Patents by Inventor Long Yin

Long Yin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240135675
    Abstract: Detecting fine-grained similarity in image includes determining a core area of a search image by generating an image salient map from a plurality of layers of the search image and determining a connected area based on the image salient map. Feature descriptors are generated from the core area of the search image. A plurality of capsule vectors are generated from different ones of a plurality of keypoints of the feature descriptors. Capsule vectors of the search image are compared with capsule vectors of each image of the dataset to generate a top-K matrix. Similarity scores for the top-K matrix are calculated. One or more image of the dataset having fine-grained similarity with the search image are selected based a bundled similarity score for each image of the dataset. The bundled similarity score is a summation of the similarity scores of the image.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Inventors: Fei Wang, Xue Ping Liu, Dan Zhang, Yun Jing Zhao, Kun Yan Yin, Zhi Xing Peng, Jian Long Sun
  • Publication number: 20240124460
    Abstract: Provided are compounds of Formula (I) and pharmaceutically acceptable salts and compositions thereof, which are useful for treating cancers and related conditions.
    Type: Application
    Filed: October 12, 2021
    Publication date: April 18, 2024
    Inventors: Weiwen Ying, Kevin P. Foley, Wei Yin, Long Ye, Mingkai Wang, Chenghao Ying, Lingjie Zhang
  • Publication number: 20240119563
    Abstract: One or more systems, devices, computer program products and/or computer-implemented methods of use provided herein relate to detecting a closed ring in a three-dimensional (3D) point cloud via cycle basis. A system can comprise a memory configured to store computer executable components; and a processor configured to execute the computer executable components stored in the memory, wherein the computer executable components can comprise a filtering component that can filter a first undirected graph of a three-dimensional (3D) point cloud, by eliminating one or more edges of the first undirected graph that are longer than an adaptive threshold, wherein filtering the first undirected graph can produce a second undirected graph; and a detection component that can detect a minimum cycle basis of the second undirected graph to determine a cycle path that can traverse an irregular annular shape that is represented by the 3D point cloud.
    Type: Application
    Filed: October 5, 2022
    Publication date: April 11, 2024
    Inventors: Xue Ping Liu, Fei Wang, Dan Zhang, Kun Yan Yin, Yun Jing Zhao, Jian Long Sun, Zhi Xing Peng
  • Patent number: 11943285
    Abstract: Methods and systems for metering computing resources in cloud computing environments are disclosed. A method includes: executing, by a computing device, computing tasks on computing resources; determining, by the computing device, an amount of time and an amount of power used in the executing the computing tasks on the computing resources; determining, by the computing device, a number of standard units consumed by the computing tasks based on the determined amount of time and the determined amount of power; and metering, by the computing device, the computing resources based on the determined number of standard units consumed by the computing tasks.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: March 26, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Li Xia, Lan Luo, Jian Dong Yin, Jian Zhang, Li Long Chen
  • Publication number: 20240084069
    Abstract: A resin matrix composition is provided in the present invention. The resin matrix composition includes an epoxy resin, a polysulfone engineering plastic, a modified polyetherimide and an amine curing agent. The modified polyetherimide is formed from a nucleophilic compound and polyetherimide. The nucleophilic compound has a nucleophile such as hydroxyl group, sulfhydryl group, carboxyl group and/or amine group. Therefore, a resin matrix with two phase separation of island phase and co-continuous phase is formed. The resin matrix can have both great flexural strength and toughness. Moreover, the resin matrix has suitable viscosity, such that it is appropriate for impregnating carbon fiber to produce prepreg and carbon fiber composites.
