Skip to main content

Software & Information Technology

Name Investigator Tech ID Licensing Manager Name Micensing Manager Email Description Tags 1-Clik License
Intelligent Wi-Fi Packet Relay Protocol Dr. Zhenghao Zhang 13-089 Michael Tentnowski <p>L2Relay is a novel packet relay protocol for Wi-Fi networks that can improve the performance and extend the range of the network. A device running L2Relay is referred to as a relayer, which overhears the packet transmissions and retransmits a packet on behalf of the Access Point (AP) or the node if no acknowledgement is overheard. L2Relay is ubiquitously compatible with all Wi-Fi devices. L2Relay is designed to be a layer 2 solution that has direct control over many layer 2 functionalities such as carrier sense. Unique problems are solved in the design of L2Relay including link measurement, rate adaptation, and relayer selection. L2Relay was implemented in the OpenFWWF platform and compared against the baseline without a relayer as well as a commercial Wi-Fi range extender. The results show that L2Relay outperforms both compared schemes.</p>
The Spot Method for Detecting Compromised Computers in a Network Zhenhai Duan 09-148 Michael Tentnowski <p>Threats to computer network security are increasing, particularly regarding the “botnet” scenario where computers in a network are infected by malware programs (e.g., viruses, spyware, worms) that enable third parties to take control of the machines without the owners’ knowledge. Compromised computers, also known as “zombies,” can markedly decrease the efficiency of a network.</p> <p>Current malware detection programs are only capable of detecting known malware agents; however, new malware is continuously being developed so that malware detection programs are chronically behind and require frequent updates. Additionally, most detection methods do not allow for the global monitoring of machines on a network.</p> <p>Unlike the current malware detection programs that focus on the point of infection, Dr. Duan has developed a new program, SPOT, that focuses on the number of outgoing messages that are originated or forwarded by each computer on a network to identify the presence of compromised machines. SPOT uses three algorithms that were specifically developed for the system. The first algorithm is based on the percentage of spam messages that originate or are forwarded from an internal machine. The second is based on the number spam messages that originate or are forwarded from an internal machine. The third is based on a statistical method called the sequential probability ratio test (SPRT). Importantly, SPOT analyses the total number of messages sent by a machine rather than only analyzing the rate at which they are sent to thwart spammers from purposely slowing the rate of message transmission in order to work around the system. The SPOT system enables individual networks to globally monitor computers on their networks and to automatically and accurately detect and efficiently remove compromised computers from their networks in an online manner. This novel detection method is applicable to a wide range of settings in which computer networks play an essential role.</p> <h2><span>Applications:</span></h2> <ul> <li>Computer security industry.</li> <li>needing computer security (e.g., government agencies, financial institutions, research laboratories).</li> </ul> <h2>Advantages:</h2> <ul> <li>May be incorporated into new or added to existing networks at low cost.</li> <li>Only a single copy of the SPOT software is needed to protect a network.</li> <li>Fills security holes left by existing malware detection programs that focus only on the point of intrusion.</li> <li>May be used in combination with other malware detection programs.</li> <li>Detects compromised computers quickly and accurately, with low false positive and false negative rates.</li> </ul> password,spot,computers
System and Method of Probabilistic Passwords Cracking Dr. Sudhir Aggarwal 11-189 Michael Tentnowski <p>Professor Aggarwal and his team have created a  system and method of probabilistic passwords cracking.</p> <p>This technology is a novel password cracking system that generates password structures in highest probability order. Our program, called UnLock, automatically creates a probabilistic context-free grammar (CFG) based upon a training set of previously disclosed passwords.</p> <p>This CFG then allows to generate word-mangling rules, and from them, password guesses to be used in password cracking attacks.</p> <h2>Advantages:</h2> <ul> <li>Effectiveness demonstrated on real password sets</li> <li>Technology capable of cracking significantly more passwords in the same number of guesses as compared to publicly available standard password cracking systems.</li> <li>Tested in digital forensic missions</li> </ul>
System and Methods for Analyzing and Modifying Passwords Dr. Sudhir Aggarwal 12-044 Michael Tentnowski <p>Professor Aggarwal's team developed a system for analyzing and modifying passwords in a manner that provides a user with a strong and usable/memorable password. The user would propose a password that has relevance and can be remembered. The invention would evaluate the password to ascertain its strength. The evaluation is based on a probabilistic password cracking system that is trained on sets of revealed passwords and that can generate password guesses in highest probability order. If the user's proposed password is strong enough, the proposed password is accepted. If the user's proposed password is not strong enough, the system will reject it. If the proposed password is rejected, the system modifies the password and suggests one or more stronger passwords. The modified passwords would have limited modifications to the proposed password. Thus, the user has a tested strong and memorable password.</p>
Simple, Accurate and Fast Web-Based Analysis Tool for the Stock Market Dr. Piyush Kumar 12-193 Michael Tentnowski <p>The present invention describes a novel system and method of aggregating and predicting stock rankings. A financial data model based on a neighborhood model, this invention allows users to predict the trend of a continuous time series, given the knowledge of other similar time series. It also solves another proximal problem of Rank Aggregation, which is, given a set of rankings based on some parameters, to come up with an optimal ranking that procures the earning capability of a ticker as the primary pivot. To achieve this, each ticker is projected as a point on a high dimensional space.</p> <p>The system and method then uses a ranking optimization method to predict the ranking of each stock based on percentage change in price. The current invention facilitates investors trading by using a novel methodology to predict stock rankings and providing a neighborhood of related stocks, while having an easy to use interface.</p> <h2>Advantages:</h2> <ul> <li>Ranks stock tickers registered at NASDAQ based on different market parameters, or within a given a sector, or as charts where instead of the price of a ticker its rank is shown at different hours of the day</li> <li>Predicts pricing trends</li> <li>Provides recommendation based on portfolio and budget, and short term prediction with reason (i.e. why we have put ticker X at rank 1)</li> <li>The entire web interface (including the visualizations) will be implemented using HTML5/CSS3 so that it stays accessible from any mobile device (including Apple devices)</li> </ul> <p> </p>
Reproducible Random Number Generation using Unpredictable Random Numbers Michael Mascagni 16-103 Michael Tentnowski <p>The use of random numbers in simulation is widespread, and is crucial in a large number of applications. In simulation, it is equally important that applications using random numbers are reproducible. The requirement of reproducibility is important for many reasons:</p> <ol> <li>Code development and debugging would be nearly impossible without reproducible random numbers</li> <li>Many simulation applications require absolute reproducibility in certification situations, such as those mandated by the Nuclear Regulator Commission</li> <li>Publication in many journals now has a code reproducible mandate, such as the ACM Transactions on Mathematical Software.</li> </ol> <p>This has led to many new, and very capable random numbers designed primarily for cryptographic use, and hence are unpredictable, to be deemed inadequate for simulation purposes. One such generator, the Intel digital random number generator (DRNG) is of particular note, and served as Dr. Mascagni’s inspiration.</p> <p>In the Scalable Parallel Random Number Generators (SPRNG) library that Dr. Mascagni developed, one has the capability to produce independent full-period random number streams based on parameterization. The parameter can be thought of as a very long integer, and SPRNG currently assigns parameters to steams. One can use an unpredictable RNG to produce the parameters in SPRNG, and by augmenting the SPRNG RNG data structure, this can be done in a reproducible way. The reproducibility will be of the so-called forensic type, and reproducing the results will require the use and design of extra software to collect the parameters used in a computation, and to stage a new computation with the same parameters.</p> <h2>Advantages:</h2> <ul> <li>All current Intel and AMD processors have an interface to the RdRAND function, which produces the unpredictable random values. Thus, this would provide a reproducible generator for a wide variety of machines, and would permit parallel and distributed computing without the need for message passing, as the Native RdRAND function can be used independently.</li> </ul>
