usage. MXRM then shares the number of the transceivers to be requested, A, with next-hop neighbors. A node assigns X transceivers such that X is the maximum of their own A value and the highest A value they receive if they are next-hop targets. MXRM processes requests for additional transceivers from nodes and previous-hop neighbors such that the sender-receiver pair assigns a compatible number of transceivers. MXRM is also used to drive frequency assignments to increase capacity along the traffic flows. Therefore, MXRM adapts transceiver assignments to the traffic paths. | 09-18-2014 |
20140265550 | REDUNDANTLY POWERED AND DAISY CHAINED POWER OVER ETHERNET - According to one aspect, embodiments of the invention provide a distributed sensor network comprising an interface unit and a plurality of sensor strings, each sensor string comprising a plurality of sensor units coupled in series to a port of the interface unit, wherein each one of the plurality of sensor units is configured to be provided both power and network connectivity via a first cable from one of the interface unit and another sensor unit within the sensor string and also to provide both power and network connectivity via a second cable to another sensor unit within the sensor string, and wherein a first string of the plurality of sensor strings is configured to be coupled to a second string of the plurality of sensor strings and wherein at least one sensor unit within the first string is configured to provide power to a sensor unit within the second string. | 09-18-2014 |
20140254387 | SYSTEM AND METHOD FOR PACKET TRANSMISSION ALONG SHORTEST-PATH TO MULTIPLE DESTINATIONS - A system, method and apparatus arranged for efficient usage of network resources. Embodiments include nodes linked together, and the links having differing costs, e.g., bandwidth, frequency, and/or monetary cost, or any combination of these. Embodiments may identify neighboring nodes as either next-hop-neighbors or non-next-hop-neighbors. Next-hop-neighbors lie on the shortest path to any node, while non-next-hop-neighbors are nodes linked directly to a node, but the link is more costly than an alternative multi-hop path to the same node. Accordingly, embodiments may suppress packets to the non-next-hop-neighbors. | 09-11-2014 |
20140233728 | METHOD FOR SECURE SYMBOL COMPARISON - A method for secure comparison of encrypted symbols. According to one embodiment, a user may encrypt two symbols, share the encrypted symbols with an untrusted third party that can compute algorithms on these symbols without access the original data or encryption keys such that the result of running the algorithm on the encrypted data can be decrypted to a result which is equivalent to the result of running the algorithm on the original unencrypted data. In one embodiment the untrusted third party may perform a sequence of operations on the encrypted symbols to produce an encrypted result which, when decrypted by a trusted party, indicates whether the two symbols are the same. | 08-21-2014 |
20140210763 | TOUCH SCREEN IMAGING SENSOR - Provided are systems and methods for detecting and associating location information with changes in capacitance on a capacitance sensor assembly of a computing device. Enhancing capacitance detection to include location information can enable generation of image data for display to user showing properties of a concealed object. Rates of change in capacitance drain detected at the sensor assembly coupled with location information can be stored in a derivative image format. The derivative image format of a concealed object can be transformed into an approximation of a conventional camera image. Further processing can be executed to define properties of the concealed object, and identify the concealed object. Further processing can also include model-based analysis and/or property matching to known objects. Image displays can also be correlated to subsequent positions of the device, allowing “x-ray” views of concealed objects | 07-31-2014 |
20140204823 | MULTIPLE SIMULTANEOUS LINK TRANSMISSIONS FOR A MULTI-FREQUENCY MULTI-RATE MULTI-TRANSCEIVER COMMUNICATIONS DEVICE - An apparatus includes a network node configured to communicate with other network nodes via a communication network. The network node includes a plurality of transceivers and a controller. The controller includes a link management module and a packet management module. The link management module is configured to produce link profiles associated with communication links available to the network node, wherein a link profile indicates link characteristics that include a busy indication of a transceiver. The packet management module is configured to identify a link profile solution set that includes a set of link profiles corresponding to communication links for multicasting the message packet, map the link profiles of the link profile solution set to at least a portion of the plurality of transceivers, and initiate transmission of the message packet using the communication links corresponding to the link profile solution set. | 07-24-2014 |
20140198704 | JUST IN TIME LINK TRANSMISSION FOR A MULTI-FREQUENCY MULTI-RATE MULTI-TRANSCEIVER COMMUNICATION DEVICE - An apparatus includes a network node configured to communicate with other network nodes via a communication network. The network node includes a plurality of transceivers and a controller. The controller includes a packet management module that identifies a link profile solution set that includes a set of link profiles corresponding to communication links for multicasting the message packet. The link profile solution set maximizes coverage of network target nodes of the multicast message packet. The packet management module places a first message clone of the message packet in a transceiver queue for transmission to one or more of the network target nodes, updates the link profile solution set when the first message clone reaches the end of the transceiver queue, and initiates transmission of the first message clone or drop the first message clone according to the updated link profile solution set. | 07-17-2014 |
