Patent application number | Description | Published |
20100079850 | MAGNETOPHORETIC AND ELECTROMAGNETOPHORETIC DISPLAYS - The present invention is directed to a display device which comprises two layers of insulating substrate, at least the substrate on the viewing side is transparent, an array of display cells sandwiched between the two layers of substrate, a writing means, and optionally an erasing means to magnetically or electrically erase the image. The display cells are filled with a dispersion of magnetic particles which may be charged or non-charged. The display of the invention eliminates the use of the transparent conductor film, such as ITO, on the viewing side. Therefore, the displays of this invention are more cost effective, more flexible and durable and capable of higher image contrast ratio and higher reflectance in the Dmin area. | 04-01-2010 |
20110292495 | MAGNETOPHORETIC AND ELECTROMAGNETOPHORETIC DISPLAYS - The present invention is directed to a display device which comprises two layers of insulating substrate, at least the substrate on the viewing side is transparent, an array of display cells sandwiched between the two layers of substrate, a writing means, and optionally an erasing means to magnetically or electrically erase the image. The display cells are filled with a dispersion of magnetic particles which may be charged or non-charged. The display of the invention eliminates the use of the transparent conductor film, such as ITO, on the viewing side. Therefore, the displays of this invention are more cost effective, more flexible and durable and capable of higher image contrast ratio and higher reflectance in the Dmin area. | 12-01-2011 |
Patent application number | Description | Published |
20110220505 | DROPLET MANIPULATIONS ON EWOD MICROELECTRODE ARRAY ARCHITECTURE - A method of manipulating droplet in a programmable EWOD microelectrode array comprising multiple microelectrodes, comprising: constructing a bottom plate with multiple microelectrodes on a top surface of a substrate covered by a dielectric layer; the microelectrode coupled to at least one grounding elements of a grounding mechanism, a hydrophobic layer on the top of the dielectric layer and the grounding elements; manipulating the multiple microelectrodes to configure a group of configured-electrodes to generate microfluidic components and layouts with selected shapes and sizes, comprising: a first configured-electrode with multiple microelectrodes arranged in array, and at least one second adjacent configured-electrode adjacent to the first configured-electrode, the droplet disposed on the top of the first configured-electrode and overlapped with a portion of the second adjacent-configured-electrode; and manipulating one or more droplets among multiple configured-electrodes by sequentially activating and de-activating one or more selected configured-electrodes to actuate droplets to move along selected route. | 09-15-2011 |
20110247934 | MICROELECTRODE ARRAY ARCHITECTURE - Disclosed herein is a device A device of the microelectrode array architecture, comprising: (a) a bottom plate comprising an array of multiple microelectrodes disposed on a top surface of a substrate covered by a dielectric layer; wherein each of the microelectrode is coupled to at least one grounding elements of a grounding mechanism, wherein a hydrophobic layer is disposed on the top of the dielectric layer and the grounding elements to make hydrophobic surfaces with the droplets; (b) a field programmability mechanism for programming a group of configured-electrodes to generate microfluidic components and layouts with selected shapes and sizes; and, (c) a system management unit, comprising: (i) a droplet manipulation unit; and (ii) a system control unit. | 10-13-2011 |
20110247938 | FIELD-PROGRAMMABLE LAB-ON-A-CHIP BASED ON MICROELECTRODE ARRAY ARCHITECTURE - The system relates to filed-programmable lab-on-chip (FPLOC) microfluidic operations, fabrications, and programming based on Microelectrode Array Architecture are disclosed herein. The FPLOC device by employing the microelectrode array architecture may include the following: (a) a bottom plate comprising an array of multiple microelectrodes disposed on a top surface of a substrate covered by a dielectric layer; wherein each of the microelectrode is coupled to at least one grounding elements of a grounding mechanism, wherein a hydrophobic layer is disposed on the top of the dielectric layer and the grounding elements to make hydrophobic surfaces with the droplets; (b) a field programmability mechanism for programming a group of configured-electrodes to generate microfluidic components and layouts with selected shapes and sizes; and, (c) a FPLOC functional block, comprising: (i) I/O ports; (ii) a sample preparation unit; (iii) a droplet manipulation unit; (iv) a detection unit; and (iv) a system control unit. | 10-13-2011 |
Patent application number | Description | Published |
20100019195 | METHODS AND SYSTEMS FOR PREPARING MATERIALS FOR SUCRALOSE PRODUCTION - The present invention provides a method for preparing DMF for sucralose production, including, e.g., isolating DMF from a composition comprising DMF, water, and methanol, using a single-tower rectification system. In various embodiments of the present invention, the composition, after the removal of water and methanol, may be further dried/dehydrated, such as, by using a dehydration agent and/or filtration. The resulting substantially pure DMF may comprise at least about 98-99% DMF. The present invention further provides a method of preparing a composition comprising anhydrous sucrose for sucralose production, which may comprise mixing regular sucrose with a water-containing DMF composition, and drying the resulting sucrose-DMF composition. Also provided is a single-tower separation system for isolating DMF from a composition comprising DMF, water, and methanol. | 01-28-2010 |
20100022765 | METHODS FOR EXTRACTING AND PURIFYING SUCRALOSE INTERMEDIATE - The present invention provides a method for purifying sucralose-6-ester for use in making sucralose, wherein the method eliminates the need of an esterification process. In particular, ethyl acetate and ether are used to extract and purify sucralose-6-ester from a sucralose production intermediate composition comprising sucralose-6-ester. | 01-28-2010 |
20110175022 | METHODS AND SYSTEMS FOR PREPARING MATERIALS FOR SUCRALOSE PRODUCTION - The present invention provides a method for preparing DMF for sucralose production, including, e.g., isolating DMF from a composition comprising DMF, water, and methanol, using a single-tower rectification system. In various embodiments of the present invention, the composition, after the removal of water and methanol, may be further dried/dehydrated, such as, by using a dehydration agent and/or filtration. The resulting substantially pure DMF may comprise at least about 98-99% DMF. The present invention further provides a method of preparing a composition comprising anhydrous sucrose for sucralose production, which may comprise mixing regular sucrose with a water-containing DMF composition, and drying the resulting sucrose-DMF composition. Also provided is a single-tower separation system for isolating DMF from a composition comprising DMF, water, and methanol. | 07-21-2011 |