Phase-Shifted Square Wave Modulation Method for Isolated Modular Multilevel DC/DC Converter Hui (Helen) Li 18-008 Michael Tentnowski <p>This invention provides a phase-shifted square wave modulation method for isolated modular multi-level DC/DC (IM2DC) converters. In the present invention, one square wave based modulation waveform with the same frequency and magnitude is applied to each cell of an isolated modular multi-level DC/DC converter and compared with a triangular carrier waveform to generate the gate signals. With the phase-shifted angle of the carrier waves, higher equivalent switching frequency can be achieved. Both full-bridge (FB) and half-bridge (HB) cells are allowed as the single cell.</p> <p>This technology can be implemented to reduce the DC inductor size due to higher equivalent switching frequency. In addition, the required capacitor energy can be reduced, which decreases the capacitor size since they are dedicated to smooth the high switching frequency ripples only. Moreover, a high efficient power transfer capability can be achieved with the square wave compared to conventional sinusoidal waveforms.</p> <p>In addition, this invention proposes a novel phase-shifted square wave modulation technique aiming at reducing passive components and devices sizes for single-phase and three-phase IM2DC applications in HVDC/MVDC systems. In various embodiments a square wave based modulation waveform is applied to each cell of IM2DC and compared to the phase-shifted carrier waveforms to generate device gate signals. Thus, higher equivalent switching frequency will be achieved and square wave based arm and AC link waveforms will be generated. The power flow of IM2DC is controlled by a phase shift angle of the square modulation waveforms between HVS and LVS. Compared to the conventional phase-shift sinusoidal method, the converter cell capacitors can be reduced significantly since they are required to smooth out the high switching frequency ripple components only. In addition, lower TDR can be achieved due to the higher power transferring capability of square waves. Both proposed method and quasi-two-level modulation can achieve low TDR and small cell capacitor size, however, the present invention can allow smaller DC inductors due to the multi-cell phase-shifted characteristics.</p>
Leakage Current Suppression Solutions for Photovoltaic Cascaded Multilevel Inverter Application Hui (Helen) Li 13-176 Michael Tentnowski <p>The cascaded multilevel inverter is considered to be a promising alternative for the low-cost and high-efficiency photovoltaic (PV) systems. However, the current leakage issue, resulting from the stray capacitances between the PV panels and the earth, needs to be solved for the cascaded inverter to be reliably applied in PV application.</p> <p>The proposed technologies solve the leakage current issue in PV cascaded multilevel inverter by using passive filters. It can retain the simple structure of the inverter and does not complicate the associated control system.  The system is a photovoltaic cascaded inverter, including inverter modules, which have both an AC and a DC side.  In addition, the system includes a common DC-side choke coupled to the DC-side of each of the inverter modules and a common mode AC-side choke coupled to the AC-side of each of the inverter modules.</p> <p> </p>
Fast Dynamic Parallel Approximate Neighbor Search Data Structure Using Space Filling Curves Piyush Kumar 16-096 Michael Tentnowski <p>The nearest neighbor search (NNS) is a technique that is used in computing to optimize the amount of time it takes to accurately locate one data point in relation to another data point in a dataset that is organized so that distances between points are measured in Euclidian space. Increasingly, NNS computation is becoming a key sub-task in many algorithms and applications that are used to process, organize, cluster, learn, and understand massive data sets, such as those used in the automotive, aerospace, and geographic information system (GIS) industries.</p> <h2>The Problem:</h2> <p>The NNS algorithm works well for small data sets, but it is too time-consuming to implement with large data sets. The approximate nearest neighbor (ANN) search, an alternative to NNS, improves search time and saves memory by estimating the nearest neighbor, without guaranteeing that the actual nearest neighbor will be returned in every case. Two limitations of this method are that it is difficult to make an ANN algorithm dynamic (i.e., allows for insertions and deletions in the data structure) or to parallelize it (i.e., use multiple processors to speed up queries).</p> <h2>The Solution:</h2> <p>Dr. Kumar and his research team are developing a novel, practical, and theoretically-sound method that will solve the NNS problem in lower dimensional spaces. Specifically, the researchers are creating an approximate k-nearest neighbor algorithm, based on Morton Sorting of points, to create a software library for approximate nearest neighbor searches for Euclidian spaces. The library will use multi-core machines efficiently (parallel) and enable the insertion and deletion of points at run time (dynamic). This new algorithm delivers the search results with expected logarithmic query times that are competitive with or exceed Mount’s approximate nearest neighbor (ANN) search.</p> <h2>Advantages:</h2> <ul> <li>Speed on multicore machines</li> <li><span>Minimum spanning tree computation</span></li> </ul>
Fast Compression and Estimation of the Channel State Information (CSI) with Sparse Sinusoid Approximation for Broadband Wireless Networks Zhenghao Zhang 16-079 Michael Tentnowski <p>CSIApx is a very simple algorithm for the compression of the Channel State Information (CSI) of OFDM systems. The algorithm is guided by rigid mathematical findings and has with bounded performance. It is very suitable to be implemented in hardware because it involves only a small number of complex multiplications, similar to that of a digital FIR filter. In the illustrated embodiment CSIApx has been extensively tested with both experimental data and the Wi-Fi channel model, and the results confirm that while dramatically reducing the computation complexity, CSIApx still significantly outperforms the existing solutions both in compression ratio and accuracy, in nearly all cases.</p> <p>Accordingly, the present invention provides an improved system and method for compressing the CSI for OFDM that is accurate and computationally easy to implement.</p> <p> </p> <h2>Applications:</h2> <ul> <li>Computer systems</li> </ul> <h2>Advantages:</h2> <ul> <li>Extremely simple</li> <li>Compressed CSI consists of small range of 5 or less complex numbers</li> <li>Easy to quantize and transmit</li> <li>Based on rigid mathematical foundations</li> <li>Resilient against the disturbance of noise</li> </ul>
Derivative Reference-Based Method for Detection of Instability in Power Hardware-in-the-Loop Simulation James Langston 16-084 Michael Tentnowski <p>Hardware-in-the-loop (HIL) is a form of simulation wherein a hardware device is interfaced to a digital real-time simulator (DRTS), which models the system that the hardware is intended to be connected to in the real world. HIL simulations offer a method to test physical devices under real time operating conditions. Various scenarios can be tested in a controlled environment to evaluate the performance of the device under test (DUT) before it is connected to the actual physical system.</p> <p>Most HIL simulations are closed-loop meaning that the response of the device is fed back to the DRTS. One type of closed-loop HIL is a Power HIL (PHIL). PHIL simulations involve interfacing the DRTS with a power device such as a motor, generator, transformer, inverter, etc. (DUT). The DRTS and the DUT exchange power over the PHIL interface. In some instances, a digital to analog (D/A) converter, which is included as part of the DRTS provide analog signals scaled down to electronic levels within ±10Vpk, ±10mA. In other instances, digital signals may be exchanged. These voltage levels are well below the operating voltage/current range of the DUT, therefore amplifiers and/or actuators are required in PHIL simulations to scale the signals sent from the DRTS to the DUT.</p> <p>Due to the closed-loop nature of PHIL simulations and the natural delays in the feedback loops, instability is often a problem, and can lead to damage and/or destruction of the equipment involved in the tests. Very little has been published regarding protection methods designed to detect instabilities in PHIL systems. Some of the proposed methods to detect these oscillations include over/under frequency protection and harmonic distortion-based protection.</p> <p>The invention provides a method for detecting instability in a PHIL simulation. The PHIL includes a RTS, a DUT, and an amplifier electrically connected between the RTS and the DUT. The method includes computing in a RTS a magnitude of a time-derivative of reference quantities and applying a low pass filter thereto. The method also includes comparing an output from the low pass filter to a threshold for detection of oscillations of the reference quantities. When oscillations are detected a mitigating step is applied to the DUT. The invention includes other variations of a similar concept.</p>
