Follow us on Twitter
twitter icon@FreshPatents


Exponent patents

      

This page is updated frequently with new Exponent-related patent applications.




 Estimation of lesion size patent thumbnailnew patent Estimation of lesion size
A method, consisting of ablating tissue for a time period, measuring a contact force applied during the time period, and measuring a power used during the time period. The method further includes ceasing ablating the tissue when a desired size of a lesion produced in the tissue, as estimated using an integral over the time period of a product of the contact force raised to a first non-unity exponent and the power raised to a second non-unity exponent, is reached..
University Of Oklahoma Health Sciences Center


 Distance estimation patent thumbnailDistance estimation
A distance estimate between two nodes may be determined from a path loss exponent and a direct path energy estimate. The direct path energy estimate may be determined from channel state information of a packet received from one of the nodes.
Hewlett Packard Emterprise Development Lp


 Dynamic identity verification and authentication continuous, dynamic one-time-pad/one-time passwords and dynamic distributed key infrastructure for secure communications with a single key for any key-based network security controls patent thumbnailDynamic identity verification and authentication continuous, dynamic one-time-pad/one-time passwords and dynamic distributed key infrastructure for secure communications with a single key for any key-based network security controls
A method of using a single, one-time pre-distributed and pre-authenticated symmetric whitenoise key structure or other exponential key or deterministic random number generator to establish secure key-based communications between a first source computer and a second destination computer (endpoint, sensor or smart component) to provide continuous, dynamic, one-time-pad authentication throughout a session (not just at sign-in or login). By polling ahead in an exponential key stream with specific indexes, pointers or dynamic offsets the method creates an infinite number of identifiable one-time-pad tokens that have never been created or used before and deterministic, random key streams of functionally limitless length that will easily outlive the life of the person or device deploying it.

 Rsa decryption using multiplicative secret sharing patent thumbnailRsa decryption using multiplicative secret sharing
An embodiment features an rsa process in which the private key is separated into shares. Decryption (and authentication and other rsa objectives) may be accomplished by successive modular exponentiation of, for example, a ciphertext or a signature..
Nxp, B.v.


 Determining location of a user device patent thumbnailDetermining location of a user device
Method(s) and system(s) for determining location of a user device within a premise are described. The method includes identifying multiple zones with physical boundaries within the premise based on parameters associated with geometry of the premise.
Tata Consultancy Services Limited


 Correction of diffraction effects in an ultrasonic sensor patent thumbnailCorrection of diffraction effects in an ultrasonic sensor
Embodiments of correcting diffraction effects in an ultrasonic sensor are disclosed. In one embodiment, an ultrasonic sensor may include an ultrasonic transmitter configured to transmit an ultrasonic wave, a piezoelectric receiver layer configured to receive a reflected wave of the ultrasonic wave, where the reflected wave comprises a plurality of images of a fingerprint having a plurality of phases in a time sequence, and a platen layer configured to protect the ultrasonic transmitter and the piezoelectric receiver layer.
Qualcomm Incorporated


 Re-encryption key generator, re-encryption apparatus, encryption apparatus, decryption apparatus, and storage medium patent thumbnailRe-encryption key generator, re-encryption apparatus, encryption apparatus, decryption apparatus, and storage medium
According to one embodiment, a re-encryption key generator which generates the re-encryption key based on the first private key, the second re-encryption key generation key, and a plurality of random numbers. The second re-encryption key generation key comprises a plurality of system-specific values and the second private key.
Toshiba Solutions Corporation


 Method of processing signals, data processing system, and transceiver device patent thumbnailMethod of processing signals, data processing system, and transceiver device
A data processing system may include a transmit circuit configured to transmit a first signal sequence comprising one or more signals, a receive circuit configured to transmit a second signal sequence comprising one or more additional signals, wherein one or more signals of the second signal sequence comprise an interference component related to the first signal sequence, and a processing circuit. The processing circuit may be configured to generate a kernel set comprising one or more kernels based on the first signal sequence, wherein a first kernel of the kernel set comprises: a first complex exponential component of the first kernel based on the phase of a first signal of the first signal sequence, and a second complex exponential component of the first kernel based on the amplitude of the first signal of the first signal sequence, and apply the kernel set to generate a solution to a linear system, wherein the solution to the linear system represents a substantially linear relationship between the kernel set and the signal component of the second signal sequence arising from the first signal sequence..
Intel Corporation


 Double exponential mechanism controlled transistor patent thumbnailDouble exponential mechanism controlled transistor
The present disclosure relates to a tunnel fet device with a steep sub-threshold slope, and a corresponding method of formation. In some embodiments, the tunnel fet device has a dielectric layer arranged over a substrate.
National Taiwan University


 Minimizing information leakage during modular exponentiation and elliptic curve point multiplication patent thumbnailMinimizing information leakage during modular exponentiation and elliptic curve point multiplication
Minimizing information leakage during modular exponentiation using random masks is disclosed minimizing information leakage during elliptic curve point multiplication is disclosed with windowing by using point randomization is disclosed. Elliptic curve point multiplication with windowing calculates and stores multiple points based on the point being multiplied and then processes multiple bits of the multiplier at a time is also disclosed..
The Athena Group, Inc.