Patent application number | Description | Published |
20090129162 | Method of making a non-volatile memory (NVM) cell structure and program biasing techniques for the NVM cell structure - A method of making a non-volatile memory (NVM) cell structure comprises the formation of a first NVM cell, a second NVM cell and an SRAM cell that includes first and second data nodes. A first pass gate structure is connected between the first NVM cell and the first data node of the SRAM cell, the first pass gate structure being responsive to first and second states of a first pass gate signal to respectively couple and decouple the first NVM cell and the SRAM cell. A first equalize structure is formed to connect the first pass gate structure and the first NVM cell and is responsive to a first equalize signal to connect the first NVM cell to ground. A second pass gate structure is connected between the second NVM cell and the second data node of the SRAM cell, the second pass gate structure being responsive to first and second states of a second pass gate signal to respectively couple and decouple the second NVM cell and the SRAM cell. A second equalize structure is connected between the second pass gate structure and the second NVM cell, the second equalize structure being responsive to a second equalize signal to connect the second NVM cell to ground. Appropriate biasing conditions are applied to the NVM cell structure to implement program/operations. | 05-21-2009 |
20110235425 | METHOD OF DIRECTLY READING OUTPUT VOLTAGE TO DETERMINE DATA STORED IN A NON-VOLATILE MEMORY CELL - An NVM cell design enables direct reading of cell output voltage to determine data stored in the cell, while providing low current consumption and a simple program sequence that utilizes reverse Fowler-Nordheim tunneling. | 09-29-2011 |
20110242898 | 4-TRANSISTOR NON-VOLATILE MEMORY CELL WITH PMOS-NMOS-PMOS-NMOS STRUCTURE - A non-volatile memory (NVM) cell structure comprises a PMOS program transistor having source, drain and bulk region electrodes and a gate electrode that is connected to a data storage node; an NMOS control transistor having source, drain and bulk region electrodes that are commonly-connected to receive a control voltage and a gate electrode that is connected to the data storage node; a PMOS erase transistor having source, drain and bulk region electrodes that are commonly-connected to receive an erase voltage and a gate electrode that is connected to the data storage node; and an NMOS read transistor having source, drain and bulk region electrodes and a gate electrode connected to the data storage node. | 10-06-2011 |
Patent application number | Description | Published |
20090324789 | PERACID AND 2-HYDROXY ORGANIC ACID COMPOSITIONS AND METHODS FOR TREATING PRODUCE - Methods and compositions for treating produce to control microorganisms are provided. The method treats produce by contacting the surface of the produce with an aqueous solution comprising i) an organic peracid of the formula RC(O)OOH wherein R is methyl, ethyl, n-propyl, or s-propyl; ii) a 2-hydroxy organic acid selected from tartaric acid, citric acid, malic acid, mandelic acid, and lactic acid; and (optionally) iii) an anionic surfactant; wherein the aqueous solution has a pH from 2.5 to 6.0. | 12-31-2009 |
20110247655 | SYSTEMS AND METHODS FOR SANITIZING PRODUCE IN AN ACIDIC BATH - Methods and systems are disclosed for treating a produce item with a treatment solution that includes water and a first and second treatment acid. The disclosed methods and systems may be particularly beneficial when used to sanitize the produce item of pathogens and/or to maintain the quality of the produce item. A disclosed treatment method includes measuring an amount of water; measuring an amount of a first treatment acid; measuring an amount of a second treatment acid; mixing the water, the first treatment acid, and the second treatment acid to form a treatment-solution concentrate; diluting a quantity of the treatment-solution concentrate to form a treatment solution; and contacting an exterior surface of the produce item with a quantity of the treatment solution. | 10-13-2011 |
20110318461 | PERACID AND 2-HYDROXY ORGANIC ACID COMPOSITIONS AND METHODS FOR TREATING PRODUCE - Methods and compositions for treating produce to control microorganisms are provided. The method treats produce by contacting the surface of the produce with an aqueous solution comprising i) an organic peracid of the formula RC(O)OOH wherein R is methyl, ethyl, n-propyl, or s-propyl; ii) a 2-hydroxy organic acid selected from tartaric acid, citric acid, malic acid, mandelic acid, and lactic acid; and (optionally) iii) an anionic surfactant; wherein the aqueous solution has a pH from 2.5 to 6.0. | 12-29-2011 |
20130065959 | SANITIZING MEAT WITH PERACID AND 2-HYDROXY ORGANIC ACID COMPOSITIONS - Methods and compositions for treating items to control microorganisms are provided. The method treats produce by contacting the surface of an item with an aqueous solution comprising i) an organic peracid of the formula RC(O)OOH wherein R is methyl, ethyl, n-propyl, or s-propyl; ii) a 2-hydroxy organic acid selected from tartaric acid, citric acid, malic acid, mandelic acid, and lactic acid; and iii) water wherein the aqueous solution has a pH from 2.5 to 6.0. | 03-14-2013 |
20130072563 | PERACID AND 2-HYDROXY ORGANIC ACID COMPOSITIONS AND METHODS FOR SANITATION AND DISEASE PREVENTION - Methods and compositions for treating living surfaces to control microorganisms are provided. The method treats produce by contacting a living surface with an aqueous solution comprising i) an organic peracid of the formula RC(O)OOH wherein R is methyl, ethyl, n-propyl, or s-propyl; ii) a 2-hydroxy organic acid selected from tartaric acid, citric acid, malic acid, mandelic acid, and lactic acid; and iii) water. | 03-21-2013 |
20130079408 | PERACID AND 2-HYDROXY ORGANIC ACID COMPOSITIONS AND METHODS FOR TREATING ITEMS - Methods and compositions for treating items to control microorganisms are provided. The method treats produce by contacting the surface of the item with an aqueous composition comprising i) an organic peracid of the formula RC(O)OOH wherein R is methyl, ethyl, n-propyl, or s-propyl; ii) a 2-hydroxy organic acid selected from tartaric acid, citric acid, malic acid, mandelic acid, and lactic acid; and iii) water; wherein the aqueous composition has a pH from 2.5 to 6.0. | 03-28-2013 |
Patent application number | Description | Published |
20090055398 | RETRIEVING MOBILE USER CONTEXT INFORMATION USING TOKENIZED VIRTUAL DICTIONARIES - A network device, system, and method are directed towards providing user context information to improve relevancy of a search result, or other content, provided to a user. A context service may provide a common retrieval interface (CRI) that reflects the capabilities available to a content service application (CSA). The CSA may provide limited information about the user to the context service and may specify user context information being sought. The context service provides at least some of the known user information to various context analysis services to request the user context information, and receives back user context information along with a confidence level indicating a percentage of confidence the context analysis service may have for the results. The context service then selects user context information based on weighted confidence levels, and provides the results to the CSA, to improve the relevancy of information provided to the user. | 02-26-2009 |