Cashtags: Prevent Leaking Sensitive Information through Screen Display An-I Andy Wang 15-091 Michael Tentnowski <p>Mobile computing is the new norm. As people feel increasingly comfortable computing in public places such as coffee shops and transportation hubs, the risk of exposing sensitive information increases. While solutions exist to guard the communication channels used by mobile devices, the visual channel remains, to a significant degree, open. These solutions aim only to prevent the visual leakage of password entries. However, once the uses has been successfully authenticated, all accessed sensitive information is displayed in full view.  No existing mechanism allows arbitrary data to be marked as sensitive. Shoulder surfing is becoming a viable threat in a world where sensitive information from images can be extracted with modest computing power.</p> <p>In response, we present Cashtags: a system to defend against attacks on mobile devices based on visual observations. The system allows users to access sensitive information in public without the fear of visual leaks. This is accomplished by intercepting sensitive data elements before they are  displayed on screen, then replacing them with non-sensitive information. In addition, the system provides a means of computing with sensitive data in a non-observable way.</p>
Materials Genome Software to Accelerate Discovery of New Materials Jose Mendoza-Cortes 18-012 Garrett Edmunds <p>The creation of a material genome can accelerate the discovery of new materials in much the same way the human genome is accelerating advances in gene therapy. It often takes 15-20 years to transfer advanced materials from the laboratory to the marketplace. Our predictive software utilizes unique databases of predicted materials to drastically accelerate the discovery of new materials by allowing users in research and industry to synthesize and characterize only the most promising compounds for the desired application in lieu of experimental trial and error on thousands candidates or even more. Genomes and predictive algorithms for energy storage and light capture materials have been developed. This technology is primed to be commercialized as a software as a service (SaaS).</p>
Voltage Profile Based Fault Detection Michael (Mischa) Steurer 13-147 Michael Tentnowski <p>Fault location in a traditional power system is a challenging task. Electric power flows only in one direction: from the substation to the various loads. Therefore, when a severe short circuit fault occurs, there is a current rise with voltage sag near the faulted node or line and everything else that is downstream. If the fault protection system responds adequately it isolates the assumed faulted areas which are all the nearby and downstream customers of the actual faulted area.</p> <p>In a system containing distributed resources (DRs), most fault location technologies ignore the presence of DRs by assuming either low DRs penetration or no power injection from DRs during a fault. The few technologies that consider the presence of DRs have not considered a current limited system when a fault occurs.</p> <p>As the amount of local generation (PV, microturbines ... ) is increasing, the existing distribution systems fault location methods do not always apply because of various reasons including cost, complexity of the system due to mesh-like system topology, and bidirectional power flow. This FSU invention takes advantage of the system topology, the presence of the controllable voltage source convertors (VSCs), and the change of the voltage profile with the presence of the fault. Using the VSCs to help locate the fault will help overcome the issue of relying on the measured value of voltage when the voltage has completely collapsed in a section because of a fault in the distribution system. Instead of hindering the fault location process, the VSCs are used to help support the voltage, locate the fault, and provide fast restoration.</p>
Methods for Implementing Stochastic Anti-Windup PI Controllers Emmanuel Collins 08-019 Michael Tentnowski <p>In the present invention, different circuit-based implementations of stochastic anti-windup PI controllers are provided for a motor drive controller system. The designs can be implemented in a Field Programmable Gate Arrays (FPGA) device. The anti-windup PI controllers are implemented stochastically so as to enhance the computational capability of FPGA. The invention encompasses different circuit arrangements that implement distinct anti-windup algorithms for a digital PI speed controller. The anti-windup algorithms implemented by the circuit arrangements can significantly improve the control performance of variable-speed motor drives.</p> <p>Compared with the existing technologies, the stochastic PI controller provides an efficient implementation approach that uses straightforward digital logic circuits but has the advantage of significantly reducing the circuit complexity. Therefore, the present invention notably improves the performance of the stochastic PI controller and saves digital resources in a motor drive control system. The immediate and/or future applications are motor drive controllers for induction motor systems, and more particularly, proportional-integral (PI) controllers. The use of the invention will increase the market of FPGA since the capability will be largely increased and the cost will be relatively reduced.</p>
Method of Mitigating Backlash of Mechanical Gear Systems Using a Damper Motor Michael "Mischa" Steurer 08-018 Michael Tentnowski <p>The technology developed comprises a torque damper motor connected to the output side of a mechanical gear system. The damper motor, along with its associated control system, mitigates backlash problems, reduced torsional resonance, and provides improved output torque control. In the preferred embodiment, the damper motor is powered by a power electronics-based variable speed drive. The damper motor can be significantly less powerful than the overall rating of the gear system (typically 5-10% of the overall rating) while still providing the enhanced performance.</p> <p>The invention can be applied to any rotating system having a gear train. The invention eliminates or at least mitigates many of the problems inherent in rotating gear systems. As one example, the invention could be used with many types of torque creating devices other than steam turbines, electric motors, and compressors. Likewise, although a was described in detail, the invention is equally applicable to speed-decreasing gear trains as well as speed-increasing gear train.</p>
A Self-Balanced Modulation and Magnetic Rebalancing Method for Parallel Multi-level Inverters Hui (Helen) Li 16-098 Michael Tentnowski <p>A power inverter which can provide sinusoidal voltage or current is the key apparatus in the field of electrical machine drive and utility interface, such as in renewable energy generation systems and energy storage power conditioning systems. In order to achieve a higher power rating, each phase of the inverter may be constructed of paralleled phase legs. If two paralleled legs are connected to an output terminal by a magnetic coupling device, such as an "inter-phase transformer", or a "multi-winding autotransformer", or an "inter phase inductor", the output terminal of each phase will have a multilevel staircase waveform, which is closer to the desired sinusoidal waveform. Therefore, the inverter will require smaller magnetic components while still providing the benefit of higher dynamic response.</p> <p>The technology developed provides a finite state machine (FSM) based modulation method for parallel multi-level inverters. Within this invention, a modulation waveform is fed into a comparator to compare with carrier waveforms. Then, a digitized ideal waveform is generated, and the digitized ideal waveform is fed into a finite state machine (FSM) module to generate a switching pattern for each switch of the parallel multi-level inverter.</p>
Photosynthetic Transcription Factors that Determine Bundle Cell Fate and Function Hongchang Cui 13-087 Brent Edington <p>Photosynthesis is one of the most important reactions on the earth because its products are the ultimate energy source for all living organisms and the food of the human beings. Depending on the number of carbon atoms in the initial organic compound made in photosynthesis, plants can be grouped into C3 or C4 plants. C4 plants are evolved from C3 plants, but they have several features that make them much more efficient photosynthetically than C3 plants:</p> <ol> <li>The enzyme for C02 fixation, called PEP carboxylase, is not inhibited by oxygen. In contrast, the C02 fixation enzyme in C3 plants, called RUBICO carboxylase, has an oxygenase activity, which reverses the photosynthetic reaction. The oxygenase activity is favored at high light and high temperature, making C3 plants perform even worse in warm area where crop yield potential is high.</li> <li>C02 fixation occurs in the mesophyll cells, whereas C3-type photosynthesis is performed in the bundle sheath (BS) cells, which surround the vascular tissue, using the C02 concentrated by and supplied from mesophyll cells.</li> <li>There are more vascular bundles (veins), hence more BS cells, and a greater number of channels between BS and mesophyll cells, which ensures rapid transport between these two cell types. C4 plants are also efficient in water utilization. Because many important crops are C3 plants, such as rice and wheats, huge resources have been invested to introduce C4 photosynthesis into C3 plants. Although BS cells are also present in C3 plants, they generally contribute little to photosynthesis and this cell type has therefore become a primary target for C3-to-C4 bioengineering. Despite extensive research, until now the mechanism that controls BS cell fate is still unknown.</li> </ol> <p>Our work identified three transcription factors (SCR, SCL23 and SHR) that are required for BS cell fate specification in Arabidopsis, a model C3 plant. SCR and SCL23 are both expressed specifically in BS cells. Though they act redundantly in determining the BS cell fate, they have distinct functions. Because similar genes are present in other plant species, including rice and maize, which is a C4 plant, we believe that similar mechanisms control BSC cell fate determination in all C3 and C4 plants. These bundle sheath cell determinants offer a novel and powerful tool for the C3-to-C4 engineering, which is regarded as a key solution to the demand for food and biomass by a rapidly growing world population.</p>