System and probabilistic relational clustering

Relational clustering has attracted more and more attention due to its phenomenal impact in various important applications which involve multi-type interrelated data objects, such as web mining, search marketing, bioinformatics, citation analysis, and epidemiology. A probabilistic model is presented for relational clustering, which also provides a principal framework to unify various important clustering tasks including traditional attributes-based clustering, semi-supervised clustering, co-clustering and graph clustering.
The Research Foundation For The State University Of New York

Method and big data cloud storage resource management

A system and method for storage resource management that improves the efficiency of big data cloud storage management using copy-on-write/read snapshots to redirect the i/o requests without moving the virtual disk is disclosed herein. The system includes storage pools, a virtualized server, and a centralized data center management server.
University Of Florida Research Foundation, Incorporated

Dna methylation analysis

Disclosed herein are methods for determining whether one or more cpg dinucleotides are methylated using linear after the exponential polymerase chain reaction (“late-pcr”) or linear-expo-linear polymerase chain reaction (“lel-pcr”).. .
Brandeis University

Server-assisted secure exponentiation

In one embodiment, a method for secure computation, includes receiving in a server, over a communication channel from a device external to the server a request to perform a modular exponentiation operation in which an exponent of the operation comprises a secret value, wherein the secret value is not provided to the server, and at least two parameters that encode the secret value in accordance with a polynomial or matrix homomorphic encryption of the secret value computed by the device, and performing in the server, in response to the request, a homomorphic exponentiation using the at least two parameters received from the device without decrypting the secret value in the server, so as to generate an output that is indicative of a result of the modular exponentiation operation.. .
Cisco Technology, Inc.

Estimating a tempo metric from an audio bit-stream

The invention relates to estimating tempo information directly from a bitstream encoding audio information, preferably music. Said tempo information is derived from at least one periodicity derived from a detection of at least two onsets included in the audio information.
Dolby International Ab

Thermal oscillator

A temperature dependent oscillator charges a capacitance from a voltage source through a switch. The switch is opened and the capacitance discharges through a transistor having a temperature dependent resistance.
Advanced Micro Devices, Inc.

Plasma processing apparatus, data processing apparatus and data processing method

According to an embodiment of the present invention, a plasma processing apparatus includes: a processing chamber in which plasma processing is performed to a sample; a radio frequency power source that supplies radio frequency power for generating plasma in the processing chamber; and a data processing apparatus that performs processing to light emission data of the plasma. The data processing apparatus performs the processing to the light emission by using an adaptive double exponential smoothing method for varying a smoothing parameter based on an error between input data and a predicted value of smoothed data.
Hitachi High-technologies Corporation

Method for inverse tone mapping of an image

Method comprising, for each pixel, obtaining a pixel expansion exponent value (e′(p)) by low pass filtering luminance values of colors of pixels in its spatial neighborhood, obtaining a pixel luminance-enhancement value (yenhance(p)) by extraction of high frequencies of luminance values of colors of pixels in its spatial neighborhood, and then inverse tone mapping the luminance (y(p)) according to the equation yexp(p)=y(p)e′(p)×[yenhance(p)]c.. .
Thomson Licensing

Protecting the input/output of modular encoded white-box rsa

A method of obscuring the input and output of a modular exponentiation function, including: receiving modular exponentiation parameters including an exponent e having n bits and a modulus m; generating randomly a pre-multiplier; calculating a post-multiplier based upon the pre-multiplier, exponent e, and modulus m; multiplying an input to the modular exponentiation function by the pre-multiplier; performing the modular exponentiation function; and multiplying the output of the modular exponentiation function by the post-multiplier, wherein multiplying an input to the modular exponentiation function by the pre-multiplier, performing the modular exponentiation function, and multiplying the output of the modular exponentiation function by the post-multiplier are split variable operations.. .
Nxp, B.v.

White-box modular exponentiation

A method of obscuring software code implementing a modular exponentiation function, including: receiving modular exponentiation parameters including an exponent e having n bits; generating a bitwise exponent array and inverse bitwise exponent array; and generating modular exponentiation function operations using the bitwise exponent array, inverse bitwise exponent array, and n, wherein the generated modular exponentiation function operations are split variable operations.. .
Nxp B.v.

Euv mirror and optical system comprising euv mirror

An euv mirror has a multilayer arrangement applied on a substrate. The multilayer arrangement includes a first layer group having ten or more first layer pairs.
Carl Zeiss Smt Gmbh

Radiography flat panel detector having a low weight x-ray shield and the production thereof

And ae(am241 60 kev) represents the absorption exponent of the x-ray absorbing layer relative to the about 60 kev gamma ray emission of am241; t represents the a thickness of the x-ray absorbing layer; e1, e2, e3, . .

