About Us Our Work Employment News & Events
MITRE Remote Access for MITRE Staff and Partners Site Map
  Home > Our Work > Technology Transfer Office >
Technology Transfer Office
2011 Patents

Mechanical arm system for opening a door

A mechanical arm system for opening a door includes an actuator assembly having an output shaft and an arm driven by the output shaft so as to move the door from a closed position toward an open position. The arm is free from contact with the door when the door moves from the open position to the closed position. The actuator assembly is mounted to a support member adjacent the door. The arm extends between the output shaft and the door. The arm may be moveable between a position in which the arm contacts the door in the open position and a retracted position in which the arm is free from contact with the door in the closed position. The arm may be moved to the retracted position before the door reaches the open position so as to abort the opening of the door.

Multi-modal particle detector

Systems, methods and computer program products for the multi-modal detection of particles are described herein. An embodiment of the present invention is a particle detector that includes a first chamber wherein analyte particles are subjected to a first particle detection mechanism, and a second chamber coupled to the first chamber, wherein the analyte particles are subjected to a second particle detection mechanism, and wherein the detection characteristics of second particle detection mechanism are orthogonal to detection characteristics of the first particle detection mechanism. According to another embodiment, the present invention is a particle detection method including the steps of detecting presence of at least one predetermined particle type in an analyte particle sample using a first particle detection mechanism, and confirming the presence of the predetermined particle type in the analyte particle sample using a second particle detection mechanism, wherein detection characteristics of the second particle detection mechanism are orthogonal to detection characteristics of the first detection mechanism.

Decomposing human behavior into quantified layers of perception

A method, computer program product, and system are provided for decomposing human behavior into quantifiable layers of perception. The method for decomposing human behavior into quantifiable layers of perception may be referred to as "DAP-E," which is an acronym representative of four main phases of the method. Theses phases include the following: decompose; aggregate; propagate; and, evaluate. For example, an embodiment of the method may include aggregating one or more outputs from one or more behavioral models to represent a statistically significant conclusion and propagating the conclusion across a social network to allow opinions of a first entity within the social network to influence a conclusion of a second entity. A token passing behavior algorithm may be used to weigh an opinion of an entity receiving a token when propagating the conclusion across the social network.

Method, apparatus, and computer program product for detecting computer worms in a network

A worm is a malicious process that autonomously spreads itself from one host to another. To infect a host, a worm must somehow copy itself to the host. The method in which a worm transmits a copy of itself produces network traffic patterns that can be generalized as a traffic behavior. As a worm spreads itself across the network, the propagation of the traffic behavior can be witnessed as hosts are infected, one after another. By monitoring the network traffic for propagations of traffic behaviors, a presence of a worm can be detected.

Carbon nanotube-based electronic devices

Carbon nanotube-based devices that can be used to meet the growing miniaturization and performance needs of electronic systems, are provided. In particular, a transmission line and inductor that include nanotube bundles is disclosed. In a further embodiment a method for isolating nanotubes with proteins is disclosed. In another embodiment a nanoswitch using nanotubes is disclosed. In a final embodiment a low loss, high permeability material is disclosed that includes a conductive coil and a set of nanotube toroids.

Cursive character handwriting recognition system and method

A cursive character handwriting recognition system includes image processing means for processing an image of a handwritten word of one or more characters and classification means for determining an optimal string of one or more characters as composing the imaged word. The processing means segments the characters such that each character is made up of one or more segments and determines a sequence of the segments using an over-segmentation-relabeling algorithm. The system also includes feature extraction means for deriving a feature vector to represent feature information of one segment or a combination of several consecutive segments. The over-segmentation-relabeling algorithm places certain segments considered as diacritics or small segments so as to immediately precede or follow a segment of the associated main character body. Additionally, the system also includes classification means that processes each string of segments and outputs a number of optimal strings which could be matched against a given lexicon.

Interpolation processing for enhanced signal acquisition

The present invention relates to methods and systems for enhanced signal acquisition through cross-ambiguity function (CAF) interpolation. In one aspect, the present invention provides methods and systems for CAF interpolation. In an embodiment, a first CAF generated using a low input sampling rate (e.g., 1 sample/chip) is interpolated to generate a second CAF having a higher sample per chip rate. By lowering the initial input sampling rate, cost and complexity of initial synchronization processing can be significantly reduced at the receiver. In another aspect, coherent and non-coherent interpolation methods and systems are provided for time and frequency CAF interpolation. Low cost and low complexity implementations of these methods and systems are also provided with associated CAF peak detection methods and systems.

Adaptive cross-layer cross-node optimization

Methods and systems for adaptive cross-layer cross-node optimization in wireless communication systems are provided. Adaptive cross-layer cross-node optimization allows for conventional cross-layer optimization coupled with the ability to adaptively optimize cross-layer interactions across node boundaries. In one aspect, adaptive cross-layer cross-node optimization includes adaptively and dynamically shifting functions/layers among nodes in a network, so that a global network objective is achieved. In another aspect, adaptive cross-layer cross-node optimization includes adaptively and dynamically distributing functions/layers across a network, according to changes and/or events in the network. In a further aspect, adaptive cross-layer cross-node optimization includes dynamically defining or changing individual node functions within a network, so that a global network functionality may emerge.

