Nassar, US
Abdalla R. Nassar, University Park, PA US
Patent application number | Description | Published |
---|---|---|
20160074937 | METHOD FOR MANUFACTURING OVERHANGING MATERIAL BY PULSED, VOXEL-WISE BUILDUP - A method for manufacturing material voxel-by-voxel using directed-energy deposition is given. Using the method, unsupported structures, via voxel-wise directed-energy deposition, with steep overhangs is described and demonstrated. Methods for forming arbitrarily-complex structures and shaped voxels and surfaces are also given. A method for forming materials with internally-varying properties is also given. The method utilizes a pulsed or modulated, rather than continuous-wave energy source, thus allowing rapid solidification of voxels, rather than contours, hatches or tracks. Tuning of pulsing or modulation, material flow, and deposition-path parameters allows the buildup of unsupported material using standard directed-energy deposition processing heads and 3-axis stages, for example. The methods are demonstrated using a modified-directed-energy-deposition processes and is applicable to powder-bed for the buildup of three-dimensional components, repair and the addition of features to existing components. | 03-17-2016 |
Adib Nassar, Dublin, CA US
Patent application number | Description | Published |
---|---|---|
20150335604 | Chromium and Chlorogenic Acid Weight Control Formulations - This invention provides weight loss formulations and methods of use. The formulations include a combination of chlorogenic acids and chromium compounds. The Cr/CGA combination can help reduce blood glucose, while fructose in the formulation provides quick energy and mitigates effects on appetite. The formulations can be introduced into any number of foods and beverages for consumption by dieters as part of their weight loss regimen. | 11-26-2015 |
Ahmed M. Nassar, Katy, TX US
Patent application number | Description | Published |
---|---|---|
20150142419 | CONTEXTUAL VALIDATION OF SYNONYMS IN OTOLOGY DRIVEN NATURAL LANGUAGE PROCESSING - Embodiments described herein provide approaches for validating synonyms in ontology driven natural language processing. Specifically, an approach is provided for receiving a user input containing a token, structuring the user input into a semantic model comprising a set of classes each containing a set of related permutations of the token, designating the token as a synonym of one of the set of related permutations, annotating the token with a class from the set of classes corresponding to the one of the set of related permutations, and validating the annotation of the token by determining an accuracy of the designation of the token as a synonym of the one of the set of related permutations. In one embodiment, the accuracy is determined by quantifying a linear distance between the token and a contextual token also within the user input, and comparing the linear distance to a pre-specified linear distance limit. | 05-21-2015 |
Ahmed M.a. Nassar, Katy, TX US
Patent application number | Description | Published |
---|---|---|
20160063095 | UNSTRUCTURED DATA GUIDED QUERY MODIFICATION - A method, system, and computer program product for unstructured data guided query modification are provided in the illustrative embodiments. A set of parameters is identified in a structured database query. Using a Natural language processing (NLP) engine, a set of tokens is identified in an unstructured data. Using the NLP engine, corresponding to a subset of the set of parameters, sets of variations are obtained. A fit is found between a first token from the set of tokens and a first variant of a first parameter, the first variant of the first parameter being a member of a first set of variations corresponding to the first parameter. The first parameter in the structured database query is substituted with the first variant to produce a substituted query, wherein the substituted query produces a result set that is related to the unstructured data. | 03-03-2016 |
Ahmed M. A. Nassar, Katy, TX US
Patent application number | Description | Published |
---|---|---|
20150378984 | AUGMENTING SEMANTIC MODELS BASED ON MORPHOLOGICAL RULES - A computer processor determines a root of a first element of a semantic model, in which a first relationship of the first element to a second element of the semantic model, is unknown. The computer processor generates a search token, based on applying morphological rules to the root of the first element and appending a preposition. The computer processor determines one or more regular expressions by applying the search token to search a source of unstructured data. The one or more regular expressions are in a form of a triple, having a subject, a predicate, and an object, and the computer processor applies the predicate of the triple as the first relationship of the first element of the semantic model to a second element of the semantic model. | 12-31-2015 |
Ala Nassar, Milford, CT US
Patent application number | Description | Published |
---|---|---|
20120136157 | ARYL UREAS AS KINASE INHIBITORS - This invention relates to new aryl ureas and methods for their synthesis. The inventive compounds are useful in the treatment of (i) raf mediated diseases, for example, cancer, (ii) p38 mediated diseases such as inflammation and osteoporosis, and (iii) VEGF mediated diseases such as angiogenesis disorders. | 05-31-2012 |
Aladdin A. Nassar, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20090293011 | Pivot Search Results By Time and Location - Aggregating temporal information and location information to form a collective query. A search query is received from a user to identify search results. Temporal information and location information associated with the query inputs from information sources are received. One or more search results associated with the received query are identified in response to and as a function of the one or more query inputs, the received temporal information and the received location information. One or more graphical identifiers on a map are provided representing the one or more identified results. Each one or more provided graphical identifiers has at least one corresponding temporal identifiers on a calendar such that selecting one graphical identifier on the map focuses a corresponding one temporal identifier on the calendar or selecting one temporal identifier on the calendar selects a corresponding one graphical identifier on the map. | 11-26-2009 |
20100319056 | DECREASING LOGIN LATENCY - Systems, methods, and computer-storage media for decreasing web service login latency are provided. Upon a user's initial login to the web service from a web browser, the location of user information is identified. A cookie containing information identifying the location of the user information is generated and stored in association with the web browser. Upon a subsequent login to the web service by the same user, the location information included in the cookie is utilized to direct the user request directly to the correct location, without having to repeat the act of identifying the location, thus providing the user with the desired information more quickly. | 12-16-2010 |
20110202608 | EMAIL SYSTEM LATENCIES AND BANDWIDTHS - One or more techniques and/or systems are disclosed for measuring a client's network latency and the client's connection bandwidth. A network latency is determined by adding a randomly generated variable to a browser query string for a get request for a test file on a remote server, where the test file fits in one response packet. A first amount of time it takes for the test file to be received by the browser from when the get request is sent is determined and used to determine the network latency between the client and remote server. A connection bandwidth is determined by determining a second amount of time it takes for an email response to be received by the browser for an email request from the browser to a remote server. The size of the response is identified and combined with the second time to determine the connection bandwidth. | 08-18-2011 |
20120259969 | CACHED DATA DETECTION - A service assigns session identifiers to usage sessions of a program on a computing device, and maintains records in a log of received page requests and associated session identifiers, as well as received cached data detection requests and associated session identifiers. This log can be used to determine how many usage sessions existed over a particular amount of time, and how many of the usage sessions used data from a local cache rather than from the service. The service also returns, in response to a received cached data detection request, a response including an indication that the response is from the service. The program can determine that the response was received from the service if the indication is included in the response, and that the response was received from a local cache of the computing device if the indication is not included in the response. | 10-11-2012 |
20130138957 | MIGRATING AUTHENTICATED CONTENT TOWARDS CONTENT CONSUMER - Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service. | 05-30-2013 |
20140380050 | MIGRATING AUTHENTICATED CONTENT TOWARDS CONTENT CONSUMER - Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service. | 12-25-2014 |