20140198703 | INTERFACE AND LINK SELECTION FOR A MULTI-FREQUENCY MULTI-RATE MULTI-TRANSCEIVER COMMUNICATION DEVICE - An apparatus includes network node configured to communicate with other network nodes via a communication network. The network node includes a plurality of transceivers and a controller. The controller includes a link management module and a packet management module. The link management module is configured to produce link profiles associated with communication links available to the network node, wherein a link profile indicates link characteristics of a communication link. The packet management module is configured to identify a link profile solution set that includes a set of link profiles corresponding to communication links for multicasting the message packet, map the link profiles of the link profile solution set to at least a portion of the plurality of transceivers, and initiate transmission of the message packet using the communication links corresponding to the link profile solution set. | 07-17-2014 |
20140133001 | DEVICE AND METHOD FOR OPTIMALLY DISTINGUISHING AMONG AN ARBITRARY SET OF COHERENT STATES OF LIGHT - A method and device for optimal processing of a plurality of sets of coherent states of lights. The method includes: receiving a light having a coherent state; splitting the coherent state into a plurality of identical states (slices), each a coherent state with lower intensity than that of the received coherent state; transferring the information of each of the identical coherent states into a qubit; compressing the quantum information of the qubit into a quantum memory; and quantum processing the quantum information from the quantum memory. | 05-15-2014 |
20140126824 | EFFICIENT INNER PRODUCT COMPUTATION FOR IMAGE AND VIDEO ANALYSIS - A computationally efficient approach to determining inner products between feature vectors is provided that eliminates or reduces the need for multiplication, and more specifically, provides an efficient and accurate basis selection for techniques such as Orthogonal Matching Pursuit. | 05-08-2014 |
20140126817 | IMAGE ANALYSIS USING COEFFICIENT DISTRIBUTIONS WITH SELECTIVE BASIS FEATURE REPRESENTATION - Distributional information for a set of α vectors is determined using a sparse basis selection approach to representing an input image or video. In some examples, this distributional information is used for a classification task. | 05-08-2014 |
20140115687 | INTRUSION AND MISUSE DETERRENCE SYSTEM EMPLOYING A VIRTUAL NETWORK - A method and apparatus is disclosed for increasing the security of computer networks through the use of an Intrusion and Misuse Deterrence System (IMDS) operating on the network. The IMDS is a system that creates a synthetic network complete with synthetic hosts and routers. It is comprised of a network server with associated application software that appears to be a legitimate portion of a real network to a network intruder. The IMDS consequently invites inquiry and entices the intruder away from the real network. Simulated services are configured to appear to be running on virtual clients with globally unique, class “C” IP addresses. Since there are no legitimate users of the virtual network simulated by the IMDS, all such activity must be inappropriate and can be treated as such. Consequently, the entire set of transactions by an intruder can be collected and identified rather than just those transactions that meet a predefined attack profile. Also, new exploits and attacks are handled just as effectively as known attacks, resulting in better identification of attack methodologies as well as the identification and analysis of new attack types. Since the IMDS only has to be concerned with the traffic going to its simulated hosts it additionally eliminates the bandwidth limitation that plagues a traditional IDS. | 04-24-2014 |
20140099033 | FAST COMPUTATION OF KERNEL DESCRIPTORS - An approach to computation of kernel descriptors is accelerated using precomputed tables. In one aspect, a fast algorithm for kernel descriptor computation that takes O(1) operations per pixel in each patch, based on pre-computed kernel values. This speeds up the kernel descriptor features under consideration, to levels that are comparable with D-SIFT and color SIFT, and two orders of magnitude faster than STIP and HoG3D. In some examples, kernel descriptors are applied to extract gradient, flow and texture based features for video analysis. In tests of the approach on a large database of internet videos used in the TRECVID MED 2011 evaluations, the flow based kernel descriptors are up to two orders of magnitude faster than STIP and HoG3D, and also produce significant performance improvements. Further, using features from multiple color planes produces small but consistent gains. | 04-10-2014 |
20140079316 | SEGMENTATION CO-CLUSTERING - An approach to segmentation or clustering of a set of elements combines separate procedures and uses training data for those procedures on labeled data. This approach is applied to elements being components of an image of text (e.g., printed or handwritten). In some examples, the elements are connected sets of pixels. In images of text, the clusters can correspond to individual lines. The approach provides improved clustering performance as compared to any one of the procedures taken alone. | 03-20-2014 |
