Search Results - information+assurance%2fcyber+security

16 Results Sort By:
A Method And Apparatus Forgenerating And Evaluating Ideas In An Organization
Background:Prediction markets are speculative electronic markets created for the purpose of making predictions. Recently, there has been an increased interest in the possibility of using Such markets to predict certain events or parameter. The current market prices can be interpreted as predictions of the probability of the event or the expected value...
Published: 4/26/2021   |   Inventor(s): Gerrit Kamp, Peter Koen
Keywords(s):  
Category(s): Information Assurance/Cyber Security
Intelligent Adaptive Integrated Learning Environment
An intelligent adaptive integrated learning environment to optimize the learning process to a particular user. The environment is capable of providing assessment and targeted feedback. - TESTFull Patent: Intelligent Adaptive Integrated Learning Environment
Published: 4/26/2021   |   Inventor(s): Alexei Miasnikov, Alexey Myasnikov
Keywords(s):  
Category(s): Information Assurance/Cyber Security
Automated Teaching System Using Declarative Problem Solving Approach
A system for solving problems in mathematics, natural science, engineering and like disciplines, online or on a computing device. The system includes an interface which employs a declarative approach to solution representation. The interface allows users such as students to enter their solutions by declaring main steps of a solution (in various modes...
Published: 4/26/2021   |   Inventor(s): Alexei Miasnikov, Alexey Myasnikov
Keywords(s):  
Category(s): Information Assurance/Cyber Security
Systems and Methods for Automatically Detecting Deception in Human Communications Expressed in Digital Form
Background:The Internet is used to establish and maintain close personal relationships and is otherwise used as the virtual commons on which the whole world conducts vital human communication. The Internet is used everywhere and the dependence of its users on information communicated through the Internet has provided an opportunity for deceptive persons...
Published: 4/26/2021   |   Inventor(s):  
Keywords(s):  
Category(s): Information Assurance/Cyber Security
Systems And Methods For Automatically Detecting Deception In Human Communications Expressed In Digital Form
Background:The Internet is used to establish and maintain close personal relationships and is otherwise used as the virtual commons on which the whole world conducts vital human communication. The Internet is used everywhere and the dependence of its users on information communicated through the Internet has provided an opportunity for deceptive persons...
Published: 4/26/2021   |   Inventor(s):  
Keywords(s):  
Category(s): Information Assurance/Cyber Security
Genuine Quantum Variable-Probability True-Random Bit Generator
This invention is a truly random bit generator that harnesses the fundamental uncertainty of pure quantum superposition states to produce truly unpredictable bits. Unlike other random bit generators that claim to use quantum states but actually use non-quantum methods in their devices, this invention takes full advantage of truly random quantum effects....
Published: 4/26/2021   |   Inventor(s): Samuel Hedemann
Keywords(s):  
Category(s): Information Assurance/Cyber Security
Method and Apparatus to Identify the Source of Information/Misinformation in Large-scale Social Media Networks
Background:Social media networks have experienced a meteoric rise in popularity. Information spread much faster in social networks than any other communication method as of this writing. This ease of information dissemination can be a double-edged sword, however, as social networks can also be used to spread rumors or computer malware. In such circumstances,...
Published: 4/26/2021   |   Inventor(s): Alireza Louni, Koduvayur Subbalakshmi
Keywords(s):  
Category(s): Information Assurance/Cyber Security
Probable Elastic Part (PEP) Model for Real-World Face Recognition
Pose variation remains one of the major factors adversely affect the accuracy of real-world face recognition systems. Inspired by the recently proposed probabilistic elastic part (PEP) model and the success of the deep hierarchical architecture in a number of visual tasks, we propose the Hierarchical-PEP model to approach the unconstrained face recognition...
Published: 4/26/2021   |   Inventor(s): Gang Hua, Haoxiang Li
Keywords(s):  
Category(s): Information Assurance/Cyber Security
Detection Of Hostile Intent From Movement Patterns
Background:Technology is often employed to detect whether suspects (individuals, vehicles, or mobile objects) are or may be a hostile threat to a target, such as one or more people, structures, vehicles, etc. Current technology used to detect a suspect typically requires that the suspect is within a proximity to the suspect's intended target. Examples...
Published: 4/26/2021   |   Inventor(s): Jefferson Nickerson, Toshihiko Matsuka
Keywords(s):  
Category(s): Information Assurance/Cyber Security, Sensing Devices / Technology
Range Dependent Resolution Control For Three Dimensional Laser Scanning
Background:Light detection and ranging (LIDAR) scanners are non-contact measurement devices that work by emitting a very narrow light pulse and analyzing the reflection of the light pulse from an object. In order to scan a three-dimensional (3D) area from a single observation position, these scanners typically employ actuators to rotate the LIDAR assembly...
Published: 4/26/2021   |   Inventor(s): Kishore Pochiraju, Biruk Assefa Gebre
Keywords(s):  
Category(s): Information Assurance/Cyber Security
1 2