Patents by Inventor Weidong Xu

Weidong Xu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100223392
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for input queued content switching using a playlist. A retrieval sequence is generated using a plurality of content requests based on content location information. A first portion of content is requested to be queued at a first content source, and a second portion of content is requested to be queued at a second content source. A content stream of the first portion and the second portion of content is generated using the retrieval sequence. The generating includes selecting the first portion of content from a queue associated with the first content source and transferring the first portion of content to an output buffer, then terminating transfer of the first portion of content and initiating transfer of the second portion of content from a queue associated with the second content source. The portion of content in the output buffer is transmitted to a client device.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Applicant: Verivue, Inc.
    Inventors: Daniel Pond, Thomas V. Radogna, Weidong Xu, Qin-Fan Zhu, Steve Branam, Craig Frink, Michael G. Hluchyj, Santosh Krishnan
  • Publication number: 20100215057
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for canonical scheduling for heterogeneous content delivery. A content stream of bits is preprocessed by dividing the content stream of bits into data packets and assigning a timestamp to each data packet. The preprocessed content stream of bits is transmitted upon request from a receiver. A second timestamp based on the assigned timestamp from at least a portion of the respective data packets is established. The data packets are scheduled for transmission based on the second timestamp. The data packets are transmitted based on the schedule.
    Type: Application
    Filed: February 24, 2009
    Publication date: August 26, 2010
    Applicant: Verivue, Inc.
    Inventors: Craig Frink, Santosh Krishnan, Weidong Xu, Qin-Fan Zhu
  • Publication number: 20100189122
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for efficiently storing transport streams. A first sequence of one or more packets associated with the first transport stream is received, the first sequence comprising one or more data packets. A storage packet is generated by selecting one or more packets from the first sequence, the storage packet comprising a packet header and the one or more data packets. One or more null packet insertion locations are identified in a second sequence of one or more packets associated with a second transport stream. Null packet insertion information is generated based on the one or more null packet insertion locations, the information including data indicative of a reconstruction parameter related to reconstructing the second sequence from the storage packet by inserting one or more null packets that are not stored in the storage packet, wherein the packet header includes the null packet insertion information.
    Type: Application
    Filed: January 23, 2009
    Publication date: July 29, 2010
    Applicant: Verivue, Inc.
    Inventors: Shirish Dandekar, Craig Frink, Santosh Krishnan, Weidong Xu, Qin-Fan Zhu
  • Publication number: 20100189131
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for scalable seamless digital video stream splicing. Data packets in a first video stream of bits are rearranged. Placeholder packets are created in a second video stream of bits. The first video stream of bits and the second video stream of bits are combined to generate a spliced stream by inserting data packets from the first video stream of bits into the placeholder packets in the second video stream of bits.
    Type: Application
    Filed: January 23, 2009
    Publication date: July 29, 2010
    Applicant: Verivue, Inc.
    Inventors: Steve Branam, Craig Frink, Santosh Krishnan, Weidong Xu, Jean Zhou, Qin-Fan Zhu
  • Publication number: 20100105024
    Abstract: A rapid test kit may have a genetic probe, and antibody detecting probe or a combination of a genetic probe and an antibody detecting probe disposed within one or more test windows of the test kit. A cellulose filter paper membrane with a flow rate selected in a range of about 0.04 to about 0.4 ml/min/cm2 is used in one example. The test kit provides for rapid screening for DNA, RNA or fragments of DNA or RNA in a bodily fluid or antibodies indicating exposure to such DNA/RNA. The genetic probe may include single stranded DNA or a fragment of single stranded DNA, such as primer, immobilized on the filter paper, and a single stranded DNA, such as the same or a different primer, conjugated with a marker, such as a nanotube or nanoparticle. For example, a gold nanoparticle or a carbon nanotube may be used as a staining agent by conjugating the gold nanoparticle or the carbon nanotube to a genetic probe, such as a DNA primer capable of binding with a complementary DNA or viral RNA or a fragment of one of these.
    Type: Application
    Filed: April 16, 2009
    Publication date: April 29, 2010
    Applicant: Transgenex Nanobiotech, Inc.
    Inventors: Weidong Xu, Shyam Mohapatra, Arun Kumar
  • Publication number: 20090265856
    Abstract: A dust collecting device comprising a dust collector comprising a port; and a dust collecting mattress comprising a mattress cover, a mattress working face, and a dust exhaust; the port is connected to the dust exhaust via a dust pipe; the mattress working face is formed with a plurality of small holes connected to the dust exhaust; a plurality of stiffening ribs is disposed between the mattress cover and the mattress working face, and a clearance space is formed between the stiffening ribs; the stiffening ribs are concave in shape; and a raised hollow ring is formed along the outer edge of the dust collecting mattress.