20150180996 | CACHED DATA DETECTION - A service assigns session identifiers to usage sessions of a program on a computing device, and maintains records in a log of received page requests and associated session identifiers, as well as received cached data detection requests and associated session identifiers. This log can be used to determine how many usage sessions existed over a particular amount of time, and how many of the usage sessions used data from a local cache rather than from the service. The service also returns, in response to a received cached data detection request, a response including an indication that the response is from the service. The program can determine that the response was received from the service if the indication is included in the response, and that the response was received from a local cache of the computing device if the indication is not included in the response. | 06-25-2015 |
Aladdin Aly Nassar, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20100262646 | OBTAINING INSTRUMENTATION DATA - An apparatus described herein includes a request receiver component that receives a request for application data over a network from a client computing device. The apparatus also includes an instrumentation component that causes instrumentation logic to be transmitted to the client computing device responsive to receipt of the request for the application data. The instrumentation logic is configured to cause the client computing device to analyze a cookie to determine whether to capture instrumentation data pertaining to the client and, if it is determined that instrumentation data is desirably captured. The instrumentation logic is also configured to cause the client computing device to capture quantitative instrumentation data pertaining to the requested application data and cause the client computing device to transmit the quantitative instrumentation data over the network to a data repository. | 10-14-2010 |
Anthony Albert Nassar, Reston, VA US
Patent application number | Description | Published |
---|---|---|
20140282409 | IMPROVED DATA INTEGRATION TOOL - Computer-implemented systems and methods are disclosed for providing proactive validations of transformation scripts. In one implementation, a method is provided that includes associating, with at least one processor, the transformation script with ontology parameters. The method also includes initiating a debugging operation of the transformation script having at least one condition and importing, from a data source, at least one data item for transformation. The method further includes determining, as part of the debugging operation, whether the at least one condition that uses the at least one data item is valid based on the ontology parameters and notifying a user, on a display device, of a result associated with the determination. | 09-18-2014 |
20150100559 | DATA INTEGRATION TOOL - Computer-implemented systems and methods are disclosed for providing proactive validations of transformation scripts. In one implementation, a method is provided that includes associating, with at least one processor, the transformation script with ontology parameters. The method also includes initiating a debugging operation of the transformation script having at least one condition and importing, from a data source, at least one data item for transformation. The method further includes determining, as part of the debugging operation, whether the at least one condition that uses the at least one data item is valid based on the ontology parameters and notifying a user, on a display device, of a result associated with the determination. | 04-09-2015 |
Ayman E. Nassar, Clarksville, MD US
Chris Nassar, Portland, ME US
Patent application number | Description | Published |
---|---|---|
20130277791 | SCHOTTKY DIODE WITH OPPOSITE-POLARITY SCHOTTKY DIODE FIELD GUARD RING - In one general aspect, an apparatus includes a metal or metal silicide contact layer disposed on an n-well region of a semiconductor substrate to form a primary Schottky diode. The apparatus includes a p-well guard ring region of the semiconductor substrate abutting the primary Schottky diode. The metal silicide contact layer has a perimeter portion extending over the p-well guard ring region of the semiconductor substrate and the p-well guard ring region has a doping level establishing a work function difference relative to the perimeter portion of the metal silicide contact layer to form a guard ring Schottky diode. The guard ring Schottky diode is in series with a p-n junction interface of the p-well region and the n-well region and the guard ring Schottky diode has a polarity opposite to that of the primary Schottky diode. | 10-24-2013 |
Chris J. Nassar, Rochester, NY US
Patent application number | Description | Published |
---|---|---|
20100201670 | DERIVATIVE SAMPLED, FAST SETTLING TIME CURRENT DRIVER - Methods and apparatus provide for producing a remote current for driving a load, comprising: one of sourcing and sinking a local current, Iref, through a distributed impedance line, at a first node thereof; the other of sourcing and sinking a remote current, Iref, through the distributed impedance line in response to the local current Iref; determining a rate of change of voltage of the first node; and sourcing or sinking additional current, into or out of the first node, in response to the rate of change of voltage of the first node in order to settle the voltage on the distributed impedance line. | 08-12-2010 |
20100201671 | METHODS AND APPARATUS FOR PRODUCING PRECISION CURRENT OVER A WIDE DYNAMIC RANGE - Methods and apparatus provide for producing a remote current for driving a load, comprising: producing a local current, Iref; amplifying the local current Iref by a value of K to produce a local current K Iref; mirroring the local current K Iref to another location; producing a remote current K Iref in response to the mirroring of the local current K Iref; and dividing the remote current K Iref by a matched value of K to produce a remote current Iref for driving the load. | 08-12-2010 |
Christopher Nassar, Portland, ME US
Patent application number | Description | Published |
---|---|---|
20140120694 | USE OF PLATE OXIDE LAYERS TO INCREASE BULK OXIDE THICKNESS IN SEMICONDUCTOR DEVICES - Semiconductor devices and methods for making such devices are described. The semiconductor devices are made by providing a semiconductor substrate with an active region, providing a bulk oxide layer in a non-active portion of the substrate, the bulk oxide layer having a first thickness in a protected area of the device, providing a plate oxide layer over the bulk oxide layer and over the substrate in the active region, forming a gate structure on the active region of the substrate, and forming a self-aligned silicide layer on a portion of the substrate and the gate structure, wherein the final thickness of the bulk oxide layer in the protected area after these processes remains substantially the same as the first thickness. The thickness of the bulk oxide layer can be increased without any additional processing steps or any additional processing cost. Other embodiments are described. | 05-01-2014 |
20140213024 | PRODUCTION OF MULTIPLE SEMICONDUCTOR DEVICES USING A SEMICONDUCTOR PROCESS - In one general aspect, a method can include implanting a first dopant, simultaneously, in a portion of a laterally diffused metal oxide semiconductor (LDMOS) device and in a portion of a resistor device included in a semiconductor device. The method can also include implanting a second dopant, simultaneously, in a portion of the LDMOS device and in a portion of a bipolar junction transistor (BJT) device in the semiconductor device. | 07-31-2014 |
20140231911 | LDMOS DEVICE WITH DOUBLE-SLOPED FIELD PLATE - In one general aspect, an apparatus can include a channel region disposed in a semiconductor substrate, a gate dielectric disposed on the channel region and a drift region disposed in the semiconductor substrate adjacent to the channel region. The apparatus can further include a field plate having an end portion disposed between a top surface of the semiconductor substrate and the gate dielectric The end portion can include a surface in contact with the gate dielectric, the surface having a first portion aligned along a first plane non-parallel to a second plane along which a second portion of the surface is aligned, the first plane being non-parallel to the top surface of the semiconductor substrate and the second plane being non-parallel to the top surface of the semiconductor substrate. | 08-21-2014 |
20140231952 | PRODUCTION OF HIGH-PERFORMANCE PASSIVE DEVICES USING EXISTING OPERATIONS OF A SEMICONDUCTOR PROCESS - In one general aspect, a semiconductor processing method can include forming an N-type silicon region disposed within a P-type silicon substrate. The method can also include forming a field oxide (FOX) layer in the P-type silicon substrate where the FOX layer includes an opening exposing at least a portion of the N-type silicon region. The method can further include forming a reduced surface field (RESURF) oxide (ROX) layer having a first portion disposed on the exposed N-type silicon region and a second portion disposed on the FOX layer where the ROX layer includes a first dielectric layer in contact with the exposed N-type silicon region and a second dielectric layer disposed on the first dielectric layer. The method can further include forming a doped polysilicon layer having a first portion disposed on the first portion of the ROX layer and a second portion disposed on the second portion of the ROX layer. | 08-21-2014 |