20140063281 | SYSTEMS AND METHODS FOR RANDOM INTENSITY ILLUMINATION MICROSCOPY - An optical imaging system and method for performing random intensity illumination microscopy is disclosed. The system includes an incoherent signal light source, at least two diffusers having spatially random diffusion patterns, an image capture device that receives a reflected light signal from an object to be imaged, and a processor configured to perform digital image processing of the reflected signal. The method comprises acts of providing an incoherent light signal, diffusing the incoherent light signal with at least two diffusers having spatially random diffusion patterns to provide a diffused light signal, splitting the diffused light signal to provide a first light signal and a second light signal, reflecting the first light signal from a specimen to provide a reflected light signal, collecting the reflected light signal and the second light signal with an image capture device and processing the collected images to determine reflectance. | 03-06-2014 |
20140059684 | SYSTEM AND METHOD FOR COMPUTER INSPECTION OF INFORMATION OBJECTS FOR SHARED MALWARE COMPONENTS - Embodiments of a system and method for computer inspection of information objects, for example, executable software applications for common components that may include elements of computer viruses, items from hacker exploit libraries, or other malware components. Information objects may contain identified sequences of instructions, each of which may be identified and hierarchically grouped based on their structural relationship(s). In the software context, programming languages may include multiple components that include functional code; these components are often shared between programmers. In some embodiments, an inspection of the hierarchical relationship of components (e.g., constituent functions) in the information objects may allow for identification of common components shared between programs. In some embodiments, authorship of objects or components in the objects may be identified by comparisons between component samples. In some embodiments, inspection of the relationship between components is limited to component groups having a specified structural size, complexity, or eccentricity. | 02-27-2014 |
20140016779 | TAMPER RESISTANT ELECTRONIC PACKAGES WITH QUANTUM INTERCONNECTS - A method for resisting tampering, the method including discovering a plurality of electronic packages for communication, each of the plurality of electronic packages having an associated quantum state table, mapping a plurality of communications paths among the plurality of electronic packages, for each communication path of the plurality of communications paths, making an entry into the quantum state table, negotiating key material for each of the plurality of communications paths, for a plurality of data exchanges along each of the plurality of communications paths generating a key, and encrypting a data exchange on a communications path with the key. | 01-16-2014 |
20140012847 | STATISTICAL INSPECTION SYSTEMS AND METHODS FOR COMPONENTS AND COMPONENT RELATIONSHIPS - Embodiments of an inspection system and method for a collection of information objects, for example, a collection of executable software applications may be inspected for computer viruses, or a collection of genomes may be inspected for common or unique gene sequences. Information objects may contain identified sequences of instructions, each of which may be labeled with a symbol. In the software context, programming languages may include symbols that indicate functionality. In some embodiments, an inspection of the statistical properties of the information objects and their included symbols may allow for the symbols (and thus instruction sequences) to be grouped into logical components. In some embodiments, objects that include individual logical components may be grouped together. These groupings and their dependencies may be used to determine the structure of each object by detailing its constituent components, how they relate or depend on one another, and how the information object may function. | 01-09-2014 |
20130292472 | BOUNDLESS READING OF INFORMATION BITS WITH A SINGLE PHOTON - An optical imaging system includes a transmitter configured to generate spatially entangled quantum states of light to probe reflective targets, a target configured to reflect the spatially entangled quantum states of light and a receiver configured to receive and detect the spatially entangled quantum states of light, thereby decoding a message encoded in a memory. | 11-07-2013 |
20130266127 | SYSTEM AND METHOD FOR REMOVING SENSITIVE DATA FROM A RECORDING - Systems and methods for, among other things, removing sensitive data from an recording. The method, in certain embodiments, includes receiving an audio recording of a call and a text transcription of the audio recording, identifying events which occur during the call by detecting characteristic audio patterns in the audio recording and selected keywords and phrases in the text transcription, determining, from the identified events, a first event which precedes sensitive data in the call and a second event which occurs after sensitive data in the call, determining a portion of the call containing sensitive data with a start time at the first event and an end time at the second event, and removing the portion of the call between the start time and end time from the audio recording. | 10-10-2013 |
20130238951 | HOLEVO CAPACITY ACHIEVING JOINT DETECTION RECEIVER - An optical receiver may include a unitary transformation operator to receive an n-symbol optical codeword associated with a codebook, and to perform a unitary transformation on the received optical codeword to generate a transformed optical codeword, where the unitary transformation is based on the codebook. The optical receiver may further include n optical detectors, where a particular one of the n optical detectors is to detect a particular optical symbol of the transformed optical codeword, and to determine whether the particular optical symbol corresponds to a first optical symbol or a second optical symbol. The optical receiver may also include a decoder to construct a codeword based on the determinations, and to decode the constructed codeword into a message using the codebook. The optical receiver may attain superadditive capacity, and, with an optimal code, may attain the Holevo limit to reliable communication data rates. | 09-12-2013 |