Medium composition for culturing microalgae colony and use thereof

A medium composition for increasing the colony number or colony size of microalgae includes, as an effective component, a conditioned medium derived from culture solution during the exponential phase of microalgae in culture. A solid medium contains the medium composition.
Advanced Biomass R&d Center

Heating element powered by alternating current and heat generator accomplished by the heating element

Heating element (1) powered by alternating current and heat generator (43) comprising the heating element (1) and control electronics (9). The heating element has a hollow body housing (3) which is closed or provided with one or more openings, and at least two electrodes (5) which are insulated from said housing (1) and from each other by means of an insulating element (4).

Magnetic disk device and controlling magnetic disk

According to one embodiment, a controller of a magnetic disk device is configured to manage a first value representing the number of times of writing for each track on a magnetic disk. The controller detects a first off-track amount during writing for a first track that is a writing target track, calculates a second value exponentially increasing according to the detected first off-track amount, and adds the calculated second value to the first values of tracks adjacent to both sides of the first track..
Kabushiki Kaisha Toshiba

Extended use of logarithm and exponent instructions

Embodiments of the present disclosure are based on a recognition that some processors are configured with instructions to compute logarithms and exponents (i.e. Some processors include log and exp circuits).
Analog Devices, Inc.

Accumulation of floating-point values

An apparatus and method for generating a sum of floating-point input values are provided. To sum the values multiple partial sum floating-point values are maintained and the partial sum to which an input value may be added is selected by a least significant portion of the exponent of the input value.
Arm Limited

Thz radiation detection in standard cmos technologies based on thermionic emission

A detector of terahertz (thz) energy includes a mosfet having an extended source region, and a channel region depleted of free carriers, which mosfet operates in a sub-threshold voltage state and has an output that is an exponential function of thz energy supplied to the gate.. .
University Of Rochester

Method and distributing media content

A system that incorporates teachings of the present disclosure may include, for example, initializing a boundary estimate for an optimization of a linear programming model describing a network of media servers for servicing requests for media content items from subscriber devices, where the boundary estimate is an estimate of an infeasible solution of the linear programming model, and calculating iteratively, using an exponential potential function, additional boundary estimates for the linear programming model, wherein the calculating resolves to an improved boundary estimate that corresponds to placement of copies of the media content items at the media servers subject to a set of constraints on storage capacity of media servers and on bandwidth for communication links in the network. Other embodiments are disclosed..
At&t Intellectual Property I, Lp

Control device for controlling at least one manipulator of a projection lens

The disclosure provides a control device for controlling at least one manipulator of a microlithographic projection lens by generating a travel command, which defines a change to be undertaken, of an optical effect of at least one optical element of the projection lens by manipulating a property of the optical element via the at least one manipulator along a travel. The control device is configured to generate the travel command for the at least one manipulator from a state characterization of the projection lens by optimizing a merit function.
Carl Zeiss Smt Gmbh

High-throughput sequencing detection methylated cpg islands

A high-throughput sequencing method for detecting methylated cpg islands includes: processing a dna sample by using a modifier, and converting cytosine in the dna sample into uracil, and keeping 5′methylcytosine unchanged; amplifying the obtained segment by using a primer a and dna polymerase, to obtain a segment having one end being capable of anchoring a junction primer c; amplifying the obtained segment by using a primer b and dna polymerase, to obtain a segment gathering methylated cpg islands and having two ends being capable of separately anchoring junction primers c and d; amplifying the obtained segment at a pcr exponent by using the junction primers c and d and the dna polymerase, to obtain the amplified product; and separating and purifying the amplified product, to form a high-throughput sequencing library and perform computer sequencing, and data analysis.. .
Peking University

Optimal allocation of hardware inventory procurements

In various embodiments, methods, computer-storage media, and systems for generating optimal allocation of hardware inventory procurements are provided. An adjusted total cost, based on assessment properties for hardware providers is determined.
Microsoft Technology Licensing, Llc

Floating-point adder circuitry

An integrated circuit is provided that performs floating-point addition or subtraction operations involving at least three floating-point numbers. The floating-point numbers are pre-processed by dynamically extending the number of mantissa bits, determining the floating-point number with the biggest exponent, and shifting the mantissa of the other floating-point numbers to the right.
Altera Corporation

Technologies for offloading and on-loading data for processor/coprocessor arrangements

Technologies for transferring offloading or on-loading data or tasks between a processor and a coprocessor include a computing device having a processor and a sensor hub that includes a coprocessor. The coprocessor receives sensor data associated with one or more sensors and detects events associated with the sensor data.



Exponent topics:
  • Exponential
  • Prospective
  • Processing Device
  • Encryption
  • Key Generator
  • Permutation
  • Computer System
  • Test Strip
  • Concatenation
  • Signal Processing
  • Floating Point
  • Anticipation


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Exponent for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Exponent with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.9309

    file did exist - file did put2339

    3 - 1 - 52