Please wait...

You selected inventions in category Computers

  • ToysCollectorToysCollector
      Preview
      Description

      Toys-collector main serve for toy enthusiasts and distributor,we professional to supply Transformer,Original Car Model, UAV,Autobots and so on by wholesale and retail. And freeshipping online store.If you are interesed in this kind of toys,please feel free to contact us,or log in our website to have a look first:http://www.toys-collector.com/

      Full details Contact close
    • Intellexer - Natural Language Processing and Text Mining APIIntellexer - Natural Language Processing and Text...
        Preview
        Description

        Intellexer API is a cloud service that enables developers to embed natural language processing and text analysis tools in consumer and enterprise applications, or web-services using JSON or XML.

        Intellexer API methods can be called from any programming language or software component that supports HTTP requests.

        Intellexer API includes the following semantic solutions:

        Sentiment Analyzer is a powerful and efficient solution that automatically extracts sentimens, opinion objects and emotions in unstructured text data.

        Named Entity Recognizer identifies elements in text and classifies them into predefined categories. Additionally this module allows identifying the relations between named entities.

        Summarizer automatically generates a summary (short description) of a document with its main ideas.

        Multi-Document Summarizer with Related Facts automatically generates a summary (short description) from multiple documents with their main ideas.

        Comparator is a module that accurately compares documents of any format and determines the degree of similarity between them.

        Clusterizer hierarchically sorts an array of documents or terms from given texts.

        Natural Language Interface transforms Natural Language Queries into Boolean queries.

        Preformator extracts plain text and information about the text layout from documents of different formats.

        Language Recognizer identifies the language and character encoding of incoming documents.

        Spellchecker automatically corrects spelling errors due to well-chosen statistic and linguistic rules.

        Full details Contact close
      • 3D-Phone Increaser  - Turn your Smartphone into a 3D Monitor - for all VIDEOS, FOTOS and GAMES !3D-Phone Increaser - Turn your Smartphone into a...
          Preview
          Description

          Yes, it's possible! Turn your smartphone into a 3D monitor.

          Handling is easy open the 3D-Phone Increaser, insert smartphone and adjust focus. PRESS PLAY that was about everything, you sit back and enjoy fantastic 3D experience wherever you want it.

          Simple technology and a fantastic result. On the annoying 3D glasses can be dispensed through the 3D Phone Increaser. The results are also better than of other current 3D techniques. The picture has more depth, is sharper and there are no overlapping distorted images. In addition, no special software or format is needed, the technique works for any video, image or game.

          Full details Contact close
        • Improved authentication and encryption stopping brute forcingImproved authentication and encryption stopping...
            Preview
            Description

            Patent pending with the European Patent Office.

            SUMMARY:
            The invention is an improved authentication and encryption methodology, to be implemented as apparatus and/or software on a machine. The invention is a quantum leap compared to the previous state-of-the art (i.e. hashing / SALTs).

            PURPOSE:
            With this invention, all keys / passwords gain extremely enhanced resistance against all forms of brute-force or dictionary attacks. Passwords short enough to be easily memorized by human beings could - previously - easily be brute-forced by modern supercomputers (e.g. those of nation state intelligence agencies) and/or large botnets. Using this invention, they are now resistant to these attacks. The same holds true for dictionary attacks, here the effect is even greater. The patent will give its holder / buyer an obvious and significant advantage, offereing much higher privacy and security regarding authentication and encryption than all competitors.

            LOOKING FOR:
            Buyer - Contacts in the security field within large operating system or security solution vendors, who are interested in obtaining this invention for both implementation and strategical value against competitors.
            (I will not sell the invention to anybody intending to use the patent to block implementation of the invention for the public!)

            INFORMATION RELEASE / PROCESS:
            Interested parties of big enough market power to be considered potential buyers can request the details of the invention. This will require signing an NDA, but absolutely no other commitments have to be made. The decision of the prospective buyer to enter sales negotiations or not can be made after disclosure of the details and full completed analysis by him. The details of the invention will clearly prove that the invention works (can be verified mathematically) and show how it works.

            INVENTOR:
            Thomas Wolf
            - expert in computer security systems
            - decades of experience as white hat hacker, winner of Reemtsma "Hacker of the Year" award 1991
            - winner of several awards for mathematics / computer science
            - renowned security and IT expert, headed several ITprojects / programs for Allianz Group (world's largest insurance group), currently heading Deutsche Boerse Group's information security program
            - several media appearances (including the leading German news site SPIEGEL) as one of only nine members of the Giga Society (world's most discerning high IQ society)

            Full details Contact close
          • A Highly Secure Super High Capacity Data Storage Method that Both Reads and WritesA Highly Secure Super High Capacity Data Storage...
              Preview
              Description

              Acurrent method of storing data using 4 dimentions, the 3 of space and one of intensity, can store 350,000 Gs of data on a standard chip. The method uses a glass disc and is secure since to reread doesn't change the strong glass disc with lower energy reading laser. The higher energy write laser burns the permanent holes in the glass and the size of the holes multiplies the memory store capacity in the area of the groove in x y and z plus the intensity coordinate. This method has limitations however. It takes a high energy laser to write and is expensive and though it has long lasting storage for thousands of years, it's not rewritable.

