Patent application number | Description | Published |
20090063361 | Risk and Reward Assessment Mechanism - A data driven and forward looking risk and reward appetite methodology for consumer and small business is described. The methodology includes customer segmentation to create pools of homogeneous assets in terms of revenue and loss characteristics, forward looking simulation to forecast expected values and volatilities of revenue and loss, and risk and reward optimization of the portfolio. One methodology used for modeling revenue and loss is a generalized additive effect decomposition model to fit historical data. Based on the model, a segmentation procedure is performed, which allows for creation of groups of customers with similar revenue and loss characteristics. An estimation procedure for the model is developed and a simulation strategy to forecast and simulate revenue and loss volatility is developed. Efficient frontier curves of risk (e.g., return volatility) and reward (e.g., expected return) are created for the current portfolio under various economic scenarios. | 03-05-2009 |
20100293107 | Risk and Reward Assessment Mechanism - A data driven and forward looking risk and reward appetite methodology for consumer and small business is described. The methodology includes customer segmentation to create pools of homogeneous assets in terms of revenue and loss characteristics, forward looking simulation to forecast expected values and volatilities of revenue and loss, and risk and reward optimization of the portfolio. One methodology used for modeling revenue and loss is a generalized additive effect decomposition model to fit historical data. Based on the model, a segmentation procedure is performed, which allows for creation of groups of customers with similar revenue and loss characteristics. An estimation procedure for the model is developed and a simulation strategy to forecast and simulate revenue and loss volatility is developed. Efficient frontier curves of risk (e.g., return volatility) and reward (e.g., expected return) are created for the current portfolio under various economic scenarios. | 11-18-2010 |
20130073481 | Risk and Reward Assessment Mechanism - A data driven and forward looking risk and reward appetite methodology for consumer and small business is described. The methodology includes account level historical data collection for customers associated with accounts as part of a portfolio. The account level historical data is segmented into groups of customers with similar revenues and loss characteristics. Segmented data is decomposed into seasoning, vintage, and cycle effects. Statistical clusters are formed based upon the data and effects. A simulation is applied to the statistical clusters and prediction data is generated. A simulation strategy to forecast and simulate revenue and loss volatility is developed. Efficient frontier curves of risk (e.g., return volatility) and reward (e.g., expected return) are created for the current portfolio under various economic scenarios. | 03-21-2013 |
Patent application number | Description | Published |
20090105143 | HIV FUSION INHIBITOR PEPTIDES WITH IMPROVED BIOLOGICAL PROPERTIES - Provided is an HIV fusion inhibitor peptide having an amino acid sequence of any one of SEQ ID NO:9, SEQ ID NO:10, SEQ ID NO:11, SEQ ID NO:12, SEQ ID NO:13, SEQ ID NO:14, or SEQ ID NO:15; and provided is a pharmaceutical composition comprising a HIV fusion inhibitor peptide and one or more of a pharmaceutically acceptable carrier and macromolecular carrier, and uses and methods of treatment provided by these compositions. | 04-23-2009 |
20100016225 | CONJUGATES COMPRISED OF POLYMER AND HIV gp-41-DERIVED PEPTIDES AND THEIR USE IN THERAPY - Provided are conjugates comprising a polymer having operably bound thereto no less than two molecules of synthetic peptide derived from HIV gp41; methods of using these conjugates to inhibit transmission of HIV to a target cell by adding an amount of effective to inhibit infection of the cell by the virus; and methods of producing the conjugates by operably binding each molecule of synthetic peptide, via a reactive functionality, to the polymer. | 01-21-2010 |
20100261876 | NOVEL METHODS OF SYNTHESIS FOR THERAPEUTIC ANTIVIRAL PEPTIDES - Provided herein are methods for synthesis of peptides. In particular, provided herein are methods of synthesis for therapeutic antiviral peptides. | 10-14-2010 |
20120040891 | HIV FUSION INHIBITOR PEPTIDES WITH IMPROVED BIOLOGICAL PROPERTIES - Provided is an HIV fusion inhibitor peptide having an amino acid sequence of any one of SEQ ID NO:9, SEQ ID NO:10, SEQ ID NO:11, SEQ ID NO:12, SEQ ID NO:13, SEQ ID NO:14, or SEQ ID NO:15; and provided is a pharmaceutical composition comprising a HIV fusion inhibitor peptide and one or more of a pharmaceutically acceptable carrier and macromolecular carrier, and uses and methods of treatment provided by these compositions. | 02-16-2012 |
Patent application number | Description | Published |
20130047175 | GROUP RECOGNITION AND PROFILING - A system can include storage for identification data for individuals; an interface configured to receive image data; recognition circuitry configured to recognize individuals using received image data and stored identification data; grouping circuitry configured to define groups based on recognized individuals; assignment circuitry configured to assign media consumption preferences to defined groups; and output circuitry configured to output preferred media information based on assigned media consumption preferences of a defined group of recognized individuals. Various other apparatuses, systems, methods, etc., are also disclosed. | 02-21-2013 |
20130179870 | UPDATING FIRMWARE IN A HYBRID COMPUTING ENVIRONMENT - Systems, methods and products directed toward facilitating firmware updates in a hybrid computing environment. One aspect includes providing a primary operating environment and a secondary operating environment in an information handling device; downloading one or more firmware update packages appropriate for the secondary operating environment to the primary operating environment; and executing a firmware update tool from the primary operating environment, the firmware update tool being configured to install the one or more firmware update packages on the secondary operating environment. Other embodiments are described herein. | 07-11-2013 |
20140164307 | PREDICTING WEB PAGE - For predicting web pages, a calculation module predicts a web page from a current context and displays the predicted web page. | 06-12-2014 |
20140194102 | INTELLIGENT MUTING OF A MOBILE DEVICE - A device includes a transceiver, a microphone, a sensor, and a controller coupled to receive signals from the sensor and to place the device into a mute mode when the signals from the sensor are indicative of a user action to reduce transmission of the user's voice. | 07-10-2014 |
20140244239 | IDENTIFYING WORDS FOR A CONTEXT - For identifying words for a context, a monitor module monitors first communications at a digital processing system and determines usage frequencies of a plurality of words in one or more contexts. An identity module identifies a first word in response to a usage frequency for the first word exceeding a use threshold. | 08-28-2014 |
20140298246 | AUTOMATIC DISPLAY PARTITIONING BASED ON USER NUMBER AND ORIENTATION - A method, program product, and apparatus are disclosed for automatic display partitioning based on user number and orientation. In one embodiment, the apparatus includes a detection module that detects a plurality of users, a partitioning module that creates a plurality of display-screen partitions on a display screen, and a positioning module that orients one of the display-screen partitions to correspond to the position of one of the device users in relation to the display screen. | 10-02-2014 |
