Abstract: A passive valve for use as a fixed leak valve. The valve includes a body having an internal chamber, first and second body ports in fluid communication with the chamber with the first port configured for fluid communication with a patient connection and the second body port configured for fluid communication with a ventilator, a body passageway in fluid communication with the chamber and with ambient air exterior of the body, and a check valve seal positioned to seal the body passageway to permit the flow of gas within the chamber through the body passageway to the exterior of the body and to prevent the flow of ambient air exterior of the body through the body passageway into the chamber. In alternative embodiments, the valve is incorporated into the patient connection or constructed as a separate part connectable to the patient connection.
Type:
Grant
Filed:
April 4, 2022
Date of Patent:
May 28, 2024
Assignee:
Ventec Life Systems, Inc.
Inventors:
Douglas F. DeVries, David H. Good, Shan E. Gaw, Joseph Cipollone
Abstract: A computing device includes an image sensor, an IMU, a display, and a processor coupled to the image sensor, the IMU, and the display. The processor is configured to generate a GUI current screen on the display. The GUI current screen includes a background, and foreground GUI elements overlaying the background. The processor is configured to when the IMU generates motion data indicative of movement, render the background to comprise a video image from the image sensor.
Abstract: Methods and systems for secure authentication of a first device through attestation by one or more other devices are described herein. A server may receive, from an untrusted client device, a request for access to one or more services associated with the server. The server may generate a challenge code. The server may send, to the untrusted client device, a request for attestation of the untrusted client device. The server may receive, from a trusted client device, an indication that the trusted client device attests to an identity of the untrusted client device. Based on the indication that the trusted client device attests to the identity of the untrusted client device, the server may grant, to the untrusted client device, access to the one or more services associated with the server.
Abstract: This application is generally related to systems and methods for providing a medical therapy to a patient by tracking patient activity and adjusting medical therapy based on occurrence of different types of activities performed by the patient according to clinician defined stimulation program scheduling rules.
Abstract: A multi-piece plastic tank is provided and includes a tank top section, wherein the tank top section defines a tank top opening surrounded by a top flange that extends along the length of the top flange, a tank bottom section having, wherein the tank bottom section defines a tank bottom opening surrounded by a bottom flange that extends along the length of the bottom flange, wherein the top flange and bottom flange are configured to be connected to form the multi-piece plastic tank.
Abstract: Disclosed is a method that includes sectioning a graph into a sequence of sections, the sequence of sections including at least a first section followed by a second section. The first section is configured to generate a first output in a first target tiling configuration in response to processing a first input in a first input tiling configuration. The graph is configured to reconfigure the first output in the first target tiling configuration to a second input in a second input tiling configuration. The second section is configured to generate a second output in a second target tiling configuration in response to processing the second input in the second input tiling configuration.
Abstract: Systems, methods, and apparatuses for providing dynamic, prioritized spectrum utilization management. The system includes at least one monitoring sensor, at least one data analysis engine, at least one application, a semantic engine, a programmable rules and policy editor, a tip and cue server, and/or a control panel. The tip and cue server is operable utilize the environmental awareness from the data processed by the at least one data analysis engine in combination with additional information to create actionable data.
Abstract: An IMS device is provided that includes at least one surface, first and second pluralities of electrodes disposed on the surface, and an ion path having first and second accumulation regions and a separation region. The IMS device is configured to receive, guide, temporally separate, and discharge ions. Each accumulation region is configured to switch between accumulation and release states in which ions are accumulated and released therefrom, respectively. The separation region is positioned downstream of the first accumulation region and configured to temporally separate ions based on mobility. The first accumulation region is synchronized with a downstream mass filter while the second accumulation region is dependent upon the state of a gating element, which is positioned downstream of the IMS device and configured to control the flow of ions to a mass analyzer. A method in accordance with the foregoing is also provided.
Type:
Application
Filed:
November 16, 2023
Publication date:
May 23, 2024
Applicant:
MOBILion Systems, Inc.
Inventors:
Jacob McCabe, Liulin Deng, John Daniel DeBord, Alexander A. Makarov, Kyle Fort, Brian D. Adamson, Eloy R. Wouters
Abstract: An illustrative data storage management system enables a Tenant to retain control over criteria for protecting the Tenant's data, and hides details of the Service Provider's infrastructure. The Service Provider may have many data centers, each one represented within the system by a Resource Pool with attributes that reflect the infrastructure resources of the corresponding data center. A system analysis, which is triggered by the Tenant's choices for data protection, keys in on a suitable Resource Pool. The system analysis identifies suitable system resources within the Resource Pool and associates them to the data source. Subsequent data protection jobs invoke proper system components based on the associations created by the system analysis. In some embodiments, the system will invoke infrastructure resources created on demand when a data protection job is initiated rather than being pre-existing resources.
Abstract: Various embodiments include a system or platform that uses electrochemistry to upcycle waste products and low-value minerals into valuable, carbon dioxide (CO2)-neutral materials. Various embodiments may include systems and/or methods for processing material inputs using an electrochemical reactor. Various embodiments may include systems, methods, and/or devices for capturing and sequestering carbon dioxide (CO2) while producing valuable co-products.
