Aboujaoude
Emad Aboujaoude, Portland, OR US
Patent application number | Description | Published |
---|---|---|
20100263129 | Lower Extremity Surgical Positioning Device - The present inventive subject matter is the method of use as well as a device or fixture for positioning and manipulating a patient's lower extremity for surgical and diagnostic procedures where alignment is critical and minute adjustments may be required. Once firmly attached to the operating table, the device prevents the patient's extremity from moving after the physician has selected the precise position for the elected procedure. This is achieved by a combination of a fracture reduction plate, posts, shimming blocks and an articulating and rotating frame or cradle with an adjustable and lockable rack and gear configuration and pivot joints attached to a foot assembly which acts as a leg and foot splint. The cradle is attached to the patient via a series of adjustable straps preventing the extremity from moving independently of the cradle. | 10-21-2010 |
Emad S. Aboujaoude, Portland, OR US
Patent application number | Description | Published |
---|---|---|
20120318278 | Extremity Surgical Positioning Device - The present inventive subject matter is a device or fixture for positioning, adjusting, and stretching a patient's extremity for surgical procedures where alignment is critical and minute adjustments may be required. The device prevents the patient's extremity to move once the physician has selected the precise position for the elected procedure, using a combination of an articulating and rotating frame or support plates and support rings attached to the extremity surgical positioning system which acts as a limb splint that firmly attached to the surgical table. The support plates are attached to the patient via a series of adjustable straps preventing the extremity from moving independently of the support plate. A locking rack and gear configuration and a myriad of adjustable locking pivot points positioned along and within the outer/inner proximal tube and outer/inner distal tube to either lengthen or rotate various portions of the extremity. | 12-20-2012 |
Jodi F. Aboujaoude, West Henrietta, NY US
Patent application number | Description | Published |
---|---|---|
20130061816 | Leak-Proof Pet Exercise Device and Method for Making the Same - A leak-proof pet exercise device and method for making the same is provided. The device comprises outer and inner shells spaced apart to form a retaining chamber therebetween. The outer shell includes external and internal surfaces including at least one first aperture defined therein. The inner shell includes external and internal surfaces including at least one second aperture defined therein. The internal surface of the inner shell defines an interior compartment for the animal. The outer shell includes a first wall extending around the periphery of the at least one first aperture and from the internal surface of the outer shell toward the external surface of the inner shell. At least a portion of the first wall is spaced a distance from the external surface of the inner shell. The inner shell does not include a wall extending around the periphery of the at least one second aperture. | 03-14-2013 |
Ramzi Aboujaoude, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090161743 | INTEGRATED COMPACT EYE PATTERN ANALYZER FOR NEXT GENERATION NETWORKS - A portable hand-held battery powered eye pattern analyzer is provided that can analyze signal quality of a high speed digital communication network. The system is 10 times smaller in volume and 4 times lighter than the bench-top equivalent instruments. The system includes a housing containing a display, keypad, power supply, battery pack, and RF sampler board along with connections for electrical inputs, optical inputs, clock signal inputs, and clock recovery signal inputs. The sampler circuit board can support connections, such as a USB plug for attachment to a personal computer. The RF sampler board contains the following elements: (1) A dual sampler for two-channel electrical inputs. (2) An Optical-to-Electrical O/E conversion module. (3) A clock recovery unit (CRU) module to recover the clock from the electrical or optical pulse pattern signal. (4) A trigger circuit that accepts an input clock and uses that clock to trigger the sampling of the data signal. (5) A PRBS generator that could be used as stimulus for testing high speed devices, and (6) A controller such as an FPGA that processes the sampled signals and provides statistical analysis along with eye patterns to a display as controlled using the keyboard. | 06-25-2009 |
Roger Aboujaoude, Asbury Park, NJ US
Patent application number | Description | Published |
---|---|---|
20090022281 | Methods and Apparatus for Directory Enabled Network Services - Methods and apparatus for controlling the rules of engagement between a telecommunication carrier and a customer whose network is managed by the telecommunication carrier are provided. A computer system interviews a customer by determining a set of specific questions tailored to the customer's needs, the set of specific questions based on previously stored customer information. Answers to the asked questions are stored as an entry in a master user profile. The master user profile defines the rules of engagement of how the telecommunication carrier shall operate on behalf of the customer on each subsequent transaction without the need of the customer's direct involvement on each element of the transaction. The entry has an associated event and a corresponding action to perform in response to the occurrence of the associated event. Upon receipt of an event occurrence, the corresponding action which includes interoperating with existing telecommunication carrier systems is performed. | 01-22-2009 |
Roger Aboujaoude, Ocean Township, NJ US
Patent application number | Description | Published |
---|---|---|
20100114786 | WORKLIST INTEGRATION OF LOGICAL AND PHYSICAL TASKS - In accordance with a method of managing work flow, tasks associated with a telecommunications service order from a plurality of worklists of computing source systems are merged into a merged worklist. Each computing source system maintains a respective worklist that includes a task associated with the service order. The tasks of the service order in the merged worklist are prioritized into a prioritized sequence to be completed on a work-when-ready basis. An error in completion of a task associated with a worklist of a source system is detected and a new task to correct the detected error is generated. Further, the worklist of the source system associated with the detected error is updated with the new task and the new task is integrated into a proper position of the prioritized sequence in the merged worklist in accordance with the work-when-ready basis. | 05-06-2010 |
20100153248 | Portable Service Agnostic Access - Methods are disclosed which relate to providing and billing for a service through a network regardless of the type of transport used to access the network. A customer who wishes to have a certain service first selects a transport. Transport options can be limited by the customer's location and bandwidth needs, but not by the service the customer desires. Once a transport option is selected it is installed and the customer receives the service through the transport by accessing a network. If a customer already has a transport and access to a network but desires another service, then the desired service can be simply added onto the existing access and billed accordingly. The transport type and service are calculated independently for billing purposes. | 06-17-2010 |
Roger Aboujaoude, Ocean Twp, NJ US
Patent application number | Description | Published |
---|---|---|
20120124197 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING NETWORK DATA FLOW ANALYSIS AND ROUTING - Data flow analysis and routing processes include monitoring a process of a workflow, intercepting data traffic for data entered for the process, and identifying a communication path of a destination location for the data traffic. The method also includes verifying compliance of the process by applying business rules to the data, and notifying an entity of any non-compliance identified from the verification. | 05-17-2012 |
20130014283 | DATABASE APPLICATION SECURITY - A method allows access to a set of secure databases and database applications over an untrusted network without replicating the secure database. The method involves authenticating a user using a first authentication application. When the user is verified, then the user's credentials are directed to a second authentication application associated with a secure database based on a first set of user settings retrieved for the user. The second authentication application, based on a second set of user settings, grants the user access to the secure database and database applications associated with the secure database. | 01-10-2013 |