Apply
Undergraduate
Graduate
Giving
Give Now
Learn about Giving
The Power of Stevens Campaign
I am a…
Future Student
Parents and Family Members
Stevens Alumnus/a
High School Counselor
Corporate Partner
Current Student
Friend of Stevens
Log in to mySTEVENS
Search
Search form
Search
Utilities
Visit
Virtual Tour
Alumni
News
Directory
Athletics
myStevens
About
Stevens
Mission
Stevens History
Facts & Statistics
Rankings and Recognition
Leadership
Strategic Plan
Sustainability
Community Engagement
University Policy Library
Accreditation
Consumer Information
Admissions
Undergraduate Admissions
Graduate Admissions
Stevens Veterans Office
Pre-College Programs
Tuition & Financial Aid
Success After Stevens
Academics
Undergraduate Studies
Graduate Studies
Colleges & Schools
Stevens Online
Academic Catalog
Technology & Entrepreneurial Thinking
Continuing and Professional Education
Global Opportunities
Academic Culture
Library
Research &
Entrepreneurship
Foundational Research Pillars
Annual Innovation Expo
Faculty Research
Student Research
Innovation & Entrepreneurship
Stevens Venture Center
Solar Decathlon
Partner with Stevens
Campus Life
Living at Stevens
Student Affairs
Undergrad Student Life
Graduate Student Affairs
Career Center
Health & Wellness
Diversity and Inclusion
Athletics
Arts on Campus
Life in Hoboken
Commencement
Navigation & Search
Close
Available Patents & Technologies
Home
Directory
Office of Innovation and Entrepreneurship
Available Patents & Technologies
Search for Technologies
All Technologies
-
Advanced Search
Search Results - information+assurance%2fcyber+security
16
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
A Method And Apparatus Forgenerating And Evaluating Ideas In An Organization
Background:Prediction markets are speculative electronic markets created for the purpose of making predictions. Recently, there has been an increased interest in the possibility of using Such markets to predict certain events or parameter. The current market prices can be interpreted as predictions of the probability of the event or the expected value...
Published: 4/26/2021
|
Inventor(s):
Gerrit Kamp
,
Peter Koen
Keywords(s):
Category(s):
Information Assurance/Cyber Security
Intelligent Adaptive Integrated Learning Environment
An intelligent adaptive integrated learning environment to optimize the learning process to a particular user. The environment is capable of providing assessment and targeted feedback. - TESTFull Patent: Intelligent Adaptive Integrated Learning Environment
Published: 4/26/2021
|
Inventor(s):
Alexei Miasnikov
,
Alexey Myasnikov
Keywords(s):
Category(s):
Information Assurance/Cyber Security
Automated Teaching System Using Declarative Problem Solving Approach
A system for solving problems in mathematics, natural science, engineering and like disciplines, online or on a computing device. The system includes an interface which employs a declarative approach to solution representation. The interface allows users such as students to enter their solutions by declaring main steps of a solution (in various modes...
Published: 4/26/2021
|
Inventor(s):
Alexei Miasnikov
,
Alexey Myasnikov
Keywords(s):
Category(s):
Information Assurance/Cyber Security
Systems and Methods for Automatically Detecting Deception in Human Communications Expressed in Digital Form
Background:The Internet is used to establish and maintain close personal relationships and is otherwise used as the virtual commons on which the whole world conducts vital human communication. The Internet is used everywhere and the dependence of its users on information communicated through the Internet has provided an opportunity for deceptive persons...
Published: 4/26/2021
|
Inventor(s):
Keywords(s):
Category(s):
Information Assurance/Cyber Security
Systems And Methods For Automatically Detecting Deception In Human Communications Expressed In Digital Form
Background:The Internet is used to establish and maintain close personal relationships and is otherwise used as the virtual commons on which the whole world conducts vital human communication. The Internet is used everywhere and the dependence of its users on information communicated through the Internet has provided an opportunity for deceptive persons...
Published: 4/26/2021
|
Inventor(s):
Keywords(s):
Category(s):
Information Assurance/Cyber Security
Genuine Quantum Variable-Probability True-Random Bit Generator
This invention is a truly random bit generator that harnesses the fundamental uncertainty of pure quantum superposition states to produce truly unpredictable bits. Unlike other random bit generators that claim to use quantum states but actually use non-quantum methods in their devices, this invention takes full advantage of truly random quantum effects....
Published: 4/26/2021
|
Inventor(s):
Samuel Hedemann
Keywords(s):
Category(s):
Information Assurance/Cyber Security
Method and Apparatus to Identify the Source of Information/Misinformation in Large-scale Social Media Networks
Background:Social media networks have experienced a meteoric rise in popularity. Information spread much faster in social networks than any other communication method as of this writing. This ease of information dissemination can be a double-edged sword, however, as social networks can also be used to spread rumors or computer malware. In such circumstances,...
Published: 4/26/2021
|
Inventor(s):
Alireza Louni
,
Koduvayur Subbalakshmi
Keywords(s):
Category(s):
Information Assurance/Cyber Security
Probable Elastic Part (PEP) Model for Real-World Face Recognition
Pose variation remains one of the major factors adversely affect the accuracy of real-world face recognition systems. Inspired by the recently proposed probabilistic elastic part (PEP) model and the success of the deep hierarchical architecture in a number of visual tasks, we propose the Hierarchical-PEP model to approach the unconstrained face recognition...
Published: 4/26/2021
|
Inventor(s):
Gang Hua
,
Haoxiang Li
Keywords(s):
Category(s):
Information Assurance/Cyber Security
Detection Of Hostile Intent From Movement Patterns
Background:Technology is often employed to detect whether suspects (individuals, vehicles, or mobile objects) are or may be a hostile threat to a target, such as one or more people, structures, vehicles, etc. Current technology used to detect a suspect typically requires that the suspect is within a proximity to the suspect's intended target. Examples...
Published: 4/26/2021
|
Inventor(s):
Jefferson Nickerson
,
Toshihiko Matsuka
Keywords(s):
Category(s):
Information Assurance/Cyber Security
,
Sensing Devices / Technology
Range Dependent Resolution Control For Three Dimensional Laser Scanning
Background:Light detection and ranging (LIDAR) scanners are non-contact measurement devices that work by emitting a very narrow light pulse and analyzing the reflection of the light pulse from an object. In order to scan a three-dimensional (3D) area from a single observation position, these scanners typically employ actuators to rotate the LIDAR assembly...
Published: 4/26/2021
|
Inventor(s):
Kishore Pochiraju
,
Biruk Assefa Gebre
Keywords(s):
Category(s):
Information Assurance/Cyber Security
1
2