Central Executive Training for ADHD Dr. Michael Kofler 16-106 Michael Tentnowski <p>Attention-deficit/hyperactivity disorder (ADHD) is a complex, chronic, and potentially debilitating disorder of brain, behavior, and development that affects approximately 5.4% of school-aged children at an annual U.S. cost of illness of over $42 billion. Medication and behavioral treatment are effective for reducing symptoms, but they are considered maintenance therapies because their benefits disappear within minutes to hours after treatment is stopped. Clearly, novel treatments are needed.</p> <p> </p> <p>Central Executive Training (CET) is a novel, evidence-informed, computerized training protocol developed based on recent advancements in clinical and neuropsychological science. It differs fundamentally from existing, capacity-based “working memory training” programs. Each of CET’s 9 training games implement advanced algorithms to adapt based on the child’s performance and build capabilities across three, empirically-identified functions of the midlateral prefrontal cortex. These 3 functions involve dual-processing, continuous updating, and temporal ordering, and are collectively known as the brain’s ‘central executive.’</p> <p> </p> <p>Central executive abilities are targeted in CET based on fMRI evidence of significant cortical underdevelopment in these areas in children with ADHD. Importantly, our previous work has shown that hyperactivity and inattentive symptoms are most pronounced in children with ADHD when they are engaged in activities that challenge their underdeveloped central executive abilities. In fact, several studies have found that children with ADHD do not show attention deficits or hyperactivity during conditions with minimal central executive demands.</p> <p> </p> <p>Our preliminary data show that CET is superior to the current gold standard psychosocial treatment (behavioral parent training) for improving working memory in children with ADHD. Our data also show that CET is superior to the gold standard for reducing hyperactivity symptoms measured using high-precision actigraphs that sample children’s movement 16 times per second. CET was equivalent to the current gold standard for reducing ADHD symptoms based on parent report. A randomized clinical trial of CET is underway.</p> <p> </p> <p><a rel="noopener noreferrer" href="" target="_blank" title="">More on the NIH Award and a radio interview of Dr. Kofler.</a></p> <p> </p> ADHD
Automated Extraction of Bio-entity Relationships from Literature Dr. Zhang 12-065 Garrett Edmunds <p>The current invention discloses an automated and standardized software application, system, and method of extracting relationships, for example bio-entity relationships, in text or literature.</p> <p>The long-standing need for an improved, automated and more efficient text mining procedure is now met by a new and useful computer-implemented software application. The software is accessible from a non-transitory, computer-readable media and provides instructions for a computer processor to extract textual relationships or semantic information from non-annotated data by natural language processing and graph theoretic algorithm.</p> <h2>Advantages:</h2> <ul> <li>The present invention may address one or more of the problems (high incidence of error and high cost of text mining), and deficiencies (low efficiency and poor organization/standardized format) of the prior art.</li> </ul> <h2> Applications:</h2> <ul> <li>Building biomedical databases, search engines, knowledge bases, or any other applications that may use organized relationships of content within literatures.</li> </ul>
Economic Analysis System Julie Harrington 15-197 Brent Edington <p><strong>Citrones</strong> and <strong>Citronem</strong>  products are software supported Multiplier Matrix files,  based on economic business establishment variables, using standard business sector classifications such as the North American Industry Classification System (NAICS), or Standard Industrial Classification System (SIC), per geographic region (e.g., Nation, State, County, Zip Code, Congressional District, etc.).</p> <p><strong>Citrones</strong> and <strong>Citronem</strong>  products enable users to conduct economic and business research, such as industrial operations(IO) research, industrial clusters analyses and economic impact analyses (including direct, indirect and induced impacts) and economic forecasting, among other areas. The products provide a level of inter-industry detail that currently is not available in the market. For example, the typical economic impact model software product generates about 1,056 multipliers. However, when compared with <strong>Citrones</strong> and <strong>Citronem</strong>, which generates approximately 1.35 million multipliers, the there is a much higher resolution or level of inter-industry detail at the six digit level. The granular level of readily applicable and accessible multipliers with allow for exponentially greater detail and higher quality results for any economic impact analyses. The Multiplier Matrix, is available in a user friendly format (e.g. EXCEL, SAS and SPSS software). <strong>Citrones </strong>and <strong>Citronem</strong> is based on the largest sample of national establishments’ data available, and will easily compete (with an expected market advantage) with any product in its category in the current marketplace.</p>
Systems and Methods for Improving Processor Efficiency Dr. David Whalley 13-101 Michael Tentnowski <p>Dr. Whalley's team has created  a data cache systems designed to enhance energy efficiency and performance of computing systems. A data filter cache herein may be designed to store a portion of data stored in a level one (L1) data cache. The data filter cache may reside between the L1 data cache and a register file in the primary compute unit. The data filter cache may therefore be accessed before the L1 data cache when a request for data is received and processed. Upon a data filter cache hit, access to the L1 data cache may be avoided. The smaller data filter cache may therefore be accessed earlier in the pipeline than the larger L1 data cache to promote improved energy utilization and performance. The data filter cache may also be accessed speculatively based on various conditions to increase the chances of having a data filter cache hit.</p> <p>Furthermore,  tagless access buffers (TABs) can optimize energy efficiency in various computing systems. Candidate memory references in an L1 data cache may be identified and stored in the TAB. Various techniques may be implemented for identifying the candidate references and allocating the references into the TAB. Groups of memory references may also be allocate to a single TAB entry or may be allocated to an extra TAB entry (such that two lines in the TAB may be used to store L1 data cache lines), for example, when a strided access pattern spans two consecutive L1 data cache lines. Certain other embodiments are related to data filter cache and multi-issue tagless hit instruction cache (TH-IC) techniques.</p>
