Search Results

11 Results
for "technology+classifications+%3e+wireless+technologies"
Use Advanced Search
Sort By:

Adversarial Learning for Hiding Wireless Signals

Provides a novel method for ensuring sensitive messages are secure from malicious intrusion on wireless networks. Background: Spectrum access is required to communicate between two mobile nodes in a wireless network, where the communication link can be intercepted or jammed by adversaries due to the inherent broadcast nature of the wireless channel....
Published: 5/1/2024   |   Inventor(s): Dola Saha, Hesham Mohammed
Keywords(s): Technologies
Category(s): Technology Classifications > Wireless Technologies, Campus > University at Albany

Bionet Sonar, Inc.

https://www.bionetsonar.com/ https://www.bionetsonar.com/ https://suny.technologypublisher.com/files/sites/bionet_transparent_logo.png https://suny.technologypublisher.com/files/sites/bionet_transparent_logo.png
Published: 3/11/2024   |   Inventor(s): University at Buffalo
Keywords(s): Startups
Category(s): Technology Classifications > Medical Devices, Technology Classifications > Wireless Technologies, Campus > University at Buffalo

Advanced Mobile Navigation and Mapping App

­Improves mobile mapping and navigation apps by visualizing distant landmarks that typically fall outside the device display area. Background: Existing mobile map or navigation apps generally provide directions through distance and turn-by-turn instructions – for example, “after 1 mile, turn right on to Lakeview street.” Directions...
Published: 1/23/2024   |   Inventor(s): Rui Li, Jiayan Zhao
Keywords(s): augmented reality, autonomous vehicle, spatial cognition, Technologies, visualization, wayfinding and navigation
Category(s): Campus > University at Albany, Technology Classifications > Electronics, Technology Classifications > Instrumentation, Technology Classifications > Wireless Technologies

Wireless Charger

Provides simultaneous charging on all sides of the device to reduce charging time. Background: Wireless charging of electronic products such as mobile devices is an area of significant interest and research. Unfortunately, challenges have stunted the growth of the wireless charging industry. For example, many so-called “wireless” charging...
Published: 5/1/2024   |   Inventor(s): Patanjali Parimi, Mohammed Hossain
Keywords(s): #SUNYresearch, drones, TAF, Technologies
Category(s): Technology Classifications > Wireless Technologies, Campus > SUNY Oswego

RFEye in the Sky

Locates signals independent of the waveform, via a single Unmanned Aerial Vehicle (UAV) equipped with only one omnidirectional antenna. Background: Locating wireless signals outdoors is necessary for a variety of military, law enforcement, and civil applications. Acquiring such signals is the first step, which often requires patrolling large distances...
Published: 5/7/2024   |   Inventor(s): Dola Saha, Aveek Dutta, Maqsood Abdul Careem
Keywords(s): beamforming, blind detection, direction of arrival, localization, Technologies, UAV
Category(s): Campus > University at Albany, Technology Classifications > Electronics, Technology Classifications > Wireless Technologies

Air Filter for Face Masks

Battery-operated air filtration system for face masks that kills viruses on contact. Background: Face masks protect wearers via fabric layers, which mechanically block large droplets, and electrostatic layers, which trap small, airborne particles carrying viruses. The electrostatic layers lose their charge after a single day, reducing effectiveness....
Published: 5/1/2024   |   Inventor(s): Iulian Gherasoiu, Haralabos Efstathiadis, Michael Fasullo
Keywords(s): battery-operated, COVID-19, electrostatic field, face masks, replacement for N95, reusable filter
Category(s): Campus > SUNY Polytechnic Institute, Technology Classifications > COVID-19, Technology Classifications > Wireless Technologies, Technology Classifications > Medical Devices

ODD: Protecting Sensitive Data in Mobile Devices by Out-of-order Data Division

A novel, multi-layer distributed data security scheme that provides a triple layer of out-of-order divide and store protection of data Background: Technologists are looking to achieve a balance between making data difficult to be illegally or maliciously compromised while providing legitimate data users and owners sufficient encryption protection...
Published: 8/3/2021   |   Inventor(s): Yu Chen
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University

Hardware Mechanism for Authenticating Program Execution at Run-Time in a Microprocessor

A mechanism for validating the legal execution path and instructions that works in parallel with normal program execution and imposes a small performance penalty Background: The construction of trustworthy systems demands that the execution of every piece of code is validated as genuine – that the executed codes do exactly what they are supposed...
Published: 12/29/2023   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University

System and Method for Validating Program Execution at Run-Time Using Control Flow Signatures

A simple hardware mechanism to validate the execution of a program continuously for fast validation of the program as it executes. Background: A central requirement for implementing trusted computing platforms is to validate whether a program executing on a potentially untrusted host is really the program the user thinks it is. If the host...
Published: 4/10/2023   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University

System and Method for Validating Program Execution at Run-Time

A technology that enables the detection of tampering of a program as the program executes for security applications. Background: Current computer systems are highly vulnerable to cyber-attack. The number of attacks and the financial losses due to those attacks has risen exponentially. Despite significant investments, the situation continues...
Published: 4/23/2023   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University
1 2 

Search SUNY Technologies

Trending Searches

Latest Technologies