20090069037 | SMS SHORTCODE ALLOCATION - A system, apparatus, and method are directed towards managing short code allocation policies across a plurality of different carriers for multiple applications. Each carrier provides to a centralized routing service a short code policy that includes an extension allocation policy. The extension allocation policy may specify whether the extensions are allocated based on a dynamical recycle allocation, a range recycle allocation, a pass-through allocation, or a re-usekey based allocation policy, or other mechanism. When a message is sent from an application, a carrier is determined to send the message to a destination mobile device. The carrier's short code policy, including the extension allocation policy, is then used to select how to allocate and/or re-allocate a short code and extension for use with the message. The message may then be modified to include the selected short code and extension, and is then sent using the determined network carrier. | 03-12-2009 |
20090082042 | SMS SPAM CONTROL - A system, apparatus, and method are directed towards managing abuse of text messages through controls on messages sent by an application to a mobile device (e.g., MT text messages). MT text messages sent from a defined application are intercepted by a Text Message SPAM Control Service (TMSCS). Various controls are determined for the sending application based on the application, level of user control on contents of the message, the user requesting the message to be sent (if any), and/or a destination address for the message. These controls may then be used in various combinations and/or various levels of constraint to determine whether to block transmission of the message to a destination mobile device. By monitoring messages from the application, abuse of the application may be minimized. | 03-26-2009 |
20090106770 | SMS SESSIONING - A system, apparatus, and method are directed towards managing communications with global applications through message handlers. The message is received by a first message handler that is local to the client device. The first message handler determines if the message is to be forwarded to a global application, and if so, forwards the message to a second message handler, which is configured to be local to the global application. The second message handler forwards the message and receives a response from the global application. The second message handler may then generate a session identifier that is useable to manage its session data for the message/response. The session identifier is sent to the first message handler in lieu of sending the session data, such that the two message handlers manage separately their own session data for the session. The session identifier is useable to relate the separately managed session data sets. | 04-23-2009 |
20090109978 | Application interface for global mobile message delivery - A device, system, and method are directed towards communicating mobile information over a network. A mobile message (MM) is generated by an Internet Protocol (IP) enabled application interface. The MM may include advertising information. The MM is received at a routing server and comprises a destination phone number and/or advertising information. If the MM is determined to be locally processed, the routing server selectively routes the MM to a destination carrier associated with the destination phone number. If the MM is determined to be remotely processed, the MM is recursively forwarded until the MM reaches another routing server associated with the destination phone number. The other routing server is configured to selectively route the MM to the destination carrier. A response MM may be received at a boundary routing server. The response MM may be sent to the API if at least a portion of the response MM matches information associated with the MM. | 04-30-2009 |
20090138563 | DYNAMICAL ROUTING FOR TEXT MESSAGING - Routing text messages. A mobile message (MM) is received from an application program or other message source, and includes a destination identifier, such as a phone number. Based on the destination identifier, a routing server determines whether the MM is to be locally routed to a destination carrier, or forwarded to a remote server that provides access to the destination carrier. For local routing, the routing server determines a channel to the carrier based on predefined carrier information, the destination user information, and the carrier gateway dynamic information. The predefined carrier information indicates predicted availability or reliability of each of a plurality of channels to the carrier. The destination user information indicates availability of the destination user to receive messages, and includes a destination user criterion for determining one of the channels. The carrier gateway dynamic information indicates current and statistical traffic information for each of the channels. | 05-28-2009 |
20120184308 | APPLICATION INTERFACE FOR GLOBAL MESSAGE DELIVERY - A device, system, and method are directed towards communicating mobile information over a network. A mobile message (MM) is generated by an Internet Protocol (IP) enabled application interface. The MM may include advertising information. The MM is received at a routing server and comprises a destination phone number and/or advertising information. If the MM is determined to be locally processed, the routing server selectively routes the MM to a destination carrier associated with the destination phone number. If the MM is determined to be remotely processed, the MM is recursively forwarded until the MM reaches another routing server associated with the destination phone number. The other routing server is configured to selectively route the MM to the destination carrier. A response MM may be received at a boundary routing server. | 07-19-2012 |
Patent application number | Description | Published |
20100030783 | Metadata Driven Mobile Business Objects - A system, method, and computer program product are provided for abstracting data in a remote data source. A method operates by defining the data source, defining a data synchronization methodology for communication with the data source, and providing an abstraction layer for accessing data in the data source. The abstraction layer implements the data synchronization methodology when data is accessed through the abstraction layer is presented. | 02-04-2010 |
20110161290 | DATA CACHING FOR MOBILE APPLICATIONS - Systems, methods, computer program product embodiments and combinations and sub-combinations thereof for data caching and cache synchronization are described herein. An embodiment includes comparing data in a cache with data stored at a data source and determining database operations needed to synchronize one or more partitions of the cache with the data source. Each cache partition is associated with mobile business object (MBO) metadata of a distinct mobile device and the determined database operations are executed to synchronize the partitions with the data source. By refreshing only those partitions which are pertinent to a given device, embodiments of the invention may increase parallelism by allowing multiple partitions to refresh concurrently. The embodiment further comprises reviewing a caching policy associated with the cache. The caching policy may be selected in a manner that reduces data traffic and redundant requests on the data source. | 06-30-2011 |