20150030179 | PRESERVING PHASE SHIFT IN SPATIAL FILTERING - For preserving phase shift in spatial filtering is disclosed, an electronic device includes a microphone array. A filtering module spatially filters a plurality of received audio signals from the microphone array to increase the signal-to-noise ratio in one or more corresponding output audio signals. A phase module preserves a phase shift of at least one received audio signal in the corresponding output audio signal. | 01-29-2015 |
20150074524 | MANAGEMENT OF VIRTUAL ASSISTANT ACTION ITEMS - An aspect provides a method, including: operating an audio receiver and a memory of an information handling device to store audio; receiving input activating a virtual assistant of the information handling device; and after activation of the virtual assistant, processing the audio stored to identify one or more actionable items for the virtual assistant. Other aspects are described and claimed. | 03-12-2015 |
20150085615 | MOTION MODIFIED STEERING VECTOR - For a motion modified steering vector, a motion module modifies a prior steering vector with a motion vector. A steering module spatially filters audio signals using the modified steering vector. | 03-26-2015 |
20150140972 | FILTERING AN AUDIO SIGNAL FOR A NON-REAL-TIME RECIPIENT - For filtering an audio signal for a non-real-time recipient, a signal module may detect communication of an audio signal to the non-real-time recipient. A management module may filter the audio signal with a high-latency audio filter. | 05-21-2015 |
20150277745 | COMPUTER INPUT USING HAND DRAWN SYMBOLS - According to one example embodiment there is disclosed a system having a touch sensitive component responsive to a pen-based input includes a memory or storage device storing a symbol library defining at least one symbol representative of at least one logograph, pictograph or ideogram, the symbol library information specifying a topology structure defining sub-regions that symbol elements can appear in the at least one logograph, pictograph or ideogram, and a processor operatively connected to the touch sensitive component and the memory or storage device and operative to execute program instructions to interpret hand drawn indicia to identify at least one symbol based on recognizing at least one symbol element and its respective position in a sub-region. | 10-01-2015 |
20150310267 | AUTOMATED HANDWRITING INPUT FOR ENTRY FIELDS - An embodiment provides a method, including: detecting, at a surface of a device accepting handwriting input, a location of the display surface associated with initiation of a handwriting input; determining, using a processor, a location of an entry field in a document rendered on a display surface, the location of the entry field being associated with a display surface location; determining, using a processor, a distance between the location of the surface associated with initiation of the handwriting input and the location of the entry field; and automatically inserting input, based on the handwriting input, into the entry field after determining the distance is less than a threshold value. Other aspects are described and claimed. | 10-29-2015 |
20150347364 | HIGHLIGHTING INPUT AREA BASED ON USER INPUT - In one aspect, a device includes a touch-enabled display, a processor, and a memory accessible to the processor. The memory bears instructions executable by the processor to present at least a first input area at a first location on the touch-enabled display and receive first input to the touch-enabled display. The instructions are also executable to determine whether at least the first input is to be represented at the first input area, and highlight the first input area at least in part in response to a determination that at least the first input is to be represented at the first input area. | 12-03-2015 |
20150348510 | PRESENTATION OF REPRESENTATIONS OF INPUT WITH CONTOURS HAVING A WIDTH BASED ON THE SIZE OF THE INPUT - In one aspect, a device includes a touch-enabled display, a processor, and a memory accessible to the processor. The memory bears instructions executable by the processor to receive input to the touch-enabled display and present a representation of the input on the touch-enabled display. The representation is presented with the width of one or more contours of the representation being correlated to the size of at least a portion of the input to the touch-enabled display. | 12-03-2015 |
20160042165 | SECURE HANDWRITING INPUT FOR PASSWORD FIELDS - For secure handwriting input for password fields, an apparatus for using a tone indicator to identify language in text recognition is disclosed. The apparatus may include a processor, a handwriting input unit operatively coupled to the processor, a display operatively coupled to the processor, a handwriting element module that identifies a handwriting element from handwriting input, an input replication module that controls the display to present the handwriting element, and a privacy module that controls the display to obscure the handwriting element in response to a predetermined trigger event. Obscuring the handwriting element may include removing the handwriting element, rendering transparent the handwriting element, replacing the handwriting element and an area surrounding the handwriting element with a colored area, and/or replacing the handwriting element with an anonymizing symbol. A method and computer program product also perform the functions of the apparatus. | 02-11-2016 |
20160054818 | PRESENTING USER INTERFACE BASED ON LOCATION OF INPUT FROM BODY PART - In one aspect, a device includes a touch-enabled display, a processor, and a memory accessible to the processor. The memory bears instructions executable by the processor to receive first input from a body part of a user at a first location of the touch-enabled display and receive second input from a stylus at a second location of the touch-enabled display, where the second input is identified as a request to present a window on the touch-enabled display. The instructions are also executable to, at least in part based on the first location and the second location, present the window on the touch-enabled display at a third location on the touch-enabled display, where the third location is different from the first and second locations. | 02-25-2016 |
20160078847 | REFLECTING HANDWRITING ATTRIBUTES IN TYPOGRAPHIC CHARACTERS - For reflecting handwriting attributes in typographic characters, code parses calligraphic data from digitized handwriting on the touch screen display. The calligraphic data includes a character stroke slant and a character pixel matrix. In addition, the code renders the digitized handwriting with a render font selected in response to one or more of the character stroke slant and the character pixel matrix. | 03-17-2016 |
Patent application number | Description | Published |
