Latest technologies from Binghamton Universityhttp://binghamton.technologypublisher.comBe the first to know about the latest inventions and technologies available from Binghamton Universityen-USSun, 25 Jun 2017 13:45:54 GMTMon, 24 Oct 2016 12:51:32 GMT 2017, Binghamton UniversitypH-INSENSITIVE GLUCOSE INDICATOR PROTEIN, 24 Oct 2016 12:51:32 GMTinnovation@binghamton.edu New Bioorthogonal Reaction, 24 Oct 2016 12:48:31 GMTinnovation@binghamton.edu Interposers with Nano Structures, 22 Jul 2016 09:23:15 GMTinnovation@binghamton.edu and Pattern of Dispensing Thermal Interface Materials, 22 Jul 2016 09:21:14 GMTinnovation@binghamton.edu Method for Fabricating monodispersed Fe-oxide@au nanoparticles in the range of 5-100nm, 22 Jul 2016 09:18:53 GMTinnovation@binghamton.edu Time Hand Tracking and Pointing for Human Interaction Hand Pointing Estimationfor Human-Computer InteractionHand gesture is an efficient means for humans interacting with computers.Pointing gesture can resolve ambiguities derived from the verbal communication,thus opening up the possibility of humans interacting or communicatingintuitively with computers or robots by indicating objects or pointedlocations either in the three dimensional (3D) space or on the screen. However,it is a challenging task to estimate the 3D hand pointing direction automaticallyand reliably from the streams of video data due to the great variety andadaptability ...Fri, 15 Jul 2016 10:28:06 GMTinnovation@binghamton.edu Time Eye Tracking for Human Computer Interaction Eye-tracking for Human-Computer InteractionThe ideal human-computer interaction system should function robustly with asfew constraints as those found in human-to-human interaction. One of the mosteffective means of interaction is through the behavior of the eye. Specifically,knowledge of the viewing direction and thus the area of regard offers insight into theuser's intention and mental focus, and consequently this information is vital for thenext generation of user interfaces.The present technology enables the ability to capture the direction the eyes pointin while the subject is a ...Fri, 15 Jul 2016 10:16:35 GMTinnovation@binghamton.edu Extension of RDP Code with Optimal Decoding Procedure, 15 Jul 2016 10:11:45 GMTinnovation@binghamton.edu an Efficient MDS-like RAID-6 Code for Parallel Implementation, 15 Jul 2016 10:11:09 GMTinnovation@binghamton.edu Protecting Sensitive Data in Mobile Devices by Out-of-order Data Division DISTRIBUTED DATA STORAGE SECURITYINVENTOR:Yu ChenDESCRIPTIONTechnologists are looking to achieve a balance between making data difficult to be illegally or maliciously compromised while providing legitimate data users and owners sufficient encryption protection that does not overly strain the computing power, storage space, processing speeds, and battery life available on the devices. Distributed storage of data on personal and other computing devices and hardware subsystems pose risks to security if the devices are captured (military and government scenario) or lost or stolen (ci...Fri, 15 Jul 2016 10:09:00 GMTinnovation@binghamton.edu Sensor, 15 Jul 2016 09:50:42 GMTinnovation@binghamton.edu Comb Fins, 15 Jul 2016 09:49:42 GMTinnovation@binghamton.edu Mechanism for Authenticating Program Execution at Run-time in a Microprocessor, 15 Jul 2016 09:48:02 GMTinnovation@binghamton.edu and Method for Validating Program Execution at Run-Time Using Control Flow Signatures and Method for Validating Program Execution at Run-Time Using Control Flow SignaturesDescription:A central requirement for implementing trusted computing platforms is to validate whether a program executing on a potentially untrusted host is really the program the user thinks it is. If the host platform and its software environment are potentially compromised, the application may be compromised either through static replacement of the binaries or through linking the