20110161339 | PENDING STATE MANAGEMENT FOR MOBILE BUSINESS OBJECTS - A system, method, and computer program product are provided for invoking an operation to change a current data row of a table in a local database. As a result, a pending change data row is inserted in the table, distinguished by a primary key comprising a common key value and a pending change indicator. The pending change is then submitted for synchronization. | 06-30-2011 |
20110161349 | MESSAGE BASED SYNCHRONIZATION FOR MOBILE BUSINESS OBJECTS - A system, method, and computer program product are provided for executing a notification query derived from a download cursor for a business object to identify an updated subscription in order to provide updates to a client device in an import message. Additional systems, methods, and computer program products are provided for guaranteeing at-least-once delivery of a message. | 06-30-2011 |
20110161383 | MESSAGE BASED MOBILE OBJECT WITH NATIVE PIM INTEGRATION - Systems, methods, and computer program products are provided for synchronizing data within a native PIM data store in a device an enterprise data. Data modifications generated by mobile applications on the device, or by an enterprise server, are identified and reflected into the native PIM data store. Additionally, a listener is provided to detect modifications to relevant data within the native PIM data store and reflect these modifications in the mobile applications and the enterprise server. The framework which accomplishes this further provides platform-independent access to the native PIM data store. | 06-30-2011 |
Patent application number | Description | Published |
20100318570 | PLUGGABLE SESSION CONTEXT - A method and apparatus are described for sharing a session to access a database. A database server receives, in a session, a session context identifier and a command. The session context identifier identifies a session context to use for the session. The session context is a set of information or commands that plug into a session state and specify how commands in the session are to be performed for a particular user or privilege level. In response to receiving the identifier, the database server associates the session context with the database session for the connection. The database server uses the session context to process the command. The session context may then be detached from the session, allowing another user to attach to the session via another session context. | 12-16-2010 |
20110023082 | TECHNIQUES FOR ENFORCING APPLICATION ENVIRONMENT BASED SECURITY POLICIES USING ROLE BASED ACCESS CONTROL - An application platform examines, at runtime, various specified aspects of an application environment in which an application interacts with a user. Such examinations are made to determine a state for each of the various specified aspects. Further, the platform automatically activates particular application environment roles for the user depending on the result of the examinations. For example, an application environment role may be activated representing a particular detected mode of communication (e.g., encrypted network communications) or a particular detected manner of authentication (e.g., password authentication). Such activations are based on the detected states and specified states for the various specified aspects of the application environment. Such activations may occur in the context of an application attempting to perform an operation on an access controlled object on behalf of a user. Further, such activations may occur in the context of establishing or maintaining a user session for a user of an application. | 01-27-2011 |
20130144901 | REAL-TIME DATA REDACTION IN A DATABASE MANAGEMENT SYSTEM - A database server receives a data request from a client. In response to the data request, the database server selects, from a database, actual data that satisfies criteria specified by the data request. The database server retrieves the selected actual data from the database. Also in response to the data request, the database server redacts the retrieved data in real time without modifying the actual data contained within the database. This may be accomplished by the prior insertion of masking operators into a top SELECT clause of a query representation generated during semantic analysis. The database server returns the redacted data to the client as a reply to the data request. | 06-06-2013 |
20140304298 | Real-Time Data Redaction In A Database Management System - A database server receives a data request from a client. In response to the data request, the database server selects, from a database, actual data that satisfies criteria specified by the data request. The database server retrieves the selected actual data from the database. Also in response to the data request, the database server redacts the retrieved data in real time without modifying the actual data contained within the database. This may be accomplished by the prior insertion of masking operators into a top SELECT clause of a query representation generated during semantic analysis. The database server returns the redacted data to the client as a reply to the data request. | 10-09-2014 |
Patent application number | Description | Published |
20090290672 | Circuits and Methods for Clock and Data Recovery - A clock-data recovery circuit includes a phase rotator, a phase detector and a charge pump. The phase rotator receives first and second reference clocks and differential control signals. The phase rotator generates a modified clock signal responsive to the first and second reference clocks and the control signals. The phase detector receives a data signal and the modified clock signal. The phase detector generates a modified data signal and a phase error signal responsive to the data signal and the modified clock signal. The charge pump receives the phase error signal and generates the differential control signals, which direct the phase rotator to interpolate between select clock phases. | 11-26-2009 |
20100213566 | REDUCED-CROSSTALK WIREBONDING IN AN OPTICAL COMMUNICATION SYSTEM - Wirebonds are formed to couple an opto-electronic device chip having two or more opto-electronic devices to a signal processing chip. Two or more mutually adjacent wirebond groups, each corresponding to one of the opto-electronic devices, are formed. For example, each wirebond group can include a first wirebond coupling a P-terminal of the opto-electronic device of the wirebond group to the signal processing chip, a second wirebond coupling an N-terminal of the opto-electronic device of the wirebond group to the signal processing chip, and a third wirebond coupling the opto-electronic device chip to the signal processing chip. | 08-26-2010 |