20140268443 | INPUT POWER PROTECTION - In one general aspect, an apparatus can include an input terminal, an output terminal and a ground terminal. The apparatus can also include an overcurrent protection device coupled between the input terminal and the output terminal. The apparatus can further include a thermal shunt device coupled between the output terminal and the ground terminal, the thermal shunt device being configured to, at a threshold temperature, operate in a thermally-induced low-impedance state. | 09-18-2014 |
Gus Nassar, Canton, MI US
Patent application number | Description | Published |
---|---|---|
20140297099 | SYSTEM AND METHOD FOR SENDING AND RECEIVING MESSAGES BETWEEN AN ELECTRONIC CONTROL UNIT OF A VEHICLE AND AN EXTERNAL DEVICE - A device for sending and receiving messages between an electronic control unit of a vehicle and an external device includes a processor, a memory, a first port, and a second port. The memory, first port, and second port are each in communication with the processor. The first port is configures to communicate with the electronic control unit of a vehicle, while the second port is configured to communicate with the external device. The processor is configured to receive a request message from the external device via the second port, transmit the request message to the electronic control unit of the vehicle; receive requested information from the electronic control unit of the vehicle based on the request message, and determine an information subset in the requested information that should be transmitted to the external device; and transmitting the information subset to the external device. | 10-02-2014 |
20140309905 | SYSTEM AND METHOD FOR SENDING AND RECEIVING MESSAGES BETWEEN AN ELECTRONIC CONTROL UNIT OF A VEHICLE AND AN EXTERNAL DEVICE - The system for sending and receiving messages from an electronic control unit of the vehicle includes a processor, a database, and a port in communication with the processor. The database contains information as to the emissions of the vehicle and the port is configured to communicate with the electronic control unit of the vehicle. The processor is configured to receive information from the electronic control unit of the vehicle, compare the information from the electronic control unit of the vehicle with information found in the database. By so doing, the processor can determine if the information from the electronic control unit of the vehicle does not match the information in the database. If this is the case, the system can provide an indication to the user of the system that the vehicle may have been tampered with and any emissions related testing may be incorrect. | 10-16-2014 |
Hani Nassar, Hickory, NC US
Patent application number | Description | Published |
---|---|---|
20110187393 | MOISTURE DETECTION SENSORS FOR BUILDING STRUCTURES - A moisture detection sensor self-adhesive tape is used in a building structure to detect moisture penetration and includes a substrate of dielectric, hydrophobic material. Two elongate, parallel, conductors are secured to the top surface of the substrate and a protective layer of non-hygroscopic, water pervious material secured to the to the top surface of the substrate, over the conductors. A pressure sensitive mounting adhesive is placed on a bottom surface of the substrate and covered with a release sheet. The sensor may include moisture probes adapted to penetrate the protective layer, the respective conductors and the substrate and to extend into a building component to which the substrate has been adhered. The preferred moisture probe is a U-shaped metal staple configured to be driven in by a conventional power stapler. | 08-04-2011 |
20120074967 | MOISTURE DETECTION SENSORS FOR BUILDING STRUCTURES - A moisture detection sensor is used in a building structure to detect moisture penetration is a flat self-adhesive tape. It includes a substrate of dielectric, hydrophobic material. Two elongate, parallel, conductors are secured to the top surface and a protective layer of non-hygroscopic, water pervious material secured over the conductors. A pressure sensitive adhesive on a bottom surface of the substrate is covered with a release sheet. The sensor may include moisture probes which penetrate the protective layer, the respective conductors and the substrate and to extend into a building component to which the substrate has been adhered. Each probe is made from a conductive, corrosion resistant material. This is particularly useful with water absorbent building materials, such as wood, where the surface may appear dry, but the body is impregnated with water. The preferred moisture probe is a U-shaped metal staple driven by a power stapler. | 03-29-2012 |
Issa Nassar, Rancho Palos Verdes, CA US
Patent application number | Description | Published |
---|---|---|
20130277007 | SINGLE PIECE CASTING OF REACTIVE ALLOYS - A method of vacuum induction melting a charge of material includes preheating a mold; inserting the charge into the mold; placing the mold into a chamber; reducing an operating pressure within the chamber; induction melting the charge within the mold; allowing material of the charge to fill a cavity defined within the mold; applying electromagnetic pressure to the charge within the mold; and applying an electromagnetic field to material of the charge positioned within the cavity defined within the mold. | 10-24-2013 |
Jason A. Nassar, Hazel Park, MI US
Patent application number | Description | Published |
---|---|---|
20100001582 | PRECHARGING A HIGH-VOLTAGE BUS USING A VOLTAGE-REGULATED POWER SUPPLY - Systems and methods are provided for precharging high-voltage buses. The precharge system comprises an energy source having a first terminal and a second terminal, wherein a first voltage is equal to a potential difference between the first terminal and the second terminal. The precharge system further comprises a bus having a first rail and a second rail, wherein a second voltage is equal to a potential difference between the first rail and the second rail. A first contactor is coupled between the first terminal and the first rail and a second contactor is coupled between the second terminal and the second rail. A controller is coupled to the energy source, the bus, and the contactors. The controller is configured to activate the second contactor, and thereafter activate the first contactor if the magnitude of a difference between the first voltage and the second voltage is less than a threshold tolerance. | 01-07-2010 |
Jason Alan Nassar, League City, TX US
Patent application number | Description | Published |
---|---|---|
20140159495 | Dynamic Battery Control Based On Demand - A system is provided that includes a plurality of power units each configured to supply power. Additionally, the system includes a plurality of contacts each configured to toggle an electrical connection of each of the plurality of power units as a network. Moreover, the network is configured to supply power to a load. Furthermore, the system includes a controller configured to control when each of the plurality of contacts toggle according to a power state, and the power state includes information regarding a charge of each power unit, a load demand, and a supplied power being supplied by the plurality of power units. | 06-12-2014 |
Kareem Aladdin Nassar, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20140201278 | SYSTEMS AND METHODS FOR COMPUTING DEVICE COMMUNICATIONS - Certain implementations of the disclosed technology may include systems and methods for computing device communications. According to an example implementation of the disclosed technology, a method is provided that can include determining a status and capability of at least one selected computing device, and sending a generated message to the at least one selected computing device. The at least one selected computing device is configured to retrieve content from a source identified by a uniform resource identifier in the message, and the at least one selected computing device is further configured to present the retrieved content. | 07-17-2014 |
20140359709 | Maintaining Video Conference Session Continuity During Transfer of Session to Alternative Device - Implementations of the present disclosure provide systems and methods for seamlessly transferring a communication session from a first client to a second client via a close-range communication connection. Implementations contemplate serializing a set of unique identifiers pertaining to a communication session and transmitting the set of serialized identifiers from the first client to the second client via a close-range communication connection. The second client de-serializes the set of unique identifiers and transmits a request to a communication session server to assume control of the communication session from the first client. A communication session server may perform an authentication of the second client that requires the second client to provide credentials associated with a user account. In some implementations, the present disclosure provides for the creation of a temporary use token that enables a client to temporarily acquire credentials associated with a user account. | 12-04-2014 |