Sub-seasonal Forecasts of Winter Storms and Cold Air Outbreaks Dr. Ming Cai 16-090 Michael Tentnowski <p style="font-size: 18px;" class="font_8"> </p> <p class="lead">"Our technology is a dynamics-statistics hybrid model to forecast continental-scale cold air outbreaks 20-50 days in advance beyond the 2-week limit of predictability for weather."</p> <p style="font-size: 18px;" class="font_8"> </p> <p style="font-size: 18px;" class="font_8"><span style="font-size: 18px;">Professor Cai's team has developed a technology that allows them to make Sub-seasonal forecasts for cold air outbreaks in winter season. These forecasts are made on the basis of the relationship of the atmospheric mass circulation intensity and cold air outbreaks. The atmospheric poleward mass circulation aloft into the polar region, including the stratospheric component, is coupled with the equatorward mass circulation out of the polar region in the lower troposphere. The strengthening of the later is responsible for cold air outbreaks in mid-latitudes.</span></p> <p style="font-size: 18px;" class="font_8"><span style="font-size: 18px;">Due to the inherent predictability limit of 1-2 weeks for numerical weather forecasts, operational numerical weather forecast models no longer have useful forecast skill for weather forecasts beyond a lead time of about 10 days. Recently, the research carried out by Professor Cai and his team shows that operational numerical weather forecast models do possess useful skill for atmospheric anomalies over the polar stratosphere in cold seasons owing the models' ability to capture the poleward mass circulation into the polar stratosphere.</span></p> <p style="font-size: 18px;" class="font_8"><span style="font-size: 18px;">They calculate the stratospheric mass transport into the polar region from forecast outputs of the US NOAA NCEP's operational CFSv2 model and use it as our forecasts for the strength of the atmospheric mass circulation. The anomalous strengthening of it is indicative of the high probability of occurrence of cold air outbreaks in mid-latitudes.They further derive a set of forecasted indices describing a state of stratospheric mass circulation to obtain detailed spatial pattern and intensity of the associated cold air outbreak events. </span></p> <p style="font-size: 18px;" class="font_8"><span style="font-size: 18px;">Because cold air outbreak events are accompanied with development of low and high pressure systems and frontal circulations, our forecasts of cold air outbreaks are also indicative of snow, frozen rain, high wind, icy/freezing and other winter storm related hazards besides a large area of below-normal cold temperatures.</span></p> <p><a href="">Forecast website:</a></p> <p><a href="">Professor Cai in the news</a></p> <p> </p>
Accuracy and Fairness in Dead-Reckoning Based Distributed Games Using a Proxy Architecture Dr. Sudhir Aggarwal 05-150 Michael Tentnowski <p>The invention includes a method and apparatus for attempting to synchronize delivery of information at a plurality of receiving systems. The method includes generating, at a sending system, a plurality of current messages adapted for rendering an asset within an application space of a respective plurality of receiving systems, determining an accumulated export error for each of the receiving systems, transmitting the current messages toward the respective receiving systems in a manner adapted to reduce the accumulated export errors. The accumulated export error for a receiving system includes an estimated current message export error for a current message generated by the sending system for the receiving system and an accumulated previous message export error for at least one previous message generated by the sending system for the receiving system.</p> <p> </p> <p>Patent <span id="assigneeWarning" class="tooltip-hint style-scope patent-result">Currently Assigned</span> to Alcatel-Lucent SA and Florida State University Research Foundation Inc</p>
PetroOrg Software Yuri Corilo 13-093 Michael Tentnowski <p>Software specifically designed to process, assign, organize and visualize elemental composition of petroleum and its derivatives samples acquired by high resolution mass spectrometry.</p> <p> </p>
Fingerprint for Cell Identity and Pluripotency David Gilbert 12-028 Brent Edington <p>At Florida State University, we have developed a method to identify sets of regions that replicate at unique times in any given cell type (replication timing fingerprints) using pluripotent stem cells as an example, and show that genes in the pluripotency fingerprint belong to a class previously shown to be resistant to reprogramming in induced pluripotent stem cells (iPSCs), identifying potential new target genes for more efficient iPSC production. We propose that the order in which DNA is replicated (replication timing) provides a novel means for classifying cell types, and can reveal cell type specific features of genome organization.</p> <p>A major advantage of our fingerprinting method is in selection of a minimal set of regions that allow for classification with a straightforward PCR-based timing assay and a reasonably small set of primers, particularly if only cell-type specific regions are examined. Our results suggest that a standard set of 20 fingerprint loci can be effective for classification, but the number of regions queried can be adjusted based on the confidence level required. The sole requirement for replication profiling is the collection of a sufficient number of proliferating cells for sorting on a flow cytometer. Consistently, just as replication fingerprints can be generated for particular cell types or general categories of cells, features of replication profiles allow for the creation of disease-specific fingerprints, which may be valuable for prognosis. We have also identified regions that may undergo important organizational changes upon differentiation.</p>
System and method for Generating a Benchmark Dataset for Real noise Reduction Evaluation Dr. Adrian Barbu 15-046 Garrett Edmunds <p>Often images taken with smartphones or point-and-shoot digital cameras come out noisy due to lack of sufficient lighting. This low-light noise problem is widespread, being present in all of the smartphones in the world, more than 1 billion total. This problem generates in consumers disappointment and frustration with the quality of the images taken in low light. While a number of commercial denoising packages are already available on the market, the majority of them are trained on images corrupted by artificial noise, rather than trained on real low-light noisy images. Since artificial noise has different characteristics than real noise, these packages do not perform as well as a denoising algorithm trained on images corrupted by real noise as we have created.</p> <p>                We have developed a fully automatic state of the art algorithm (RENOIR) for denoising smartphone and digital camera images which have low-light noise problems. The RENOIR algorithm could be either; be sold directly to the public as a standalone application or could be licensed to smartphone or digital camera manufacturers to be embedded in their devices.</p> <p> </p>
A Robust Method to Measure the Temporal Order of Replication of all Chromosome Segments in a Cell Dr. Gilbert 12-102 Brent Edington <p>Cancers have unique replication timing fingerprints that hold great promise as a novel genre of biomarkers, and despite the heterogeneity in different individual cancers, each cancer more closely resemble their tissue of origin than they do other tissue types. This phenomenon demonstrates the great promise of replication timing profiling to determine tissue of origin for metastatic cancers.</p> <p><span style="font-family: inherit; font-size: 0.875rem; line-height: 1.4;"></span>There are many biomarkers on the market for cancer and most involve tests for chromosome abnormalities while some involve gene expression tests. Currently biomarkers are only partially effective at diagnosis. Our technology provides a completely novel genre of biomarkers that cannot be detected by any other existing method.</p> <p>This technology can provide a completely novel type of tissue of origin test, and queries the entire genome simultaneously and therefore is more comprehensive.</p>
Lipid Multi-Layer Gratings for Semi-Synthetic Quorum Sensors Dr. Lenhert 11-067 Brent Edington <p>The present invention provides a device comprising: a substrate, and a quorum sensor array on the substrate. The quorum sensor array comprises quorum sensors releasing signal molecules in response to one or more environmental signals being sense by the quorum sensors to thereby amplify the one or more environmental signals by causing a signal chain reaction in neighboring quorum sensors of the quorum sensor array, and wherein each of the quorum sensors comprises a lipid multi-layer structure.</p> <p>The present invention provides a method comprising the following steps: (a) detecting with a camera one or more light intensities of light scattered by one or more iridescent microstructures of a sample, and (b) determining a height of each of the one or more iridescent microstructures of the sample based on one or more light intensities detected in step (a) and a calibration profile for the camera, wherein the calibration profile is based on light intensities detected by the camera for light scattered one or more patterned arrays of standard iridescent microstructures of a calibration standard, and wherein each of the patterned arrays of iridescent microstructures comprises iridescent microstructures having the same shape and two or more different heights.</p>
Liposome Micro- and Nano-Arrays for Molecular Screens in Cell Culture Dr. Lenhert 11-191 Brent Edington <p>The proposed invention describes the use of surface supported liposome arrays as a platform for screening of molecular libraries in cell culture models. Drug candidates encapsulated into surface supported liposomes are arrayed on a surface to form lipid multilayer arrays. The surface has been functionalized to ensure liposome uptake by the cells. Cells are cultured on these arrays and their response to the liposomes are monitored optically. Multiple liposome compositions and different lipids or other additives printed onto the same surface can be simultaneously screened. The drugs that are and are not working can be determined by their position on the surface.</p> <p>Contrarily to actual small molecule microarrays for drug screening strategies our invention does not require to covalently attach to a surface, and cells can be grown on the surface. Covalent attachment of the small molecule on the surface prevents internalization of the compounds, limiting the types of tests that can be carried out. Furthermore, the number of molecules that a single cell can see is limited by the surface it contacts. Diffusion of small molecules from array sources, such as gels has also been used for screening, although molecular diffusion limits applicability of those methods. Using surface supported lipid multilayers encapsulating drug candidates solves these problems.</p> <h2>Applications:</h2> <ul> <li>Screening of delivery systems, particularly for lipophilic drug candidates</li> <li>Drug resistance cell screening, where cells from biopsies are cultured ex situ</li> </ul>
