# of Displayed Technologies: 6 / 6

Applied Category Filter (Click To Remove): Software & Information Technology


Categories

Protecting UUID in Bluetooth Low Energy (from Sniffing and Fingerprinting)
TS-048632 — A method for mitigating the BLE vulnerability in an IoT device that protects UUIDs from being harvested and reverse engineered
Universally Unique Identifiers (UUIDs) in Bluetooth Low Energy (BLE) Devices are vital for nearby smartphone applications to discover them. BLE has also been increasingly used by Internet of Things (IoT) devices in various areas such as transportation, healthcare, wearables, retail, and smart home…
  • College: College of Engineering (COE)
  • Inventors: Lin, Zhiqiang; Wen, Haohuang; Zhang, Yinqian; Zuo, Chaoshun
  • Licensing Officer: Hong, Dongsung

DAtAnchor: A Multi-Layer Data Loss Mitigation System
TS-041846 — An alternative to traditional data security measures. The technology effectively "anchors" the information to one location, allowing for better security and making it harder to compromise access.
Data breaches are a looming risk for organizations that maintain significant repositories of sensitive data. The fundamental reason behind their inability to prevent them is the philosophy behind the current paradigm in data security: prevent all breaches at all times. Towards that end, existing a…
  • College: College of Engineering (COE)
  • Inventors: Koksal, C. Emre
  • Licensing Officer: Hong, Dongsung

Sampling Method for Big Data Join Queries
TS-039364 — Tables of information are related using JOIN operators, a particular data point from table A is related with a data point from table B. This connectivity is a fundamental part of data analysis, allowing the user to run statistical analysis to find trends. When using large data sets too much inform…
  • College: College of Engineering (COE)
  • Inventors: Nandi, Arnab; Kamat, Niranjan
  • Licensing Officer: Hong, Dongsung

ICARUS: Interactive Cleaning and Rule System
TS-039363 — User friendly database validation software
Data sets are booming larger and more complex, in order to use big data ideas all the data must be stored in an organized manner. Data cleaning is the process of removing corrupted records from a set of data, with the problematic data being updated or removed. Data validation is the process of con…
  • College: College of Engineering (COE)
  • Inventors: Nandi, Arnab; Hebert, Courtney; Rahman, Protiva
  • Licensing Officer: Hong, Dongsung

Query Rewriting Infrastructure for Big Data Exploration
TS-015213 — Middleware layer that queries in the context of sampling and improves efficiency of common statistical analyses.
The rise of data-driven approaches to business decision making has led to advances in data querying. However, quantity of data collected has been increasing more rapidly than the user's ability to develop queries for efficient data analysis. For example, the calculation of variance is a necess…
  • College: College of Engineering (COE)
  • Inventors: Nandi, Arnab; Kamat, Niranjan
  • Licensing Officer: Hong, Dongsung

Multi-carrier processing in auditory prosthetic devices
TS-014871 — Encoding strategy for improvement of speech understanding in a noisy environment for audiotory prosthetic devices.
There are about 275 million adults globally with moderate to severe hearing loss and 360 million adults with mild hearing loss. The current solutions to allow these people to hear better include hearing aids, hearing loss counseling, cochlear implants, alerting devices, and other communication aid…
  • College: College of Arts & Sciences
  • Inventors: Apoux, Frederic; Healy, Eric
  • Licensing Officer: Hong, Dongsung

Loading icon