application dynamically to untrusted library functions or through dynamic code substitution at run time.The present techno...Fri, 15 Jul 2016 09:46:56 GMTinnovation@binghamton.edu and Method for Validating Program Execution at Run-Time and Method for Validating Program Execution at Run-TimeDescription:Current computer systems are highly vulnerable to cyber-attack. The number of attacks and the financial losses due to those attacks has risen exponentially. Despite significant investments, the situation continues to worsen; novel attacks appear with high frequency and employ increasingly sophisticated techniques. The present technology enables tampering of a program to be detected as the program executes. In particular, tampering of the code as it runs is detected efficiently. The authenticity of instructions is verifie...Fri, 15 Jul 2016 09:45:58 GMTinnovation@binghamton.edu of Remotely Executed Program and Method for Authenticating Remote ExecutionDescription:As distributed systems become pervasive, security mechanisms have to be geared up to meet the increasing threats against such systems. For grid computing and other systems to become truly pervasive, mechanisms are needed to not only authenticate the remote serves but also to authenticate the actual executions of the programs on these servers. The present technology provides a mechanism for authenticating remote executions on a server in a distributed environment, essentially validating that what is executed at the server on behal...Fri, 15 Jul 2016 09:43:57 GMTinnovation@binghamton.edu Detection using Object Access Graphs, 28 Jan 2016 11:57:06 GMTinnovation@binghamton.edu of highly electrically conducting patterns via inkjet printing of mussel-inspired organic nano-material, 28 Jan 2016 11:48:11 GMTinnovation@binghamton.edu Phase Polymerized Conductive Poly(3,4-ethylenedioxythiophene) Thin Films, 28 Jan 2016 11:41:02 GMTinnovation@binghamton.edu Alloys, 28 Jan 2016 11:37:19 GMTinnovation@binghamton.edu and Biodegradable Packaging Foam and the Method of Preparation Thereof, 28 Jan 2016 11:32:23 GMTinnovation@binghamton.edu Mixing Techniques for Microchannel Flows, 28 Jan 2016 11:15:28 GMTinnovation@binghamton.edu Microelectrodes Array Devices on Glass and Flexible Polymer Substrates: Design, Fabrication, $ Assembly, 28 Jan 2016 11:12:01 GMTinnovation@binghamton.edu Reliable Switch that is Triggered by the Detection of a Specific Gas or Substance, 28 Jan 2016 11:06:34 GMTinnovation@binghamton.edu Portable Capillary Sensor, 28 Jan 2016 10:58:37 GMTinnovation@binghamton.edu Switch Triggered by Shock and/or Acceleration, 28 Jan 2016 10:49:38 GMTinnovation@binghamton.edu Non-Directional Microphone, 26 Jan 2016 11:26:57 GMTinnovation@binghamton.edu Diaphragm for an Acoustic Device, 26 Jan 2016 11:21:45 GMTinnovation@binghamton.edu Micromachined Dif-ferential Microphone, 26 Jan 2016 11:13:00 GMTinnovation@binghamton.edu Sense Microphone, 26 Jan 2016 11:02:43 GMTinnovation@binghamton.edu Directional Microphone Diaphragm, 26 Jan 2016 10:59:52 GMTinnovation@binghamton.edu Microphone, 26 Jan 2016 10:41:03 GMTinnovation@binghamton.edu Differential Microphone, 26 Jan 2016 08:51:56 GMTinnovation@binghamton.edu Natural Molecule for Inducing Dispersion of Microbial Biofilms novel dispersion inducing agent for microbial biofilms Bacterial biofilms have been implicated in more than 80 percent of chronic inflammatory and infectious diseases, including ear infections, native valve endocarditis, urinary tract infections, burn and non-healing wounds and infections of indwelling medical devices. Biofilms are also the principal cause of biofouling, a persistent problem in marine and industrial environments. Biofouling affects food processing, water purification and distribution, the pharmaceutical and petroleum industries, as well as essentially all other industries ha...Wed, 02 Sep 2015 11:31:06 GMTinnovation@binghamton.edu