20150088988 | Social Queue on Television - Content such as a television program can be shared by pushing a content identifier to a queue through a social network. A share request from a sender can designate a recipient for the content. An implementation can determine if the sender and the recipient have permission to share the content. If permitted, an identifier associated with the content can be pushed to a viewing queue of the recipient. A user can subscribe to follow a viewing queue, which can provide to the user access to the queue's listing of content, as well as the content itself. | 03-26-2015 |
Karim Nassar, Raleigh, NC US
Patent application number | Description | Published |
---|---|---|
20130328913 | METHODS FOR VIEWING AND NAVIGATING BETWEEN PERSPECTIVES OF A DATA SET - Methods for viewing and navigating between perspectives of a data set are described. In one example, a method includes the steps of displaying a view of a data set arranged according to a first perspective and receiving an input associated with an affordance. The method includes the additional steps of determining a view transition based at least in part on the input, displaying the view transition, and updating the view based at least in part on the input. | 12-12-2013 |
20140123032 | Methods for Creating, Arranging, and Leveraging An Ad-Hoc Collection of Heterogeneous Organization Components - Methods for creating, arranging, and leveraging an ad-hoc collection of heterogeneous organization components are provided. In one example, a method includes the steps of displaying a scratchpad affordance associated with a scratchpad, and detecting an update to the scratchpad based on an input associated with a first organization component of the one or more organization components and the scratchpad affordance. The method includes the additional step of updating the scratchpad based at least in part on the input. | 05-01-2014 |
Luai Nassar, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20140358478 | MULTIVARIATE YIELD CALCULATOR FOR WAFER INTEGRATED CIRCUIT FABRICATION AND METHOD OF USE THEREOF - A multivariate yield calculator for wafer integrated circuit (IC) fabrication and a method of generating a multivariate yield forecast using the multivariate yield calculator. One embodiment of the multivariate yield calculator includes: (1) a Gaussian computer configured to compute a mean vector and a covariance matrix from multivariate performance characterizations having a multivariate distribution over a plurality of wafer ICs, and (2) an integrator configured to integrate a probability distribution function (PDF) based on the mean vector and the covariance matrix over a multivariate performance bin, thereby generating a multivariate yield forecast. | 12-04-2014 |
Magda K. Nassar, Tinton Falls, NJ US
Patent application number | Description | Published |
---|---|---|
20160057071 | Network Platform as a Service Layer for Open Systems Interconnection Communication Model Layer 4 Through Layer 7 Services - According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a hardware resource and a Network Platform as a Service (“NPaaS”) layer. The NPaaS layer can expose a cloud service for use by a service that operates within at least one of layer 4 through layer 7 of the Open Systems Interconnection (“OSI”) communication model. The cloud service can include a database service, an application container service, a resource broker service, a load balancer service, a domain name system (“DNS”) service, a state persistence service, a probe service, or a combination thereof. The NPaaS also can receive a request for the cloud service, and in response to the request, can provide the cloud service. | 02-25-2016 |
20160057208 | Virtual Zones for Open Systems Interconnection Layer 4 Through Layer 7 Services in a Cloud Computing System - Concepts and technologies disclosed herein are directed to virtual zones for Open Systems Interconnection (“OSI”) communication model layers 4-7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a hardware resource and a virtual zone. The virtual zone can include a virtual network function (“VNF”) that is executable by the hardware resource. The VNF can support a service that operates within one of layers 4-7 of the OSI communication model. A computing system can detect new subscribers to the service within the virtual zone. The computing system also can determine that a capacity constraint exists within the virtual zone as a result of the new subscribers. The computing system also can home the new subscribers to the further virtual zone so that the further VNF can provide the service to the new subscribers. | 02-25-2016 |
20160057209 | Service Centric Virtual Network Function Architecture for Development and Deployment of Open Systems Interconnection Communication Model Layer 4 Through Layer 7 Services in a Cloud Computing System - According to one aspect disclosed herein, a service centric virtual network function architecture can be used for development and deployment of services in a cloud computing system. The cloud computing system can include a plurality of compute resources and a plurality of memory resources. A portion of the plurality of memory resources can include virtual machine monitor instructions. The virtual machine monitor instructions can be executed by a first portion of the plurality of compute resources to perform operations. In particular, the virtual machine monitor instructions can be executed by the first portion of the plurality of compute resources to instantiate a virtual network function to be executed by a second portion of the plurality of compute resources. The virtual network function can include at least a portion of a decomposition of a physical network function that supports at least a portion of a telecommunications service. | 02-25-2016 |
20160057231 | Avoiding Registration Storms for Open Systems Interconnection Layer 4 Through Layer 7 Services in a Cloud Computing System - Concepts and technologies disclosed herein are directed to avoiding registration storms for Open Systems Interconnection (“OSI”) communication model layers 4-7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, a traffic distribution system can receive a connection request from a device. The traffic distribution system also can send the connection request to a site. The site can include a virtual call session control function (“V-CSCF”). The site also can include a state persistence database. The V-CSCF can cause a registration state associated with the device to be stored in the state persistence database. The registration state can be replicated to one or more further persistence databases that operate within one or more further sites. | 02-25-2016 |
20160057234 | Service Compiler Component and Service Controller for Open Systems Interconnection Layer 4 Through Layer 7 Services in a Cloud Computing System - Concepts and technologies disclosed herein are directed to a service compiler component and service controller for Open Systems Interconnection (“OSI”) communication model layer 4 through layer 7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, the service compiler component can receive compiler data associated with a new service. The service compiler component also can analyze the compiler data at least to determine at least one virtual network function (“VNF”) to be used to instantiate the new service. The service compiler also can generate a template for the new service. | 02-25-2016 |
Majed S. Nassar, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20130327714 | COMPOSITE MEMBRANE WITH MULTI-LAYERED ACTIVE LAYER - A thin film composite membrane includes an active layer on a support membrane, wherein the active layer includes at least two chemically distinct first and second crosslinked polyamide film sub-layers. The first film sub-layer includes a polyamide unit; and the second film sub-layer includes a copolyamide with two chemically distinct polyamide units. The first film sub-layer is closer to the support than is the second film sub-layer. | 12-12-2013 |
Marcel Nassar, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20160065245 | ELECTRONIC SYSTEM WITH VITERBI DECODER MECHANISM AND METHOD OF OPERATION THEREOF - A electronic system includes: a support chip configured to receive an input code stream; a circular Viterbi mechanism, coupled to the support chip, configured to: generate a final path metric for the input code stream, store intermediate path metrics at the repetition depth, generate a repetition path metric for the input code stream, and calculate a soft correlation metric based on the final path metric, the repetition path metric, and the intermediate path metrics. | 03-03-2016 |
Marcel Nassar, Austin, TX US
Marcos Nassar, Los Angeles, CA US
Patent application number | Description | Published |
---|---|---|
20090061597 | SINGULATOR METHOD AND APPARATUS - A method for the singulation of hybrid circuits from a pre-scribed plate containing hybrid circuits or made of other brittle materials. The method includes the steps of providing a platen used to support the hybrid plate and which has a surface comprised of a series of sections each angled downward from its adjacent section, aligning the plate on the platen so that the scribe lines align with the surface discontinuities at the angles between the sections, securing the plate to the platen with vacuum pressure, creating a pressure differential between a space above the plate and a space below the plate, and applying the pressure differential to sequentially break the plate along the pre-scribed lines by forcing the plate against the angles. | 03-05-2009 |