20140266453 | TRANSIMPEDANCE AMPLIFIER (TIA) CIRCUIT AND METHOD - A TIA circuit and method are provided that merge the automatic gain control function with the bandwidth adjustment function to allow the TIA circuit to operate over a wide dynamic range at multiple data rates. The TIA circuit has an effective resistance that is adjustable for adjusting the gain and the bandwidth of the TIA circuit. The mechanism of the TIA circuit that is used to adjust the effective resistance, and hence the gain and bandwidth of the TIA circuit, is temperature independent, and as such, the performance of the TIA circuit is not affected by temperature variations. | 09-18-2014 |
Patent application number | Description | Published |
20080268403 | DENTAL TOWEL - A dental towel has at least four edges, a straight tear line and a surrounding band. One of the edges is oriented edge that is oriented forward a patient. The straight tear line is parallels the oriented edge, is near the oriented edge and has two ends and a length shorter than a length of the oriented edge. One of the ends is formed on an adjacent edge that is adjacent to the oriented edge. The surrounding band is mounted between the straight tear line and the oriented edge, surrounds conveniently a patient's neck and has an adhesive member sticking on the dental towel. The dental towel can be torn to obtain the surrounding band with a desired length to fit patient's neck. Thus, the dental towel can be positioned in front of patient's chest to prevent water or other agents from spraying to contaminate patient's clothes and neck. | 10-30-2008 |
20090286200 | SEPARATING RING - A separating ring having a body being a resilient bent open ring and having two bent side bars having distal ends and wedge legs formed respectively on the distal ends, the wedge legs being spearheaded and fit easily between adjacent teeth to allow dental operations to be carried out easily and without the need for wedges. | 11-19-2009 |
20100075279 | DENTAL IMPRESSION TRAY AND METHOD OF USING THE SAME - A dental impression tray has a base and a relator. The base has a biting portion and a handle. The biting portion is curved. The handle is formed on the biting portion and has an arc hole that is defined through the handle to receive impression material. The relator has a vertical bar and a horizontal bar. The relator is mounted in the arc hole and is fastened in the arc hole by impression material. The horizontal bar connects perpendicularly to the vertical bar. Therefore, the impression of the teeth to be crowned or veneered as well as the relation between the impression and the patient's face are obtained simultaneously. | 03-25-2010 |
20100261138 | DENTAL AGENT APPLICATOR - A dental agent applicator has a barrel, a sealing plug, a delivery head and a plunger. The barrel has a proximal end, a distal end and a chamber defined through the barrel. The sealing plug is mounted in the chamber and hermetically obstructs the chamber. The delivery head is movably mounted on the distal end of the barrel and has a hub and a nozzle tip. The hub is mounted movably in the distal end and selectively moves the sealing plug to make the chamber communicate with the delivery head. The nozzle tip is mounted on the hub. The plunger is mounted slidably in the proximal end of the barrel. The delivery head is mounted permanently on the barrel. Using the dental agent applicator without having to replace any sealing cap with the delivery head is simple and convenient. | 10-14-2010 |
20110198370 | DEVICE FOR MIXING AND DISCHARGING PLURAL MATERIALS - A device for mixing and discharging plural materials has a body, a housing and a sealing plug. The body has multiple barrels and multiple tubes communicating with the barrels. The housing is rotatably attached to the body in a thread manner and has a mixing chamber and a discharging segment. The sealing plug is mounted in the mixing chamber to seal the tubes and has a sealing disk and multiple sealing sleeves. The sealing disk has multiple holes and multiple sealing lids mounted respectively in the holes, and each sealing lid has an outer edge connected detachably to the inner surface of a corresponding hole and having a thickness smaller than that of the sealing lid. The sealing sleeves are formed on the sealing disk, align respectively with the holes in the sealing disk and are mounted respectively around the tubes. | 08-18-2011 |
Patent application number | Description | Published |
20110208867 | Performing Message Payload Processing Functions In A Network Element On Behalf Of An Application - A method is disclosed for performing message payload processing functions in a network element on behalf of an application. According to one aspect, a network element intercepts data packets comprising network layer or transport layer headers having an address of a destination which destination differs from the network element. The network element determines whether information contained in layer | 08-25-2011 |
20120047239 | System and Method for Installation and Management of Cloud-Independent Multi-Tenant Applications - An application framework may include a cloud-independent application manager, a cloud-independent content services manager, and cloud-independent content services servers. The framework may dynamically install and manage scalable, multi-tenant applications in a cloud, and may scale the applications, as needed. The application manager may receive and handle requests to install application domains and configurations thereof, and may receive and respond to requests for information about servers on which installed methods are available. The content services servers may execute installed methods, using underlying resources of the cloud, through a cloud-specific SPI. The content services manager and application manager may work together using shared cloud storage to provide scalable content services at a very large scale. In the context of the framework described herein, an “application” may be defined by methods bundled into configurations, and by various cost-based and/or performance-based rules that specify how server instances providing those methods are to be managed. | 02-23-2012 |
20140032690 | Method and Apparatus For High-Speed Processing of Structured Application Messages in a Network Device - A method is disclosed for high-speed processing of structured application messages in a network device. According to one aspect, a network device receives a structured application layer message and identifies, in message classification requirements at the network device, a reference to a classification portion of the structured application layer message and an operation portion of the structured application layer message. The system extracts, based on one or more expressions, a portion of the message for classifying the structured application layer message and classifies the message using the extracted portion and according to the message classification requirements. At least in part by accessing information indicated by one or more location identifiers, at least one operation is performed on the classified structured application layer message. | 01-30-2014 |