    Type: Application
    Filed: May 30, 2008
    Publication date: October 29, 2009
    Inventors: Weidong XU, Shuichun Zhou
  • Publication number: 20090181361
    Abstract: A rapid test kit has a cellulose filter paper with a flow rate selected in a range of about 0.04 to about 0.4 ml/min/cm2, such that rapid screening for disease or other conditions amendable to detection of antibodies or antigens may be made using bodily fluids, such as blood, serum and plasma. In one example of a process for using a rapid test kit, a diluting buffer dilutes a sample of a bodily fluid and is presented directly on a test area of the test kit, then a staining reagent, such as protein A conjugated with colloidal gold or another chromophore is added to the test area, and a destaining buffer is added to improve background contrast. By combining antigens capable of detecting antibodies of infectious and/or non-infectious agents, the rapid test has improved specificity and sensitivity compared to other tests, while using whole blood, serum and plasma in less than two minutes.
    Type: Application
    Filed: January 14, 2008
    Publication date: July 16, 2009
    Inventors: Weidong Xu, Shyam Mohapatra, Arun Kumar
  • Publication number: 20080262990
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 29, 2007
    Publication date: October 23, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080262991
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 29, 2007
    Publication date: October 23, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080229415
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 29, 2007
    Publication date: September 18, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080214437
    Abstract: Methods, compositions and devices are provided by the present invention for reducing activity of a natriuretic peptide receptor and other signals. Therapeutic treatments are provided by use of polynucleotides encoding a natriuretic peptide or by regulating the expression of natriuretic peptide receptor, such as NPRA and NPRC, or combinations of these therapies. Routes used for delivering polynucleotides encoding a natriuretic peptide, or, for example, siRNA that down regulates natriuretic peptide receptor include subcutaneous injection, oral gavage, transdermal and intranasal delivery routes. Compositions can include chitosan, chitosan derivatives, and chitosan derivative and a lipid. Transdermal delivery can use a transdermal cream. Intranasal delivery can use a dropper or an aspirator for delivery of a mist. Oral gavage delivers equivalent to oral delivery.
    Type: Application
    Filed: November 30, 2007
    Publication date: September 4, 2008
    Inventors: Shyam S. Mohapatra, Weidong Xu, Xiaoyuan Kong, Xiaoqin Wang, Subhra Mohapatra
  • Publication number: 20080162390
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 24, 2007
    Publication date: July 3, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080133518
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 24, 2007
    Publication date: June 5, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080134330
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 24, 2007
    Publication date: June 5, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080133517
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 24, 2007
    Publication date: June 5, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20070265204
    Abstract: This invention pertains to inhibitors of atrial natriuretic peptide receptor A (NPRA) function, such as small interfering RNA (siRNA), useful for reducing the inflammation associated with many human diseases, such as asthma, respiratory syncytial virus (RSV) infection, and cancers (such as melanoma, lung cancer, and/or ovarian cancer) by interfering with NPRA gene expression or otherwise reducing NPRA function within a subject; and methods for treating a subject suffering from, or at risk of developing, an inflammatory disease, respiratory allergy (such as allergic rhinitis and asthma), viral infection, and/or cancer by administering such NPRA inhibitors to the subject.
    Type: Application
    Filed: April 30, 2007
    Publication date: November 15, 2007
    Applicant: University of South Florida
    Inventors: Shyam Mohapatra, Weidong Xu, Xiaoyuan Kong, Xiaoqin Wang
  • Publication number: 20070192863
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: December 13, 2006
    Publication date: August 16, 2007
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen Justus, JC Ferguson, Yevgeny Korsunsky, Paul Gallo, Charles Lee, Timothy Martin, Chunsheng Fu, Weidong Xu
  • Patent number: 5305424
    Abstract: A fuzzy inference system and its method of operation. The system comprises an inference unit (30) of pipeline architecture, a control unit (20) for controlling the operation of the inference unit, and a host computer (10) for supervising the entire operation. A plurality of inference rule groups (referred to as rule cells) each for controlling an object to be controlled are stored in a rule memory (22) of the control unit (20). The rule cell is composed of a number of path codes. The path code includes object data to be processed and operation codes. The operation codes are to control each of processing/operation sections (31 to 35) of the inference unit (30).
    Type: Grant
    Filed: July 26, 1990
    Date of Patent: April 19, 1994
    Assignee: Apt Instruments (N.A.) Inc.
    Inventors: Xiwen Ma, Hongmin Zhang, Weidong Xu