20090266172 | SENSE ELEMENT ASSEMBLY AND METHOD - Described herein is the sense element assembly for a capacitive pressure sensor and method for creating same that has increased sensitivity without additional size. The sense element assembly and method includes fabricating an off-centered elliptically shaped center electrode, at least one elliptical annular-like electrode around the center electrode, a ground electrode and a method for fusing the layers together to optimize sensitivity. | 10-29-2009 |
Marcos A. Nassar, Los Angeles, CA US
Patent application number | Description | Published |
---|---|---|
20150198495 | Pressure Transducer With Capacitively Coupled Source Electrode - A capacitive pressure transducer of an embodiment of the present invention capacitively couples two electrodes on a substrate with a diaphragm electrode to form a transducing circuit without the need for a physical connection between the electrodes. Embodiments of the present invention have a substrate with a coupling electrode and a sensing electrode and an attached diaphragm with a diaphragm electrode. A spacer positioned between the substrate and the diaphragm provides for a cavity that defines a gap between the sensing electrode and the diaphragm electrode. A dielectric spacer may be positioned over the coupling electrode to increase the capacitance between the coupling electrode and the diaphragm electrode. The capacitive pressure transducer has similar electrical characteristics as existing capacitive pressure transducers, is easier to manufacture, and has long-term reliability and durability improvements brought about by the elimination of mechanical interconnects and additional conductive materials. | 07-16-2015 |
20150204747 | Differential Pressure Sensor With Dual Output Using a Double-Sided Capacitive Sensing Element - A differential capacitive pressure sensor of an embodiment of the present invention has first and second diaphragms positioned on opposing sides of a single substrate. Each diaphragm of the pressure transducer is configured to be exposed to a transient fluid, with the first and second pressure transducers being arranged with their respective deflection surfaces directed outwardly from each other. The differential capacitive pressure sensor may be configured to output representations of differential and common mode pressure of the transient fluids, where a representation of a common mode is cancelled in generating the representation of the differential pressure. The transient fluids may be the same fluid at different locations within a flow path. The diaphragms may be constructed from a ceramic material to be able to withstand exposure to corrosive or caustic fluids. | 07-23-2015 |
Marcos Abraham Nassar, Los Angeles, CA US
Patent application number | Description | Published |
---|---|---|
20150248780 | Touchscreen Contouring Method for Radiation Oncology Treatment Planning and Treatment Administration - An improved method to draw the contour of the outline of a scanned tumor image for radiation oncology treatment planning and treatment administration using a touchscreen device and a stylus. | 09-03-2015 |
Mounir E. Nassar, Pittsford, NY US
Patent application number | Description | Published |
---|---|---|
20110288366 | Surgical Approach to Treat Coronary Artery Syndromes - A treatment for congestive heart failure due to acute or chronic coronary syndromes with myocardial infarction comprising excising from the patient's heart an auricular appendage and grafting the auricular appendage to the damaged heart muscle. | 11-24-2011 |
Munir N. Nassar, Skillman, NJ US
Patent application number | Description | Published |
---|---|---|
20090291913 | FACTOR Xa INHIBITOR FORMULATION AND METHOD - An injectable Factor Xa inhibitor formulation is provided which includes the Factor Xa inhibitor razaxaban or apixaban, a solubilizing agent which is a substituted β-cyclodextrin, preferably, sulfobutyl ether β-cyclodextrin (SBE-CD) or hydroxypropyl-β-cyclodextrin (HPB-CD), and water. A method for preventing or treating venous thrombosis, deep venous thrombosis and acute coronary syndrome employing the above formulation is also provided. | 11-26-2009 |
Nader M. Nassar, Yorktown Heights, NY US
Patent application number | Description | Published |
---|---|---|
20130042302 | COGNITIVE PATTERN RECOGNITION FOR COMPUTER-BASED SECURITY ACCESS - Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request that includes a set of images and an instruction to identify a cognitive pattern in the set of images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed. | 02-14-2013 |
20130042303 | COGNITIVE PATTERN RECOGNITION FOR SECURITY ACCESS IN A FLOW OF TASKS - Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request. The administering includes randomly selecting a set of related images from a database of images, randomly selecting one image that is unrelated to the set of related images, displaying the set of related images along with the image that is unrelated to the set of related images, and prompting a user to identify the image that is unrelated to the set of related images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed. | 02-14-2013 |
20130212662 | SECURITY ACCESS IN A COMPUTER-BASED FLOW OF TASKS - Implementing security access includes creating a coordinate system that includes a first axis and a second axis. Points on the first axis and the second axis specify corresponding coordinates. The security access also includes randomly selecting values from a database and populating the coordinate system with the values and selecting a set of the coordinates from the coordinate system. The set of coordinates is indicative of an instruction. The security access further includes generating an image from the coordinate system and the values, the image including labels for the coordinates along respective first axis and second axis, and identifying values corresponding to the set of coordinates. The values correspond to the set of coordinates indicative of an answer to the instruction. The security access also includes transmitting the image and the instruction to a user device, and using the image, the instruction, and the answer as a security access mechanism. | 08-15-2013 |
20130268667 | POLICY-DRIVEN ADMINISTRATION OF MOBILE APPLICATIONS - Policy-driven administration of mobile applications includes receiving a policy defined by a client system. The policy is defined by rules configured for implementation by a scanner and a compliance definition indicative of a threshold acceptability value for output of the implementation of the scanner on a mobile application. The policy-driven administration also includes executing the scanner for the mobile application and identifying an association between a mobile device and the client system. The policy-driven administration of mobile applications further includes controlling access to the mobile application by the mobile device based on results of executing the scanner using the compliance definition. | 10-10-2013 |
20130268668 | POLICY-DRIVEN ADMINISTRATION OF MOBILE APPLICATIONS - Policy-driven administration of mobile applications includes receiving a policy defined by a client system. The policy is defined by rules configured for implementation by a scanner and a compliance definition indicative of a threshold acceptability value for output of the implementation of the scanner on a mobile application. The policy-driven administration also includes executing the scanner for the mobile application and identifying an association between a mobile device and the client system. The policy-driven administration of mobile applications further includes controlling access to the mobile application by the mobile device based on results of executing the scanner using the compliance definition. | 10-10-2013 |
20130283647 | AUTOMOTIVE VEHICLE SKID RECOVERY SYSTEM - Disclosed is a vehicle skid recovery system, which is able to accelerate skid recovery, when an automotive vehicle begins to skid as a result of ice accumulation on the road surface. The embodiments control operation of ice removers (e.g., blades or heaters), which are mounted within the wheel wells forward of the wheel, based on information received from the vehicle's outside temperature sensor and anti-lock braking system (ABS). When the temperature sensor indicates that the outside temperature is below a predetermined temperature (e.g., below freezing) and when the anti-lock braking system is activated as a result of detected skid, a controller activates the ice remover in one or more of the wheel wells and, thereby cause the ice remover to remove ice from the road surface forward of the corresponding wheel. Clearing the ice allows the vehicle's tires to gain traction on the road surface and, thereby stops the skid. | 10-31-2013 |