The Lookahead Instruction Fetch Engine (LIFE) Dr. David Whalley 08-033 Michael Tentnowski <p>The Lookahead Instruction Fetch Engine (LIFE) provides a mechanism to guarantee instruction fetch behavior in order to avoid access to fetch-associated structures, including the level one instruction cache (Ll IC), instruction translation look aside buffer (ITLB), branch predictor (BP), branch target buffer (BTB), and return address stack (RAS). Systems and methods may be provided for lookahead instruction fetching for processors. The systems and methods may include an L1 instruction cache, where the L1 instruction cache may include a plurality of lines of data, where each line of data may include one or more instructions. The systems and methods may also include a tagless hit instruction cache, where the tagless hit instruction cache may store a subset of the lines of data in the L1 instruction cache, where instructions in the lines of data stored in the tagless hit instruction cache may be stored with metadata indicative of whether a next instruction is guaranteed to reside in the tagless hit instruction cache, where an instruction fetcher may be arranged to have direct access to the L1 instruction cache and the tagless hit instruction cache, and where the tagless hit instruction cache may be arranged to have direct access to the L1 instruction cache.</p> <p>LIFE can both reduce energy consumption and power requirements with no or negligible impact on application execution times. It can be used to reduce energy consumption in embedded processors to extend battery life. It can be used to decrease power requirements of general purpose processors to help address heat issues. LIFE, unlike most energy saving features, does not come at the cost of increased execution time. It will result in a significant improvement over the state of the art and will extend the life of batteries making mobile computing more practical. Finally, it will allow general-purpose processors to run at a faster clock rate with similar heat being generated.</p>
Method to Identify the Molecular Structure of Large Biomolecules via IM/MS Christian Bleiholder, Ph.D. 17-008 Garrett Edmunds <p>This method uses data derived from Ion Mobility-Mass Spectroscopy (IM/MS) to computationally decipher molecular structures of proteins, protein assemblies, and protein-small molecules interactions.</p> <p><span style="text-decoration: underline;"><strong>Advantages</strong></span></p> <ul> <li>Enables high-throughput large-scale systematic fragment-based drug discovery</li> <li>Requires a fraction of the sample amounts and time</li> <li>Uses systems already available to most pharmaceutical and therapeutics companies.</li> </ul> <p><strong><span style="text-decoration: underline;">Introduction and Applications</span></strong></p> <p>This technology has the potential to revolutionize the field of drug discovery, especially fragment-based drug discovery, by elucidating the molecular structure of biomolecules and any bound ligands with high fidelity. </p> <p>Currently, structural characterization in drug discovery is often undertaken with techniques such as x-ray crystallography, nuclear magnetic resonance, or cryo-EM. These traditional methods require significant sample amounts, purified samples, and are poorly suited for high-throughput screening assays. Further, many potentail targets are not amenable to structural characterization by these methods, including, for example, the soluble protein assemblies implicated as toxic agents in Alzheimer's or Parkinson's diseases.</p> <p>In contrast, the current method exhibits sufficient sensitivity, sample-throughput, and dynamic range to enable the high-throughput, large-scale systemic screening of small molecule-target interactions. Additionally, the samples can be studied in a manner that more closely mimics their natural conditions, including flexible branches and glycan moieties that other methods often miss.</p> <p><span style="text-decoration: underline;"><strong>The Technology</strong></span></p> <p>The biomolecules of interest are analyzed in a few minutes via IM/MS. The output is then analyzed computationally, providing structural characterization. The program can be modified to work with in-house supercomputers or with cloud-based computing services, such as Amazon's AWS.</p> <p> </p> <p><span>Click here to watch an interview with Dr. Bleiholder: <span class="fa fa-caret-square-o-right"></span><span class="fa fa-blind"></span><span class="fa fa-check-circle"></span><span class="fa fa-hand-o-right"></span><a href=""></a></span></p> Drug discovery,fragment based drug discovery,computational chemistry
Method for Real-Time Probabilistic Inference with Bayesian Network on GPGPU Devices Robert Van Engelen 17-013 Michael Tentnowski <p>General Purpose Graphics Processing Unit (GPGPU) devices are used in most PCs for graphics, popular for high-performance computing, and relatively inexpensive. However, algorithms must be specifically designed for these devices.</p> <p>The proposed invention consists of a process and a method for efficient probabilistic inference with Bayesian probabilistic networks on GPGPU devices. Bayesian probabilistic networks are widely used for modeling probability beliefs in computational biology and bioinformatics, healthcare, document classification, information retrieval, data fusion, decision support systems, security and law enforcement, betting/gaming and risk analysis.</p> <p> The invention consists of:</p> <ol> <li>A novel “parallel irregular wavefront process” for importance sampling with Bayesian probabilistic networks, such that this process is tailored to the specific FPFPU device being used</li> <li>A novel method to structure the Bayesian probabilistic network in GPGPU local memories to ensure optimal data access.</li> </ol> <p>This invention increases the efficiency of probabilistic inference with Bayesian probabilistic networks on GPCPU devices. This is achieved by the specialized organization of data in the memory of these devices and by the optimized parallel process to produce results faster. The efficiency and performance increases commensurate with increasingly larger Bayesian probabilistic networks, i.e. the approach scales favorably with larger networks thereby making real-time probabilistic inference possible on large data sets and realistic applications.  </p>
CNN Filters for Noise Estimation and Improved Denoising in Low-Light Noisy Images Adrian Barbu 17-019 Garrett Edmunds <p>The proposed invention is a system and method for training a Convolutional Neural Network (CNN) to predict a tuning parameter to be used in an existing image denoising method (called BM3D) to obtain best possible denoising results on images obtained by digital cameras in low-light conditions. The performance of the BM3D denoising algorithm varies with this tuning parameter.</p> <p>In this work we present a method to predict the best parameter value for each image patch and we observe that using this prediction we obtain better results than using a fixed parameter value for all images.</p> <p>There are many image denoising methods available today. However, they are trained and tested on artificial noise. According to our observations, when it comes to images corrupted by real low light noise the BM3D method works best. Our work takes the BM3D method and enhances it by predicting what its tuning parameter should be for each image patch being denoised.</p> <p>This technology could be directly sold to consumers in the form of an app or embedded in a mobile phone or digital camera.</p> <p> </p>
Hypergeometric Solutions of Second Order Linear Differential Equations Dr. Mark van Hoeij 19-008 Brent Edington <p>Researchers, scientists, and engineers across a wide range of fields of expertise depend on computer algebra systems to solve complex equations such as linear differential or difference equations. Solutions to these equations cannot often be expressed by a closed-form expression. Functions are in closed form if they are written in terms of commonly used functions such as exp and log. Using computer systems to solve equations that cannot be expressed by a closed-form expression leads to an error or no solution being found. This can lead one to believe that there is no solution to the equation, even if this is not the case.</p> <p>Dr. Mark van Hoeij has extensively research unsolvable equations such as second order linear differential equations. He has created a novel algorithm to find closed form solutions to previously unsolvable equations. This state of the art algorithm can be implemented into current computer algebra systems.</p> <h2><strong>Advantages</strong></h2> <ul> <li>State of the art algorithm to find solutions not readily available</li> </ul> <ul> <li>Easily integrated with current software</li> </ul> mathematics,software,analytics,analytical software,algebra,computer system,code
