Patent application number | Description | Published |
20150173669 | METHOD AND SYSTEM FOR PROVIDING INJURY-BASED PARTICIPATION MANAGEMENT FOR TEAM ACTIVITIES - An approach for providing diagnostic information regarding one or more impacts sustained by one or more users while the one or more users are participating in a team activity is described. A diagnostic platform detects one or more impacts sustained by a user, wherein the user is part of a team with one or more other users engaged in a team activity. The diagnostic platform generates a recommendation for a level of participation of the user, the one or more other users, or a combination thereof in the team activity based on the one or more impacts, a severity level of the one or more impacts, or a combination thereof. The diagnostic platform further presents the recommendation, a representation of the severity level, a representation of the level of participation, or a combination thereof in a user interface. | 06-25-2015 |
20150173670 | METHOD AND APPARATUS FOR BIOMETRIC MONITORING - An approach for monitoring a sleeping subject includes receiving an input for specifying an attachment position of a monitoring device attached to a subject, calibrating a resting positioning of the subject based on the attachment position, analyzing sensor information collected from the monitoring device to determine a movement of the subject into a potentially dangerous position with respect to the calibrated resting position, wherein the monitoring device includes an array of sensors including an accelerometer, one or more biometric sensors, or a combination thereof. | 06-25-2015 |
20160062620 | Mobile Application Management Systems and Methods - An exemplary mobile application management system detects a first user input provided by a user while a first user interface associated with a first feature of a mobile application is displayed within an application display area of a display screen of a mobile computing device executing the mobile application. The first user input represents a request to transform the first user interface into a minimized widget associated with the first feature of the mobile application. The mobile application management system directs, in response to the first user input, the mobile computing device to concurrently display, in place of the first user interface, the minimized widget within a first region of the application display area and a second user interface associated with one or more additional features of the mobile application within a second region of the application display area. | 03-03-2016 |
Patent application number | Description | Published |
20090258088 | USE OF MATERIALS AND EXTERNAL STIMULI FOR SYNOVECTOMY - This invention has as one of its aspects a method to provide a safe an effective treatment for synovectomy. The method involves the administration a material to the affected joint, allowing the material to localize in the synovial membrane, and then applying an external stimulus that interacts with the material to provide therapy. The materials of this invention are preferably particles, which are either magnetic or contain a heavy element. The external stimuli of this invention includes an alternating magnetic field to heat magnetic particles, infrared laser to heat heavy elements, or electromagnetic ionizing radiation (X- or gamma-radiation) that interacts with heavy elements to produce a localized radiation dose. | 10-15-2009 |
20100196268 | Compositions and methods for treatment of tumors by direct administration of a radioisotope - This invention provides a safer and more effective treatment for non-intracavitary undesirable tissue masses, especially bone cancer and soft tissue tumors. The method involves the direct administration of a therapeutically-effective dose of a formulated radioisotope composition nearby or directly into the tissue mass. Small volumes of the composition are used. | 08-05-2010 |
20100204457 | PREPARATION OF ANNEXIN DERIVATIVES - Labeled annexin is formed by reacting annexin or a modified annexin with a phosphatidylserine group or an analogue of phosphatidylserine. This phosphatidylserine annexin conjugate is then reacted with an appropriate label to form a labeled annexin and the annexin is separated from the phosphatidylserine group. The reaction between the phosphatidylserine group and the annexin is calcium ion concentration dependent. Therefore, the reaction can be promoted by having a high calcium ion concentration and the separation of the phosphatidyl group from the annexin group is facilitated by reducing the calcium ion concentration preferably by addition of an appropriate calcium chelating agent. | 08-12-2010 |
20120220754 | METHODS FOR GENERATING RADIOIMMUNOCONJUGATES - Methods for generating an Ac-225 radioconjugate comprising a monoclonal antibody (mAb) (IgG) is disclosed. The Ac-225 radioimmunoconjugate is an [Ac-225]-p-SCN-Bn-DOT AIHuM195 radioimmunoconjugate. | 08-30-2012 |
20120251442 | Methods for Treatment of Tumors by Direct Administration of a Radioisotope - This invention provides a safer and more effective treatment for non-intracavitary undesirable tissue masses, especially bone cancer and soft tissue tumors. The method involves the direct administration of a therapeutically-effective dose of a formulated radioisotope composition nearby or directly into the tissue mass. Small volumes of the composition are used. | 10-04-2012 |
20130195975 | IN VIVO USE OF WATER ABSORBENT POLYMERS - The subject invention is a method and material for removing fluid from the intestinal tract of a host and may be useful in treating animals or human patients suffering from fluid overload states. In one embodiment, the subject method involves ingesting an enterically coated non-systemic, non-toxic, non-digestible, water absorbing polymer which absorbs fluid while passing through the intestinal tract. The polymer is excreted in the feces wherein the polymer and absorbed fluid is removed from the body. Preferred polymers include super absorbent acrylic acid polymers, preferably provided in bead form. The polymers may include functional groups for selectively removing blood borne waste products, e.g. urea, from the G.I. tract. | 08-01-2013 |
