Patents by Inventor Yao He
Yao He has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240152103Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing an electric grid time synchronization process. The process can include: receiving, from a GPS transceiver of a first device coupled to an electric power grid, data including a GPS time reference; formatting the GPS time reference into a data packet, where the data packet has a particular format compatible with power line communication; and broadcasting, by the first device and using power line communications, the data packet to a plurality of electric grid components.Type: ApplicationFiled: November 4, 2022Publication date: May 9, 2024Inventors: Rui Yao, Xinyue Li, Leo Francis Casey, Mike Miao He
-
Publication number: 20240154782Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing electric grid timing coordination. The method can include: receiving, by a first electric grid device, a message from a second electric grid device, the message including a first clock value associated with an oscillator of the second electric grid device; determining, based on the first clock value, a second-first device time offset between the second electric grid device and the first electric grid device; and storing the second-first device time offset in a time offset table stored at the first electric grid device.Type: ApplicationFiled: November 4, 2022Publication date: May 9, 2024Inventors: Mike Miao He, Rui Yao, Xinyue Li, Leo Francis Casey
-
Publication number: 20240140923Abstract: The present disclosure relates to the technical field of drug synthesis, and provides a method for preparing a key intermediate of ABT-737 and a method for preparing ABT-737. In the present disclosure, the compound having a structure represented by formula I is used as the starting material. The carboxyl group in the compound having a structure represented by formula I is first reduced to a hydroxyl group, followed by a vulcanization by a vulcanizing agent, and then an amination, a deprotection, a condensation, and a carbonyl group reduction, to obtain the key intermediate of ABT-737 having a structure represented by formula VI. Tert-butoxycarbonyl is used as the protecting group for the compound having a structure represented by formula I, and the subsequent intermediate containing the protecting group of tert-butoxycarbonyl is stable, and easy to be deprotected. This method is suitable for mass synthesis, with high product yield and low production cost, and thus has a good industrialization prospect.Type: ApplicationFiled: June 17, 2021Publication date: May 2, 2024Applicant: Xeon Biopharmaceutical LimitedInventors: Yanfei GU, Yao HE
-
Publication number: 20240095061Abstract: A computer-implemented method for aligning a sensor to reference coordinate system includes initiating a plurality of threads, each thread executes simultaneously and independent of each other. A first thread parses data received from the sensor and stores the parsed data in a data buffer. A second thread computes an alignment transformation using the parsed data to determine alignment between the sensor and the reference coordinate system. The computing includes checking that the data buffer contains at least predetermined amount of data. If at least the predetermined amount of data exists, an intermediate result is computed using the parsed data in the data buffer; otherwise, the second thread waits for the first thread to add more data to the data buffer. The second thread outputs the intermediate result into the data buffer. A third thread outputs the alignment transformation, in response to completion of alignment computations.Type: ApplicationFiled: September 19, 2022Publication date: March 21, 2024Inventors: Xinyu Du, Guanlun He, Yao Hu, Binbin Li, Hao Yu
-
Publication number: 20240095954Abstract: A vehicle includes a system performing a method of operating a camera for the vehicle. The camera is configured to capture an image. The processor is configured to query the camera to obtain an intrinsic parameter of the camera, estimate a unified parameter based on the intrinsic parameter of the camera, and perform at least one application on the image using the unified parameter.Type: ApplicationFiled: September 19, 2022Publication date: March 21, 2024Inventors: Yao Hu, Hao Yu, Guanlun He, Xinyu Du, Binbin Li
-