20140040438 | DYNAMIC CONFIGURATION OF APPLICATIONS DEPLOYED IN A CLOUD - A system is provided to deploy a computing application in a cloud using a service provider interface. The system comprises a configuration request detector, a configuration object retriever, and a configuration installer. The configuration request detector receives, at a computer system provided within a virtualization service, a configuration request. The configuration object retriever retrieves a configuration object in response to the configuration request. The configuration installer uses the configuration object, to automatically install a configuration associated with the configuration object to produce a second version of the computing application. The second version of the computing application provides additional features or services according to the definition of the configuration object. | 02-06-2014 |
20140040473 | OPTIMIZATION SCHEDULER FOR DEPLOYING APPLICATIONS ON A CLOUD - A system is provided to deploy a computing application on a cloud using optimization criteria. The system comprises a launch request detector to detect a request to launch a computing application within a virtualization service, an application requirement detector to determine application requirement for the computing application, a cloud resource inventory detector to determine cloud resource inventory, an optimization requirement detector, a matching module, and a configuration module. The optimization requirement detector may be configured to determine an optimization requirement. The matching module may be configured to perform matching of the application requirement with the resource inventory based on the optimization requirement. The configuration module may be configured to generate an optimized application deployment configuration based on the result of the matching and cause launching of the computing application within the virtualization service using the optimized application deployment configuration. | 02-06-2014 |
20140040656 | SYSTEM AND METHOD FOR MANAGING CLOUD DEPLOYMENT CONFIGURATION OF AN APPLICATION - A system is provided to manage cloud deployment configuration of a computing application. The system comprises a request detector, a retrieving module, a manager loader, a configuration change request detector, and a configuration module. The request detector may be configured to detect a request to install a manager agent on an instance of a virtual machine executing a computing application within a virtualization service. The retrieving module may be configured to obtain a manager agent object for loading the manager agent, and install the manager agent on the instance. The manager loader may be configured to invoke the manager agent to collect metrics for the computing application. The configuration change request detector may be configured to receive an instruction to alter cloud deployment configuration of the computing application. The configuration module may be configured to automatically alter the cloud deployment configuration of the computing application in response to the instruction. | 02-06-2014 |
Patent application number | Description | Published |
20110257643 | APPARATUS AND METHOD FOR REGULATING TISSUE WELDER JAWS - A surgical apparatus and methods for severing and welding tissue, in particular blood vessels. The apparatus includes an elongated shaft having a pair of relatively movable jaws at a distal end thereof. A first heating element on one of the jaws is adapted to heat up to a first temperature and form a welded region within the tissue, while a second heating element on one of the jaws is adapted to heat up to a second temperature and sever the tissue within the welded region. The first and second heating elements may be provided on the same or opposite jaws. A control handle provided on the proximal end of the elongated shaft includes controls for opening and closing the jaws, and may include an actuator for sending current through the first and second heating elements. The first and second heating elements may be electrically connected in series, and the first heating element may be bifurcated such that it conducts about one half of the current as the second heating element. A force-limiting mechanism provided either within the control handle, in the elongated shaft, or at the jaws limits the pressure applied to the tissue by the jaws to ensure that the tissue is severed and the ends effectively welded within a short amount of time. | 10-20-2011 |
20140194876 | APPARATUS AND METHOD FOR REGULATING TISSUE WELDER JAWS - A surgical apparatus and methods for severing and welding tissue, in particular blood vessels. The apparatus includes an elongated shaft having a pair of relatively movable jaws at a distal end thereof. A first heating element on one of the jaws is adapted to heat up to a first temperature and form a welded region within the tissue, while a second heating element on one of the jaws is adapted to heat up to a second temperature and sever the tissue within the welded region. The first and second heating elements may be provided on the same or opposite jaws. A control handle provided on the proximal end of the elongated shaft includes controls for opening and closing the jaws, and may include an actuator for sending current through the first and second heating elements. The first and second heating elements may be electrically connected in series, and the first heating element may be bifurcated such that it conducts about one half of the current as the second heating element. A force-limiting mechanism provided either within the control handle, in the elongated shaft, or at the jaws limits the pressure applied to the tissue by the jaws to ensure that the tissue is severed and the ends effectively welded within a short amount of time. | 07-10-2014 |
Patent application number | Description | Published |
20110112788 | Integrated Systems Testing - A hard disk drive system comprises an interface that receives test configuration data, that transmits test result data, and that transmits and receives application data. A system on chip (SOC) includes integrated system test (IST) modules. A memory module communicates with the SOC and includes memory and an IST module. One of the IST modules communicates with the interface and is a master IST module that receives the test configuration data and that configures others of the IST modules for testing a component of the hard disk drive system. | 05-12-2011 |
20110283035 | Hybrid Storage System With Control Module Embedded Solid-State Memory - A hybrid control module includes a host interface control module configured to transfer data to and from a host interface. A first embedded multi-media card (eMMC) interface is configured to (i) connect to a second eMMC interface of a control module embedded solid-state memory (SSM) and (ii) transfer the data between the hybrid control module and the control module embedded SSM. A buffer management module is (i) in communication with the host interface control module, the first eMMC interface and a disk access control module and (ii) configured to buffer the data in volatile memory. The data is received by the buffer management module and from at least one of the host interface control module, the first eMMC interface, or the disk access control module. | 11-17-2011 |