20130311641 | TRAFFIC EVENT DATA SOURCE IDENTIFICATION, DATA COLLECTION AND DATA STORAGE - Traffic event data source identification embodiments comprise a first monitoring system that detects a traffic event, a communication device that broadcasts a discovery signal and receives back response signals from any second monitoring systems within the vicinity of the traffic event, and a memory that stores a list of responding second monitoring systems. Traffic event data collection embodiments incorporate the identification embodiments and additional features. In this case, the first monitoring system captures data recorded at the time of the traffic event and a second communication device transmits this data and, optionally, the list to a traffic event database in a traffic event data storage system. The first communication device also transmits a data capture request signal to the second monitoring system(s) requesting capture of any data recorded at the time of the traffic event and, optionally, requesting that such data be transmitted to the database. | 11-21-2013 |
20140090032 | SYSTEM AND METHOD FOR REAL TIME SECURE IMAGE BASED KEY GENERATION USING PARTIAL POLYGONS ASSEMBLED INTO A MASTER COMPOSITE IMAGE - A method including: receiving, at a first device, a challenge provided from a second device, wherein the challenge includes an encoding algorithm and a request for credentials from the first device; and outputting, from the first device to the second device, a response to the challenge, wherein the response includes at least one image, the at least one image including an article of evidence arranged according to the encoding algorithm. | 03-27-2014 |
20140090040 | SYSTEM AND METHOD FOR REAL TIME SECURE IMAGE BASED KEY GENERATION USING PARTIAL POLYGONS ASSEMBLED INTO A MASTER COMPOSITE IMAGE - A method including: receiving, at a first device, a challenge provided from a second device, wherein the challenge includes an encoding algorithm and a request for credentials from the first device; and outputting, from the first device to the second device, a response to the challenge, wherein the response includes at least one image, the at least one image including an article of evidence arranged according to the encoding algorithm. | 03-27-2014 |
20140200904 | PRESCRIPTION BASED SHOPPING ASSISTANCE - A method, a system and a computer program product for generating a personalized shopping recommendation includes steps and structure for for creating a shopping plan, for one or more persons, on a computing device of a user, and using corresponding prescription data advised for the one or more persons by a doctor to identifying recommended products that best fit each person's requirements. | 07-17-2014 |
20140253452 | WIRELESS KEYBOARD - Embodiments include a wireless keyboard having a plurality of keys and a plurality of radio frequency identification (RFID) tags, wherein each of the plurality of RFID tags are coupled to one of the plurality of keys. Each of the RFID tags are configured to transmit a signal when one of the plurality of keys coupled to RFID tag is pressed. | 09-11-2014 |
20150020176 | Using Personalized URL for Advanced Login Security - Techniques for advanced login security using personalized, user-specific urls are provided. In one aspect, a method for authenticating a user is provided. The method includes the following steps. A personalized login url and credentials (e.g., username and password) are stored for the user. Upon receipt of a login url from the user, it is verified whether the login url matches the personalized url stored for the user. If the login url matches the personalized url for the user, then the user is provided with a user-specific login page where the user can enter credentials, otherwise access is denied. The user is authenticated only if the credentials the user enters match the credentials stored for the user, otherwise denying access. | 01-15-2015 |
20150020178 | Using Personalized URL for Advanced Login Security - Techniques for advanced login security using personalized, user-specific urls are provided. In one aspect, a method for authenticating a user is provided. The method includes the following steps. A personalized login url and credentials (e.g., username and password) are stored for the user. Upon receipt of a login url from the user, it is verified whether the login url matches the personalized url stored for the user. If the login url matches the personalized url for the user, then the user is provided with a user-specific login page where the user can enter credentials, otherwise access is denied. The user is authenticated only if the credentials the user enters match the credentials stored for the user, otherwise denying access. | 01-15-2015 |
20150026343 | CLOUD-CONNECTABLE MIDDLEWARE APPLIANCE - A computer system and associated method and software where communications between the cloud and a sensor device (for example, a temperature sensor) pass through and are processed by a middleware appliance. The middleware appliance creates data structures called cloud event data objects (cEDOs). A cEDO may include, for example: event data, device data, sensor data, geo key data, payload key data and data value pairs. | 01-22-2015 |
20150039361 | Techniques for Managing Snow Removal Equipment Leveraging Social Media - Techniques that leverage social media to proactively respond to inclement weather conditions such as snow that affect road conditions and, for example, coordinate snow removal from the roads are provided. In one aspect, a method for sharing road condition information is provided. The method includes the following steps. Data is collected from vehicles related to road conditions at various locations. The data is stored in an off-vehicle system. The data is processed to determine what type of maintenance activity is needed based on the road conditions. The maintenance activity and the locations are provided to dispatchers to enable routing of municipal vehicles to the locations to address the road conditions. A system for sharing road conditions is also provided. | 02-05-2015 |
20150206127 | Multiple-node supply chain price determination via mobile phone text message - In a hierarchical multiple-node supply chain, a commodity is sold a first time at a first end of the supply chain and is resold multiple times across the supply chain before being sold a final time at a second end of the supply chain opposite the first end. A user who is a buyer and/or a seller within the supply chain is interacted with by exchanging text messages with a mobile phone device of the user to provide the user with a current price of the commodity for a type of the user within the supply chain, and to receive from the user an actual price of the commodity in a current transaction in which the user was involved. The type of the user includes a node within the supply chain to which the user corresponds. | 07-23-2015 |
20150206236 | Multiple-node supply chain price determination via mobile phone text message - In a hierarchical multiple-node supply chain, a commodity is sold a first time at a first end of the supply chain and is resold multiple times across the supply chain before being sold a final time at a second end of the supply chain opposite the first end. A user who is a buyer and/or a seller within the supply chain is interacted with by exchanging text messages with a mobile phone device of the user to provide the user with a current price of the commodity for a type of the user within the supply chain, and to receive from the user an actual price of the commodity in a current transaction in which the user was involved. The type of the user includes a node within the supply chain to which the user corresponds. | 07-23-2015 |
20150253745 | Utility Consumption Advisor - An embodiment of the invention provides a method for a utility consumption advisor, wherein a target electricity consumption for a predefined time period is received with a user interface. User parameters are also received with the user interface, the user parameters including a list of electricity consumption items that may not be modified, a list of electricity consumption items that may be modified, and a range of modification for each of the listed electricity consumption items that may be modified. The user's electricity consumption history is determined; and, an electricity utilization plan is generated for the predefined time period with a processor. The electricity utilization plan is generated based on the target electricity consumption, the user parameters, and the user's electricity consumption history. The electricity utilization plan is implemented by wirelessly controlling the electricity consumption items that may be modified. | 09-10-2015 |
20150254542 | OPTIMIZING QUICK RESPONSE CODE CAPACITY USING GRAY LUMINANCE - A system and methods are provided. A method includes determining a set of Grayscale bands providing an increase in a Quick Response Code data capacity that is an integer multiple of the Quick Response Code data capacity provided by a Black and White Quick Response Code that uses only Black and White to represent data. The method further includes generating, using a processor, a Grayscale Quick Response Code using the determined set of Grayscale bands to represent the data. | 09-10-2015 |