Flight restriction zone detection and avoidance

A method, system and computer program product to detect and indicating TFR zone violations, potential TFR zone violations or TFR zones in vicinity of an aircraft and indicating measures to avoid or exit a TFR zone are provided. TFR zone information and an aircraft's position information are received. The aircraft's position information is processed to determine the aircraft's current heading. A TFR zone violation is determined based on the aircraft's current position. A potential TFR violation is determined based on whether the aircraft's current heading intersects a TFR zone. The presence of a TFR zone in the vicinity of the aircraft is determined based on the aircraft's current position and heading. Indicators of a TFR violation, potential TFR violation, no TFR violation or TFR zones in the vicinity are provided. If a TFR violation, or possible TFR violation or TFR zone in the vicinity are found, measures are indicated to exit the TFR zone or change the aircraft's current heading to avoid the TFR zone.

Removal of matched waveform interference

Methods and systems of signal cancellation/separation for use in multi-signal communication environments are provided herein. Embodiments of the present invention use a feedback-optimized multi-signal multi-stage estimator with data-aided signal parameter estimation. Embodiments of the present invention require minimal information about the received signals and can be used to separate a desired signal from an interfering signal or two desired signals received on the same frequency. In the latter case, embodiments of the present invention effectively double the capacity of the communication system. Embodiments of the present invention are suitable for environments with intentional and/or unintentional jamming or interference. System embodiments of the present invention can be used as in-line solutions that can be inserted at different points in a receive chain.

Quantum sensor miniaturization utilizing entangled photon signals

The resolution obtained by an imaging system utilizing separable photons can be achieved by an imaging system making use of entangled photons. Since resolution is not being increased from the separable-photon system, the imaging system utilizing entangled photons can take advantage of a smaller aperture. This results in a smaller and lighter system, which can be especially valuable in satellite imaging where weight and size play a vital role.

Semantic system for integrating software components

A system and method for integrating databases and/or web services into a searchable ontological structure. The structure allows free-form searching of the combined system, discovering an execution path through the ontology to provide answers to queries that may require accessing multiple systems to resolve, without a need for knowledge of the available databases and services or of query syntax by the user. The same technologies that integrate databases and web services into a single ontological structure may also provide interoperability between the numerous information systems within modern enterprises. Context ontologies are constructed to capture ubiquitous enterprise concepts and their representations across the enterprise. By mapping information system data models to these context ontologies, information that originates in one part of the enterprise may be used across the enterprise in a highly automated fashion.

Methods, systems, and computer program products for rateless coding

The disclosed methods, systems, and computer-program products for compute a power allocation for a rateless, error-correcting code constructed from a plurality of repeated blocks having a plurality of superimposed layers and having a decoding signal-to-noise ratio (SNR) threshold. A noise threshold for an initial block of the rateless code is determined based on at least the SNR threshold, and a power allocation for each layer of the initial block is then calculated based on the determined noise threshold. The calculated power allocation may ensure that each layer of the initial block experiences the SNR threshold. Power is then allocated to each layer of a block proximate to the initial block such that each layer of the proximate block has an effective SNR equivalent to the SNR threshold. The allocating step for the proximate block is then repeated for each of the plurality of repeated blocks subsequent to the initial block to allocate power to each layer of the plurality of repeated blocks.

 

Network cross-domain precedence and service quality conflict mitigation

A method, computer program product, and system are provided for prioritizing data in a network system. For example, an embodiment of the method may include allocating network system resources to high-priority data with an identifier and dynamically changing a threshold level from a pre-assigned, minimum level in the allocation of network resources based on data traffic with the identifier received by a communication device in the network system. In allocating network system resources, the data with the identifier may be filtered into a separate data stream from data without the identifier. For instance, the data stream containing data with the high-priority identifier may be directed to a high-priority buffer that has a minimum allocation of network resources dedicated to the buffer to ensure unencumbered data transfer between the communication device and a destination within the network system. Further, in dynamically changing the threshold level, network resources may be allocated to data with a high-priority identifier as the high-priority data is received by the communication device. A prioritization of network resource queue space for the data with the high-priority identifier and then a prioritization of data without the high-priority identifier in the remaining queue space, if any, according to Quality of Service (QoS) requirements may be required when allocating network resources. Therefore, the method described above may be used to propagate prioritized data across a network while accommodating for QoS requirements.

 

Page last updated: December 14, 2011   |   Top of page

Homeland Security Center Center for Enterprise Modernization Command, Control, Communications and Intelligence Center Center for Advanced Aviation System Development

 
 
 

Solutions That Make a Difference.®
Copyright © 1997-2013, The MITRE Corporation. All rights reserved.
MITRE is a registered trademark of The MITRE Corporation.
Material on this site may be copied and distributed with permission only.

IDG's Computerworld Names MITRE a "Best Place to Work in IT" for Eighth Straight Year The Boston Globe Ranks MITRE Number 6 Top Place to Work Fast Company Names MITRE One of the "World's 50 Most Innovative Companies"
 

Privacy Policy | Contact Us