20080301268 | Method and Apparatus for Configuring and Modeling Server Information in an Enterprise Tooling Environment - A computer implemented method, an apparatus, and a computer usable program product are provided for configuring and modeling server connection and deployment information in an enterprise tooling environment. A software model is provided that comprises a connections object, which includes a plurality of connection objects and deploy spec objects. Each of the connection objects is specific to a backend server type. A deploy controller is provided at run time to examine the connections object for a connection object. A backend resource manager is loaded for a specific application server. If a connection object is present, the backend resource manager loads a connection interpreter, which transforms development time connection information in the connection object to the run time connection information in corresponding deploy spec object and connection factory spec object. The backend resource manager then writes the deployment information to the configurations files of the application server. | 12-04-2008 |
20090055482 | System and Method to Promote Calendar Event Awareness in Instant Messaging Products - A method, system and computer-usable medium for providing a current availability status of a user to receive an instant messaging system (IMS) communication. Electronic calendar information to detect the next scheduled event for the selected IMS recipient. The time remaining before the scheduled event begins is determined. The remaining time and other predetermined information about the scheduled event is used to generate a current availability status of the IMS recipient. The current availability status is provided to the IMS sender prior to initiating an IMS session. The IMS sender and receiver are notified when the time remaining before the start of the event expires. | 02-26-2009 |
20090063499 | REMOVING WEB APPLICATION FLICKER USING AJAX AND PAGE TEMPLATES - A web page is rendered under the control of a client. A content server divides a webpage in multiple empty partitions. Each of the partitions has an associated pointer to data that can populate the partition. When data changes, the content server transmits pointers for all data for all of the partitions, including new pointers to new changed data. If an old pointer to old data is the same as a new pointer to the new data, the client ignores the new pointer. If the new pointer and the old pointer are different, then the client uses the new pointer to obtain the new data for that particular partition. | 03-05-2009 |
20100125827 | DEVELOPING SOFTWARE CODE USING PARAMETERIZED ANNOTATIONS - The present invention provides the ability to use annotations to represent current user configuration concerning a particular “domain model,” which allows for round-trip support as well as choosing the specific implementation technology at a later point. The present invention provides a preview capability which allows users to dynamically expand the annotation to preview what will be generated based on the current configuration information. The present invention generates software code based on the user configuration input and packages the generated software code for deployment without allowing a user to edit the generated software code. | 05-20-2010 |
20120174078 | SMART CACHE FOR A SERVER TEST ENVIRONMENT IN AN APPLICATION DEVELOPMENT TOOL - Embodiments of the present invention provide a method, system and computer program product for a smart cache for server testing in an application development tool. In an embodiment of the invention, method of smart caching of service data during application testing in a development tool for a service invoking application is provided. The method includes loading source code for a computer program into a development tool executing in memory of a computing system. The method further includes executing the source code from the development tool. In this regard, the execution of the source code invokes a service responsive to a directive to invoke the service disposed in the source code. Finally, the method includes invoking the service in a container instance in response to a first invocation of the service from the computer program. However, a data set for the service is located in a cache and returned the data set to the computer program in lieu of invoking the service in the container instance for all other invocations of the service. | 07-05-2012 |
20130069947 | CALCULATING DISPLAY SETTINGS AND ACCURATELY RENDERING AN OBJECT ON A DISPLAY - In one embodiment, a system for displaying parameters of an original object on a display is described. The system includes a user interface that displays data. The system further includes a system for calculating pixels per distance and displaying parameters of an image on the display device. The system calculates the pixels per distance ratio by displaying a width and height parameter on the display and adjusting the width and height parameter to correspond to a standard sized object. The system calculates the pixels per distance ratio based on the adjusted width and height parameters. The system is further configured to receive an image from a provider to for display. At least one parameter of the image from the provider as displayed corresponds to at least one parameter of the original object. The corresponding parameters of the image and original object share approximately the same geometric dimensions. | 03-21-2013 |
20130262977 | Controlling Browser Preferences with a Rich Internet Application - Methods and systems may involve transferring application information from a rich Internet application (RIA) to a browser extension via a common protocol node, and using the browser extension to change a browser preference in accordance with the application information. In one example, the common protocol node is a document object model (DOM) node that is common to all Internet applications using a communication protocol associated with the DOM node. | 10-03-2013 |
20140006539 | CACHE CONTROL FOR WEB APPLICATION RESOURCES | 01-02-2014 |
20140006622 | CACHE CONTROL FOR WEB APPLICATION RESOURCES | 01-02-2014 |
20150222565 | CACHE CONTROL FOR WEB APPLICATION RESOURCES - Cache control for Web application resources can include receiving a cache manifest for a Web application, wherein the cache manifest specifies a Web page of the Web application, and determining, using a processor, a resource that is required by the Web page. A closure collection can be built that includes the resource required by the Web page. A reference to the resource can be written to the cache manifest. | 08-06-2015 |
20150222724 | CACHE CONTROL FOR WEB APPLICATION RESOURCES - Cache control for Web application resources can include receiving a cache manifest for a Web application, wherein the cache manifest specifies a Web page of the Web application, and determining, using a processor, a resource that is required by the Web page. A closure collection can be built that includes the resource required by the Web page. A reference to the resource can be written to the cache manifest. | 08-06-2015 |
Patent application number | Description | Published |
20090150312 | Systems And Methods For Analyzing Disparate Treatment In Financial Transactions - Systems and methods are provided for analyzing disparate treatment in financial transactions. Data processing software instructions may be used to process lending-related data to identify a plurality of primary factors and one or more secondary factors for use making a lending-related decision. Model facilitation software instructions may be used to receive one or more relationships between the primary factors and the one or more secondary factors, wherein the relationships define criteria in which one or more positive secondary factors will compensate for a negative primary factor in making the lending-related decision. Model generation software instructions may be used to analyze lending-related data based on the primary factors, secondary factors and the one or more relationships. | 06-11-2009 |