20130219400 | ENERGY-AWARE COMPUTING ENVIRONMENT SCHEDULER - A method includes receiving a process request, identifying a current state of a device in which the process request is to be executed, calculating a power consumption associated with an execution of the process request, and assigning an urgency for the process request, where the urgency corresponds to a time-variant parameter to indicate a measure of necessity for the execution of the process request. The method further includes determining whether the execution of the process request can be delayed to a future time or not based on the current state, the power consumption, and the urgency, and causing the execution of the process request, or causing a delay of the execution of the process request to the future time, based on a result of the determining. | 08-22-2013 |
20130185213 | NEAR-FIELD COMMUNICATION (NFC) SYSTEM AND METHOD FOR PRIVATE NEAR-FIELD COMMUNICATION - Embodiments of a near-field communication (NFC) system and method for private near-field communication are generally described herein. In some embodiments, a resonance-coupled channel is masked with a random channel-masking signal. The channel-masking signal may be scaled based on near-field channel conditions. Signals received through the channel may be unmasked with the scaled channel-masking signal to determine data that may have been conveyed by an NFC transmitting device by affecting the impedance of the resonance-coupled channel. In some embodiments, a reference signal may be scrambled with a mask to generate the channel-masking signal. The mask may include at least one of a random symbol mask, an amplitude mask and a phase mask. For additional privacy, the mask may include a random symbol mask and at least one of an amplitude mask and a phase mask. | 07-18-2013 |
20130171626 | METHODS OF EVALUATING GENE EXPRESSION LEVELS - Described herein are methods of evaluating the expression levels of DNA parts encoding proteins in test circuits. In particular, the methods disclosed herein are useful to evaluate the expression of an output protein regulated by a regulatory protein-genetic element pair. | 07-04-2013 |
20130170584 | NON-CONTIGUOUS SPECTRAL-BAND MODULATOR AND METHOD FOR NON-CONTIGUOUS SPECTRAL-BAND MODULATION - Embodiments of a non-contiguous spectral-band modulator and method for non-contiguous spectral-band modulation are generally described herein. In some embodiments, an input symbol tuple may be mapped to a sequence of phase values. Each value of the sequence of phase values may represent an instantaneous frequency of a waveform for a signal with a power spectral density that is substantially constrained to the two or more subbands of a non-contiguous spectrum. The values of the sequence of phase values may be accumulated and a phase-sample sequence representing phase samples of a transmit waveform may be generated. An exponentiation may be performed on the phase-sample sequence to generate a constant modulus signal sequence. An output signal sequence is generated that is constrained to a region in the complex plane, such as an annulus, when the signal is in a subband. The output signal sequence may be shaped to constrain spectral energy during transitions between subbands. | 07-04-2013 |
20130160556 | ACOUSTIC SENSORS FOR DETECTING SHOOTER LOCATIONS FROM AN AIRCRAFT - The systems and methods described herein include an acoustic sensor having piezoelectric material housed in a cartridge and sealed with a solid nonporous stainless steel cover. The systems include additional elements to tune the performance of the acoustic sensor for measuring shockwaves on the surface of an aircraft, such as a helicopter. In particular, the system includes several vibration isolating elements including foam pads and O-rings disposed between the cartridge and the cover for isolating the piezoelectric material from aircraft vibration and turbulence. Additionally, the systems and methods include circuitry for converting analog electrical signals generated by the piezoelectric material, in response to acoustic signals, to digital electrical signals. | 06-27-2013 |
20130148658 | SYSTEMS AND METHODS FOR SCALABLE MULTICAST COMMUNICATION USING SELF-ROOTED FORWARDING TREES - Systems and methods are disclosed herein for multicasting a data packet through a wireless network. The method includes a packet metadata which maintains a set of next-hop nodes on the routing path as well as the assigned destination nodes of the packet. In addition, each node maintains only a single self-rooted forwarding tree for determining the routing path. By using the metadata in conjunction with a single forwarding tree at each node, the method introduces a highly scalable alternative to multicast protocols based on link state routing source-based trees while substantially reducing the processor load. Furthermore, the method does not require a consistent view of the network topology, making it useful in mobile scenarios. Also included is a mechanism to minimize the packet metadata size for minimal impact to performance while supporting arbitrarily large multicast group sizes. | 06-13-2013 |
20130137604 | METHODS OF EVALUATING GENETIC ELEMENTS - The invention relates to compositions for evaluating a genetic element and methods of use. | 05-30-2013 |
20130083903 | SYSTEMS AND METHODS FOR PRESENTING END TO END CALLS AND ASSOCIATED INFORMATION - Systems and methods that analyze and monitor the performance of a call center including performance of the interactive voice response systems, call center agents, and other components. The systems and methods record characteristics of the call such as the audio data, and analyze that record to identify the events that take place during the call. These events may be defined as customer/call center interactions, such as dropped calls, logic errors or other event. A call center administrator may also identify a set of metrics, such as the number of dropped calls that occur during a day, that may be monitored by the systems described herein. The data collected about these events and metrics may be stored in a database and provided to the administrator through a user interface that allows the administrator to browse through the collected metric and recorded call data and directly review relevant portions of a call. | 04-04-2013 |