20150261951 | SECURITY INFORMATION SHARING BETWEEN APPLICATIONS - A system and method for sharing data and a risk assessment of the data comprises receiving data in a first application and obtaining a risk level of the data, performing an action in the first application necessitating passing a message comprising at least the data and the risk level to a second application, passing the message from the first application to the second application, receiving, at the second application, the message, determining by said second application whether the risk level exceeds a predetermined threshold, when the risk level exceed the predetermined threshold, implementing a protocol to perform actions in the second application using the data in accordance with the protocol, and when the risk level does not exceed the predetermined threshold, running the second application using the data. | 09-17-2015 |
20150284921 | AUTOMOTIVE VEHICLE SKID RECOVERY SYSTEM - In a vehicle skid recovery system skid recovery can be accelerated when an automotive vehicle begins to skid as a result of ice accumulation on the road surface. The system can control operation of ice removers (e.g., blades or heaters), which are mounted within the wheel wells forward of the wheel, based on information received from the vehicle's outside temperature sensor and anti-lock braking system (ABS). When the temperature sensor indicates that the outside temperature is below a predetermined temperature and when the anti-lock braking system is activated as a result of detected skid, a controller activates the ice remover in one or more of the wheel wells and, thereby cause the ice remover to remove ice from the road surface forward of the corresponding wheel. Clearing the ice allows the vehicle's tires to gain traction on the road surface and, thereby stops the skid. | 10-08-2015 |
20150310368 | ROAD MANAGEMENT EQUIPMENT CONTROL - A method includes a computing device receiving historical data for a portion of a road; the computing device receiving current data for road conditions using sensors; the computing device predicting future hazardous road conditions for the portion of the road using the received historical and current data; and the computing device scheduling road management actions for the portion of the road as a result of the predicted road conditions. | 10-29-2015 |
20160041851 | EXECUTING A COMMAND ON AN OPTIMAL SMART DEVICE - Executing a command on an optimal smart device. One aspect of the present invention provides a method for executing a command. The method includes: receiving a command at a plurality of smart devices; determining a score for each smart device of the plurality of smart devices; communicating the score between each smart device of the plurality of smart devices; comparing the score between each smart device of the plurality of smart devices; and executing the command at one smart device of the plurality of smart devices based on comparing the score between each smart device. | 02-11-2016 |
20160069840 | METHODS AND SYSTEMS TO IDENTIFY AND MANAGE RECYCLABLE MATERIALS - A method to identify and manage recyclable materials provides a recyclable material with a quartz crystal identification element configured to oscillate at a predetermined frequency associated with the recyclable material. A mobile device detects the oscillation frequency of the quartz crystal, identifies the recyclable material based on the detected oscillation frequency, and sends that information to a controller. | 03-10-2016 |
20160070903 | TIMING OF PASSWORD CHANGE REQUIREMENTS BASED ON AMBIENT INTELLIGENCE - A user's required password change is postponed according to context information determined to indicate that the current password change timing is at an inconvenient time for the user. A user is permitted to extend the use of an expired password when a pre-determined password validity period ends. | 03-10-2016 |
20160087978 | MULTI - LAYERED BIOMETRIC SECURITY - A method including a computer device receiving a first authentication input from at least one user to start a multi-layered security protocol; the computer device receiving secondary authentication inputs from the at least one user to continue the multi-layered security protocol to determine if a security protocol has been met, wherein the secondary authentication inputs include receiving a first feature input from the at least one user and receiving a second feature from the at least one user; and the computer device determining if the first and secondary authentication inputs pass or fail the multi-layered security protocol. | 03-24-2016 |
20160094611 | MANAGING REQUESTS TO A HIGH UTILIZATION WEBSITE - In an approach to managing requests to a high utilization website, one or more computer processors receive a first resource usage load status from a first server computer. The one or more computer processors receive a request for content on the first server computer from a client. The one or more computer processors determine whether the first resource usage load is above a pre-defined threshold. Responsive to determining the first resource usage load is above the pre-defined threshold, the one or more computer processors create a queue of a plurality of content requesters, wherein the client is one of the plurality of content requesters. The one or more computer processors establish a bidirectional communication channel with the client. | 03-31-2016 |
20160104360 | PAIRED PROXIMITY ALARM TAGS - A method includes pairing at least two tags and attaching each one of the at least two tags to objects; a computer device sensing the proximity of each tagged object; and the computer device issuing alerts depending on the sensed proximity of each tagged object, wherein a first alert is triggered when one of the tagged objects leaves a secured area without a corresponding paired tagged object. | 04-14-2016 |
Richard S. Nassar, San Mateo, CA US
Patent application number | Description | Published |
---|---|---|
20120131683 | UNIFIED ONLINE CONTENT MANAGER APPARATUSES, METHODS, AND SYSTEMS - Apparatuses, methods, and systems for transforming user identification information and user selection data inputs into a profile data output, a generated query output, search results output, and a secure home page with customized content. According to one embodiment, the method includes indexing disparately owned content via a multi-content owner spider indexing engine; generating a disparately owned content index from the indexing engine; receiving, by a first server, a request to access secure content through a network, the request including user identification information; automatically constructing a query based on the request without input from the user; providing the constructed query to the search engine and running the constructed query against the index; constructing a display by placing the results of the query sent from the search engine within a multi-source owner template interface; and providing the multi-source owner template interface to a requestor for display. | 05-24-2012 |
Roger A. Nassar, Arlington, MA US
Patent application number | Description | Published |
---|---|---|
20080206671 | Novel polymers and photoresist compositions - The invention relates to new polymers that comprise units that contain one or more photoacid generator groups and photoresists that contain the polymers. Preferred polymers of the invention are suitable for use in photoresists imaged at short wavelengths such as sub-250 nm or sub-200 nm, particularly 248 nm and 193 nm. | 08-28-2008 |
20110236823 | NOVEL POLYMERS AND PHOTORESIST COMPOSITIONS - The invention relates to new polymers that comprise units that contain one or more photoacid generator groups and photoresists that contain the polymers. Preferred polymers of the invention are suitable for use in photoresists imaged at short wavelengths such as sub-250 nm or sub-200 nm, particularly 248 nm and 193 nm. | 09-29-2011 |
Sayed A. Nassar, Northville, MI US
Patent application number | Description | Published |
---|---|---|
20140178120 | Mechanism For Rapid De-Coupling Of Load Bearing Structures - A de-coupling mechanism includes a link slidably received in a link aperture of a bracket. A pin is slidably received in a pin bore of the link and a receiving bore of the bracket. A first block is connected to the bracket and includes an initiator receiving passage in communication with the pin bore. An initiator is positioned in the initiator receiving passage and retained against a connecting passage edge and oppositely contacts an end face of a cap connected to the first block. A second block connected to the bracket includes a longitudinal channel having a channel diameter larger than a pin diameter so the pin is freely displaceable into the longitudinal channel. An end face of a retaining cap is connected to a second block end wall. The retaining cap includes a stepped portion having a step diameter smaller than the channel diameter and the pin diameter. | 06-26-2014 |
Suheil M. Nassar, Cary, NC US
Patent application number | Description | Published |
---|---|---|
20080300946 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING AN END-TO-END PROJECT MANAGEMENT SYSTEM - Methods, systems and computer program products for implementing an end-to-end integrated product development management system are provided. A method includes providing a user system with a link to a data source and an analysis tool via a user interface in response to a project opportunity selection for a proposed product. The method also includes receiving results of an analysis performed by the user system in response to implementing the analysis tool, and creating a project record for the project opportunity selection in response to determining an approval of the project opportunity selection. The method further includes creating a project plan by mapping data fields in the project record to corresponding data entries relating to a project phase, project task, project task tool, project task timetable, project task measurement, data source, and project team selected by the user system via the user interface. | 12-04-2008 |