20090299896 | Computer-Implemented Systems And Methods For Integrated Model Validation For Compliance And Credit Risk - Computer-implemented systems and methods are provided for model validation of a model for compliance and credit risk. Model input, output, and processing validation areas are contained on a computer system. A handle data structure connects the model validation areas with handles that comprise a unified metric. A handle represents combinations of covariate patterns and describes the joint distribution of risk characteristics. | 12-03-2009 |
20090299911 | Computer-Implemented Systems And Methods For Loan Evaluation Using A Credit Assessment Framework - Systems and methods are provided for evaluating loan applications. A computer environment can include a loan evaluation system which operates on a processor-based system and which evaluates loan applications. A credit assessment framework is also provided for operating on the processor-based system and has a data connection to the loan evaluation system. The credit assessment framework generates a categorization of credit risk for each of the loan applications to be evaluated. | 12-03-2009 |
20110125671 | Systems And Methods For Underlying Asset Risk Monitoring For Investment Securities - Systems and methods are provided for evaluating asset risks using categories of primary loan underwriting factors, which are associated with a pre-selected number of variables. An initial handle-based tree data structure is created in a computer memory based upon the primary loan underwriting factors associated with a loan, where the initial handle-based tree data structure includes a plurality of handle cells that segment a population of loans according to values of the pre-selected variables. The depth of the initial handle-based tree data structure is the number of variables associated with the primary loan underwriting factors, and a branch of the initial handle-based tree data structure is based on a value of one of the pre-selected variables. The initial handle-based tree data structure is modified by combining handle cells which contain least significant splits. A rank ordering of the modified handle-based tree data structure is performed, and the rank ordered handle-based tree data structure is used to segment portfolio data. | 05-26-2011 |
20120296806 | Computer-Implemented Risk Evaluation Systems And Methods - Systems and methods are provided for evaluating risks associated with alternative strategies for assessing an entity with respect to a predetermined objective. A system includes an action table that contains a plurality of possible actions that can be taken with respect to the predetermined objective for various entity profiles. One or more statistical data stores are configured to contain risk amounts associated with each entity profile, where the one or more statistical data stores are configured to contain inferred percentage distribution of applicants associated with each entity profile. One or more profile identification data stores contain entity identification information for use in determining an action for the entity. One or more improvement data stores provide an indication in the improvement in risk based upon a change in one or more characteristics for an entity profile. | 11-22-2012 |
20130282556 | Systems and Methods for Analyzing Disparate Treatment in Financial Transactions - Systems and methods are provided for analyzing disparate treatment in financial transactions. Data processing software instructions may be used to process lending-related data to identify a plurality of primary factors and one or more secondary factors for use making a lending-related decision. Model facilitation software instructions may be used to receive one or more relationships between the primary factors and the one or more secondary factors, wherein the relationships define criteria in which one or more positive secondary factors will compensate for a negative primary factor in making the lending-related decision. Model generation software instructions may be used to analyze lending-related data based on the primary factors, secondary factors and the one or more relationships. | 10-24-2013 |
Patent application number | Description | Published |
20080316028 | SECURITY DEVICE WITH PERIMETER ALARM - A security device for attachment to an article to deter theft has a housing containing an alarm system including an audible alarm speaker. The alarm system includes a conductor located within the housing which forms a loop that extends at least partially about the alarm speaker or about the periphery of the housing. The conductor which can be an electrical conductor, fiber optic conductor, light pipe, etc., when severed by a thief will actuate the audible alarm. In another embodiment, the conductor forms a loop about a simulated speaker grille formed in the housing to prevent tampering, wherein the audible alarm is located in the housing remote from the simulated speaker grille. | 12-25-2008 |
20090057244 | Merchandise display with time delay mechanism - A merchandise display system for displaying items of merchandise on a support has vertically spaced first and second rods extending outwardly from the support. A time delay mechanism is mounted on the upper rod and includes a pair of pivotally mounted plates which are selectively moveable into and out of blocking engagement with the lower plate on which the items of merchandise are slidably supported. An item of merchandise is moveable past the forwardmost plate from a space between the plates for removal from a free end of the lower rod while the rearward plate prevents movement of another item of merchandise into the intervening space until the forward plate moves to the blocking position and the rear plate moves to an unblocking position. A magnetically actuated lock mechanism locks the rear plate in an adjusted linear position with respect to the front plate to adjust the intervening space. | 03-05-2009 |
20090095695 | MERCHANDISE DISPLAY HOOK HAVING INTERLOCKING TIME DELAY ARMS - A display hook for supporting items of merchandise includes a rod assembly and a pair of mechanically interlocked time delay arms medially disposed on the rod assembly. The time delay arms are sequentially movable to permit a potential purchaser to manipulate an item beyond the time delay arms for removal from the display hook. The time delay arms include a guide tube slidingly disposed on the rod assembly, a first arm rotatably mounted on the guide tube and a second arm spaced outwardly from the first arm and fixedly mounted on the guide tube. The first arm is spaced-apart from the second arm sufficiently to permit at least one of the items to be disposed between the arms. The first arm has a circumferentially extending groove and the guide tube has a key that cooperates with the groove to permit limited rotation between the guide tube and the first arm. | 04-16-2009 |
20090288460 | Cable wrap security device - A security device includes a plurality of cables which are securable about an item of merchandise with a lockable cable-linking member and a cable-tightening mechanism each connected to the cables in a spaced apart manner. The cable-linking member may include a key member for unlocking the tightening mechanism. The tightening mechanism includes an internal spool and other internal members some of which are related to the locking and unlocking of the tightening mechanism. The tightening mechanism carries sense loops which typically include the cables and which if compromised actuate an onboard audible alarm. The device is configured to sound a security gate alarm upon passing through the gate and upon simply reaching a certain distance from the gate. The tightening mechanism may include a flip-up handle for rotating the spool to tighten the cable. | 11-26-2009 |