20140140923 | TIN-117m SOMATOSTATIN RECEPTOR BINDING COMPOUNDS AND METHODS - Tin-117m somatoostatin analogues or antagonist are used to treat tumors and symptoms associated with these tumors which express somatostatin receptors, such as gastroenteropancreatic neuroendocrine tumors. The tin-117m somatostatin receptor binding compounds can be administered at a dosage which is effectively apoptotic and not necrotic. Also, if desired, it can be administered at a dose that is necrotic and/or induces necrosis, but only to cells within 290 microns of the tin-117m atom. A novel somatostatin analogue is also disclosed, as well as novel methods to produce the tin labeled analogues and antagonists. | 05-22-2014 |
20150023869 | RADIOACTIVE COMPOSITIONS AND METHODS FOR THEIR THERAPEUTIC USE - This invention concerns a pharmaceutically-acceptable composition of radioactive metals, which are used for treating various diseases in animals or humans, such as cancer and arthritis. | 01-22-2015 |
20150105601 | RADIOACTIVE EPOXY IN OPHTHALMIC BRACHYTHERAPY - An ophthalmic radiation device using a polymeric radiation-source implemented as either a polymer molecularly bonded with a radioisotope or a polymeric encasement of a radioisotope. | 04-16-2015 |
20150105602 | POLYMERIC RADIATION-SOURCES - A polymeric radiation-source with customized geometries to maximize receipt of radiation into treatment areas that is formed from either radioisotopes molecularly bonded to a polymer or radioisotopes encased within a polymer. | 04-16-2015 |
Patent application number | Description | Published |
20080229412 | Associating Security Information with Information Objects - A hash key is generated based on an information object and a lookup operation is performed in a hash table based on the hash key. A determination is made whether an entry in the hash table at an index corresponding to the hash key identifies a labelset for the information object. A labelset, identifying a sensitivity of the information object, is stored in the entry at the index corresponding to the hash key for the information object if a labelset for the information object is not identified in the entry in the hash table. Information flows involving the information object are authorized based on a lookup of the labelset associated with the information object in the hash table. The hash table may be a multidimensional hash table. | 09-18-2008 |
20080229413 | Authorizing Information Flows - Authorizing information flows between devices of a data processing system is provided. In one illustrative embodiment, an information flow request is received from a first device to authorize an information flow from the first device to a second device. The information flow request includes an identifier of the second device. Based on an identifier of the first device and the second device, security information identifying an authorization level of the first device and second device is retrieved. A sensitivity of an information object that is to be transferred in the information flow is determined and the information flow is authorized or denied based only on the sensitivity of the information object and the authorization level of the first and second devices irregardless of the particular action being performed on the information object as part of the information flow. | 09-18-2008 |
20090119507 | Reference Monitor for Enforcing Information Flow Policies - A reference monitor that authorizes information flows between elements of a data processing system is provided. The elements of the data processing system are associated with security data structures in a reference monitor. An information flow request is received from a first element to authorize an information flow from the first element to a second element. A first security data structure associated with the first element and a second security data structure associated with the second element are retrieved. At least one set theory operation is then performed on the first security data structure and the second security data structure to determine if the information flow from the first element to the second element is to be authorized. The security data structures may be labelsets having one or more labels identifying security policies to be applied to information flows involving the associated element. | 05-07-2009 |
20110302413 | Authorizing Information Flows Based on a Sensitivity of an Information Object - A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one illustrative embodiment, an information flow request is received from a first device to authorize an information flow from the first device to a second device. The information flow request includes an identifier of the second device. Based on an identifier of the first device and the second device, security information identifying an authorization level of the first device and second device is retrieved. A sensitivity of an information object that is to be transferred in the information flow is determined and the information flow is authorized or denied based only on the sensitivity of the information object and the authorization level of the first and second devices irregardless of the particular action being performed on the information object as part of the information flow. | 12-08-2011 |
Patent application number | Description | Published |
20090033490 | System and Method of Dynamically Weighted Analysis for Intrusion Decision-Making - An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based, anomaly-based, scan-based, and danger theory. The intrusion detection mechanism also allows a limitless number of intrusion analysis approaches to be added on the fly. Using an intrusion detection skin, the mechanism allows various weights to be assigned to specific intrusion analysis approaches. The mechanism may adjust these weights dynamically. The score ration can be tailored to determine if an intrusion occurred and adjusted dynamically. Also, multiple security policies for any type of computing element may be enforced. | 02-05-2009 |
20090037098 | Method and System for Providing Travel Direction Annotations Over a Network - A method and system is provided for providing and storing annotations that pertain to travel directions to a particular destination, the annotations generally including ratings of the accuracy of the directions and errors observed in the directions by prior users. Annotations submitted by users are stored in a central repository, for access by those who subsequently become interested in the directions or the particular destination. A useful embodiment of the invention is directed to a method for providing travel directions over a selected network, wherein a request for directions regarding a specified destination is sent from a requester to a Directions Provider. The Provider retrieves the requested directions and furnishes them to the requester. The method further includes generating annotations associated with the furnished directions in accordance with a set of rules resulting from one or more decisions made by the requester, and sending the annotations to the requester. The requester then selectively provides annotations regarding the furnished directions to a central repository. | 02-05-2009 |