Patent number: 11926914Abstract: Provided is a tungsten electrode for molten salt electrolysis for rare earth metals preparation, including an open tungsten shell and a copper alloy body; wherein the copper alloy body is arranged inside the open tungsten shell; a tungsten buffer layer is provided between a side wall of the copper alloy body and the open tungsten shell; and a bottom of the copper alloy body is in contact with an inner bottom of the open tungsten shell.Type: GrantFiled: August 28, 2023Date of Patent: March 12, 2024Assignee: Ganzhou Chenguang Rare Earths New Material Co., Ltd.Inventors: Shaohua Yang, Zhenhong Cui, Hui Li, Senlin Ouyang, Yao Xie, Fangsong He, Guangdong Wu, Kangwei Xie
-
Publication number: 20240013804Abstract: The present disclosure discloses a device with a protective layer, including a substrate, a seed layer formed on the substrate, and a diamond-like carbon layer formed on the seed layer, where the seed layer is a silicon nitride layer, and a content of nitrogen in the silicon nitride layer is 9%-17%. The present disclosure further discloses a microwave-assisted magnetic recording (MAMR) head slider, a head gimbal assembly, and a disk drive unit. The device has good thermal stability, oxidation resistance and corrosion resistance, thereby improving reliability and prolonging service life of an MAMR head.Type: ApplicationFiled: July 6, 2023Publication date: January 11, 2024Inventors: Da Yao HE, Rong HUANG, Hua LI, Jian Hui HUANG, Peng LIU
-
Patent number: 11775511Abstract: A computer retrieves data from a database. The computer retrieves a Machine Learning (ML) model trained to generate database queries. The computer applies the ML model to generate a primary database query based, at least in part, on a user inquiry available to the computer. The computer retrieves the primary database query, an initial set of data from a database available to the computer. The computer, in response to retrieving the initial set of data, receives feedback assessing the initial set of data. The computer, in response to receiving the feedback, applies a Natural Language Processing (NLP) model to identify query adjustment content within the feedback. The computer revises the primary database query based, at least in part, on the model adjustment content, to generate a secondary database query. The computer retrieves using the secondary database query, a secondary set of data from the database.Type: GrantFiled: August 3, 2021Date of Patent: October 3, 2023Assignee: International Business Machines CorporationInventors: Wen Wang, Yi Chen Zhong, Yi Ming Wang, Lu Yu, Liu Yao He
-
Publication number: 20230222214Abstract: The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.Type: ApplicationFiled: January 10, 2023Publication date: July 13, 2023Inventors: Soumyadipta Das, Sai Sravan Kumar Ganachari, Yao He, Aleksandr Dubrovsky
-
Publication number: 20230041181Abstract: A computer retrieves data from a database. The computer retrieves a Machine Learning (ML) model trained to generate database queries. The computer applies the ML model to generate a primary database query based, at least in part, on a user inquiry available to the computer. The computer retrieves the primary database query, an initial set of data from a database available to the computer. The computer, in response to retrieving the initial set of data, receives feedback assessing the initial set of data. The computer, in response to receiving the feedback, applies a Natural Language Processing (NLP) model to identify query adjustment content within the feedback. The computer revises the primary database query based, at least in part, on the model adjustment content, to generate a secondary database query. The computer retrieves using the secondary database query, a secondary set of data from the database.Type: ApplicationFiled: August 3, 2021Publication date: February 9, 2023Inventors: Wen Wang, Yi Chen Zhong, Yi Ming Wang, Lu Yu, Liu Yao He
-
Patent number: 11550912Abstract: The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.Type: GrantFiled: June 16, 2020Date of Patent: January 10, 2023Assignee: SONICWALL INC.Inventors: Soumyadipta Das, Sai Sravan Kumar Ganachari, Yao He, Aleksandr Dubrovsky
-
Publication number: 20220354923Abstract: The present invention provides compounds which are selective kappa-opioid receptor agonist, method of preparation of these compounds, compositions that comprise these compounds, and methods for treating kappa-opiod receptor agonist related medical disorders.Type: ApplicationFiled: July 11, 2022Publication date: November 10, 2022Inventors: Subo Liao, Jun Yang, Jinliang Lv, Zongquan Liao, Hao Zhou, Jueyuan Gao, Tianpeng Xie, Quanli Yang, Yao He, Dali Liang, Rong Liu