20130082146 | SYSTEM AND METHOD FOR CREATING AN ARTIFICIAL ATMOSPHERE FOR THE REMOVAL OF SPACE DEBRIS - Systems and methods are disclosed herein for producing an artificial atmosphere for creating drag on space debris. The artificial atmosphere is produced by an artificial atmosphere delivery system (AADS), which comprises a combustible propellant and a propellant ignition device. The combustible propellant creates an artificial atmosphere when ignited. The combustible propellant is directed to a region near the path of the space debris by a targeting device. The propellant ignition device ignites the combustible propellant such that ignition of the combustible propellant does not impart significant momentum on the AADS. Igniting the combustible propellant creates the artificial atmosphere in the path of the space debris. | 04-04-2013 |
20130019309 | SYSTEMS AND METHODS FOR DETECTING MALICIOUS INSIDERS USING EVENT MODELSAANM Strayer; William TimothyAACI West NewtonAAST MAAACO USAAGP Strayer; William Timothy West Newton MA USAANM Partridge; CraigAACI East LansingAAST MIAACO USAAGP Partridge; Craig East Lansing MI USAANM Jackson; Alden WarrenAACI BrooklineAAST MAAACO USAAGP Jackson; Alden Warren Brookline MA USAANM Polit; Stephen HenryAACI BelmontAAST MAAACO USAAGP Polit; Stephen Henry Belmont MA US - Systems and methods are disclosed for determining whether a mission has occurred. The disclosed systems and methods utilize event models that represent a sequence of tasks that an entity could or must take in order to successfully complete the mission. As a specific example, an event model may represent the sequence of tasks a malicious insider may complete in order to exfiltrate sensitive information. Most event models include certain tasks that must be accomplished in order for the insider to successfully exfiltrate an organization's sensitive information. Many of the observable tasks in the attack models can be monitored using relatively little information, such as the source, time, and type of the communication. The monitored information is utilized in a traceback search through the event model for occurrences of the tasks of the event model to determine whether the mission that the event model represents occurred. | 01-17-2013 |
20130015596 | ROBOTIC FABRICATOR - A fabrication system includes a tool-head for manufacturing, a first manipulator and a second manipulator. The first manipulator supports and manipulates an item, and is configured to provide six-axes of movement for positioning of the item relative the tool-head. The second manipulator carries a component and orients the component at a select orientation relative to the item supported on the first manipulator. The tool-head is configured to add material to at least one of the item and the component. The first and second manipulators provide at least six axes of fabrication for the tool-head. | 01-17-2013 |
20120324557 | SYSTEM AND METHOD FOR REMOTE INTEGRITY VERIFICATION - Systems and methods are disclosed herein for verifying the integrity of a remote computing device. The system includes a challenge processor in communication with a communication device. The challenge processor selects a challenge from a plurality of challenges for determining the integrity of a computer program on a remote computing device. The challenge is selected in a manner which is substantially unpredictable by the remote computing device. The communication device transmits the challenge to the remote computing device and receives an output of the challenge. The challenge processor is also configured to determine from the output of the challenge whether the integrity of the computer program on the remote computing device has been compromised. | 12-20-2012 |
20120311691 | SYSTEMS AND METHODS FOR DECOY ROUTING AND COVERT CHANNEL BONDING - Systems, methods, and devices for decoy routing and covert channel bonding are described. The decoy routing system includes a client computing device, a decoy router, and a decoy proxy such that packets addressed to a decoy destination are re-routed by the decoy router to a covert destination via the decoy proxy. The decoy routing method may be applied to a covert channel bonding process, in which a plurality of packet data streams are sent to one or more decoy destinations, re-routed appropriately via one or more decoy routers and/or decoy proxies, and assembled together into a single packet data stream at either a decoy proxy, or a final covert destination. | 12-06-2012 |
20120275272 | WEARABLE SHOOTER LOCALIZATION SYSTEM - A wearable shooter localization system including a microphone array, processor, and output device for determining information about a gunshot. The microphone array may be worn by on the upper arm of the user. A second array, which may operate cooperatively or independently from the first array, may be worn on the other arm. The microphone array is sensitive to the acoustic effects of gunfire and provides a set of electrical signals to the processing unit, which identifies the origin of the fire. The system may include orientation and/or motion detection sensors, which the processor may use to either initially compute a direction to the origin of a projectile in a frame of reference meaningful to a wearer of the system or to subsequently update that direction as the wearer moves. | 11-01-2012 |
