Search Results - software+%26+algorithms+%3e+security+%26+privacy

12 Results Sort By:
Low-Latency Decoder for the Bahl, Cocke, Jelinek, Raviv Algorithm (Case No. 2025-114)
Summary UCLA researchers have developed a low-latency, high-throughput GPU-based implementation of the BCJR (Bahl-Cocke-Jelinek-Raviv) algorithm for decoding the CCSDS Serially-Concatenated Convolutionally-Coded Pulse-Position Modulation (SCPPM) code. The innovation reduces decoding latency from linear in the number of trellis stages to logarithmic...
Published: 9/15/2025   |   Inventor(s): Richard Wesel, Amaael Antonini, Egor Glukhov, Dariush Divsalar
Keywords(s):  
Category(s): Software & Algorithms, Software & Algorithms > Security & Privacy, Software & Algorithms > Communication & Networking, Mechanical, Mechanical > Aeronautics & Aerospace
Construction of Low-Rate LDPC Codes From Rate-½ CCSDS Standard LDPC Codes (Case No. 2025-243)
Reference: UCLA Case No. 2025-243. Please reach out to our office for more information.
Published: 9/12/2025   |   Inventor(s): Richard Wesel, Semira Galijasevic, Linfang Wang, Jon Hamkins, Dariush Divsalar
Keywords(s):  
Category(s): Software & Algorithms, Software & Algorithms > Communication & Networking, Software & Algorithms > Security & Privacy, Electrical, Electrical > Signal Processing
Adaptively Secure Streaming Functional Encryption System and Method (Case No. 2024-243)
Summary UCLA (or affiliated) researchers have filed an application describing a method and system for enhancing the reliability and efficiency of [hardware/software/data] system operation via dynamic adaptation, error detection, or environmental/context-aware control. It aims to improve system robustness and performance under varying conditions through...
Published: 9/12/2025   |   Inventor(s): Amit Sahai, Alexis Korb, Pratish Datta, Jiaxin Guan
Keywords(s):  
Category(s): Software & Algorithms, Software & Algorithms > Communication & Networking, Software & Algorithms > Security & Privacy
VEViD: Vision Enhancement via Virtual Diffraction and Coherent Detection (Case No. 2023-083)
Summary: UCLA researchers in the Department of Electrical Engineering have developed an innovative approach to improve image quality when lighting conditions are suboptimal, that can be readily integrated with different machine learning techniques for more accurate object and face recognition. Background: The computer vision market size was valued...
Published: 2/14/2025   |   Inventor(s): Bahram Jalali, Callen MacPhee
Keywords(s):  
Category(s): Electrical, Electrical > Signal Processing, Software & Algorithms, Software & Algorithms > Image Processing, Software & Algorithms > Security & Privacy, Optics & Photonics, Electrical > Displays, Electrical > Imaging, Life Science Research Tools, Life Science Research Tools > Microscopy And Imaging, Software & Algorithms > Artificial Intelligence & Machine Learning
Scalable Multi-Party Networks for High-Rate Entanglement Distribution and Quantum Communications (Case No. 2024-011)
Summary: UCLA researchers in the Department of Electrical and Computer Engineering have developed a multiparty network for improved quantum communications. Background: Fully secure quantum networks are essential in achieving efficient and rapid quantum computing. These networks connect distant quantum computers and increase the computational volume...
Published: 2/14/2025   |   Inventor(s): Chee Wei Wong, Murat Sarihan, Xiang Cheng, Kai-Chi Chang
Keywords(s): Communication & Networking, energy-efficient wireless communication, entanglement, multiparty network, quantum communication, Quantum Computer, quantum key, quantum network, quantum processing, quantum processor, scalable communication
Category(s): Electrical, Electrical > Quantum Computing, Electrical > Sensors, Software & Algorithms, Software & Algorithms > Communication & Networking, Software & Algorithms > Security & Privacy
2023-131 A Method for Video Motion Detection, Segmentation, and Compression
Summary: UCLA Researchers in the Department of Electrical and Computer Engineering have developed a new computationally efficient algorithm that detects and tracks motion in videos. Background: Computer vision and video processing have many applications in visual security and surveillance such as people counting, action recognition, anomaly detection,...
Published: 2/14/2025   |   Inventor(s): Bahram Jalali, Yiming Zhou, Callen MacPhee
Keywords(s): Autonomous driving, computational imaging, Computer Monitor, Computer Security, Computer Vision, computer vision algorithm, Computer-Aided Design, data Compression, Data Recovery, Energy Security , event detection, Human tracking, Image Analysis, image and video enhancement, Image Processing, image restoration, Liquid tracking, Metal process monitoring, motion detection, object recognition, real-time sensing/monitoring/tracking, security, Security and defense, security imaging, Structural health monitoring, Vibration monitoring, Vibration sensing, video pre-processing, video processing, visual security and surveillance
Category(s): Software & Algorithms, Software & Algorithms > Image Processing, Software & Algorithms > Security & Privacy, Software & Algorithms > Programs
2021-349-2 A METHOD FOR RECORDING OF TERAHERTZ WAVEFORMS
SUMMARY: UCLA researchers in the department of Electrical Engineering have developed a method for recording of terahertz waveforms which can be used for both sensing and communication in the terahertz spectrum. BACKGROUND: Terahertz waves are part of the electromagnetic spectrum between infrared and microwaves. In optical sensing, infrared waves...
Published: 7/17/2025   |   Inventor(s): Bahram Jalali, Tianwei Jiang
Keywords(s): Analytical Chemistry, Communication & Networking, Extremely High Frequency, Optical Communication , Remote Sensing, Waveform
Category(s): Electrical > Imaging, Electrical > Sensors, Electrical > Signal Processing, Software & Algorithms > Communication & Networking, Software & Algorithms > Security & Privacy, Electrical > Wireless > Antennas, Electrical > Electronics & Semiconductors
2010-586 Methods To Detect And Respond To Trojan IC Attacks
Summary Researchers at UCLA have developed a novel bus architecture to protect integrated circuit (IC) systems against real-time Trojan attacks, without incurring high cost in terms of bus resources and performances Background As the complexity and size of communications system-on-chip (SoC) exponentially grow, companies are increasingly outsourcing...
Published: 7/17/2025   |   Inventor(s):  
Keywords(s):  
Category(s): Software & Algorithms > Security & Privacy
2009-131 Encoders for Block-Circulant LDPC Codes
Summary Methods and apparatus to encode message input symbols in accordance with an accumulate-repeat-accumulate code with repetition three or four are disclosed. Block circulant matrices are used. A first method and apparatus make use of the block-circulant structure of the parity check matrix. A second method and apparatus use block-circulant generator...
Published: 7/17/2025   |   Inventor(s):  
Keywords(s):  
Category(s): Software & Algorithms > Security & Privacy
2008-614 Optimal Routing Protocol Secure against Malicious Adversary
Summary Investigators at UCLA have developed a novel secure routing protocol for data transfer that achieves optimal transfer rate with negligible decoding error even if communication nodes are compromised by a malicious adversary. This advancement will vastly improve internet security and communication safety. Background The Internet has become a ubiquitous...
Published: 7/17/2025   |   Inventor(s):  
Keywords(s):  
Category(s): Software & Algorithms > Security & Privacy
1 2