-
Publication number: 20220012220Abstract: The present invention may include a computer receives raw data. The computer converts the raw data into a dataset, where the dataset comprises independent variables and dependent variables. Then, the computer clusters the dataset to determine a corresponding target value to each of a plurality of clusters. The computer constructs a nonlinear programming problem based on a prior experience and generates an enlarged dataset by solving the nonlinear programming problem.Type: ApplicationFiled: July 7, 2020Publication date: January 13, 2022Inventors: Zhi Yong Jia, Yu Ying YY Wang, Wei Liu, Liu Yao He
-
Patent number: 10961512Abstract: The present disclosure provides methods for extracting viral particles from a sample comprising cells enclosing the viral particles. Also provided are kits that includes two or more items selected from a cell suspension solution, a cell lysis solution, a first fractionation solution, a second fractionation solution, a pellet suspension solution, a solid phase chromatography column, and a viral concentration set such as centrifugal filters.Type: GrantFiled: April 17, 2017Date of Patent: March 30, 2021Assignee: Dao-Yao HeInventor: Dao-Yao He
-
Publication number: 20200380127Abstract: The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.Type: ApplicationFiled: June 16, 2020Publication date: December 3, 2020Inventors: Soumyadipta Das, Sai Sravan Kumar Ganachari, Yao He, Aleksandr Dubrovsky
-
Patent number: 10685110Abstract: The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.Type: GrantFiled: December 29, 2017Date of Patent: June 16, 2020Assignee: SONICWALL INC.Inventors: Soumyadipta Das, Sai Sravan Kumar Ganachari, Yao He, Aleksandr Dubrovsky
-
Publication number: 20190345434Abstract: The present disclosure provides compositions and methods for extracting viral particles of a recombinant adeno-associated virus (AAV) or an adenovirus (AdV) from a sample comprising cells enclosing the viral particles. The method can include lysing the cells with the addition of an alkaline lysis solution to the sample such that the sample comprises compound(s) buffering pH value about 9.0 to about 11.5 and about 0.1% to about 1% of a detergent precipitating host cell proteins by adding a salting solution to the sample such that the sample comprises about 0.5 M to about 2.0 M of a salt and has a pH of about 4.0 to about 7.0.Type: ApplicationFiled: February 8, 2019Publication date: November 14, 2019Inventor: Dao-Yao He
-
Publication number: 20190205537Abstract: The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.Type: ApplicationFiled: December 29, 2017Publication date: July 4, 2019Inventors: Soumyadipta Das, Sai Sravan Kumar Ganachari, Yao He, Aleksandr Dubrovsky
-
Patent number: 10294452Abstract: The present disclosure provides compositions and methods for extracting viral particles of a recombinant adeno-associated virus (AAV) or an adenovirus (AdV) from a sample comprising cells enclosing the viral particles. The method can include lysing the cells with the addition of an alkaline lysis solution to the sample such that the sample comprises compound(s) buffering pH value about 9.0 to about 11.5 and about 0.1% to about 1% of a detergent precipitating host cell proteins by adding a salting solution to the sample such that the sample comprises about 0.5 M to about 2.0 M of a salt and has a pH of about 4.0 to about 7.0.Type: GrantFiled: November 22, 2016Date of Patent: May 21, 2019Inventor: Dao-Yao He
-
Patent number: 10148109Abstract: A charge wake-up circuit for a battery management system (“BMS”) for an electric vehicle, the circuit including a charging plug connection circuit, a comparator circuit, and a DC wake-up circuit. The charge wake-up circuit monitors the state of the charger after the BMS turns off. If the charger charges the battery pack after the BMS turns off, the BMS will be started by the charge wake-up circuit and continue to monitor the battery pack. If the charger is off-line, the BMS will maintain the low-power state to prevent the automotive lead-acid battery from over-discharging.Type: GrantFiled: April 12, 2016Date of Patent: December 4, 2018Assignee: Hefei University of TechnologyInventors: Xintian Liu, Yao He, Xinxin Zheng