Abstract:
An encoder can convert a stream of data into three or four synchronized 4-PSK signals, for 64-QAM and 256-QAM, respectively. Three or four mixers can combine the three or four synchronized PSK signals with a common local oscillator signal to form three or four respective amplifiable signals, which can all have the same amplitude. One amplifier receives a first of the amplifiable signals and powers one radiator. Two amplifiers both receive a second of amplifiable signals and power two respective radiators. Four amplifiers receive a third of the amplifiable signals and power four respective radiators. The amplifiers can all operate in near or full saturation. Each radiator radiates in one of a plurality of discrete, specified states. The radiated states from the radiators combine through far-field electromagnetic propagation and effectively sum at the receiver to mimic transmission from a single amplifier.
Abstract:
A method for secure comparison of encrypted symbols. According to one embodiment, a user may encrypt two symbols, share the encrypted symbols with an untrusted third party that can compute algorithms on these symbols without access the original data or encryption keys such that the result of running the algorithm on the encrypted data can be decrypted to a result which is equivalent to the result of running the algorithm on the original unencrypted data. In one embodiment the untrusted third party may perform a sequence of operations on the encrypted symbols to produce an encrypted result which, when decrypted by a trusted party, indicates whether the two symbols are the same.
Abstract:
A method for secure comparison of encrypted symbols. According to one embodiment, a user may encrypt two symbols, share the encrypted symbols with an untrusted third party that can compute algorithms on these symbols without access the original data or encryption keys such that the result of running the algorithm on the encrypted data can be decrypted to a result which is equivalent to the result of running the algorithm on the original unencrypted data. In one embodiment the untrusted third party may perform a sequence of operations on the encrypted symbols to produce an encrypted result which, when decrypted by a trusted party, indicates whether the two symbols are the same.
Abstract:
A method and apparatus for providing battery optimization and protection in a low power energy environment is presented. A current configuration of a battery module including a plurality of a particular type of battery is determined. A voltage level of the battery module is detected. A determination is made whether the current configuration of the battery module is a preferred configuration for the particular type of batteries of the battery module. When the determination is that the current configuration of the battery module is not the preferred configuration for the particular type of batteries of the battery module, then the battery module is reconfigured to a preferred configuration for the particular type of batteries of the battery module.
Abstract:
Embodiments disclosed herein include a sensor device that monitors external activity and that includes functionality to detect tampering of the device itself. When monitoring for tampering, a power switch is disabled. Techniques include detecting relative movement of the sensor device, reporting tampering activity, and executing tamper detection responses. Responses can include tracking geographical movement and/or subsequent tampering activity to assist in recovery of a transported device. Responses can also include adjusting power consumption such as by modifying sensing functionality of the sensor device. Techniques include use of an accelerometer that can be positioned in the sensor device to detect relative movement. Once relative movement meets a predetermined threshold indicating device tampering, the sensor device transmits a notification of such tampering, via a network, or in response to a query from an authorized peer device.
Abstract:
A technology is described for a Photonic Integrated Circuit (PIC) radio frequency (RF) oscillator. The PIC RF oscillator can comprise an optical gain media coupled to a first mirror and configured to be coupled to the PIC. The PIC can comprise a first optical cavity located within the PIC, a tunable mirror to form a first optical path between the first mirror in the gain media and the first tunable mirror, and a frequency tunable intra-cavity dual tone resonator positioned within the first optical cavity to constrain the first optical cavity having a common optical path to produce tow primary laser tones with a tunable frequency spacing. A photo detector is optically coupled to the PIC and configured to mix the two primary laser tones to form an RF output signal with a frequency selected by the tunable frequency spacing of the two primary tones.
Abstract:
The present disclosure is drawn to loop-mediated isothermal amplification (LAMP) reaction assemblies including a substantially hygroscopic agent free LAMP reagent mixture in combination with a solid-phase reaction medium. The present disclosure also includes systems for a chromatic LAMP analysis including a substantially non-reactive solid phase reaction medium, and a non-interfering reagent mixture. The present disclosure also includes solid phase LAMP reaction mediums comprising a substrate, an adhesive layer disposed on the substrate, a reaction layer disposed on the adhesive layer, and a spreading layer disposed on the reaction layer. The present disclosure also includes methods of testing for a presence of a target nucleotide sequence including providing a biological sample, and dispensing the sample into a test environment having a solid phase reaction medium in combination with a LAMP reagent mixture and a pH sensitive dye.
Abstract:
The present disclosure is drawn to methods of preparing a saliva sample for loop-mediated isothermal amplification (LAMP) detection of a pathogen target. In some embodiments, such methods can include providing an amount of saliva from a test subject, and diluting the saliva in water to a degree that reduces a buffering capacity of the saliva while maintaining a sufficient concentration to allow for detection of the pathogen target.
Abstract:
A reservoir computer. In some embodiments, the reservoir computer includes a discrete element transmission line and a readout circuit. The discrete element transmission line may include a plurality of shunt-connected Josephson junctions (105) and a plurality of series- connected inductors (110) connected to the shunt-connected Josephson junctions. The readout circuit is connected to at least three nodes (117) of the discrete element transmission line.