5G Request Schemes Zhenghao Zheng 18-054 Michael Tentnowski <p>The next generation cellular network, 5G, is expected to far exceed the current LTE network in many aspects including user density, latency, and network speed.  Physical Random-Access Channel (PRACH) and Scheduled Request (SR) schemes are based on an Analog Bloom Filter for 5G networks. The User Equipment (UE) needs to inform the base station about its intention for initiating a connection or data transmission. In the LTE network, each base station has 64 orthogonal sequences, and a UE randomly picks a sequence to transmit on the PRACH channel. As the number of sequences is limited, the probability of collision, i.e., two UEs picked a same sequence, is high.</p> <p>This procedure uses PRACH and SR, when the UE is in the disconnected mode or the connected mode, respectively. With PRACH, a UE can transmit multiple signals (sequences), to the base station, instead of only one sequence with the LTE systems.  The advantage of this scheme is that the collision probability (probability that two UEs picked exactly the same signal to transmit) is dramatically reduced, because the number of different combinations of sequences (2048), is much more than the number of sequences (64) for an LTE base station.  A new decoding algorithm copes with the unique challenges in the signal generated with ZC sequences, such as peak shifting and multiple peaks.  The new scheme allows the UE to piggyback approximately three (3) bits of information along with the signal.  Evaluation shows that the new scheme outperforms the existing PRACH of LTE by more than an order of magnitude making it a good candidate for 5G networks.</p> <p> </p>
Interactive Large Scale Data Profiling Mikhail Gubanov 21-021 Michael Tentnowski <p>Data profiling is a set of statistical data analysis activities and processes to determine properties of a given dataset.  A dataset has millions of tables, where their metadata (i.e. titles, attribute names and types) becomes abundant, similar to data instances and its profiling.  WebLens is an interactive, scalable metadata profiler for large-scale structured data.  It is a new data structure-metadata-profile coupled with Machine/Deep-Learning models trained to construct it. It represents a metadata summary of a specific real-world object collected over millions of data sources. These profiles significantly simplify access to largescale structured datasets for scientists and end users.</p>
ZCNET Computer Program Zhenghao Zhang 19-043 Michael Tentnowski <p>A wireless communication technology for Low Power Wide Area Networks (LPWAN). The Internet of Things (IoT) applications depend on LPWAN to connect a large number of low power devices to the Internet over long distances. ZCNET achieves significantly higher capacity (20x over LoRa), while using less resources. ZCNET supports 8 parallel channels within a single frequency band that do not severely interfere with each other, and ZCNET can resolve collisions inside a channel by using a small range for each node.  ZCNET has been extensively tested with real-world experiments on the USRP and trace-based simulations.</p>
Computer Processing Architecture David Whalley 19-018 Michael Tentnowski <p>Micro-architecture designs and methods for computer processing architecture, including an instruction cache for storing producer instructions, a half-instruction</p> <p>cache for storing half instructions, and eager shelves for storing a result of a first producer instruction. The computer processing architecture may fetch the first producer instruction and a first half instruction; send the first half instruction to the eager shelves; based on execution of the first producer instruction, send a second half instruction to the eager shelves; assemble the first producer instruction in the eager shelves based on the first half instruction and the second half instruction; and dispatch the first producer instruction for execution.</p>
Power-Aware Redundant Array of Independent Disks (PARAID) An-I Wang 05-102 Michael Tentnowski <p>A system defining a power-aware redundant array of identical disks that includes multiple data-storing disks that store multiple data blocks in a skewed stripping pattern. The PARAID further includes a disk manager for selectively powering on the plurality of disks based upon user demand. A PARAID disk driver is provided and includes a PARAID level module to operate within a computing environment by segmenting data among the array of independent disks in a skewed striping pattern. The disk driver includes a gear-shifting logic and monitoring modules for selectively causing the PARAID to operate in a particular gear.</p>
Targeted Data Extraction System and Method Sudhir Aggarwal 18-039 Michael Tentnowski <p>Mobile devices document different scenarios that are encountered by users as they go about their daily lives.  This data may be of significant forensic interest to an investigator.  The owner of the phone may be willing to provide access to this data (through a consent agreement), but it is usually contingent upon limited data extracted for analysis, either due to privacy concerns or due to personal reasons. Only filtered data should be extracted, so a targeted data extraction system (TDES) for mobile devices was developed using machine learning techniques. This system can be used to identify and extract selected data from smart phones, in real time at the scene of a crime.</p>
Decoupling Address Generation and Data Access (DAGDA) David Whalley 16-078 Michael Tentnowski <p>Improving application efficiency by decoupling address generation and data access (DAGDA) featuring prepare to access memory (PAM) instruction, address generation structure (AGS).  Associate DTLB access and L 1 DC tag check with address generation in a PAM instruction that reduces energy usage by avoiding many accesses to the DTLB and L 1 DC tag arrays and improves performance by obtaining loaded data earlier in the pipeline by prefetching data.</p>
Vault App Identification and Extraction (VIDE) Gokila Dorai 21-058 Michael Tentnowski <p>A method for mobile devices that identifies content hiding applications from the App Store.  Content hiding (or vault) apps allow users to hide photos, videos, documents, and other content securely. A subclass of these applications called decoy apps further supports secret hiding by having a model that mimics standard apps such as calculators but can turn into a vault-app through entering a specific input. This is an effective and very fast identification of content hiding apps through a two-phase process: initial categorization using keywords followed by more precise binary classification that extracts the hidden data from the apps on a smartphone.</p>
Covid-19 Self Defense Shuyuan Ho 21-003 Michael Tentnowski <p>A mental health approach to provide mobile phone users with situational awareness during a pandemic, with the goal of protecting and defending personal health.  Several individual risk reduction measures were developed to help users manage personal health. This user-centric and privacy-centric approach empowers users with tools, utilities and services to bolster the ability to manage complex health information, as well as privacy rights to personal information.  The two most important features are a social distance nudge, and a quarantine monitor.</p>
EarDynamic User ID Jie Yang 21-051 Michael Tentnowski <p>Ear canal deformation-based user identification system using ear wearables (earables). Earables include three types: headphones, earbuds, and earphones, which are over-ear, on-ear, and in-ear listening devices. When wearing, the identification process is triggered on-demand or continuously depending on the application. This provides continuous and passive user identification by ear canal deformation that combines the static geometry and dynamic motions of the ear canal when a user is speaking. Acoustic sensing captures canal deformation, and extensive experiments show that it achieves high identification accuracy and works well in noisy environments.</p>
Florida State Terrestrial Radiation Calculator Robert Ellingston 19-033 Michael Tentnowski <p>FSTRC is an iPad/iPhone application that enables students and researchers alike to visualize and quantify several terrestrial radiation quantities important for understanding many climate and remote-sensing problems. The GUI allows users to input atmospheric data into a calibrated radiative transfer model that calculates the specific parameters of manipulation, display, listing, and/or saving including; up-and-downwelling spectral radiance, spectrally integrated radiance, flux densities, cooling rates, vertical and spectral distributions, and radiative forcing.</p>