20100077813 | SECURITY CONTAINER WITH REARWARD FACING LOCK - A security container for retaining an item of merchandise therein; said security container comprising a base, a lid, a slider within the lid, a lid hole, a slider tab extending from the slider through the lid hole, and a locking mechanism unlocked through magnetic manipulation. The slider tab is located proximate the hinged side of the lid. As a user positions a key to magnetically unlock the locking mechanism, a protrusion on the key simultaneously pushes the slider tab which unlocks internal L-shaped lock tabs from hook tabs. The slider tab is located on the hinged side of the lid for aesthetic as well as safety purposes. By hiding the security features, potential customers focus on the product within the box. Likewise, a casual thief observing from the front and sides of the container is presented with no immediate means for entry. Thus, the invention provides a more secure container for displaying upscale merchandise. | 04-01-2010 |
20110100992 | SECURITY CONTAINER WITH REARWARD FACING LOCK - A security container for retaining an item of merchandise. The security container includes a base, a lid, a slider within the lid, a lid hole, a slider tab extending from the slider through the lid hole, and a locking mechanism. The slider tab is located proximate the hinged side of the lid. As a user positions a key to magnetically unlock the locking mechanism, a protrusion on the key simultaneously pushes the slider tab which unlocks internal L-shaped lock tabs from hook tabs. The slider tab is located on the hinged side of the lid for aesthetic as well as safety purposes. By hiding the security features, potential customers focus on the product within the box. Likewise, a casual thief observing from the front and sides of the container is presented with no immediate means for entry. Thus, the invention provides a more secure container for displaying upscale merchandise. | 05-05-2011 |
20110219828 | SECURITY DEVICE - A security may include a base that defines an aperture or opening configured for receiving at least a portion of an object to be secured. The base may support a capture member that is configured to move between a capture position and a release position. The security device may further include a driving member that is configured to move between a first position and a second position and may engage the capture member. When the driving member is moved from the first position to the second position it may urge the capture member from the release position to the capture position. The capture member may be configured to secure the object within the aperture when the capture member is in the capture position. The security device may further comprise a locking member may be configured to releasably engage the driving member to prevent movement of the driving member from the second position to the first position. | 09-15-2011 |
20120151974 | SECURITY DEVICE - An anti-theft security device is particularly useful with bottles and is typically secured to a bottle neck. The device may carry an onboard alarm. The device typically includes a catch member which engages the bottle neck to secure the device to the bottle and a blocking structure to help block access to the catch member. | 06-21-2012 |
20120152883 | SECURITY DEVICE - An anti-theft security device is particularly useful with bottles and is typically secured to a bottle neck. The device may carry an onboard alarm. The device typically includes a catch member which engages the bottle neck to secure the device to the bottle and a blocking structure to help block access to the catch member. | 06-21-2012 |
20120168398 | SECURITY DEVICE - An anti-theft security device is particularly useful with bottles and is typically secured to a bottle neck. The device may carry an onboard alarm. The device typically includes a catch member which engages the bottle neck to secure the device to the bottle and a blocking structure to help block access to the catch member. | 07-05-2012 |
20120223838 | CABLE WRAP SECURITY DEVICE - A security device may include a spool, locking mechanism, button, plug, and latch. The spool is configured to either wind or unwind a cable for wrapping around an object. The locking mechanism is configured to partially lock the spool. The button may be used to move the locking mechanism between locked and unlocked positions. The button may be blocked by inserting a plug into a housing of the device such that the button can not be activated to unlock the spool. The plug may be secured to the housing through the latch that prevents the unauthorized removal of the plug. For an enhanced locking feature, the latch and the plug may be configured to require at least two forces to move the latch and free the plug. The spool, locking mechanism, and button may be stacked along a common axis to provide a more compacted design. | 09-06-2012 |
20140318192 | CABLE WRAP SECURITY DEVICE - A security device may include a spool, locking mechanism, button, plug, and latch. The spool is configured to either wind or unwind a cable for wrapping around an object. The locking mechanism is configured to partially lock the spool. The button may be used to move the locking mechanism between locked and unlocked positions. The button may be blocked by inserting a plug into a housing of the device such that the button cannot be activated to unlock the spool. The plug may be secured to the housing through the latch that prevents the unauthorized removal of the plug. For an enhanced locking feature, the latch and the plug may be configured to require at least two forces to move the latch and free the plug. The spool, locking mechanism, and button may be stacked along a common axis to provide a more compacted design. | 10-30-2014 |
Patent application number | Description | Published |
20140372090 | INCREMENTAL RESPONSE MODELING - A method of selecting a one-class support vector machine (SVM) model for incremental response modeling is provided. Exposure group data generated from first responses by an exposure group receiving a request to respond is received. Control group data generated from second responses by a control group not receiving the request to respond is received. A response is either positive or negative. A one-class SVM model is defined using the positive responses in the control group data and an upper bound parameter value. The defined one-class SVM model is executed with the identified positive responses from the exposure group data. An error value is determined based on execution of the defined one-class SVM model. A final one-class SVM model is selected by validating the defined one-class SVM model using the determined error value. | 12-18-2014 |
20150269241 | TIME SERIES CLUSTERING - A method of transforming time series data to cluster data is provided. Time series data including a plurality of time series is received. A distance between a first time series of the plurality of time series and each of a remaining set of time series of the plurality of time series is computed pairwise between each of the remaining set of time series of the plurality of time series and the first time series. The computed values of the distance are sorted in increasing value. Gap width values are computed as a difference between successive pairs of the sorted, computed values. Whether a cluster including the received time series data is uniform is determined based on the computed gap width values. Cluster data including the first time series and the remaining set of time series assigned to the cluster is output when the cluster is determined to be uniform. | 09-24-2015 |