20090063905 | System and Method for Error Checking of Failed I/O Open Calls - A system and method in a data processing system for error checking and resolving failed input/output open calls. A configuration mechanism configures the options, such as the information stored in databases, details of how each error check is performed, and what actions should be taken when improper error checking occurs. Based on data stored in databases, such as an I/O calls database, a rules with syntax database, and an usage calls database, a code analyzer analyzes code in software programs for an error check of a failed input/output open call. A reporting mechanism reports data from the analyzed code to a report file, such as why software programs have proper and improper error-checking instances, sends errors from the analyzed code to an error file, and enables these files to be displayed on a display. Finally, the code analyzer enables resolving an improper error check for the failed input/output open call. | 03-05-2009 |
Patent application number | Description | Published |
20120138782 | Logging-While-Drilling Tool Incorporating Electronic Radiation Generator and Method for Using Same - Logging-while-drilling tools incorporating an electronic radiation generator, such as an electronic X-ray generator, and a method for using the same are provided. One example of such a logging-while-drilling tool may include a circumferential drill collar, a chassis disposed radially interior to the drill collar, and an electronic X-ray generator and an X-ray detector disposed within the chassis. The electronic X-ray generator may emit X-rays out of the logging-while-drilling tool into a subterranean formation. The X-ray detector may detect X-rays that return to the logging-while-drilling tool after scattering in the subterranean formation, which may be used to determine a density and/or a lithology of the subterranean formation. | 06-07-2012 |
20120199730 | High Voltage Insulating Sleeve For Nuclear Well Logging - A well logging instrument includes an instrument housing to traverse a wellbore penetrating subsurface formations. An electrically operated energy source that emits ionizing radiation is disposed inside the housing. An insulating sleeve is disposed between the energy source and an interior wall of the housing. The insulating sleeve comprises a thin dielectric film arranged in a plurality of tightly fitting layers of dielectric material disposed adjacent to each other and successively. A thickness of each layer and a number of layers is selected to provide a dielectric strength sufficient to electrically insulate the energy source from the housing and to provide a selected resistance to dielectric failure resulting from the ionizing radiation. | 08-09-2012 |
20140251690 | Logging-While-Drilling Tool Incorporating Electronic Radiation Generator And Method For Using Same - Logging-while-drilling tools incorporating an electronic radiation generator, such as an electronic X-ray generator, and a method for using the same are provided. One example of such a logging-while-drilling tool may include a circumferential drill collar, a chassis disposed radially interior to the drill collar, and an electronic X-ray generator and an X-ray detector disposed within the chassis. The electronic X-ray generator may emit X-rays out of the logging-while-drilling tool into a subterranean formation. The X-ray detector may detect X-rays that return to the logging-while-drilling tool after scattering in the subterranean formation, which may be used to determine a density and/or a lithology of the subterranean formation. | 09-11-2014 |
20150055747 | Energy Radiation Generator With Bi-Polar Voltage Ladder - A well-logging tool may include a sonde housing, and a radiation generator carried by the sonde housing. The radiation generator may include a generator housing, a target carried by the generator housing, a charged particle source carried by the generator housing to direct charged particles at the target, and at least one voltage source coupled to the charged particle source. The at least one voltage source may include a voltage ladder comprising a plurality of voltage multiplication stages coupled in a bi-polar configuration, and at least one loading coil coupled at at least one intermediate position along the voltage ladder. The well-logging tool may further include at least one radiation detector carried by the sonde housing. | 02-26-2015 |
20150055748 | Energy Radiation Generator With Uni-Polar Voltage Ladder - A well-logging tool may include a sonde housing and a radiation generator carried by the sonde housing. The radiation generator may include a generator housing, a target carried by the generator housing, a charged particle source carried by the generator housing to direct charged particles at the target, and at least one voltage source coupled to the charged particle source. The at least one voltage source may include a voltage ladder comprising a plurality of voltage multiplication stages coupled in a uni-polar configuration, and at least one loading coil coupled at at least one intermediate position along the voltage ladder. The well-logging tool may further include at least one radiation detector carried by the sonde housing. | 02-26-2015 |
20150179390 | Radiation Generator Adjusting Beam Focusing Based Upon A Diagnostic Electrode - A radiation generator is provided that includes a target, a cathode to emit electrons in a downstream direction toward the target, a first conductive member downstream of the cathode, and a second conductive member downstream of the cathode. The first and second conductive members have a potential difference with the cathode such that a resultant electric field accelerates the electrons toward the target. A diagnostic current in the second conductive member and a target current in the target may be measured, and an electrical property of the first conductive member may be adjusted based upon the diagnostic current and the target current. | 06-25-2015 |