    Type: Application
    Filed: August 21, 2023
    Publication date: March 14, 2024
    Inventors: Yu-Cheng HSU, Tang-Chun KAO, Hsuan-Yin CHEN, Long-Tyan HWANG
  • Publication number: 20240071312
    Abstract: A shift register circuit includes a first control sub-circuit and a first output sub-circuit. The first control sub-circuit is configured to: adjust a voltage of a first node to a turn-on voltage due to an influence of a first direct current voltage signal from a first clock signal terminal, an initial voltage signal from an initial signal terminal and a second direct current voltage signal from a second clock signal terminal; and maintain the voltage of the first node at the turn-on voltage due to an influence of a first clock signal from the first clock signal terminal and a second clock signal from the second clock signal terminal. The first output sub-circuit is configured to be turned on under a control of the turn-on voltage of the first node to transmit a first voltage signal from a first voltage terminal to a signal output terminal.
    Type: Application
    Filed: March 23, 2021
    Publication date: February 29, 2024
    Inventors: Guangliang SHANG, Jiangnan LU, Long HAN, Li WANG, Libin LIU, Xinshe YIN, Shiming SHI
  • Publication number: 20240070222
    Abstract: Disclosed is a nonlinear optimization method for parameters of ocean ecological dynamics model, comprising the following steps: acquiring a state variable set and a parameter set to be optimized; building an ocean ecological dynamics model; acquiring a final cost function equation group; solving the ocean ecological dynamics model to obtain numerical solutions of each state variable; acquiring a Hamilton function of the cost function equation group under a constraint condition, and acquiring an adjoint equation based on the Hamilton function; adjusting the parameter set to be optimized based on the adjoint equation to obtain an optimal parameter set.
    Type: Application
    Filed: November 23, 2022
    Publication date: February 29, 2024
    Inventors: Honghua SHI, Long HU, Wei ZHENG, Tao XIA, Yongzhi WANG, Liting YIN, Yadong SUI
  • Patent number: 11784341
    Abstract: The invention provides novel high-energy density and low-cost flow electrochemical devices incorporating solid-flow electrodes, and further provides methods of using such electrochemical devices. Included are anode and cathode current collector foils that can be made to move during discharge or recharge of the device. Solid-flow devices according to the invention provide improved charging capability due to direct replacement of the conventional electrode stack, higher volumetric and gravimetric energy density, and reduced battery cost due to reduced dimensions of the ion-permeable layer.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: October 10, 2023
    Assignee: The Chinese University of Hong Kong
    Inventors: Yi-Chun Lu, Zengyue Wang, Long Yin Simon Tam, Qingli Zou, Guangtao Cong
  • Publication number: 20210367753
    Abstract: The present invention relates to a trusted measurement and control network authentication method based on double cryptographic values and chaotic encryption. The specific method comprises realizing identity authentication and key negotiation processes through double cryptographic values and chaotic public key ciphers and realizing secure transmission and verification of user identity credentials on the basis of building a trust chain through trusted computation for realizing a secure and trusted operating environment, thereby building a secure and trusted data transmission channel. The identity authentication method in the present invention comprises multiple links such as secure generation of user identity identifiers, read protection encapsulation, secure transmission and key negotiation. Each link adopts a unique and confidential cryptographic function for secure data generation, thereby ensuring the security of the authentication device access in an industrial measurement and control network.
    Type: Application
    Filed: February 21, 2019
    Publication date: November 25, 2021
    Applicant: SHENYANG INSTITUTE OF AUTOMATION, CHINESE ACADEMY OF SCIENCES
    Inventors: Wenli SHANG, Peng ZENG, Long YIN, Chunyu CHEN, Jianming ZHAO, Xianda LIU, Guoyu TONG
  • Patent number: 11177476
    Abstract: The disclosure relates to a complexed iodine-based electrolyte, a redox flow battery comprising the complexed iodine-based electrolyte, and a method for producing the redox flow battery.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: November 16, 2021
    Assignee: The Chinese University of Hong Kong
    Inventors: Guoming Weng, Yi-Chun Lu, Zengyue Wang, Simon Long Yin Tam
  • Publication number: 20210065021
    Abstract: The present invention relates to a working condition state modeling and model correcting method, comprising collecting data, and arranging the data in a chronological order to form a time sequence data set; preprocessing the time sequence data set; clustering the preprocessed time sequence data set, computing a central point data set of the duster, and generating a working condition data set and a working condition process data set; counting a working condition transition probability for the working condition process data set to form a working condition transition probability model data set; collecting the data, and detecting and processing the data; computing a working condition state transition mode phase by phase and processing.
