Abstract: A sound producing package structure includes a plurality of chips disposed within a cavity. The chips includes a first chip and a second chip, the first chip includes a first sound producing membrane and a first actuator attached to the first sound producing membrane, and a second chip includes a second sound producing membrane and a second actuator attached to the second sound producing membrane. The first sound producing membrane and the second sound producing membrane are actuated toward a center of the cavity in a synchronous fashion so as to produce a sound pressure.
Abstract: The disclosed embodiments relate to a cyber threat information processing apparatus, a cyber threat information processing method, and a storage medium storing a cyber threat information processing program. A disclosed embodiment provides a cyber threat information processing method including: a step to classify at least one executable file into a set of code blocks corresponding to at least one malware by performing conversion of such executable file and provide the classified set of block codes; a step to select one or more code blocks included in the classified set of code blocks and generate a new set of code blocks by combining such selected code blocks; and a step to predict new malware based on the set of code blocks generated as above and provide information about the new malware predicted.
Abstract: A semiconductor package includes a processor die powered by either a front-side or a backside power delivery network, a plurality of memory dies and control dies stacked over the processor die, a plurality of high-thermal-conductivity interconnects located between and/or placed side-by-side with the dies, a substrate carrying all the dies with the substrate having a first cavity allowing a liquid to pass through, and a cold plate disposed over and in direct thermal contact with the top dies with the cold plate having a second cavity configured to connect to the first cavity and allowing the liquid to flow between the first and second cavities. This semiconductor package can be configured to go beyond the traditional single-sided interconnection and cooling topologies to enable dual- or multi-sided cooling, power supply, and signaling. The semiconductor package further includes an underground interconnection (UGI) disposed in a STI region of the processor die.
Type:
Application
Filed:
August 26, 2024
Publication date:
December 19, 2024
Applicants:
nD-HI Technologies Lab, Inc., Invention and Collaboration Laboratory, Inc.
Abstract: A light filed (LF) display system for displaying holographic performance content (e.g., a live performance) to viewers in a venue. The LF display system in the venue includes LF display modules tiled together to form an array of LF modules. The array of LF modules create a performance volume (e.g., a stage) for displaying the performance content in the venue. The array of LF modules displays the performance content to viewers in viewing volumes. The LF display system can be included in a LF presentation network. The LF presentation network allows holographic performance content to be recorded at one location and displayed (concurrently or non-concurrently) at another location. The LF presentation network includes a network system to manage the digital rights of the holographic performance content.
Type:
Grant
Filed:
August 10, 2022
Date of Patent:
December 17, 2024
Assignee:
Light Field Lab, Inc.
Inventors:
Jonathan Sean Karafin, Brendan Elwood Bevensee, John Dohm
Abstract: Various methods for implementing cryptographic systems can reduce the likelihood of security vulnerabilities. A cryptographic system can utilize a combination of cryptographic processes to securely construct immutable ledgers and/or blockchains. These cryptographic systems can be referred to as composite cryptographic systems. A device can be configured to add a block to a distributed ledger maintained by a composite cryptographic system. The device can include a network interface, memory, and a processor. The processor can be configured to obtain a first proof using a first cryptographic system, obtain a second proof using a second cryptographic system; and broadcast a block to securely add the block to a distributed ledger. The block can be capable of being validated by using the first cryptographic system to generate the first proof and by using the second cryptographic system to generate the second proof.
Abstract: A system which includes an apparatus for generating radio frequency scanning data which includes a transmitter for transmitting radio waves below the skin surface of a person and a two-dimensional array of receive antennas for receiving the radio waves, including a reflected portion of the transmitted radio waves that is reflected from a blood vessel of the person. The wave signal is compared to known standard waveforms, and similar waveforms are input into a machine learning algorithm to determine one or more health parameters of the person. The system then notifies the person and/or health professionals of the person's health status. The health parameters can be used to trigger other software and hardware modules such as another measurement device, a medication scheduler or alert, medical recommendations, guidance software, a virtual assistant, or any other hardware and/or software which may help the patient or health professionals.