20120272317 | SYSTEM AND METHOD FOR DETECTING INFECTIOUS WEB CONTENT - Systems and methods are disclosed herein for detecting a threat to a computing device. The system includes a server and a computing device in communication with the server and configured to browse the Internet. The server receives data indicating a configuration parameter of the computing device and executes an emulation of the computing device that replicates the configuration parameter. The server also receives data relating to the computing device's browsing behavior and replicates the browsing behavior on the emulation. Upon detecting an undesired modification to the emulation of the computing device caused by the replicated browsing behavior, the server automatically generates and outputs an alert related to the undesired modification and related browsing behavior. | 10-25-2012 |
20120269067 | SPECTRUM-ADAPTIVE NETWORKING - The present invention increases the available spectrum in a wireless network by sharing existing allocated (and in-use) portions of the RF spectrum in a manner that minimizes the probability of interfering with existing legacy users. Interference temperature-adaptive waveforms, and a variety of physical and media access control protocols for generating waveforms based on measurement and characterization of the local spectrum are provided. The invention measures the local spectrum at a receiving node, generates an optimal waveform profile specifying transmission parameters that will water-fill unused spectrum up to an interference limit without causing harmful interference to primary and legacy transmitters using the same frequency bands, and enables simultaneous transmit and receive modes at multiple transceivers in a wireless network. Closed loop feedback control between nodes, co-site interference management, intersymbol interference mitigation, wide sense stationary baseband signaling and modulation, and power limited signaling for avoiding detection and interception are provided. | 10-25-2012 |
20120230153 | SYSTEMS AND METHODS FOR DISTRIBUTED SENSOR CLUSTERS - Systems and methods for processing signals received from at least two sources are described. The two sources may each include an array of sensors. The sensor arrays may be spaced apart on the surface of a body, such as an aircraft, a ground vehicle, or a building. The sensors are configured for receiving signals from the at least two sources indicative of timing information. The timing information may be associated with a shockwave of a projectile and a location processor configured for determining shooter location based on signals output by each of the at least two arrays of sensors is coupled to each of the at least two arrays of sensors. The location processor is configured to compute global time metrics and local reference times associated with each of the sensors and determine shooter location based on a relationship between computed global time metrics and local reference times. | 09-13-2012 |
20120177385 | HOLEVO CAPACITY ACHIEVING JOINT DETECTION RECEIVER - An optical receiver may include a unitary transformation operator to receive an n-symbol optical codeword associated with a codebook, and to perform a unitary transformation on the received optical codeword to generate a transformed optical codeword, where the unitary transformation is based on the codebook. The optical receiver may further include n optical detectors, where a particular one of the n optical detectors is to detect a particular optical symbol of the transformed optical codeword, and to determine whether the particular optical symbol corresponds to a first optical symbol or a second optical symbol. The optical receiver may also include a decoder to construct a codeword based on the determinations, and to decode the constructed codeword into a message using the codebook. The optical receiver may attain superadditive capacity, and, with an optimal code, may attain the Holevo limit to reliable communication data rates. | 07-12-2012 |
20120175466 | SPACE DEBRIS REMOVAL USING UPPER ATMOSPHERE - The systems and methods of the invention modulate atmospheric gases to temporarily increase the amount of atmospheric particles in the path of the debris, in order to decelerate the debris and accelerate natural orbital decay to the point of atmospheric re-entry. In one aspect of the invention, clearing the space debris includes propelling a plume of atmospheric gases substantially orthogonal to the path of the debris such that the debris collides with the gaseous plume as it passes through the plume. Increased atmospheric drag from the gaseous particles of the plume in the path of the debris obstructs a forward propagation of the debris and gradually decelerates the debris, leading eventually to atmospheric recapture. Embodiments of the invention can be employed in any number of applications, including without limitation, clearing debris in the low-earth orbit (LEO) which is particularly susceptible to debris build-up, de-orbiting non-refuse payloads from orbits, and clearing debris from geosynchronous orbits. | 07-12-2012 |
20120173229 | SYSTEMS AND METHODS FOR PRESENTING END TO END CALLS AND ASSOCIATED INFORMATION - Systems and methods that, among other things, analyze and monitor the performance of a call center including performance of the interactive voice response (IVR) systems, call center agents, and other components of the call center. The systems and methods record characteristics of the call such as the audio data, and analyze that record to identify the events and the actions that take place during the call. A call center administrator may also identify a set of metrics, such as the number of dropped calls that occur during a day that may be monitored by the systems described herein. The data collected about these events and the resulting metrics may be stored in a database and provided to a call center administrator through a user interface that allows the administrator to browse through the collected metric and recorded call data and directly review relevant portions of a call. | 07-05-2012 |