    Type: Application
    Filed: February 21, 2019
    Publication date: March 4, 2021
    Applicant: SHENYANG INSTITUTE OF AUTOMATION, CHINESE ACADEMY OF SCIENCES
    Inventors: Wenli SHANG, Peng ZENG, Xianda LIU, Jianming ZHAO, Long YIN, Chunyu CHEN, Jiansong AO, Guoyu TONG
  • Publication number: 20200299553
    Abstract: UV curable adhesive compositions are provided that include 1) a UV curable poly(meth)acrylate copolymer containing monomeric units having an epoxy group wherein the poly(meth)acrylate copolymer has a glass transition temperature between ?30° C. and ?10° C., 2) a silsesquioxane polymer having epoxy-containing groups, and 3) a photocatalyst. UV cured adhesive compositions and adhesive tapes containing the cured adhesive compositions are also provided. The cured adhesive compositions are pressure sensitive adhesives.
    Type: Application
    Filed: December 18, 2015
    Publication date: September 24, 2020
    Inventors: Wei Cui, Hongbo Liu, Weigang Lin, Long Yin, Qing Wu, Zhou Jin
  • Patent number: 10738201
    Abstract: Provided is a coated article comprising a substrate and a dried coating which comprises a first set of spherical silica nanoparticles having an average diameter of less than 20 nm and a second set of spherical silica nanoparticles having an average diameter of 20 nm to 120 nm. The alkoxy silane compound comprises an epoxy functional group or a carboxylic acid functional group. Also provided is a coating composition comprising an acidic aqueous dispersion which comprises the described first and second set of spherical silica nanoparticles and silane compound.
    Type: Grant
    Filed: July 29, 2015
    Date of Patent: August 11, 2020
    Assignee: 3M Innovative Properties Company
    Inventors: Long Yin, Zhigang Yu, Naiyong Jing
  • Publication number: 20200075952
    Abstract: The disclosure relates to a complexed iodine-based electrolyte, a redox flow battery comprising the complexed iodine-based electrolyte, and a method for producing the redox flow battery.
    Type: Application
    Filed: September 3, 2019
    Publication date: March 5, 2020
    Inventors: Guoming WENG, Yi-Chun LU, Zengyue WANG, Simon Long Yin TAM
  • Publication number: 20200042711
    Abstract: A method for starting a trusted embedded platform based on TPM industrial control includes taking a Core Root of Trust Measurement (CRTM) as a source of a trust chain and executing CRTM after electrifying an embedded platform; conducting trust measurement of BIOS and starting BIOS after passing measurement; BIOS measuring Bootloader and extending a measured value into PCR corresponding to TPM; after passing the measurement, transferring a control execution right to Bootloader; and Bootloader measuring OS kernel start process, recording a measured value into PCR of TPM, and executing a start flow of OS after passing the measurement. The method performs measurement before start of each part of a start process, and measured values are also stored in the PCR corresponding to TPM. When the start process is tampered by an attacker, an integrity measurement mechanism terminates the execution of a program, thereby ensuring the security of the embedded platform.
    Type: Application
    Filed: May 7, 2018
    Publication date: February 6, 2020
    Inventors: Haibin YU, Peng ZENG, Wenli SHANG, Jianming ZHAO, Xianda LIU, Long YIN, Chunyu CHEN
  • Publication number: 20200045023
    Abstract: The present invention relates to a network guard unit for an industrial embedded system and a guard method. The specific method is to form the network guard unit (NGU) through security technologies, such as integrated access control, identity authentication and communication data encryption, to provide active guard for a site control device. The NGU comprises an access control module, an identity authentication module, a data encryption module, a key negotiation module and a PCIE communication module, and supports the communication modes of dual network cards and PCIE bus. The present invention builds a secure and trusted operating environment for industrial control systems in combination with an active guard technical means in the field of information security on the basis of ensuring the correctness and the feasibility of security of various terminal devices in the industrial control systems.