              My solution involves a chip made of self assembling crystals; atoms are used to store the data not the larger zones etched in glass by the laser, though a laser still writes the angles of the atoms. Each atom is strongly bound at room temperature by "freezing" so after write is achieved, the read laser has little chance of unbonding the atom being read. The disc has two phases, at a medium higher temperature, after general heat is applied the bonds of the atoms are more able to read yet still bonded well so only the atoms written by the laser are changed. Then once the data is wtitten, the cooling fixes the memory, like a photo with early methods of improving the saving of older images.

              If a reading laser on the other side of the chip, which has four sides and is a crystal to make it by crystallization, reads the other unbound zone where the bonds are not reduced by the heat, and if the bonds of the angles are strong enough, this method made of cheaper read methods, would have both much higher storage ability, much higher security of the data like the glass disc for thousands or millions of years, and also both read and write.

              Charles Lawson, inventor

              Full details Contact close
            • A Cheaper BeeperA Cheaper Beeper
                Preview
                Description

                Often the same words are repeated by some, e.g. curse words or other words the listener already knows and the listener may like to edit these words much like a show where the bad words are bleeped, for the same reason. A real life bleeper as in AR is out of reach with current technology since it would need viable sound cancellation and speech recognition both. The CHEAPER BEEPER may use the best technology available by jamming (all frequency noise) plus some sound cancellation and speech recognition too. The all frequency noise with current technology has to be loud and listening to sound for longer duration is harmful to health and ears. CHEAPER BEEPER uses speech recognition to find the start of the words to be bleeped and then using a simple all frequency shield along with the AN to just cancel out the words starting with the vowel or consonant they generally involve, and so on. Science shows moderately louder sound of this type isn't harmful if not continuous. AR augmented reality will be in general use in education in a year or two. There is still no AN Antinoise to reduce the bleeps yet in reach since AN stops just 80% or so of sound. Speech is higher frequency and AN cancels only the lower frequency sound. A cheap bleeper for more general use may be of worth as much as a bleeper on a show has worth. Using recognition technology available wouldn't be completely reliable and improvements could be made here using radar that finds resperation and heart changes so the radar might find the start of the word more reliably than speech recognition and also be better for speech recognition in general, e.g. cell phones could have radar in the handsetto improve speech recognition itself..Charles Lawson Inventor

                Full details Contact close
              • Route Planning Algorithm for Various Combinations of Traveler Requirement Criterions and ModesRoute Planning Algorithm for Various Combinations...
                  Preview
                  Description

                  Now a day’s various vehicles are available for the purpose of traveling and goods carrying. But the three major ways are by land, sea and air in various travel modes. According to the geographical arrangement of the world, the distance, time and cost varies in these three ways between the same source and destination.
                  In traveling the user requirement mainly on travel criterions and travel modes. The three main user requirement criterions in travel are shortest, fastest and cheapest. The travel modes may be by bus, train or flight. Throughout the globe traveling across various continents and countries by any one of the ways (or mode) will not optimize the user requirement criterions. For that a suitable route planning algorithm is proposed.
                  The entire user ever wants a solution to reach the destination in the criteria combination of shortest, fastest and cheapest. But we can not always get a best solution for the above case. Some times the user gives more important on time but not on distance and cost. Like that, there are eight possible combinations of these three criterions. On that all these eight combinations (except not shortest, not fastest and not cheapest), the suitable way of travel is taken between the various terminals are grouped to form the travel between the source and destination. The user may prefer some set of travel modes to travel. For example the user may want to travel by only bus and train and not by flight and vice versa. So the algorithm will result the travel modes between the terminals only on the preferred modes.
                  The user may give the preference on some criterions and select some travel modes. There may be many number of travel modes are available, but in this system up to three travel modes are allowed, for example it may be bus, train or flight. Otherwise it may be considered as travel by land, sea or air. The algorithm selects the mode of travel between the terminals, in between the source and destination according to the user required criterions.
                  The algorithm provides totally 49 different combinations of choices for travelers to select in travel criterions and modes. This algorithm can be applied not only in travel but also in the field of operating system kernel design, robotic arm movement etc., by modifying some logics.
                  The algorithm contains 19 steps. It is protected on the provisional patent application number US 61/984,761. The 94 page complete pseudo code will be provided at the time of purchasing. It is open for sale for mere 10000USD.
                  My E-mail ID: bkraman2014@gmail.com
                  contact number:+91-965-959-8088

                  Full details Contact close
                • Processor executing JAVA bytecodes with highest performanceProcessor executing JAVA bytecodes with highest...
                    Preview
                    Description

                    A microprocessor according to the patented technology can execute JAVA bytecodes (stack machine instructions) as well as register-based codes in an out-of-order wide-range superscalar manner.
                    Any microprocessor without the patented technology is not considered to be able to match in terms of bytecode performance and versatility.

                    For details, please refer to:

                    http://worldwide.espacenet.com/publicationDetails/biblio?DB=worldwide.espacenet.com&II=0&ND=3&adjacent=true&locale=en_EP&FT=D&date=20030702&CC=EP&NR=1324192A1&KC=A1

                    http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=7975127.PN.&OS=PN/7975127&RS=PN/7975127

                    The technology is patented in US, Japan, Germany, England, France, Canada, India, China, and South Korea.

                    The patents are basically for a license, though any offer/suggestion, especially from a smaller entity, will be appreciated and studied in the light of mutual benefit.

                    Thank you.

                    Full details Contact close