20120158953 | SYSTEMS AND METHODS FOR MONITORING AND MITIGATING INFORMATION LEAKS - Systems and methods are disclosed for determining whether a third party observer could determine that an organization has an intent with respect to subject matter based on the organization's web activity. The determination that there is a risk of information leaks to the third party observer can be completed by analyzing the entropy of web usage information destined for the third party observer's servers. Systems and methods are also disclosed for mitigating the risk of information leaks by obscuring the organization's web activity. The web activity can be obscured by selecting candidate actions that can be used to generate neutralizing web traffic from the organization's network which will obscure an intent the organization has with respect to a particular subject matter. For example, the candidate actions can identify specific queries, links, or actions that the organization can take to neutralize their web activity to a less remarkable point in the search space. | 06-21-2012 |
20120117376 | METHOD AND APPARATUS FOR ANONYMOUS IP DATAGRAM EXCHANGE USING DYNAMIC NEWTORK ADDRESS TRANSLATION - Methods, apparatus, system and computer program are provided for concealing the identity of a network device transmitting a datagram having a network layer header. A unique local identifier and broadcast address are determined in accordance with a next-hop address. A partially encrypted network layer header is determined by encrypting a plurality of identifying portions of the network layer header, where one portion of the network layer header is the unique local identifier. The datagram is encapsulated with another network layer header whose address is set to the broadcast address. The encapsulated datagram can be received and detunneled, and an address of a recipient can be extracted from the network layer header. The datagram is then admitted into a network domain. | 05-10-2012 |
20120115241 | SYSTEMS, DEVICES, AND METHODS FOR REMOTELY INTERROGATED CHEMOSENSOR ELECTRONICS - Systems, devices and methods for remotely interrogating sensor electronics are described. In one embodiment, a system for detecting and localizing chemical analytes is described. This system includes a plurality of chemosensor electronic devices for detecting the presence of chemical analytes. Each of these devices includes a chemosensor for sensing chemical analytes, a transponder, and an electronic circuit for activating the transponder based on an output of the chemosensor. These devices may have a cross-section area of less than 1 square micrometer. The system also includes an interrogation device for interrogating the plurality of devices and for receiving information on the detected chemical analytes from devices with activated transponders, and a processor for determining the locations of the devices with activated transponders. These locations may be forwarded to a third party. | 05-10-2012 |
20120076503 | SYSTEMS AND METHODS FOR QUANTUM ILLUMINATION DETECTION FOR OPTICAL COMMUNICATIONS AND TARGET DETECTION - A detection system including a receiver, a transmitter, and a processor for stealthy target detection or optical communications is described. Optical communications may be spread spectrum encoded communications over a bright background communication channel. The transmitter includes a quantum frequency entanglement source for outputting a signal beam and an idler beam, and transmission optics for directing the signal beam towards a remote surface. Photons in the idler beam are quantum-mechanically entangled in frequency with photons the signal beam. The transmitter includes a first spectrometer for measuring a frequency band associated with photons in the idler beam. The receiver includes a second spectrometer for identifying the frequency band associated with the photons in the received return beam. The system includes a processor configured to process the output of the spectrometers to determine the presence of a target in a target region or a message encoded in the received return beam. | 03-29-2012 |
20120067201 | SYSTEMS AND METHODS FOR AN INDICATOR FOR A WEAPON SIGHT - The systems and methods described herein provide military personnel with a swift and accurate means to return fire at a detected shooter. In particular, the systems and methods described herein relate to an indicator for a weapon sight. In some embodiments, the indicator is electromechanical. In some embodiments, the indicator is configured to be moveable such that when the weapon sight is aligned with the indicator, the weapon points in the direction of the detected shooter. In some embodiments, the indicator is attached to the weapon itself, while in other embodiments, the indicator is attached to the weapon mount. The weapon may be located on a ground vehicle, aircraft, or may be portable. In some embodiments, the system includes a processor configured to receive a shooter's location, determine the position of the indicator based on the received shooter location, and control the indicator to move into the determined position. In some embodiments, the system may provide the location of more than one shooter to military personnel and the location of the second shooter may be provided in the form of an aural or visual signal. | 03-22-2012 |
20120064928 | SPECTRUM-ADAPTIVE NETWORKING - The present invention increases the available spectrum in a wireless network by sharing existing allocated (and in-use) portions of the RF spectrum in a manner that will minimize the probability of interfering with existing legacy users. The invention provides interference temperature-adaptive waveforms, and a variety of physical and media access control protocols for generating waveforms based on measurement and characterization of the local spectrum. The invention measures the local spectrum at a receiving node, generates an optimal waveform profile specifying transmission parameters that will water-fill unused spectrum up to an interference limit without causing harmful interference to primary and legacy transmitters using the same frequency bands, and enables simultaneous transmit and receive modes at a multiplicity of transceivers in a wireless network. The invention also provides closed loop feedback control between nodes, co-site interference management, intersymbol interference mitigation, wide sense stationary baseband signaling and modulation, and power limited signaling for avoiding detection and interception. | 03-15-2012 |
