Patents by Inventor Xiaoming Zhou
Xiaoming Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12215002Abstract: Equipment for self-positioning handling of aluminum profiles for rail vehicle, including a handling and lifting mechanism, a steel beam fixed on and being driven to lift by the mechanism, 2-DOF spatial mechanisms fixed on the steel beam and mechanical clamping jaws fixed on a clamping jaw connecting seat; the 2-DOF spatial mechanisms includes a cylinder supporting seat, four connecting members on an outer ring of the cylinder supporting seat hinged respectively to four first connecting rods; wherein, two of the first rods are hinged to first ends of two ball joint connecting rods of which second ends are hinged to the clamping jaw connecting seat; the other two first rods are hinged to first ends of two second connecting rods of which second ends are hinged to the clamping jaw connecting seat; a piston rod of a cylinder center of the cylinder supporting seat driving the clamping jaw connecting seat.Type: GrantFiled: June 1, 2022Date of Patent: February 4, 2025Assignees: QINGDAO UNIVERSITY OF TECHNOLOGY, QINGDAO HUANGHAI UNIVERSITY, GUOHUA (QINGDAO) INTELLIGENT PRECISION DRIVE CONTROL TECHNOLOGY RESEARCH INSTITUTE CO., LTD., QINGDAO JIMO QINGLI INTELLIGENT MANFACTURING INDUCTRY RESEARCH INSTITUTEInventors: Xiaoming Wang, Changhe Li, Zhuang Shi, Bo Liu, Zongming Zhou, Yun Chen, Xiaowei Zhang, Zafar Said, Wenfeng Ding, Yanbin Zhang
-
Publication number: 20250038976Abstract: A lattice-based proxy signature method, apparatus and device, a lattice-based proxy signature verification method, apparatus and device, and a storage medium. Polynomials are randomly selected in rings to calculate public and private keys of nodes, and the magnitudes of proxy public and private keys are the same as the magnitudes of public and private keys of an original signer. Therefore, compared with existing proxy signature schemes, the present application has smaller lengths of public and private keys and higher storage efficiency. Proxy signature information generated in the present application shows a signature of the original signer and also shows a signature of a proxy signer. Once a proxy signature is created, the proxy signature cannot be repudiated by the proxy signer, and has strong non-repudiation and strong unforgeability. The proxy signature method has the advantage of resisting quantum computer attack.Type: ApplicationFiled: August 18, 2022Publication date: January 30, 2025Applicants: ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID, GUIZHOU POWER GRID CO., LTD.Inventors: Bin QIAN, Houpeng HU, Yong XIAO, Jiaxiang OU, Mi ZHOU, Pengcheng LI, Yi LUO, Yanhong XIAO, Ji WANG, Xin WU, Fusheng LI, Peilin HE, Xiaoming LIN, Zhenghao GAO, Jianlin TANG, Zerui CHEN, Fan ZHANG, Gaoyi LONG, Qiang CHANG, Qin FENG, Yuanhong CEN
-
Patent number: 12202222Abstract: A controllable rapid pressure loading technology for a large volume press is provided. A regular octahedra, plugs, diamond pistons, and a standard are included. The regular octahedra is provided with a cavity with openings at two ends of the cavity. The standard is placed in the cavity. The openings at two ends of the cavity are respectively blocked by the conductive plugs. The diamond piston is arranged between the standard and the plug. The diamond pistons arranged between the standard and the plug has high hardness and has the pressure transmission efficiency superior to that of a common ceramic plug, improving compression efficiency in sample cavity. A loading method of pre-charging a pressure to a pressure loading device first and then rapidly releasing to a pressure loading mold is used to match an improved pressure transmission component, which shortens the pressure loading time of the sample cavity.Type: GrantFiled: August 8, 2024Date of Patent: January 21, 2025Assignee: Jilin UniversityInventors: Zhaodong Liu, Kuo Hu, Ran Liu, Shucheng Liu, Di Yao, Xiaoming Zhang, Qiang Zhou, Bingbing Liu
-
Publication number: 20240409986Abstract: The present invention discloses a nucleic acid detection kit and a detection method based on photo-controlled CRISPR-Cas, wherein the kit comprises silent guide RNA and Cas protein; the silent guide RNA is formed by annealing hybridization of silent nucleotide and guide RNA; the guide RNA, designed according to a target nucleic acid sequence, includes two regions, i.e. a repetitive region and a spacer region; the silent nucleotide is completely complementarily paired with a the of the guide RNA, or is completely paired with a the of the guide RNA; the bases of the silent nucleotide are linked by PC linker; and the Cas protein is Cas12 protein or Cas13 protein. Although this method separates the nucleic acid amplification from the CRISPR-Cas detection in time, it can allow them to be completed in the same closed reaction tube, thereby avoiding the transfer process of uncapped reagent, ensuring that the detection is not affected by aerosol pollution while ensuring high detection sensitivity.Type: ApplicationFiled: May 6, 2022Publication date: December 12, 2024Inventors: Xiaoming ZHOU, Menglu HU
-