20150324398 | CONTINGENCY TABLE GENERATION - A method of creating a contingency table is provided. Whether or not a variable level list exists for a second variable in tree data is determined. When the variable level list exists for the second variable in the tree data, a first node memory structure is determined for the second variable from the variable level list, a first value of a first variable is determined using a first observation indicator and the tree data, and a first counter value is added to the contingency table in association with the first value of the first variable and a first value of the second variable. The first node memory structure includes the first value indicator, the first counter value, and the first observation indicator. The first value indicator indicates a first value of the second variable. | 11-12-2015 |
20150324403 | DATA STRUCTURE SUPPORTING CONTINGENCY TABLE GENERATION - A method of converting data to tree data is provided. A first node memory structure that includes a first value indicator, a first counter value, and a first observation indicator is initialized for a first variable. The first value indicator is initialized with a first value of the first variable selected from first observation data, and the first observation indicator is initialized with a first indicator that indicates the first observation data. The first value of the first variable is compared to a second value of the first variable. The first counter value included in the first node memory structure is incremented when the first value of the first variable matches the second value of the first variable. Corresponding values of second observation data are compared to the identified values from first observation data when the first value of the first variable matches the second value of the first variable. A next observation is read from the data when the identified values match the corresponding values. The tree data is output after a last observation of the data is processed. | 11-12-2015 |
Patent application number | Description | Published |
20110166541 | ADJUSTABLE SOLID PARTICLE APPLICATION SYSTEM - An application system for applying a solid particle includes an injector housing having a material inlet, a gas inlet, and a material outlet, and an occluder moveably disposed within the injector housing between the gas inlet and the material outlet. The injector housing and the occluder define there between at least one adjustable aperture downstream of the material inlet and in fluid communication with the gas inlet and the material outlet. The aperture has a first open area with the occluder in a first position and a second open area with the occluder in a second position, the second open area being different than the first open area. The system also includes a nozzle having a nozzle inlet coupled to the material outlet and a nozzle outlet, the inlet having a circular cross-section and the outlet having a rectangular cross-section. | 07-07-2011 |
20110223486 | BIAXIALLY ORIENTED POROUS MEMBRANES, COMPOSITES, AND METHODS OF MANUFACTURE AND USE - At least a selected microporous membrane is made by a dry-stretch process and has substantially round shaped pores and a ratio of machine direction tensile strength to transverse direction tensile strength in the range of 0.5 to 6.0. The method of making the foregoing microporous membrane may include the steps of: extruding a polymer into a nonporous precursor, and biaxially stretching the nonporous precursor, the biaxial stretching including a machine direction stretching and a transverse direction stretching, the transverse direction including a simultaneous controlled machine direction relax. At least selected embodiments of the invention may be directed to biaxially oriented porous membranes, composites including biaxially oriented porous membranes, biaxially oriented microporous membranes, biaxially oriented macroporous membranes, battery separators, filtration media, humidity control media, flat sheet membranes, liquid retention media, and the like, related methods, methods of manufacture, methods of use, and the like. | 09-15-2011 |
20110238026 | Ultrathin Fluid-Absorbent Cores - The present invention relates to ultrathin fluid-absorbent cores comprising a substrate layer, water-absorbent polymer particles and an adhesive, wherein the wet SAP shake out of water-absorbent polymer particles out of the fluid-absorbent core is less than 10% by weight. | 09-29-2011 |
20120004632 | Ultrathin Fluid-Absorbent Cores - The present invention relates to ultrathin fluid-absorbent cores comprising a substrate layer, water-absorbent polymer particles and an adhesive, wherein the water-absorbent polymer particles comprise a basic salt of a polyvalent metal cation and a monovalent carboxylic acid anion on the surface and the wet SAP shake out of water-absorbent polymer particles out of the fluid-absorbent core is less than 10% by weight. | 01-05-2012 |
20120045639 | Ultrathin Fluid-Absorbent Cores - The present invention relates to ultrathin fluid-absorbent cores comprising a substrate layer, water-absorbent polymer particles and an adhesive, wherein dry SAP shake out of water-absorbent polymer particles out of the fluid-absorbent core is less than 0.6% by weight. | 02-23-2012 |
20120071848 | Ultrathin Fluid-Absorbent Cores - The present invention relates to ultrathin fluid-absorbent cores comprising a substrate layer, multicomponent superabsorbent particles and an adhesive, wherein the wet SAP shake-out of superabsorbent particles out of the fluid-absorbent core is less than 10% by weight. | 03-22-2012 |
20130146810 | Process for Producing Water-Absorbing Polymer Fibres - The present invention relates to a process for producing water-absorbing polymer fibers, especially micro-or nanofibers, by electrospinning process and to fibers obtainable by this process. | 06-13-2013 |
20140045033 | SEPARATOR MEMBRANES FOR LITHIUM ION BATTERIES AND RELATED METHODS - A battery separator for a secondary lithium battery includes a microporous/porous membrane with a ceramic coating of one or more layers, a layer may include one or more particles and/or binders. | 02-13-2014 |
20140079980 | THIN BATTERY SEPARATORS AND METHODS - In accordance with at least selected aspects, objects or embodiments, optimized, novel or improved membranes, battery separators, batteries, and/or systems and/or related methods of manufacture, use and/or optimization are provided. In accordance with at least selected embodiments, the present invention is related to novel or improved battery separators that prevent dendrite growth, prevent internal shorts due to dendrite growth, or both, batteries incorporating such separators, systems incorporating such batteries, and/or related methods of manufacture, use and/or optimization thereof. In accordance with at least certain embodiments, the present invention is related to novel or improved ultra thin or super thin membranes or battery separators, and/or lithium primary batteries, cells or packs incorporating such separators, and/or systems incorporating such batteries, cells or packs. In accordance with at least particular certain embodiments, the present invention is related to shutdown membranes or battery separators, and/or lithium primary batteries, cells or packs incorporating such separators, and/or systems incorporating such batteries, cells or packs. | 03-20-2014 |
