Search Results - technology+classifications+%3e+software+%3e+others

23 Results Sort By:
Smart Phone App for Mapping Two-Spotted Spider Mite (TSSM) Populations in Strawberries
Integrates a Deep Learning Model Enabling Real-Time TSSM Detection and Precise Miticide Application This smartphone app integrates a deep learning model to detect and map two-spotted spider mite (TSSM) populations in strawberries, enabling growers to precisely and accurately treat them. Every year, thousands of strawberry growers face significant yield...
Published: 6/27/2025   |   Inventor(s): Won Suk Lee, Congliang Zhou, Alireza Pourreza
Keywords(s):  
Category(s): Technology Classifications > Software > Others
Mice Behavioral Tracking in Y-Maze
Quantifies Behavioral Patterns with Scalable, High-Precision Image Processing Behavioral assays such as the Y-maze, depend on manual arena segmentation, strict lighting conditions, and labor-intensive video scoring. These limitations impede reproducibility, delay data acquisition, and restrict access for laboratories without extensive computational...
Published: 6/11/2025   |   Inventor(s): Lakiesha Williams, Eiko Alzamora
Keywords(s):  
Category(s): Technology Classifications > Software > Others
Automated Python-Based Image Analysis Software for Accurate Quantification of Histological Stains in Brain Tissue Samples
Automates the Detection and Quantification of Histological Stains This custom Python-based image analysis program improves the accuracy of histological image quantification. Analysis of histological brain slices often faces challenges of accurate and consistent detection and quantification. The leading image analysis tool on the market is prone to...
Published: 6/4/2025   |   Inventor(s): Lakiesha Williams, Eiko Alzamora
Keywords(s):  
Category(s): Technology Classifications > Software > Others
Digital Twin Framework for Real-Time Structural Health Monitoring of Bridges
Facilitates intelligent, hands-off bridge maintenance, operation, and management This digital twin framework uses artificial intelligence to manage real-life data, offering an intelligent and integrated bridge management system to monitor activity before it happens. A digital twin is a virtual representation of a real bridge, continually updated with...
Published: 3/27/2025   |   Inventor(s): Aaron Costin, Alireza Adibfar
Keywords(s):  
Category(s): Technology Classifications > Engineering > Civil, Technology Classifications > Software > Others
Blockchain-Based Platform for Secure and Transparent Remote E-Voting and Polling
Enables Encryption of Individual Votes, Protecting Voter Privacy, Votes, and Publicly Verifying Voting Results This blockchain-based e-voting platform provides a transparent and secure system for remote e-voting and polling. Remote electronic voting systems, also known as e-voting systems, allow voters to cast votes electronically to election authorities...
Published: 9/11/2023   |   Inventor(s): My Thai, Truc Nguyen
Keywords(s):  
Category(s): Technology Classifications > Software > Others, Technology Classifications > Engineering > Computer Science
Building Bridges With Taxonomy: Software Application That Extends to Essentially Any Building Application
Helps Automate the Construction and Organization of Taxonomies and Ontologies for Interoperability Among Software Programs The taxonomy editor software helps promote the efficient and seamless transfer of information between software by graphically enabling the ability to assign taxonomic-based relationships and conversions among a data set or native...
Published: 9/7/2022   |   Inventor(s): Aaron Costin
Keywords(s):  
Category(s): Technology Classifications > Software, Technology Classifications > Software > Others, Technology Classifications > Engineering > Mechanical
Software to Improve Documentation of Patient Skin Cancer History
Visual Display Helps Providers Efficiently Review a Patient’s Skin Cancer History and Categorize Lesions This standardized, visual software tool quickly gives healthcare providers an accurate assessment of a patient’s skin cancer treatment history and allows them to record and categorize skin lesions easily during a screening. Skin cancer...
Published: 7/1/2021   |   Inventor(s): Maria Longo
Keywords(s):  
Category(s): Technology Classifications > Software > Others, Technology Classifications > Software > Healthcare IT
3D Characters in Virtual Reality to Holistically Evaluate Accessibility of Interior Environments
Simulated Avatars Provide Experiential Feedback for Designing Spaces Suitable for People with DisabilitiesThese first-person virtual reality characters possess kinesthetic capabilities and provide haptic feedback to simulate various levels of physical ability, enabling designers to test the accessibility of interior environments. Architects, engineers,...
Published: 6/27/2021   |   Inventor(s): Jason Meneely, Cesar Gonzalez, Kyle Walsh
Keywords(s):  
Category(s): Technology Classifications > Software > Others, Technology Classifications > Others > Others
Software Using a Genetic Algorithm to Automatically Build Convolutional Neural Networks for Medical Image Denoising
Reduces Noise in Medical Images Using Deep Neural Networks Automatically Built by Genetic AlgorithmsThis software automatically selects the most suitable parameters to develop convolutional neural networks able to denoise medical images. The noise in medical images produced from CT or MRI scans can cover or distort the true image, making accurate diagnosis...
Published: 6/27/2021   |   Inventor(s): Ruogu Fang, Peng Liu
Keywords(s): Convolutional Neural Networks, Deep Learning, Evolution, Genetic Algorithm, hyper-parameters, Low-Dose Imaging, Medical Image Denoising
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Others > Others, Technology Classifications > Software > Others
Ransomware Protection through Data Transformation Monitoring
Anti-Malware System Indicator Automatically Detects Malware Based on User Data Changes This anti-ransomware system indicator monitors an end user?s data to automatically detect malware based on changes to that data. Data breaches occur when sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or otherwise used by an unauthorized...
Published: 6/27/2021   |   Inventor(s): Walter Scaife, Patrick Traynor, Henry Carter, Kevin Butler
Keywords(s): intrusion detection, Malware Blocker, Malware Intrusion Detection
Category(s): Technology Classifications > Software > Others
1 2 3