Type:
Application
Filed:
April 5, 2022
Publication date:
May 23, 2024
Applicant:
Sublime Systems, Inc.
Inventors:
Jesse D. BENCK, Yet-Ming CHIANG, Leah D. ELLIS, Kyle DOMINGUEZ, Mariya LAYUROVA
Abstract: A method for reducing latency and increasing throughput in a reconfigurable computing system includes receiving a compute graph for execution on a reconfigurable dataflow processor comprising a grid of compute units and grid of memory units interconnected with a switching array. The compute graph includes a node specifying an operation on a tensor. The node may be split into multiple nodes that each specify the operation on a distinctive portion of the tensor to produce a first modified compute graph. The first modified compute graph may be executed. In addition, the multiple nodes may be within a single meta-pipeline stage and may be processed in parallel. Furthermore, the compute graph may further comprise a separate node for gathering the distinctive portions of the tensor into a complete tensor, to produce a second modified compute graph.
Type:
Application
Filed:
May 25, 2023
Publication date:
May 23, 2024
Applicant:
SambaNova Systems, Inc.
Inventors:
Yun DU, Gao DENG, Jianding LUO, Zhengyu CHEN
Abstract: Antiviral therapeutic compounds and compositions that may be used in methods of preventing and/or treating infection(s) caused by coronaviruses or influenza viruses.
Abstract: The method S100 can include: determining a remote operation request S110; optionally determining a priority of the remote operation request S120; providing vehicle data to a remote operator S130; responding to the remote operation request S140; and optionally training a model based on the response S150. However, the method S100 can additionally or alternatively include any other suitable elements. The method S100 functions to facilitate remote assistance of a vehicle operating within a rail network (e.g., operation of unmanned vehicles within restricted track regions). Additionally or alternatively, the system can function to facilitate remote validation/verification of vehicle operations and/or rail infrastructure status.
Abstract: Disclosed herein are systems and methods for adaptively training machine learning models for auto-segmentation of medical images. A system executes a segmentation model that receives a medical image as input and generates an initial segmentation of the medical image for a radiotherapy treatment. The system identifies a corrected segmentation corresponding to the initial segmentation generated in response to an input at a user interface presenting the initial segmentation. The system fine-tunes the segmentation model based on the medical image and the corrected segmentation to generate a fine-tuned segmentation model.
Abstract: Systems, methods, and apparatuses for providing optimization of network resources. The system is operable to monitor the electromagnetic environment, analyze the electromagnetic environment, and extract environmental awareness of the electromagnetic environment. The system extracts the environmental awareness of the electromagnetic environment by including customer goals. The system is operable to use the environmental awareness with the customer goals and/or user defined policies and rules to extract actionable information to help the customer optimize the network resources.
Abstract: Systems, methods, and apparatuses for providing optimization of network resources. The system is operable to monitor the electromagnetic environment, analyze the electromagnetic environment, and extract environmental awareness of the electromagnetic environment. The system extracts the environmental awareness of the electromagnetic environment by including customer goals. The system is operable to use the environmental awareness with the customer goals and/or user defined policies and rules to extract actionable information to help the customer optimize the network resources.
Abstract: Systems, methods, and apparatuses for providing optimization of network resources. The system is operable to monitor the electromagnetic environment, analyze the electromagnetic environment, and extract environmental awareness of the electromagnetic environment. The system extracts the environmental awareness of the electromagnetic environment by including customer goals. The system is operable to use the environmental awareness with the customer goals and/or user defined policies and rules to extract actionable information to help the customer optimize the network resources.
Abstract: A charging system may comprise: a first battery array; a bi-directional direct current (DC)/DC converter in electrical communication with the first battery array; and a charging interface in electrical communication with the bi-directional DC/DC converter, the charging interface configured to electrically couple to a second battery array of an electric vehicle.
Type:
Application
Filed:
January 23, 2024
Publication date:
May 23, 2024
Applicant:
Electric Power Systems, Inc.
Inventors:
Michael Armstrong, Nathan Millecam, Steven Hall, Randy Dunn, Kurt Rose
Abstract: A method and system for mitigating against side channel attacks (SCA) that exploit speculative store-to-load forwarding is described. The method comprises conditioning store-to-load forwarding on the memory dependence predictor (MDP) being trained for that load instruction. Training involves identifying situations in which store-to-load forwarding could have been performed, but wasn't, and obversely, identifying situations in which store-to-load forwarding was performed but resulted in an error.
Abstract: Non-voice data is embedded in a voice bit stream that includes frames of voice bits by selecting a frame of voice bits to carry the non-voice data, placing non-voice identifier bits in a first portion of the voice bits in the selected frame, and placing the non-voice data in a second portion of the voice bits in the selected frame. The non-voice identifier bits are employed to reduce a perceived effect of the non-voice data on audible speech produced from the voice bit stream.