20140127492 | COPOLYMER MEMBRANES, FIBERS, PRODUCTS AND METHODS - In accordance with at least selected embodiments, the present invention is directed to novel, improved, or modified porous membranes, fibers, porous fibers, products made from such membranes, fibers or porous fibers, and/or related methods of production, use, and/or the like. In accordance with at least certain embodiments, the present invention is directed to novel, improved, or modified microporous membranes or films, fibers, microporous fibers, materials or layers made from such membranes, fibers or porous fibers, and the like for use in textile materials, garments, products, and/or textile related applications. Microporous membranes, fibers, and/or microporous fibers are made of one or more copolymers, such as block or impact copolymers, or of at least one polyolefin combined with at least one copolymer as a means of improving the hand, drape, and/or surface coefficient of friction performance properties for use in textile garments, textile materials or textile related applications. | 05-08-2014 |
20150292117 | PROCESS FOR PRODUCING WATER-ABSORBING POLYMER FIBERS - The invention relates to a process for producing water-absorbing crosslinked polymer fibers, especially micro- or nanofibers, by spinning process, especially electrospinning process and to fibers obtainable by this process. | 10-15-2015 |
Patent application number | Description | Published |
20090063361 | Risk and Reward Assessment Mechanism - A data driven and forward looking risk and reward appetite methodology for consumer and small business is described. The methodology includes customer segmentation to create pools of homogeneous assets in terms of revenue and loss characteristics, forward looking simulation to forecast expected values and volatilities of revenue and loss, and risk and reward optimization of the portfolio. One methodology used for modeling revenue and loss is a generalized additive effect decomposition model to fit historical data. Based on the model, a segmentation procedure is performed, which allows for creation of groups of customers with similar revenue and loss characteristics. An estimation procedure for the model is developed and a simulation strategy to forecast and simulate revenue and loss volatility is developed. Efficient frontier curves of risk (e.g., return volatility) and reward (e.g., expected return) are created for the current portfolio under various economic scenarios. | 03-05-2009 |
20100293107 | Risk and Reward Assessment Mechanism - A data driven and forward looking risk and reward appetite methodology for consumer and small business is described. The methodology includes customer segmentation to create pools of homogeneous assets in terms of revenue and loss characteristics, forward looking simulation to forecast expected values and volatilities of revenue and loss, and risk and reward optimization of the portfolio. One methodology used for modeling revenue and loss is a generalized additive effect decomposition model to fit historical data. Based on the model, a segmentation procedure is performed, which allows for creation of groups of customers with similar revenue and loss characteristics. An estimation procedure for the model is developed and a simulation strategy to forecast and simulate revenue and loss volatility is developed. Efficient frontier curves of risk (e.g., return volatility) and reward (e.g., expected return) are created for the current portfolio under various economic scenarios. | 11-18-2010 |
20130073481 | Risk and Reward Assessment Mechanism - A data driven and forward looking risk and reward appetite methodology for consumer and small business is described. The methodology includes account level historical data collection for customers associated with accounts as part of a portfolio. The account level historical data is segmented into groups of customers with similar revenues and loss characteristics. Segmented data is decomposed into seasoning, vintage, and cycle effects. Statistical clusters are formed based upon the data and effects. A simulation is applied to the statistical clusters and prediction data is generated. A simulation strategy to forecast and simulate revenue and loss volatility is developed. Efficient frontier curves of risk (e.g., return volatility) and reward (e.g., expected return) are created for the current portfolio under various economic scenarios. | 03-21-2013 |
Patent application number | Description | Published |
20080268345 | Battery Separator With Z-Direction Stability - A battery separator is a microporous membrane. The membrane has a major volume of a thermoplastic polymer and a minor volume of an inert particulate filler. The filler is dispersed throughout the polymer. The membrane exhibits a maximum Z-direction compression of 95% of the original membrane thickness. Alternatively, the battery separator is a microporous membrane having a TMA compression curve with a first substantially horizontal slope between ambient temperature and 125° C., a second substantially horizontal slope at greater than 225° C. The curve of the first slope has a lower % compression than the curve of the second slope. The curve of the second slope is not less than 5% compression. The TMA compression curve is graphed so that the Y-axis represents % compression from original thickness and the X-axis represents temperature. | 10-30-2008 |
20090081535 | X-RAY SENSITIVE BATTERY SEPARATOR AND A METHOD FOR DETECTING THE POSITION OF A SEPARATOR IN A BATTERY - The instant application relates to an X-ray sensitive battery separator for a secondary lithium battery and a method for detecting the position of a separator in a secondary lithium battery. The X-ray sensitive battery separator includes a microporous membrane having an X-ray detectable element. The X-ray detectable element constitutes less than 0.1% by weight of the microporous membrane. The method for detecting the position of a separator in a battery includes the following steps: (1) providing a battery including an X-ray sensitive battery separator; (2) subjecting the battery to X-ray radiation; and (3) thereby detecting the position of said separator in said battery. | 03-26-2009 |
20110176661 | X-RAY SENSITIVE BATTERY SEPARATORS AND RELATED METHODS - The instant application relates to an X-ray sensitive battery separator for a secondary lithium battery and a method for detecting the position of a separator in a secondary lithium battery. The X-ray sensitive battery separator includes a microporous membrane having an X-ray detectable element therein, thereon, or added thereto. The X-ray detectable element constitutes less than 20% by weight of the microporous membrane or separator. The method for detecting the position of a separator in a battery, cell, stack, jellyroll, can, or the like includes the following steps: (1) providing a battery, cell, stack, jellyroll, or the like including an X-ray sensitive battery separator; (2) subjecting the battery, cell, stack, jellyroll, or the like to X-ray radiation; and (3) thereby detecting the position of said separator in said battery, cell, stack, jellyroll, or the like. | 07-21-2011 |
Patent application number | Description | Published |
20100261263 | UP AND DOWN CONVERSION SYSTEMS FOR PRODUCTION OF EMITTED LIGHT FROM VARIOUS ENERGY SOURCES - A system for energy upconversion and/or down conversion and a system for producing a photostimulated reaction in a medium. These systems include 1) a nanoparticle configured, upon exposure to a first wavelength λ | 10-14-2010 |
20110021970 | NON-INVASIVE ENERGY UPCONVERSION METHODS AND SYSTEMS FOR IN-SITU PHOTOBIOMODULATION - Products, compositions, systems, and methods for modifying a target structure which mediates or is associated with a biological activity, including treatment of conditions, disorders, or diseases mediated by or associated with a target structure, such as a virus, cell, subcellular structure or extracellular structure. The methods may be performed in situ in a non-invasive manner by placing a nanoparticle having a metallic shell on at least a fraction of a surface in a vicinity of a target structure in a subject and applying an initiation energy to a subject thus producing an effect on or change to the target structure directly or via a modulation agent. The nanoparticle is configured, upon exposure to a first wavelength λ | 01-27-2011 |
20130171060 | UP AND DOWN CONVERSION SYSTEMS FOR PRODUCTION OF EMITTED LIGHT FROM VARIOUS ENERGY SOURCES - A system for energy upconversion and/or down conversion and a system for producing a photostimulated reaction in a medium. These systems include 1) a nanoparticle configured, upon exposure to a first wavelength λ | 07-04-2013 |
20140243934 | NON-INVASIVE ENERGY UPCONVERSION METHODS AND SYSTEMS - Products, compositions, systems, and methods for modifying a target structure. The methods may be performed in a non-invasive manner by placing a nanoparticle having a metallic shell on at least a fraction of a surface in a vicinity of a target structure in a subject and applying an initiation energy thus producing an effect on or change to the target structure directly or via a modulation agent. The nanoparticle is configured, upon exposure to a first wavelength λ | 08-28-2014 |
20150251016 | NON-INVASIVE ENERGY UPCONVERSION METHODS AND SYSTEMS - Products, compositions, systems, and methods for modifying a target structure. The methods may be performed in a non-invasive manner by placing a nanoparticle having a metallic shell on at least a fraction of a surface in a vicinity of a target structure in a subject and applying an initiation energy thus producing an effect on or change to the target structure directly or via a modulation agent. The nanoparticle is configured, upon exposure to a first wavelength λ | 09-10-2015 |
Patent application number | Description | Published |
20110151800 | Delay, Gain and Phase Estimation for Measurement Receivers - Phase and gain of a transmit signal are measured at a transmitter by determining a first time delay having a first resolution at a measurement receiver between a reference signal from which the transmit signal is generated and a measured signal derived from the transmit signal by comparing amplitudes of the reference signal and the measured signal. A second time delay having a second resolution finer than the first resolution is determined at the measurement receiver between the reference signal and the measured signal based on the first time delay. The reference signal and the measured signal are time aligned at the measurement receiver based on the second time delay and the phase and gain of the transmit signal are estimated after the reference signal and the measured signal are time aligned. | 06-23-2011 |
20140162732 | Gain Control Method for a Broadband Inductorless Low Noise Amplifier - A mobile device comprising an antenna, a receiver coupled to the antenna, and a transmitter coupled to the antenna, wherein the receiver, the transmitter, or both comprise a low noise amplifier comprising an adjustable gain and a variable impedance controller, and wherein the low noise amplifier is configured to sink current and to adjust a shunt resistance substantially simultaneously. Included is a method comprising receiving an electrical signal, substantially simultaneously adjusting an input impedance and a gain factor, amplifying the electrical signal, thereby producing an amplified signal, and outputting the amplified signal. | 06-12-2014 |
20140355456 | Second Order Intercept Point (IP2) Calibration for Wireless Receivers - IP2 calibration efficiency can be improved by passing the calibration signal through the transceiver's duplexer instead of inserting the calibration signal directly onto transceivers receive circuit. Passing the calibration signal through the duplexer may reduce IP2 calibration periods for transceivers having less-permeable duplexers, or duplexers that provide better than average separation between the RX and TX circuits. IP2 calibration inefficiencies can also be reduced by using a binary-like search when computing the in-phase and quadrature-phase path correction coefficients of the IP2 correction code. | 12-04-2014 |
20150155835 | Reduced Power Amplifier Load Impact for Open Loop Envelope Tracking - A method for implementing envelope tracking (ET), the method comprising switching from a receiver (Rx) radio frequency (RF) path to a supply sensing path during factory calibration, sensing the power amplifier (PA)'s supply voltage via the supply sensing path, comparing the PA's supply voltage to a corresponding reference supply voltage, determining the difference between the PA's supply voltage and the corresponding reference supply voltage, and updating one or more parameters used to perform a PA load pre-distortion during factory calibration, wherein the PA load pre-distortion is used to match the PA's supply voltage to the corresponding reference supply voltage. | 06-04-2015 |
Patent application number | Description | Published |
20120004175 | INHIBITORS OF NF-KB ACTIVITY - The present invention provides a method for inhibiting NF-κB activity in a subject, the method comprising providing an agent capable of inducing expression of annexin 1, whereby said agent induces expression of annexin 1 and whereby said induced expression of annexin 1 inhibits NF-κB activity. Also provided are annexin 1 mimetics capable of binding to NF-κB and pharmaceutical compositions of such inducing and mimetic agents. | 01-05-2012 |
20120270790 | COMPOSITIONS AND METHODS FOR THE TREATMENT OF MYOCARDIAL ISCHEMIA/REPERFUSION INJURY WITH ANNEXIN A1 SHORT PEPTIDE - The present invention provides a method of treating, ameliorating or preventing myocardial ischemia/reperfusion injury in a subject in need thereof, by administering to the subject a therapeutically effective amount of an ANXA1short peptide (ANXA1sp). | 10-25-2012 |
20140296149 | Compositions and Methods for the Treatment of Cardiac Surgery-Associated Acute Kidney Injury with Annexin A1 Peptide - The present invention provides a method of treating, ameliorating and/or preventing cardiac surgery-associated acute kidney injury (AKI) in a subject, comprising administering to the subject a therapeutically effective amount of an ANXA1 peptide such that the AKI is treated, ameliorated and/or prevented. | 10-02-2014 |
20150111830 | Methods and Compositions for Activation of Sirtuins with Annexin A1 Peptides - The present invention provides a method of treating, ameliorating or inhibiting sirtuin-associated disorders and/or conditions in a subject in need thereof, by administering to the subject an effective amount of an ANXA1 peptide. | 04-23-2015 |
20150231205 | COMPOSITIONS AND METHODS FOR THE TREATMENT OF MYOCARDIAL ISCHEMIA/REPERFUSION INJURY WITH ANNEXIN A1 SHORT PEPTIDE - The present invention provides a method of treating, ameliorating or preventing myocardial ischemia/reperfusion injury in a subject in need thereof, by administering to the subject a therapeutically effective amount of an ANXA1short peptide (ANXA1sp). | 08-20-2015 |