Patent number: 12058170Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.Type: GrantFiled: February 25, 2022Date of Patent: August 6, 2024Assignee: Shape Security, Inc.Inventors: Justin D Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Publication number: 20240009473Abstract: The invention provides method, device, and system to commission medical devices using different wireless communication protocol or from different manufacturers to a network by introducing a pairing device and a guiding device. The commissioning process includes two steps, e.g., a pairing the medical device to the pairing device and a pairing between the pairing device and server of the network. By configuring a pairing device dynamically with the aid of a guiding device, the pairing device can receive broadcast messages from medical devices using different communication protocols and send the same to a remote server having a specific network address. Further, the guiding device is introduced not only to assist in the configuration of the pairing device, but also provide an opportunity to the pairing device to obtain a real-time feedback from the remote server through the guiding device during installation.Type: ApplicationFiled: October 29, 2021Publication date: January 11, 2024Inventor: Xiaoming Zhou
-
Publication number: 20230315991Abstract: Systems and methods for generating an entity classification model using text classification of raw text information of entities are described. Generating the classification model includes obtaining raw text information associated with a plurality of entities, converting the raw text information for each entity of the plurality of entities into one or more character strings, generating a numerical vector for each entity of the plurality of entities based on the one or more character strings for each entity, and selecting, based on the numerical vectors for each entity of the plurality of entities, one or more entity properties to be used for entity classification. A classification of a first entity coupled to a network is performed based on the one or more selected entity properties.Type: ApplicationFiled: December 30, 2022Publication date: October 5, 2023Inventors: Yi Zhang, Xiaoming Zhou, Zhiruo Cao
-
Publication number: 20230273990Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.Type: ApplicationFiled: February 25, 2022Publication date: August 31, 2023Applicant: Shape Security, Inc.Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Publication number: 20230225700Abstract: The present disclosure relates to the field of ultrasonic detection, in particular to a craniocerebral ultrasonic standard plane imaging and automatic detection and display method for abnormal regions. The following technical solution is adopted: contour detection is performed on the scanned ultrasound images the skull to construct a skull surface model, and the standard planes in ultrasound images are identified and extracted according to the skull surface model. The symmetry of the standard planes in ultrasound images is used to compare the similarity, so as to obtain the abnormal regions for segmentation and display. The advantages of the present disclosure are as follows: the skull surface model is constructed by detecting the cranial edge, and the coordinate system is established based on this model, thereby the standard planes in ultrasound images can be quickly identified from the scanned ultrasound images.Type: ApplicationFiled: October 12, 2022Publication date: July 20, 2023Inventors: Liexiang FAN, Zehang CAI, Bin LI, Zhonghong WU, Yu WANG, Jinhao LIN, Xiaoming ZHOU, Shaohui CHEN, Weiwu CHEN, Jingfeng GUO, Yijie CHEN, Zichun CHEN
-
Patent number: 11297097Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.Type: GrantFiled: December 29, 2019Date of Patent: April 5, 2022Assignee: SHAPE SECURITY, INC.Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Patent number: 11139066Abstract: The present disclosure relates to methods and tools for enhancing cognition in an individual. The methods involve presenting to the individual multiple sets of stimuli. Each set of the multiple set contains two or more stimuli and at least one set of the multiple sets contains a target stimulus. The method then receives an input from the individual, and informs the individual as to whether the input is a correct response. The methods encompass iterations of stimuli presentation, receiving of the input, and lastly, generation of feedback to the individual until the individual learns and retains what the target stimulus is.Type: GrantFiled: May 29, 2020Date of Patent: October 5, 2021Assignee: The Regents of the University of CaliforniaInventors: Etienne de Villers-Sidani, Xiaoming Zhou, Jyoti Mishra-Ramanathan, Michael Merzenich, Adam Gazzaley
-
Patent number: 10987431Abstract: A preparation method of adiposomes, and use thereof. Provided is a method for preparing adiposomes consisting of neutral lipids and a monolayer phospholipid membrane, comprising a1) vortexing phospholipid and neutral lipids in a buffer, centrifuging the resulting mixture, and collecting an upper liquid phase; a2) purifying the upper liquid phase twice or more by uniformly mixing the upper liquid phase with the buffer, layering the mixture, and collecting an upper liquid phase; and a3) uniformly mixing the upper liquid phase obtained in step a2) with the buffer, layering the mixture, and collecting a lower liquid phase in containing adiposomes. For the adiposomes prepared by the method, one or more resident proteins and/or functional proteins can be recruited to obtain artificial lipid droplets, and one or more apolipoproteins can be recruited to obtain artificial lipoproteins; and they all play important roles in preparing drugs and/or drug carriers.Type: GrantFiled: November 22, 2016Date of Patent: April 27, 2021Assignee: INSTITUTE OF BIOPHYSICS, CHINESE ACADEMY OF SCIENCESInventors: Pingsheng Liu, Yang Wang, Xiaoming Zhou, Xuejing Ma, Chang Zhou
-