Tamer Nassar, Bethel, CT US
Patent application number | Description | Published |
---|---|---|
20150253745 | Utility Consumption Advisor - An embodiment of the invention provides a method for a utility consumption advisor, wherein a target electricity consumption for a predefined time period is received with a user interface. User parameters are also received with the user interface, the user parameters including a list of electricity consumption items that may not be modified, a list of electricity consumption items that may be modified, and a range of modification for each of the listed electricity consumption items that may be modified. The user's electricity consumption history is determined; and, an electricity utilization plan is generated for the predefined time period with a processor. The electricity utilization plan is generated based on the target electricity consumption, the user parameters, and the user's electricity consumption history. The electricity utilization plan is implemented by wirelessly controlling the electricity consumption items that may be modified. | 09-10-2015 |
20150310368 | ROAD MANAGEMENT EQUIPMENT CONTROL - A method includes a computing device receiving historical data for a portion of a road; the computing device receiving current data for road conditions using sensors; the computing device predicting future hazardous road conditions for the portion of the road using the received historical and current data; and the computing device scheduling road management actions for the portion of the road as a result of the predicted road conditions. | 10-29-2015 |
20160041851 | EXECUTING A COMMAND ON AN OPTIMAL SMART DEVICE - Executing a command on an optimal smart device. One aspect of the present invention provides a method for executing a command. The method includes: receiving a command at a plurality of smart devices; determining a score for each smart device of the plurality of smart devices; communicating the score between each smart device of the plurality of smart devices; comparing the score between each smart device of the plurality of smart devices; and executing the command at one smart device of the plurality of smart devices based on comparing the score between each smart device. | 02-11-2016 |
20160104360 | PAIRED PROXIMITY ALARM TAGS - A method includes pairing at least two tags and attaching each one of the at least two tags to objects; a computer device sensing the proximity of each tagged object; and the computer device issuing alerts depending on the sensed proximity of each tagged object, wherein a first alert is triggered when one of the tagged objects leaves a secured area without a corresponding paired tagged object. | 04-14-2016 |
Tamer M. Nassar, Bethel, CT US
Patent application number | Description | Published |
---|---|---|
20150020176 | Using Personalized URL for Advanced Login Security - Techniques for advanced login security using personalized, user-specific urls are provided. In one aspect, a method for authenticating a user is provided. The method includes the following steps. A personalized login url and credentials (e.g., username and password) are stored for the user. Upon receipt of a login url from the user, it is verified whether the login url matches the personalized url stored for the user. If the login url matches the personalized url for the user, then the user is provided with a user-specific login page where the user can enter credentials, otherwise access is denied. The user is authenticated only if the credentials the user enters match the credentials stored for the user, otherwise denying access. | 01-15-2015 |
20150020178 | Using Personalized URL for Advanced Login Security - Techniques for advanced login security using personalized, user-specific urls are provided. In one aspect, a method for authenticating a user is provided. The method includes the following steps. A personalized login url and credentials (e.g., username and password) are stored for the user. Upon receipt of a login url from the user, it is verified whether the login url matches the personalized url stored for the user. If the login url matches the personalized url for the user, then the user is provided with a user-specific login page where the user can enter credentials, otherwise access is denied. The user is authenticated only if the credentials the user enters match the credentials stored for the user, otherwise denying access. | 01-15-2015 |
20150039361 | Techniques for Managing Snow Removal Equipment Leveraging Social Media - Techniques that leverage social media to proactively respond to inclement weather conditions such as snow that affect road conditions and, for example, coordinate snow removal from the roads are provided. In one aspect, a method for sharing road condition information is provided. The method includes the following steps. Data is collected from vehicles related to road conditions at various locations. The data is stored in an off-vehicle system. The data is processed to determine what type of maintenance activity is needed based on the road conditions. The maintenance activity and the locations are provided to dispatchers to enable routing of municipal vehicles to the locations to address the road conditions. A system for sharing road conditions is also provided. | 02-05-2015 |
20150206127 | Multiple-node supply chain price determination via mobile phone text message - In a hierarchical multiple-node supply chain, a commodity is sold a first time at a first end of the supply chain and is resold multiple times across the supply chain before being sold a final time at a second end of the supply chain opposite the first end. A user who is a buyer and/or a seller within the supply chain is interacted with by exchanging text messages with a mobile phone device of the user to provide the user with a current price of the commodity for a type of the user within the supply chain, and to receive from the user an actual price of the commodity in a current transaction in which the user was involved. The type of the user includes a node within the supply chain to which the user corresponds. | 07-23-2015 |
20150206236 | Multiple-node supply chain price determination via mobile phone text message - In a hierarchical multiple-node supply chain, a commodity is sold a first time at a first end of the supply chain and is resold multiple times across the supply chain before being sold a final time at a second end of the supply chain opposite the first end. A user who is a buyer and/or a seller within the supply chain is interacted with by exchanging text messages with a mobile phone device of the user to provide the user with a current price of the commodity for a type of the user within the supply chain, and to receive from the user an actual price of the commodity in a current transaction in which the user was involved. The type of the user includes a node within the supply chain to which the user corresponds. | 07-23-2015 |
Tamer M. Nassar, Yorktown Heights, NY US
Patent application number | Description | Published |
---|---|---|
20130283647 | AUTOMOTIVE VEHICLE SKID RECOVERY SYSTEM - Disclosed is a vehicle skid recovery system, which is able to accelerate skid recovery, when an automotive vehicle begins to skid as a result of ice accumulation on the road surface. The embodiments control operation of ice removers (e.g., blades or heaters), which are mounted within the wheel wells forward of the wheel, based on information received from the vehicle's outside temperature sensor and anti-lock braking system (ABS). When the temperature sensor indicates that the outside temperature is below a predetermined temperature (e.g., below freezing) and when the anti-lock braking system is activated as a result of detected skid, a controller activates the ice remover in one or more of the wheel wells and, thereby cause the ice remover to remove ice from the road surface forward of the corresponding wheel. Clearing the ice allows the vehicle's tires to gain traction on the road surface and, thereby stops the skid. | 10-31-2013 |
20150284921 | AUTOMOTIVE VEHICLE SKID RECOVERY SYSTEM - In a vehicle skid recovery system skid recovery can be accelerated when an automotive vehicle begins to skid as a result of ice accumulation on the road surface. The system can control operation of ice removers (e.g., blades or heaters), which are mounted within the wheel wells forward of the wheel, based on information received from the vehicle's outside temperature sensor and anti-lock braking system (ABS). When the temperature sensor indicates that the outside temperature is below a predetermined temperature and when the anti-lock braking system is activated as a result of detected skid, a controller activates the ice remover in one or more of the wheel wells and, thereby cause the ice remover to remove ice from the road surface forward of the corresponding wheel. Clearing the ice allows the vehicle's tires to gain traction on the road surface and, thereby stops the skid. | 10-08-2015 |