Abstract: A device for producing electricity. The device includes a substrate having spaced apart first and second surfaces and doped a first dopant type, first semiconductor material layers disposed atop the first substrate surface and doped the first dopant type, and second semiconductor material layers disposed atop the first semiconductor material layers and doped a second dopant type. A first contact is in electrical contact with the second substrate surface or in electrical contact with one of the first semiconductor material layers. A beta particle source emits beta particles that penetrate into the semiconductor material layers; the beta particle source is proximate the uppermost layer of the second plurality of semiconductor material layers. A second contact is in electrical contact with one of the second plurality of semiconductor material layers. In one embodiment, bi-polar contacts (the first and second contacts) are co-located on each major face of the device.
Type:
Grant
Filed:
January 15, 2024
Date of Patent:
December 17, 2024
Assignee:
CITY LABS, INC.
Inventors:
Peter Cabauy, Larry C. Olsen, Bret J. Elkind, Jesse Grant
Abstract: A method includes, at a controller: directing current through a set of coil assemblies in an electric motor based on a first commutation technique; in response to an operating speed of the electric motor exceeding a first operating speed threshold, initiating a transition from the first commutation technique to a second commutation technique; during a transition period, directing current through the set of coil assemblies based on the first commutation technique controlled according to a first pulse width modulation scheme and the second commutation technique controlled according to a second pulse width modulation scheme; and, in response to completion of the transition period, directing current through the set of coil assemblies based on the second commutation technique.
Abstract: A nicotine liquid formulation comprising nicotine, an acid, and a biologically acceptable liquid carrier, wherein heating an amount of said nicotine liquid formulation using low temperature electronic vaporization device, i.e., an electronic cigarette, generates an inhalable aerosol, and wherein at least about 50% of said acid in said amount is in said aerosol, and wherein at least about 90% of said nicotine in said amount is in said aerosol.
Abstract: In some examples, a server receives a security advisory that includes a description of a vulnerability and accesses a version control system (VCS) used by a third-party library to determine additional resources related to the vulnerability. The server determines a set of code changes performed by the project maintainers in the VCS, identifies one or more fix commits that address the vulnerability, and identifies one or more functions with the vulnerability that have been changed by the fix commits. The server performs a search for components and component versions that include the one or more functions with the vulnerability and generates an enriched vulnerability description that includes identifiers of package versions that include fixed versions of the one or more functions and vulnerable version of the one or more functions. Project code in a development system is modified to use the fixed versions of the one or more functions.
Type:
Application
Filed:
June 12, 2024
Publication date:
December 12, 2024
Applicant:
Endor Labs Inc
Inventors:
Henrik PLATE, Dimitrios STYLIADIS, Alexandre WILHELM
Abstract: A method for predicting a price of any subtractively manufactured part utilizing artificial intelligence at a computing device. The method comprises receiving a manufacturing request datum, wherein the manufacturing request datum further comprises at least an element of user mechanical part data, selecting a correlated dataset containing a plurality of data entries. The method further comprises generating, at a clustering unsupervised machine-learning model, at least a first correlated compatible part element, receiving, at a supervised machine-learning model, a first training set, generating, at a supervised machine-learning model as a function of the first training set, an external price output, and determining a price ratio output, wherein determining the price ratio output further comprises generating a loss function of a part specific variable and minimizing the loss function.
Abstract: A method for rightsizing an application, including analyzing, via processing circuitry, metrics from containers; determining, via the processing circuitry, a resource allocation and a target resource utilization for an application workload based on the metrics; and configuring, via the processing circuitry, the application workload based on the resource allocation, the target resource utilization, and the metrics.
Type:
Application
Filed:
June 6, 2024
Publication date:
December 12, 2024
Applicant:
Gram Labs, Inc.
Inventors:
Bradley Joseph BEAM, Jeremy Michael GUSTIE, Christopher Marc LARSON, Thibaut Xavier PEROL, John Daniel PLATT
Abstract: In some examples, a server injects malicious code into a legitimate software package to create an injected package. The server uses an artificial intelligence to extract a plurality of parts from the injected package and to mutate individual parts of the plurality of parts to create mutated parts. The server assembles the mutated parts to create a mutated malware. A malware scanner determines a risk score associated with the mutated malware. Based at least in part on determining that the score satisfies a predetermined threshold, the server stores the mutated malware in a set of mutated malware and creates at least one additional mutation based on the mutated malware. After determining that a size of the set of mutated malware satisfies a requested size, the malware scanner is modified to increase detection of the malicious code in individual mutated malware in the set of mutated malware.
Abstract: Apparatuses and methods for dimensioning and modifying a part to be manufactured are provided. Part information for a part to be manufactured is received by a processor, where the part information includes a model and print of the part. Tolerance datum are extracted from the print and a manufacturability datum is determined as a function of the model and tolerance datum. Updated tolerance datum is generated and a manufacturability of the part is determined. A manufacturing quote and user feedback is provided.
Abstract: Systems, devices, and methods for dermal treatments are provided. Various systems, devices, and methods provide treatment options with a handheld device, intradermal or subdermal fluid delivery via a needle or microneedle. For fluid delivery, system can include an injector, fluid-filled container, and a needle or hollowed microneedle. A fluid-filled container can be compatibly coupled with a treatment device such to perform the various dermal treatments. Further, fluid delivery systems can be utilized in a number of applications, including medications and supplements for the skin.
Type:
Application
Filed:
September 26, 2022
Publication date:
December 12, 2024
Applicant:
ACOM Labs, Inc.
Inventors:
Jack Phillip Abraham, Callie Mackenzie Roberts, Liang Liu, Dehui Kong, Paul F. Bente, IV, Healey Thomas Cypher
Abstract: The present invention relates to a process of obtaining encapsulated microparticles and/or nanoparticles of DMT/5-MeO-DMT, or pharmaceutically acceptable salts or derivatives thereof and a composition prepared by the process. Pharmaceutical compositions comprising the particles can further include an inhibitor of the Monoamine oxidase (MAOI), and are useful for the personalized treatment of neurological and/or psychiatric disorders, and/or inflammatory disorders.
Abstract: Disclosed is a cloud DID agent including a memory and at least one processor, in which the at least one processor is configured to receive an upload action request for a file from a mobile agent, generate an encryption key corresponding to the file in response to the upload action request and encrypt the file based on the encryption key, generate a plurality of chunks by dividing the encrypted file into a predetermined size, generate a plurality of data blocks corresponding to each of the plurality of chunks, and distribute and transmit the plurality of data blocks to a plurality of external cloud servers so that the plurality of data blocks are distributed and stored in the plurality of external cloud servers. In addition to this, various embodiments grasped through the specification are possible.
Type:
Application
Filed:
June 29, 2023
Publication date:
December 12, 2024
Applicant:
BLOCKCHAIN LABS INC.
Inventors:
Yong Tae KIM, Byung Wan LIM, Byeong Cheol YOO
Abstract: Apparatuses and methods for generating a manufacturing quote are provided. Part data for a part to be manufactured is received by a processor, where the part information includes information defining the part or specifying one or more aspects of the part. A model of the part is generated and at least a toolpath to create the part is generated. A manufacturing quote is generated using the model of the part. Feedback regarding part design may be provided and manufacturing of the part may be initiated.
Type:
Application
Filed:
March 20, 2024
Publication date:
December 12, 2024
Applicant:
Proto Labs, Inc.
Inventors:
Austin Perry, Joshua Knutson, Robert Ford, Samuel Bosak, Shuji Usui
Abstract: An electronic cigarette with an atomizer cartridge and a battery assembly. The atomizer cartridge has an atomizer coupled to a first and second terminal of a cartridge interface. A passive electrical circuit is coupled between the first terminal and a sensing terminal. The battery assembly has an interface with a first, second, and sensing contact. The interface engages the cartridge interface to provide electrical continuity between the terminals and contacts. The battery assembly has an atomizer drive circuit connected between the first and second contact, and a controller that activates the atomizer drive circuit in response to negative pressure at a draw sensor. A sensing circuit coupled to the sensing contact outputs a parameter signal indicative of the electrical parameters of the passive electrical circuit. The controller activates an RGB LED to produce discrete colors of light corresponding to discrete values of the parameter signal.