20120182640 | DUAL CHANNEL HDD SYSTEMS AND METHODS - A hard disk drive system includes a first channel module and a second channel module. The first channel module is configured to receive a first data from or transfer the first data to a first amplifier module of a hard disk assembly when reading from or writing to a first surface of a disk of the hard disk assembly. The second channel module is configured to receive a second data from or transfer the second data to a second amplifier module of the hard disk assembly when reading or writing to a second surface of the disk while the first channel module receives the first data from or transfers the first data to the first amplifier module. | 07-19-2012 |
20140049854 | METHOD AND SYSTEM FOR READING FROM OR WRITING TO MULTIPLE SURFACES OF A DISK - A system includes a management module transferring sectors between an interface or a memory and ports. The management module transfers a first portion of a first sector to or from a first port while transferring to or from a second port a second portion of the first sector or a first portion of a second sector. A first channel module reads from or writes to a first surface of a disk via a first head by transferring the first portion of the first sector to or from a first amplifier module. A second channel module, while the first channel module transfers the first portion of the first sector to or from the first amplifier module, reads from or writes to a second surface of the disk via a second head by transferring to or from a second amplifier module the second portion or the first portion of the second sector. | 02-20-2014 |
20140325132 | METHOD AND APPARATUS FOR TRANSFERRING DATA BETWEEN A HOST AND BOTH A SOLID-STATE MEMORY AND A MAGNETIC STORAGE DEVICE - A hybrid circuit includes a system-in-a-package (SIP) and an integrated circuit. The SIP includes a solid-state memory, and a first control module. The first control module controls access to the solid-state memory based on a first control signal. The integrated circuit includes an embedded multi-media card (eMMC) module, a second control module, and a management module. The eMMC module is in communication with the SIP according to an eMMC standard. The first eMMC module transfers the first control signal to the first control module to access the solid-state memory. The second control module controls access to a magnetic storage device based on a second control signal. The management module generates the control signals to transfer first data between a host and the SIP via the eMMC module and transfer the first data or second data between the host and the magnetic storage device via the second control module. | 10-30-2014 |
Patent application number | Description | Published |
20110219434 | PROVIDING SECURITY SERVICES WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers. Once third party providers have been associated with Cloud resources, a secure relationship between the third party provider(s) and the Cloud providers will be established. | 09-08-2011 |
20110264907 | SECURING INFORMATION WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle encryption/decryption of information for all users in the Cloud computing environment. Typically, the encryption service is implemented between Cloud portals and a storage Cloud. Through the use of a browser/portal plug-in (or the like), the configuration and processing of the security process is managed for the Cloud computing environment user by pointing all traffic for which security is desired to this encryption service so that it can perform encryption (or decryption in the case of document retrieval) as needed (e.g., on the fly) between the user and the Cloud. | 10-27-2011 |
20130086197 | MANAGING CACHE AT A COMPUTER - A method and system for managing caching at a computer. A computer receives a file from a storage device on a network in response to a request by a first user. The computer may then determine if other users of the computer are likely to request the file, based upon a type of the file and a type of the network. If other users are likely to request the file, the computer may then cache the file at the computer. In one embodiment, the computer may determine if other users of the computer are likely to request the file based upon access permissions to the file at a source of the file. In another embodiment, the computer may determine if other users of the computer are likely to request the file based upon if the file has been previously cached at the computer. | 04-04-2013 |
20140317398 | SECURING INFORMATION WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle encryption/decryption of information for all users in the Cloud computing environment. Typically, the encryption service is implemented between Cloud portals and a storage Cloud. Through the use of a browser/portal plug-in (or the like), the configuration and processing of the security process is managed for the Cloud computing environment user by pointing all traffic for which security is desired to this encryption service so that it can perform encryption (or decryption in the case of document retrieval) as needed (e.g., on the fly) between the user and the Cloud. | 10-23-2014 |
Patent application number | Description | Published |
20080234144 | Apparatus and method for digital magnetic beads analysis - A micro bead having a digitally coded structure that is partially transmissive and opaque to light. The pattern of transmitted light is determined by to decode the bead. The coded bead may be structured a series of alternating light transmissive and opaque sections, with relative positions, widths and spacing resembling a 1D or 2D bar code image. To decode the image, the alternating transmissive and opaque sections of the body are scanned in analogous fashion to bar code scanning. The coded bead may be coated or immobilized with a capture or probe to effect a desired bioassay. The coded bead may include a paramagnetic material. A bioanalysis system conducts high throughput bioanalysis using the coded bead, including a reaction detection zone and a decoding zone. Alternative method for barcode determination is based on barcode pattern image processes. Microbeads can also be settled down to the bottom of the well in a microplate, so the barcode can be decoded by image processed directly. Therefore, multiple-analyte tests can be performed in one single well. Microplate is a standard format; each plate can have 96, 384, or 1536 patient samples. The bead image is taken with a conventional microscope and optical detector from the bottom of an optically clear microplate, and barcode pattern can be decoded by image software. Therefore, the whole bead experiment can be performed in the microplate without taking the beads out. | 09-25-2008 |
20090061507 | Fluorescence-based lateral flow device with improved sensitivity - The invention describes how to use nanometer scale fluorescence particles as a label material for fluorescence lateral flow device application. The utilization of the nanoparticles instantly increases the fluorescence intensity by thousands to millions of times. The resulting signal enhancement not only significantly increase sensitivity for analyte detection, but also makes it possible to use low power light sources for illumination and low cost detectors for fluorescence detection. | 03-05-2009 |