20110285516 | SELF-ORGANIZING EXTENSIBLE DISTRIBUTED SENSOR ARRAY ARCHITECTURE - This invention relates to methods and systems for providing data from a distributed array. In one aspect, the array is a sensor array that includes sensor nodes that are each associated with one or more sensors, and the data includes sensor data acquired from the sensors by the sensor nodes. The sensor array employs modular and interchangeable sensor nodes that are capable of self-organizing in response to a network disruption while maintaining a flow of synchronized data to the event monitor. This self-organizing characteristic enables the overall network of nodes to be self-healing and easily extensible. The improved fault resilience makes it possible to deploy the sensors without requiring complex monitoring or fault diagnosis. Embodiments of the invention can be employed in any number of applications, including without limitation, tunnel activity detection, seismic/acoustic monitoring/detection and other applications where gathering sensor data may be desired. | 11-24-2011 |
20110280405 | SYSTEMS AND METHODS FOR STABILIZATION OF INTERFEROMETERS FOR QUANTUM KEY DISTRIBUTION - Systems and methods are described in which both a quantum key distribution (QKD) transmitter and QKD receiver may keep both of their two-path interferometers stable, with regard to path length drift, relative to an internal reference laser are described. Systems and methods are also proposed whereby the transmitter interferometer may have only a single path (e.g., Sagnac interferometers). The systems and methods described herein may greatly improve the performance of quantum cryptographic transceivers that may make use of these systems and methods. | 11-17-2011 |
20110271012 | PACKET HEADER COMPRESSION FOR LOSSY CHANNELS - The disclosed systems and methods provide for the compression and decompression of packet headers. An uncompressed header can be compressed in size to form a smaller, compressed header, such that the compressed header can include values that can be used to re-produce the uncompressed header. A compressed header can include at least two such values. A first value of the at least two values can be computed based on a second, earlier uncompressed header and can be used to derive the uncompressed header. Similarly, a second value of the at least two values can be computed based on a third uncompressed header and can be used to derive the same uncompressed header. Accordingly, the uncompressed header can be derived based on the first value and the second uncompressed header, or based on the second value and the third uncompressed header. The uncompressed header, second uncompressed header, and third uncompressed header can be associated with different packets. | 11-03-2011 |
20110173442 | PACKET-BASED AND PSEUDO-PACKET BASED CRYPTOGRAPHIC COMMUNICATIONS SYSTEMS AND METHODS - The disclosed technology provides a system and method of securely communicating data. An encryptor located at a transmitter can provide encrypted data to the transmitter. The transmitter can maintain a packet number indicating a particular packet for carrying the encrypted data and a sub-packet number indicating a position within the packet where the encrypted data is to be stored. The encryptor can produce the encrypted data using an encryptor seed generated based on the packet number and sub-packet number. A receiver can maintain a receiver packet number indicating a number of previously received packets and can compute a receiver sub-packet number. The receiver can receive a packet containing encrypted data and can decrypt the encrypted data using a decryptor seed generated based on the receiver packet number and sub-packet number. | 07-14-2011 |
20110153673 | SEMANTIC MATCHING USING PREDICATE-ARGUMENT STRUCTURE - The invention relates to topic classification systems in which text intervals are represented as proposition trees. Free-text queries and candidate responses are transformed into proposition trees, and a particular candidate response can be matched to a free-text query by transforming the proposition trees of the free-text query into the proposition trees of the candidate responses. Because proposition trees are able to capture semantic information of text intervals, the topic classification system accounts for the relative importance of topic words, for paraphrases and re-wordings, and for omissions and additions. Redundancy of two text intervals can also be identified. | 06-23-2011 |
20110047552 | ENERGY-AWARE PROCESS ENVIRONMENT SCHEDULER - A device receives a request associated with a process, and determines one or more current states of one or more process resources used to execute the process request. The device also calculates a power consumption associated with execution of the process request by the one or more process resources, and assigns an urgency for the process request, where the urgency corresponds to a time-variant parameter that indicates a measure of necessity for the execution of the process request. The device further determines whether the execution of the process request can be delayed to a future time based on the one or more current states, the power consumption, and the urgency, and causes, based on the determination, the process request to be executed or delayed to the future time. | 02-24-2011 |
20100274923 | METHOD AND APPARATUS FOR DYNAMIC MAPPING - A system for mapping and translating address information in a network is provided. The system includes a client-side address translator ( | 10-28-2010 |