    Type: Application
    Filed: June 7, 2018
    Publication date: February 6, 2020
    Inventors: Haibin YU, Peng ZENG, Wenli SHANG, Long YIN, Xianda LIU, Jianming ZHAO, Chunyu CHEN
  • Publication number: 20200042747
    Abstract: The present invention relates to a security processing unit of PLC and a bus arbitration method thereof, to provide PLC with an active defense means to build a PLC hardware and software security layer. On a hardware security layer, a part of hardware processing mechanism is added to support trusted measurement, encryption algorithms and signature algorithms, and a virtual isolation technology is used; and on a software security layer, transparent encryption and decryption, integrity verification, backup recovery and virtual isolation security mechanism are provided. The security processing aspect is improved to achieve the purpose of security and reliability. The present invention can correctly establish a trusted environment of PLC to ensure that PLC is guided by a strictly verified path. A new star type trusted structure is designed to reduce loss during information transmission and increase information transmission efficiency.
    Type: Application
    Filed: June 7, 2018
    Publication date: February 6, 2020
    Inventors: Haibin YU, Peng ZENG, Wenli SHANG, Xianda LIU, Jianming ZHAO, Long YIN, Chunyu CHEN
  • Publication number: 20190253444
    Abstract: The present invention relates to a dynamic security method and system based on multi-fusion linkage response. In the method, a site control device conducts active response and passive response through identity authentication and key management to give an alarm for abnormal behaviors. The system comprises an access authentication active response module, an access control active response module, an access control passive response module, an abnormal pretending passive response module, a key vulnerability passive response module and an abnormal state passive response mechanism module. On the basis of ensuring validity and feasibility for the security of a terminal device, the present invention can build a secure and trusted industrial control system operating environment.
    Type: Application
    Filed: May 7, 2018
    Publication date: August 15, 2019
    Inventors: Haibin YU, Peng ZENG, Wenli SHANG, Jianming ZHAO, Xianda LIU, Long YIN, Chunyu CHEN
  • Publication number: 20180362780
    Abstract: Provided is a coated article comprising a substrate and a dried coating which comprises a first set of spherical silica nanoparticles having an average diameter of less than 20 nm and a second set of spherical silica nanoparticles having an average diameter of 20 nm to 120 nm. The alkoxy silane compound comprises an epoxy functional group or a carboxylic acid functional group. Also provided is a coating composition comprising an acidic aqueous dispersion which comprises the described first and second set of spherical silica nanoparticles and silane compound.
    Type: Application
    Filed: July 29, 2015
    Publication date: December 20, 2018
    Applicant: 3M INNOVATIVE PROPERTIES COMPANY
    Inventors: Long Yin, Zhigang Yu, Naiyong Jing
  • Publication number: 20180288084
    Abstract: The present application discloses a method for automatically establishing an intrusion detection model based on an industrial control network, including: judging whether a first intrusion detection model meets preset detection requirements, and extracting communication behavior traffic data in real time if not; setting a training data set and a test date set according to the communication behavior traffic data; establishing an initial intrusion detection model according to the training data set; and testing the initial intrusion detection model using the test date set, and establishing a second intrusion detection model meeting the preset detection requirements according to the test result. The second intrusion detection model has high detection accuracy, thereby increasing intrusion detection rate of abnormal behavior and reducing false positive rate and false negative rate.
    Type: Application
    Filed: April 17, 2017
    Publication date: October 4, 2018
    Applicant: Shenyang Institute of Automation, Chinese Academy of Sciences
    Inventors: Wenli SHANG, Jianming ZHAO, Ming WAN, Xianda LIU, Long YIN, Peng ZENG, Haibin YU