20100075438 | BIOCOMPATIBLE AND PHOTOCURABLE POLYMERS - The present invention relates to substrates for biological testing produced from photo-curable epoxy compositions which further include carboxyl-containing monomers such as acrylic acid, 2-carboxyethyl acrylic acid, 4-vinylbenzoic acid, or 3-Acrylamido-3-methyl-1-butanoic acid, or glycidyl methacrylate, etc. The photo-curable compositions may be used to cast films or fabricate beads, magnetic beads, or magnetic beads containing nickel barcodes. The resulting various kinds of films, beads, magnetic beads, or magnetic beads containing nickel barcodes may find use in clinical or biological applications. | 03-25-2010 |
20100210477 | Light Transmitted Assay Beads - A micro bead having a digitally coded structure that is partially transmissive and opaque to light. The pattern of transmitted light is determined by to decode the bead. The coded bead may be structured a series of alternating light transmissive and opaque sections, with relative positions, widths and spacing resembling a 1D or 2D bar code image. To decode the image, the alternating transmissive and opaque sections of the body are scanned in analogous fashion to bar code scanning. The coded bead may be coated or immobilized with a capture or probe to effect a desired bioassay. The coded bead may include a paramagnetic material. A bioanalysis system conducts high throughput bioanalysis using the coded bead, including a reaction detection zone and a decoding zone. | 08-19-2010 |
20110007955 | Apparatus and Method for Barcoded Magnetic Beads Analysis - A Light Transmitted Assay Beads or digital magnetic microbead having a digitally coded structure that is partially transmissive and opaque to light. When hundreds or thousands of LITAB are settled down to the bottom of a microwell in a microplate or a planar surface, the barcode can be decoded by image processed accurately and reliable. Microplate is a standard bioassay format; each plate can have 96, 384, or 1536 patient samples. Therefore, a large number of targets in a sample can be analyzed in one single microwell. The image decoding algorithms comprise of four main processes (1) enhancement of image (2) segmentation of beads (3) extraction of barcode slits, and (4) decoding of barcodes. The bead image is taken from the bottom of an optically clear microplate, and barcode pattern can be decoded by image software. Therefore, the whole bead bioassay experiment can be performed in the microplate without taking the beads out. | 01-13-2011 |
20110152127 | Light Transmitted Assay Beads - A micro bead having a digitally coded structure that is partially transmissive and opaque to light. The pattern of transmitted light is determined by to decode the bead. The coded bead may be structured a series of alternating light transmissive and opaque sections, with relative positions, widths and spacing resembling a 1D or 2D bar code image. To decode the image, the alternating transmissive and opaque sections of the body are scanned in analogous fashion to bar code scanning. The coded bead may be coated or immobilized with a capture or probe to effect a desired bioassay. The coded bead may include a paramagnetic material. A bioanalysis system conducts high throughput bioanalysis using the coded bead, including a reaction detection zone and a decoding zone. | 06-23-2011 |
20120088691 | HIGHLY MULTIPLEXED REAL-TIME PCR USING ENCODED MICROBEADS - Multiple probes/primers expand the capability of single-probe real-time PCR. Multiplex real-time PCR uses multiple probe-based assays, in which each assay have a specific probe labeled with a unique fluorescent dye, resulting in different observed colors for each assay. Real-time PCR instruments can discriminate between the fluorescence generated from different dyes. Different probes/primers are labeled with different dyes that each have unique emission spectra. By combining the encoded microbeads and real-time PCR amplification, it is possible to increase the multiplexity of PCR experiments to a very large number, such as 128 with 7 digit or 4,096 with 12-digit barcode. Oligonucleotide probes/primers labeled with encoded microbeads offer the ability to monitor the reaction kinetics of each probe which is tagged with barcoded beads. | 04-12-2012 |
Patent application number | Description | Published |
20090020650 | SYSTEM AND METHODS FOR SIMULTANEOUS MOMENTUM DUMPING AND ORBIT CONTROL - The present system and methods enable simultaneous momentum dumping and orbit control of a spacecraft, such as a geostationary satellite. Control equations according to the present system and methods generate accurate station-keeping commands quickly and efficiently, reducing the number of maneuvers needed to maintain station and allowing station-keeping maneuvers to be performed with a single burn. Additional benefits include increased efficiency in propellant usage, and extension of the satellite's lifespan. The present system and methods also enable tighter orbit control, reduction in transients and number of station-keeping thrusters aboard the satellite. The present methods also eliminate the need for the thrusters to point through the center of mass of the satellite, which in turn reduces the need for dedicated station-keeping thrusters. The present methods also facilitate completely autonomous orbit control and control using Attitude Control Systems (ACS). | 01-22-2009 |
20090078829 | SYSTEM AND METHODS FOR SIMULTANEOUS MOMENTUM DUMPING AND ORBIT CONTROL - The present system and methods enable simultaneous momentum dumping and orbit control of a spacecraft, such as a geostationary satellite. Control equations according to the present system and methods generate accurate station-keeping commands quickly and efficiently, reducing the number of maneuvers needed to maintain station and allowing station-keeping maneuvers to be performed with a single burn. Additional benefits include increased efficiency in propellant usage, and extension of the satellite's lifespan. The present system and methods also enable tighter orbit control, reduction in transients and number of station-keeping thrusters aboard the satellite. The present methods also eliminate the need for the thrusters to point through the center of mass of the satellite, which in turn reduces the need for dedicated station-keeping thrusters. The present methods also facilitate completely autonomous orbit control and angular momentum control using. | 03-26-2009 |
20110144835 | SYSTEM AND METHODS FOR SIMULTANEOUS MOMENTUM DUMPING AND ORBIT CONTROL - The present system and methods enable simultaneous momentum dumping and orbit control of a spacecraft, such as a geostationary satellite. Control equations according to the present system and methods generate accurate station-keeping commands quickly and efficiently, reducing the number of maneuvers needed to maintain station and allowing station-keeping maneuvers to be performed with a single burn. Additional benefits include increased efficiency in propellant usage, and extension of the satellite's lifespan. The present system and methods also enable tighter orbit control, reduction in transients and number of station-keeping thrusters aboard the satellite. The present methods also eliminate the need for the thrusters to point through the center of mass of the satellite, which in turn reduces the need for dedicated station-keeping thrusters. The present methods also facilitate completely autonomous orbit control and control using Attitude Control Systems (ACS). | 06-16-2011 |