Search Technologies
Displaying 1 - 10 of 44 results
Researchers at the University of Maryland have created hundreds of innovations that are available for licensing. Our Discovery Portfolio contains an exciting mix of vaccines, drug targets, therapeutics, devices and cutting edge techniques that promise to make a quantifiable impact on human health and the environment.
Search by keyword:
-
A Method of Matrix Spectral Factorization
Published Sunday, June 29, 2014BackgroundSpectral factorization is a method of reducing a matrix of a high order dimension into a series of smaller matrices to perform more efficient computations. Spectral factorization has broad applications, including signal and image filtering, control systems, data processing, and data compression. However, spectral factorization...
Categories: Software + Algorithm
Keyword(s): signal processing, matrices, data compression
Docket: IS-2008-049
-
An Easy-to-Deploy Temporal Thermographic Data Collection and Analysis System
Published Thursday, May 3, 2018Buildings in the United States consume a significant amount of energy and release an increasing amount of CO2. Accordingly, tools and techniques have been developed to determine where energy efficiency in buildings can be improved. One such technique is thermography, where auditors determine energy inefficiency using a thermal camera that shows...
Categories: Software + Algorithm, Information Technology
Keyword(s): temporal, thermography, visualization, energy, efficiency
Docket: PS-2017-069
-
Automated Kriegspiel Chess Player
Published Monday, July 27, 2009Kriegspiel is a chess game played without visual awareness of the opponent pieces and opponents do not know what moves an adversary has made.One needs three boards for the game traditional game. Players receive partial information from a referee that allows them to guess where the opponent's pieces may be. Only a referee knows exactly...
Categories: Information Technology, Software + Algorithm, Education/Training/Multimedia
Keyword(s): chess, board game, computer game
Docket: IS-2006-015
-
Bistro: A System for Building Scalable Wide-Area Upload Applications
Published Wednesday, May 23, 2001Tremendous increases in network traffic are a major obstacle to achieving scalability in the Internet and other large networks. At the application layer, hot spots are usually caused by either (a) high demand for some data or (b) high demand for a certain service. Hot spots in download applications mostly result from a demand for popular data...
Categories: Information Technology, Software + Algorithm
Keyword(s): upload, Internet, GIS, Taxes, hot spots
Docket: IS-2000-014
-
Community-led Action in Response to Violent Extremism (CARVE) Training Course
Published Wednesday, February 28, 2018Community-led Action in Response to Violent Extremism (CARVE) is a 4-hour self-paced online course designed for a U.S.-based audience to provide community-focused, rigorously researched, and academically-informed instruction on Countering Violent Extremism (CVE). Targeted at the FEMA "awareness" training level, this FEMA-certified course is...
Categories: Software + Algorithm, Education/Training/Multimedia
Keyword(s): course, extremism, community
Docket: IS-2017-099
-
Compressive Radar Imaging Technology
Published Sunday, June 29, 2014The military utilizes the mapping of targets and terrain to provide much needed information for its field operations. Synthetic Aperture Radar (SAR) has been used in this capacity to provide a quality map for these operations. Researchers in the Department of Electrical and Computer Engineering at the University of Maryland–College...
Categories: Software + Algorithm, Aerospace, Engineering
Keyword(s): defense, radar, compressed imaging, mapping, environmental monitoring
Docket: IS-2009-018
-
Conservation Dependencies
Published Wednesday, October 3, 2012Many constraints and rules have been used to analyze data quality: functional, inclusion and sequential dependencies, association rules, etc. Additionally, a broad class of tools not covered by existing constraints may be identified, where a “conservation law” exists between related quantities. Conservation laws, however, are obeyed only to...
Categories: Information Technology, Software + Algorithm
Keyword(s): Data Analysis, confidence measure, data mining
Docket: IS-2011-006
-
Discriminative Facial Verification Software
Published Monday, January 29, 2018In recent years, the performance of face verification systems has significantly improved using deep convolutional neural networks (DCNNs). A typical pipeline for face verification includes training a deep network for subject classification with softmax loss, using the penultimate layer output as the feature descriptor, and generating a cosine...
Categories: Software + Algorithm
Keyword(s): machine learning, neural networks, facial recognition, face verification
Docket: IS-2017-039
-
Efficient Mechanisms for Thread Handling in Multithreaded Computer Systems
Published Tuesday, November 11, 2014During the 1980s and the early 1990s, quite a few very talented computer science researchers worked on the following problem: Seek the "ultimate" parallel programming model that will allow easy expression of parallel algorithms and their programs in the model, as well as validation of the model by algorithmic paradigms and solutions for as many...
Categories: Information Technology, Software + Algorithm
Keyword(s): parallel computing, multithreading, SIMD, threading, algorithms
Docket: IS-2006-005
-
IMPACT Agent Development System
Published Wednesday, October 11, 2000An intelligent agent is a program that gathers information or performs other services without a user's immediate presence and on a regular schedule. Typically, an agent program, using pre-set parameters, searches and gathers information of interest on a network, and presents it to the user on a periodic basis. For example, agents have been...
Categories: Information Technology, Software + Algorithm
Keyword(s): 525
Docket: IS-99-094