Search Results

11 Results
for "technology+classifications+%3e+computers"
Use Advanced Search
Sort By:

Systems and Methods for Identifying Electronic Devices

A low-cost, portable system for detecting hidden electronic device threats (e.g. spy camera, bugs, weapons) utilizing nonlinear response effects from radio frequency signals. Background: Modern electronic devices (e-devices), such as spy cameras, bugs or weapons, can be sealed in parcels and boxes, hidden under clothing, or disguised with cardboard...
Published: 11/20/2020   |   Inventor(s):  
Keywords(s): Featured, Technologies
Category(s): Technology Classifications > Computers, Technology Classifications > Electronics, Technology Classifications > Imaging, Technology Classifications > Information Technology, Campus > University at Buffalo

Cardiac Scan: Continuous Computer User Authentication

Continuous computer user authentication is achieved using DC-coupled continuous-wave radar images of the user's unique cardiac motion signature. Background: Continuous authentication improves upon one-pass validation by continuously verifying over the lifetime of a session that the system is operated by the same user as at initial login....
Published: 12/1/2020   |   Inventor(s): Wenyao Xu, Changzhi Li (non-UB)
Keywords(s): Featured, Technologies
Category(s): Technology Classifications > Computers, Technology Classifications > Information Technology, Technology Classifications > Sensors, Campus > University at Buffalo

Orbital Angular Momentum Microlaser

An integrated OAM microlaser with well-defined topological charges can improve the information capacity of current optical communication. Background: Orbital angular momentum (OAM) multiplexing is a physical layer method for multiplexing signals carried on electromagnetic waves using the orbital angular momentum of the electromagnetic waves to...
Published: 12/1/2020   |   Inventor(s): Liang Feng, Natalia Litchinitser
Keywords(s): Technologies
Category(s): Technology Classifications > Information Technology, Technology Classifications > Computers, Campus > University at Buffalo

Ultra Massive MIMO Communication in the Terahertz Band

In this invention, the concept of Ultra-Massive Multiple Input Multiple Output (UM MIMO) communication is introduced as a way to increase the communication distance in THz networks up to several tens of meters. This technology has applications in high speed wireless communication.7062
Published: 11/18/2020   |   Inventor(s): Ian Akyildiz (non-UB), Josep Jornet
Keywords(s): Technologies
Category(s): Technology Classifications > Computers, Technology Classifications > Wireless, Campus > University at Buffalo

The Mimir On-Demand ETL Tool

Combining databases with varying data inputs requires costly manual reconciliation. The Mimir program automates many of the steps involved to streamline the process. Creating a combined database from different sources can be challenging. Frequently different data forms were used with different terms and questions. This necessitates the costly and...
Published: 11/18/2020   |   Inventor(s): Oliver Kennedy, Ying Yang, Arindam Nandi, Niccolo Meneghetti, Vinayak Karuppasamy, Ronny Fehling, Zhen Hua Liu, Dieter Gawlick
Keywords(s): Technologies
Category(s): Technology Classifications > Bioinformatics, Technology Classifications > Computers, Technology Classifications > Information Technology, Technology Classifications > Healthcare IT, Campus > University at Buffalo

Communication Efficient Secret Sharing

A secret sharing scheme is a method for distributing a secret among several parties in such a way that only qualified subsets of the parties can reconstruct it and unqualified subsets receive no information about the secret. The key idea to reduce communication is to let the user to download from more (than the necessary number of) parties. For this...
Published: 11/18/2020   |   Inventor(s): Michael Langberg (UB Inventor), Wentao Huang (non-UB), Joerg Kliewer (non-UB), Jehoshua Bruck (non-UB)
Keywords(s): Technologies
Category(s): Technology Classifications > Information Technology, Technology Classifications > Computers, Campus > University at Buffalo

Spin XOR Gate in Ferromagnet-Nonmagnet Heterostructures

Current data search devices rely on complementary metal-oxide semiconductor (CMOS) technology. Although CMOS has long been the gold standard, it is limited by the number of words that can be used. Researchers at University at Buffalo have developed a device capable of combining non-volatile memory with spin based-processing to dramatically increase...
Published: 11/18/2020   |   Inventor(s): Igor Zutic, Roland Kawakami, Hanan Dery, Ilya Krivorotov, Lu Sham, Jing Shi, Hua Wen
Keywords(s): Technologies
Category(s): Technology Classifications > Computers, Campus > University at Buffalo

Polar Coding for Noisy Write-Once Memories (Cal Tech lead)

Write-once memory is a model for data-storage devices, where a set of binary cells are used to store data, and the cell levels can only increase when the data is rewritten. The WOM model was recently identified as a good model for flash memories, where rewriting delays expensive block erasures and by that leads to better preservation of cell quality...
Published: 11/18/2020   |   Inventor(s): Michael Langberg (UB Inventor), Eyal En Gad(non-UB), Yue Li(non-UB), Jehoshua Bruck (non-UB), Joerg Kliewer (non-UB), Anxiao Jiang
Keywords(s): Technologies
Category(s): Technology Classifications > Dental > Diagnostics, Technology Classifications > Healthcare, Technology Classifications > Computers, Campus > University at Buffalo

Investigation of Size Effect and Domain Walls on Magnetoresistance in Magnetic Nanocontacts

As our data storage devices get smaller, the magnetic sensors used to write and store the data must become more sensitive. The sensors require a higher degree of sensitivity because as the magnetic zones, or storage zones, of a storage disk become smaller and closer together, it becomes harder to distinguish different zones. Researchers at University...
Published: 11/18/2020   |   Inventor(s): Harsh Chopra, Jason Armstrong, Zonglu Susan Hua, Matthew Sullivan
Keywords(s): Technologies
Category(s): Technology Classifications > Computers, Campus > University at Buffalo

Secure Fingerprint Matching by Hashing Localized Information

This invention discusses and discloses a unique method of protecting fingerprint biometric data. The method uses algorithms to determine a set of specialized points on a fingerprint, and then uses the pattern to hash (encrypt) the fingerprint recognition information. This invention is unique in that it overcomes drawbacks of other recognition methods...
Published: 11/18/2020   |   Inventor(s): Venugopal Govindaraju, Sharat Chikkerur, Faisal Farooq, Sergey Tulyakov
Keywords(s): Technologies
Category(s): Technology Classifications > Bioinformatics, Technology Classifications > Computers, Technology Classifications > Information Technology, Campus > University at Buffalo
1 2 

Search SUNY Technologies

Trending Searches

Latest Technologies