Diagnostic Elementary Reading Profile App Yaacov Petscher 17-011 Brent Edington <p>This novel app uses empirical classification schemes via latent mixture model &amp; classification and regression tree analysis (CART) to classify students into profiles of readers based on their fluency performance in K-2 at the fall, winter, and spring. The empirically derived classification schemes (decision rules appended to this documentation) are generated based on the user input of a set of fluency scores. The purpose of the system is provide teachers, parents, school administrators and students a set of recommended practices for instruction based on empirical classifications. The current state of score profiling is such that the teacher is supposed to group students based on performance of one assessment, yet when the student is administered a group of assessments (n &gt; 1), it is difficult to 1) reliability group students together, 2) group students in a manner that is valid, 3) make rapid sense of the relative strengths and weaknesses of student reading scores and 4) provide appropriate instruction and/or remediation based on the groupings. By using the Diagnostic Elementary Reading Profile app, students will be automatically sorted into empirically derived groupings at any given time-point during kindergarten through second grade. This will reduce assessment and work time for the teacher as the sorting and recommendations will occur automatically. The appended decision rules were normed on a set of 60,000 students that are nationally representative in terms of race/ethnicity, achievement, socio-economic status, and English language status. A major advantage is the app automatically classifies students into reliable and valid groups for instructional purposes in the K-2 classrooms. Present workarounds in the field are largely theoretically drive guesses without data-drive support. The novel feature is the use of mixture modeling along with classification and regression tree (CART) to empirically define the rules for classifying students into profiles.</p>
Computer Adaptive Testing Simulation and Analysis Based on Item Response Theory Cody Diefenthaler 17-027 & 17-028 Brent Edington <p>WebCatCore is a novel framework for Computer Adaptive Testing (CAT) deliverable via the web. This tool takes an input item pool (such as 1P, 2P, and 3P models) and custom test criteria (such as stop rules, standard error thresholds, etc.) and delivers items for administration based on Item Response Theory (IRT) methodology. This easily configurable, plug and play system is an ideal solution for integrating Computer Adaptive Testing into web learning platforms. WebCatCore handles any customization requirements needed by providing configurable variables and consumable endpoints. The logic, algorithms, and methodology are all self-contained within the framework, making the porting process straightforward. Using WebCatCore will drastically reduce development time and cost.</p> <p>WebCatSlim is a novel web platform which works seamlessly with WebCatCore. This platform simulates and analyzes item pools designed for CAT. This platform loads administering item pools based on custom test criteria, and simulates the administration of the test across a user-defined range of simulated abilities. Once complete, the simulations are analyzed according to industry-standard test evaluation metrics, then visualized into grades, charts, and tables. The simulation results can be exported into data files which can be loaded at a later date. The simulation analysis visualizations support print functionality. WebCatSlim provides a way for researchers and test evaluators to simulate administration regardless of operating system. Additionally, the visualization of graphics, charts, and tables allows experts and non-experts to easily understand and analyze simulated test performance metrics.</p>
Successful Co-Parenting After Divorce Dr. Karen Oehme 17-049 Brent Edington <p>This novel evidence-based approach is a skills-based training which teaches divorcing parents how to lower conflict and increase cooperation. This toolkit consists of beloved videos including showing parents using effective communication and communication which is not helpful. The toolkit teaches families and professionals about the effects of divorce and helps them build and support healthy co-parenting relationships for the benefit of the children involved. The training and videos are applicable to parents, family members, social workers, licensed mental health counselors, and other professionals.</p>
Data-Driven Recirculating Aquaculture System Moses Anubi 21-055 Michael Tentnowski <p>A recirculating aquaculture system with a data-driven control strategy that improves the growth rate of cultured species (ex: shrimp, tilapia), minimizes required feed, reduces water consumption by improving waste removal from recirculating water, and provides robustness against uncertainty and disturbances. The system uses low-cost and readily available sensors to obtain estimates of concentrations of hard to measure target parameters such as ammonia, nitrate, nitrite, chemical oxygen demand, and phosphate).  It is controlled in real-time using data-driven (including machine learning) algorithms.</p> <p>In addition to the main culture tank, the system houses bioreactors for nitrification and denitrification in the waste removal process. The type of reactor varies but may include a mixed bed biofilm reactor (MBBR) and an anaerobic suspend growth reactor or sequencing batch reactor (SBR). These reactors are equipped with sensors and dosing pumps to cultivate a monitored biomass (biofloc). An intelligent control strategy is constructed from measurement data to optimize the waste removal ability of the biomass and to track reference setpoints which can be sized appropriately to feed plants in an aquaponics or hydroponics operation. The purpose of this design is to create a semi-automated method to continuously monitor and control aquaculture systems for maximum food production.</p>
TnB LoRa: Peak Identification & Block-Based Error Correction Zhenghao Zhang 22-036 Michael Tentnowski <p>TnB is designed for LoRa networks to improve capacity and communication performance. LoRa is currently the strongest contender as the technology for Low Power Wide Area Networks (LPWAN), where many nodes connect to base stations over long distances. TnB improves the capacity of a LoRa network by more than 2-3-fold, due to a novel algorithm that can decode packets that are transmitted by multiple nodes simultaneously and do so more reliably. An intelligent algorithm decodes error correction codes used in LoRa and can quickly correct the number of errors. There is no need for modification in TnB so a network operator can simply replace its base station hardware and experience immediate performance improvements.</p>
Software Code Fast Computing Gaussian Process Regression Chiwoo Park 20-048 Michael Tentnowski <p>Gaussian Process (GP) regression is a popular Bayesian nonparametric approach for non-liner regression analysis.  It has many useful applications in remote sensing, spatial data analysis, and simulation meta-modeling.  However, its computation is prohibitively expensive when the amount of data is very large.  This software code implements an inexpensive approximate computation algorithm to achieve a Gaussian Process regression solution quickly and accurately.  The name of the approximation algorithm is the Patchwork Kriging.  The inventor developed it in 2019. </p> <p>The Patchwork Kriging involves partitioning the regression input data into multiple local regions with a different local Gaussian Process models that are fitted in each specific region.  Unlike existing local Gaussian Process models, this application introduced a technique which can patch together the local Gaussian Process models nearly seamlessly to ensure that the local Gaussian Process models for two neighboring regions produce nearly the same response prediction and prediction error variance on the boundary between the two regions.  This largely mitigates well known discontinuity problems that tend to degrade the prediction accuracy of existing locally partitioned Gaussian Process methods over regional boundaries. </p> <p>Advantages</p> <ul> <li>Accuracy in estimations</li> <li>Differentiation between neighboring area and their calculations</li> </ul>
A Software-Based Error Compensation Module to Improve 3D Printing Productivity Hui Wang 23-012 Michael Tentnowski <p>This technology is a software-based module that can automatically adjust printing parameters (printing speed, acceleration, and extrusion rate) in the G-codes for 3D printing (fused deposition modeling) eliminate errors when printing at high speed. The purpose of this software is to help increase printing speed without jeopardizing printing quality, thereby improving printing productivity, especially when printing a large structure. This invention can be used by individuals or small manufacturers.</p>
COVIDKG - a Web-scale COVID-19 Interactive, Trustworthy Knowledge Graph Mikhail Gubanov 23-041 Michael Tentnowski <p>COVIDKG (KG) is a technology that can be used to automatically construct and refresh a Scientific Knowledge Graph having all the latest trustworthy, vetted medical information. It can also be used to process vetted data during future pandemics, such as Monkeypox, Polio, Zika, Ebola, or any new virus.</p>
Voltage/Current-sensing-less Short-circuit Protection and Localization Method for Power Devices/Modules Hui Li 23-043 Michael Tentnowski <p>A voltage/current-sensing-less short-circuit (SC) protection for power devices that can identify which device has a SC fault within power modules or converters. It does NOT require sensing voltage or current magnitude of power device to detect and localize the SC fault, therefore it is low cost and enhances the noise immunity and reliability. This method can be applied to all switching power devices including muti-phase converters, modular converters, multilevel converters, and modular multilevel converters.</p>
Blanking-time-less Desaturation Protection Method for Power Devices Hui Li 23-044 Michael Tentnowski <p>A blanking-time-less desaturation protection method for power devices, by which the fault response time is shorter than the blanking time required by the existing protection methods.</p>