Patent number: 10946039Abstract: The present invention provides a hemostatic powder. The hemostatic powder is mainly present in the form of a columnar particle, wherein the ratio of axial length to diameter of the columnar particle is less than 5; the hemostatic powder includes a polymer represented by the following structural formula: wherein the R is at least one selected from the group consisting of —NH2, —OCH2CH2OH, —OCH2CH2CH2OH, —OH, —ONa, —OK and —OCa; m, n and p respectively represent number percentages of corresponding repeating units in polymer molecules, and satisfy the following equations: m+n+p=1, p/(m+n+p)=0.05˜0.Type: GrantFiled: October 25, 2017Date of Patent: March 16, 2021Assignees: Jiangsu NewValue Medical Products Co., Ltd., Shnaghai Newvalue Medical Products Co., Ltd.Inventors: Yingshan Zhou, Rui Jiang, Zuguang Gong, Liqin Xu, Shiming Zhou, Xiaoming Zhou
-
Publication number: 20200365051Abstract: The present disclosure relates to methods and tools for enhancing cognition in an individual. The methods involve presenting to the individual multiple sets of stimuli. Each set of the multiple set contains two or more stimuli and at least one set of the multiple sets contains a target stimulus. The method then receives an input from the individual, and informs the individual as to whether the input is a correct response. The methods encompass iterations of stimuli presentation, receiving of the input, and lastly, generation of feedback to the individual until the individual learns and retains what the target stimulus is.Type: ApplicationFiled: May 29, 2020Publication date: November 19, 2020Inventors: Etienne de Villers-Sidani, Xiaoming Zhou, Jyoti Mishra-Ramanathan, Michael Merzenich, Adam Gazzaley
-
Publication number: 20200306287Abstract: The present invention provides a hemostatic powder. The hemostatic powder is mainly present in the form of a columnar particle, wherein the ratio of axial length to diameter of the columnar particle is less than 5; the hemostatic powder includes a polymer represented by the following structural formula: wherein the R is at least one selected from the group consisting of —NH2, —OCH2CH2OH, —OCH2CH2CH2OH, —OH, —ONa, —OK and —OCa; m, n and p respectively represent number percentages of corresponding repeating units in polymer molecules, and satisfy the following equations: m+n+p=1, p/(m+n+p)=0.05˜0.Type: ApplicationFiled: October 25, 2017Publication date: October 1, 2020Inventors: Yingshan ZHOU, Rui JIANG, Zuguang GONG, Liqin XU, Shiming ZHOU, Xiaoming ZHOU
-
Patent number: 10767876Abstract: In various embodiments, an air quality-monitoring system (100) may include at least one sensor (106) configured to detect operation of a mechanism (110) within or at a boundary of an indoor environment. The mechanism may be external to an air purifier (102) associated with the indoor environment. The system may include a persistent memory (124) for storing data about the indoor environment observed by the at least one sensor (106).Type: GrantFiled: December 21, 2015Date of Patent: September 8, 2020Assignee: KONINKLIJKE PHILIPS N.V.Inventors: Declan Patrick Kelly, Cornelis Reinder Ronda, Xiaoming Zhou, Amanda Zhao
-
Publication number: 20200177623Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.Type: ApplicationFiled: December 29, 2019Publication date: June 4, 2020Applicant: Shape Security, Inc.Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Patent number: 10672292Abstract: Provided are methods and tools for enhancing cognition in an individual. The methods involve presenting to the individual multiple sets of stimuli. Each set of the multiple set contains two or more stimuli and at least one set of the multiple sets contains a target stimulus. The method then receives an input from the individual, and informs the individual as to whether the input is a correct response. The methods encompass iterations of stimuli presentation, receiving of the input, and lastly, generation of feedback to the individual until the individual learns and retains what the target stimulus is.Type: GrantFiled: June 22, 2011Date of Patent: June 2, 2020Assignee: The Regents of the University of CaliforniaInventors: Etienne de Villers-Sidani, Xiaoming Zhou, Jyoti Mishra-Ramanathan, Adam Gazzaley, Michael Merzenich
-
Patent number: 10652275Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.Type: GrantFiled: April 5, 2018Date of Patent: May 12, 2020Assignee: Shape Security, Inc.Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
-
Patent number: 10536479Abstract: Techniques for code modification for automation detection are described. Web code is obtained corresponding to content to be served to a first client device in response to a first request from the first client device. Instances of a particular programmatic element in the web code are identified. In response to the first request, modified web code is generated from the web code by consistently changing the particular programmatic element to a modified programmatic element throughout the web code. The modified web code is caused to be provided to the first client device in response to the first request from the first client device. A communication is received from the first client device that is made in response to the modified web code. The communication includes an attempt to interact with the particular programmatic element that exists in the web code but not in the modified web code.Type: GrantFiled: March 19, 2018Date of Patent: January 14, 2020Assignee: Shape Security, Inc.Inventors: Justin D Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover