SENSORS FOR DETECTING HEAVY METALS
    181.
    发明专利

    公开(公告)号:MY155093A

    公开(公告)日:2015-09-15

    申请号:MYPI2012001289

    申请日:2012-03-21

    Applicant: MIMOS BERHAD

    Abstract: SELECTIVE LEAD (II) ION SENSOR (100) WITHOUT USING REFERENCE ELECTRODE IS USED TO MONITOR INDUSTRIAL DISCHARGE AND QUALITY OF WATER IN THE RIVERS, ESPECIALLY THOSE USED TO SUPPLY FRESH WATER FOR DAILY USE. THE LEAD SENSOR (100) OF THE PRESENT INVENTION COMPRISES MULTIPLE NARROW AND ELONGATED CHANNELS FILLED WITH LEAD RECOGNIZING MOLECULE (106), IMMOBILIZED BY LOW IMPEDANCE POLYMERIC BINDER (102). THE SENSING CHANNEL IS SANDWICHED BETWEEN AT LEAST TWO ELECTRODES (110) TO MEASURE THE CURRENT AND CONDUCTANCE ACROSS THE CHANNEL. THE BASELINE CONDUCTANCE OF THE CHANNEL IS ADJUSTED USING CONDUCTIVE PARTICLES (104) SUCH AS CARBON NANOTUBES AND PLATINUM NANOPARTICLES. THE DETECTION LIMIT AND LINEAR RANGE OF THE LEAD SENSOR (100) CAN BE OPTIMIZED BY CHANGING THE COMPOSITION OF THE MAIN COMPONENTS; LEAD IONOPHORE (106), LOW IMPEDANCE BINDER (102) AND CONDUCTIVE FILLER (104). THE PRESENCE OF TRACE AMOUNT OF LEAD ION CAN BE DETECTED FROM THE CHANGE IN THE CONDUCTIVITY ACROSS THE CHANNEL. THE PRESENCE OF LEAD IONS LINEARLY INCREASES THE CONDUCTIVITY OF THE SENSING CHANNEL. THE MOST ILLUSTRATIVE DRAWING IS

    A SYSTEM AND METHOD FOR PROVIDING INTEGRITY VERIFICATION IN RADIO FREQUENCY IDENTIFICATION (RFID)

    公开(公告)号:MY155079A

    公开(公告)日:2015-08-28

    申请号:MYPI2010005380

    申请日:2010-11-16

    Applicant: MIMOS BERHAD

    Abstract: A TRUSTED RFID ENVIRONMENT IS ESTABLISHED BY EMBEDDING A TRUSTED PLATFORM MODULE (TPM) IN A RFID SYSTEM. A TRUSTED SERVICE SERVER IS PROVIDING SERVICES IN RFID TAG TO COMPENSATE FOR LIMITATION OF RESOURCES WITHIN RFID TAG. THE SYSTEM OF THE PRESENT INVENTION COMPRISING AT ?EAST ONE RFID TAG (20), TRUSTED SERVICE SERVER (26), AT LEAST ONE RFID DEVICE (14) AND AT LEAST ONE BACK END SERVER (10). THE METHOD (200) FOR PROVIDING INTEGRITY VERIFICATION IN RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEM USING TRUSTED PLATFORM MODULE COMPRISING STEPS OF SENDING INTEGRITY VALUE OF RFID DEVICE (14) TO BACK END SERVER (10) (202); VERIFYING INTEGRITY VALUE OF RFID DEVICE (14) (204); COMPARING INTEGRITY VALUE OF RFID DEVICE (14) TO INTEGRITY VALUE STORED IN BACK END SERVER (10) (206); SENDING INTEGRITY VALUE OF BACK END SERVER (10) TO RFID DEVICE (14) WHEN INTEGRITY VALUE OF RFID DEVICE (14) MATCHES INTEGRITY VALUE STORED IN BACK END SERVER (10) (208) ELSE VERIFICATION IS TERMINATED; VERIFYING INTEGRITY VALUE OF BACK END SERVER (10) (210); COMPARING INTEGRITY VALUE OF BACK END SERVER (10) TO INTEGRITY VALUE STORED IN RFID DEVICE (14) (212); SENDING INTEGRITY VALUE OF RFID DEVICE (14) TO RFID TAG (20) WHEN INTEGRITY VALUE OF RFID DEVICE (14) MATCHES INTEGRITY VALUE OF RFID TAG (RT) (214) ELSE VERIFICATION IS TERMINATED; VERIFYING INTEGRITY VALUE OF THE RFID DEVICE (216): COMPARING INTEGRITY VALUE OF RFID DEVICE (14) TO INTEGRITY VALUE STORED IN RFID TAG (20) (218); AND REQUESTING MACHINE READABLE INSTRUCTIONS AS SERVICE FROM TRUSTED SERVICE SERVER (26) BY RFID TAG (20) WHEN INTEGRITY VALUE OF RFID DEVICE MATCHES INTEGRITY VALUE STORED IN RFID TAG (20) (220). THE MOST ILLUSTRATIVE DRAWING IS

    SYSTEM AND METHOD FOR MEMORY USAGE AND LATENCY OPTIMIZATION IN WIRELESS NETWORKS

    公开(公告)号:MY154137A

    公开(公告)日:2015-05-15

    申请号:MYPI2011005713

    申请日:2011-11-24

    Applicant: MIMOS BERHAD

    Abstract: A SYSTEM (10) AND METHOD FOR THE MEMORY AND LATENCY OPTIMIZATION ARE ACHIEVED BY USING INTERLEAVE BURST DECODE METHOD AND TIGHTLY COUPLING THE DECODER OUTPUT (20) WITH A MULTI-CHANNEL DMA BLOCK (13) THAT IS WIMAX LAYER 1 PROTOCOL AWARE, IN ORDER TO ELIMINATE THE INTERMEDIATE MEMORY STORAGE FOR FEC DECODE PROCESSING. THE SYSTEM (10) ESSENTIALLY SPLITS THE FRAME INPUT TO THE FEC BLOCK IN SMALLER GRANULARITY; THAT IS; FEC BLOCK BY FEC BLOCK. IN THIS RESPECT, A DATA BURST IS COMPRISED OF MULTIPLE FEC BLOCKS WITH BLOCK BOUNDARY AS DEFINED BY SLOT CONCATENATION (14) RULES AND THE DECODE PROCESSING OF ONE FEC BLOCK (12) FROM A PARTICULAR DATA BURST MAY INTERLEAVES WITH FEC BLOCK FROM OTHER DATA BURST, WITH THE ORDER DEPENDS ON THE INTER- ARRIVAL OF THE FEC BLOCK AND ITS BURST DIMENSION, BASED ON ?FIRST-COME-FIRST-DECODE? BASIS.

    METHOD AND SYSTEM FOR USE IN DEPLOYING MULTIPLE GATEWAYS IN MOBILE NETWORKS

    公开(公告)号:MY153839A

    公开(公告)日:2015-03-31

    申请号:MYPI2010000636

    申请日:2010-02-10

    Applicant: MIMOS BERHAD

    Abstract: THE PRESENT INVENTION RELATES TO A METHOD AND SYSTEM FOR USE IN PROVIDING MULTIPLE GATEWAYS WITHIN A NETWORK. A PLURALITY OF BORDER ROUTERS (100, 200, AND 300) IS ADDED PREFERABLY IN BETWEEN THE MOBILE ROUTER (150) OF THE RESPECTIVE NETWORK AND FOREIGN ROUTERS SO AS TO ENABLE CONSISTENT CONNECTION. THE BORDER ROUTERS, AMONG OTHERS ARE (100, 200, 300) SUITABLY CONFIGURED TO SERVE AS PROXY ADVERTISERS FOR FOREIGN ROUTERS (500), AND TO SEND OUT NOTIFICATIONS WITH RESPECT TO THEIR ACTIVE OR INACTIVE STATUS TO THE MOBILE ROUTER (150) OF THE NETWORK SO AS TO ENABLE THE MOBILE ROUTER (150) TO SELECT THE PREEMINENT BORDER ROUTER (100, 200, 300) FOR FORWARDING PACKETS WITHIN THE NETWORK. MOST ILLUSTRATIVE

    QUDITS IN TWO WAY DETERMINISTIC QUANTUM KEY DISTRIBUTION

    公开(公告)号:MY153146A

    公开(公告)日:2014-12-31

    申请号:MYPI20070734

    申请日:2007-05-11

    Abstract: OUDITS IN TWO WAY DETERMTNISTIC OUANTTYM KEY DISTRIBUTION 5 THE PRESENT INVENTION RELATES TO A QUDITS IN TWO WAY DETERMINISTIC QUANTUM KEY DISTRIBUTION WHEREIN IT INVOLVED A TWO WAY TRANSMISSION WHERE QUBITS ARE SENT TO AND FROM BETWEEN COMMUNICATING PARTIES WHILE INFORMATION IS ENCODED BY UNITARY TRANSFORMERS ON THE QUBITS. A PROTOCOL SEES 01 SENDING TO U2 A STATE THAT UL PREPARED AND WHEREIN U2 WOULD THEN ENCODE THE SAID RECEIVED PROTOCOL WITH UNITARY 10 TRANSFORMATION. U2 WOULD THEN THEREAFTER SEND THE ENCODED STATE BACK TO UL WHO WOULD THEN MEASURE OR DECODE THE SENT STATE DETERMINISTICALLY. IN ORDER TO ENSURE THE SECURITY OF THE PROTOCOL, A CONTROL MODE USED AND IS RANDOMLY DONE WITH A CERTAIN PROBABILITY WHEREIN INSTEAD OF ENCODING. U2 WOULD DO A PROJECTIVE MEASUREMENTS ON THE QUDIT RECEIVED WHILST U I MEASURES THE QUDIT SENT BY U2. 1 5 FIGILRE I @OO7693Q 111051")Q

    AN ANALOG TO DIGITAL CONVERTER
    187.
    发明专利

    公开(公告)号:MY153036A

    公开(公告)日:2014-12-31

    申请号:MYPI2010000816

    申请日:2010-02-24

    Applicant: MIMOS BERHAD

    Abstract: THE PRESENT INVENTION RELATES TO AN ANALOG TO DIGITAL CONVERTER (ADC) 100. THE ADC 100 IS COMPRISED OF A QUANTIZER COMPONENT 10 FOR SAMPLING AN INCOMING ANALOG SIGNAL AND GENERATING A DIGITAL SIGNAL; A RESIDUE GENERATOR COMPONENT 20 FOR SAMPLING THE INCOMING ANALOG SIGNAL AND FOR GENERATING A DIGITAL SIGNAL, AND A RESIDUE GENERATOR COMPONENT 20 FOR SAMPLING THE INCOMING ANALOG SIGNAL AND FOR GENERATING A RESIDUAL ANALOG SIGNAL WITH RESPECT TO THE DIGITAL SIGNAL. THE QUANTIZER COMPONENT 10 IS OF A DYNAMIC TYPE WHEREIN NO PREAMPLIFIER IS USED THEREIN AND IS SWITCHABLY CONNECTED TO A SOURCE 110 OF INCOMING ANALOG SIGNALS. THE QUANTIZER COMPONENT 10 IS COMPRISED OF A COMPARATOR CIRCUIT 30 HAVING A PLURALITY OF FIRST TRANSISTORS FOR SUBSTANTIALLY ACTING AS VOLTAGE-CONTROLLED RESISTORS THEREIN, AND A PLURALITY OF SECOND TRANSISTORS FOR SUBSTANTIALLY FORMING A LATCH THEREIN. THE RESIDUE GENERATOR 20 IS SWITCHABLY CONNECTED TO THE SOURCE 110 OF THE INCOMING ANALOG SIGNALS. THE INPUT OF THE RESIDUE GENERATOR COMPONENT IS CONNECTED TO THE OUTPUT OF THE QUANTIZER COMPONENT. THE COMPARATOR CIRCUIT 30 AND THE SWITCHABLE CONNECTION ARE FOR MATCHING THE SAMPLING CHARACTERISTICS OF THE QUANTIZER AND THE RESIDUE GENERATOR COMPONENTS 10 & 20. THE MOST ILLUSTRATIVE DRAWING:

    A SYSTEM AND METHOD TO DETECT INTRUSION EVENT

    公开(公告)号:MY152782A

    公开(公告)日:2014-11-28

    申请号:MYPI2010005928

    申请日:2010-12-13

    Applicant: MIMOS BERHAD

    Abstract: THE PRESENT INVENTION PROVIDES A SYSTEM FOR DETECTING INTRUSION EVENT IN REGION OF INTEREST. THE SYSTEM (100) COMPRISING AT LEAST ONE BLOB SEGMENTATION SUB-COMPONENT (102), AT LEAST ONE BLOB PROPERTIES COMPUTATION SUB-COMPONENT (104), AT LEAST ONE BLOB FILTERING ANALYSIS AND VALIDATION SUB-COMPONENT (106), AT LEAST ONE BACKGROUND MODEL UPDATE SUB-COMPONENT (108) AND AT LEAST ONE INTRUSION EVENT ANALYSIS SUB-COMPONENT (110). THE SAID BLOB SEGMENTATION SUB-COMPONENT (102) PROCESSES CURRENT IMAGE AND EXTRACTS MOTION PIXELS BY SUBTRACTING CURRENT IMAGE FROM REFERENCE OR BACKGROUND IMAGE. THE SAID BLOB PROPERTIES COMPUTATION SUB-COMPONENT (104) CLASSIFIES MOTION PIXELS BY APPLYING MORPHOLOGY CLOSING AND FILING HOLES TO CURRENT MOTION MAP AND LABELING EACH OF ADJACENT MOTION PIXELS. THE SAID BLOB FILTERING ANALYSIS AND VALIDATION SUB-COMPONENT (106) VALIDATES INTRUDER BLOBS USING RULE SET WHICH COMBINES INFORMATION OF CALCULATED PROPERTIES. THE SAID BACKGROUND MODEL UPDATE SUB-COMPONENT (108) UPDATES BACKGROUND IMAGE USING COMBINATION OF RULES BASED ON SIMILARITY VALUE OF DETECTED BLOB AND ITS SURROUNDING BY UPDATING PIXEL IN BACKGROUND IMAGE USING PREDEFINED INCREMENT OR DECREMENT VALUES IF CURRENT PIXEL IS BACKGROUND PIXEL AND UPDATING BACKGROUND PIXEL WITH CURRENT PIXEL INTENSITY IF CURRENT PIXEL BELONGS TO MOTION BLOB AND BLOB IS NONSIGNIFICANT WHILE THE SAID INTRUSION EVENT ANALYSIS SUB-COMPONENT (110) TRIGGERS ALERT WHEN EVENT IS DETECTED AND VERIFIED. ANOTHER EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD (700) FOR DETECTING INTRUSION EVENT IN REGION OF INTEREST. THE METHOD COMPRISING THE STEPS OF PROCESSING CURRENT IMAGE AND EXTRACTING MOTION PIXELS (702), CLASSIFYING MOTION PIXELS (704), DETERMINING INTRUDER BLOBS USING COMBINATION OF RULES BASED ON BLOB GEOMETRIC PROPERTIES, TEMPORAL PROPERTIES AND SIMILARITY PROPERTIES OF BLOB WITH SURROUNDING PIXELS (706), UPDATING BACKGROUND IMAGE USING COMBINATION OF RULES BASED ON SIMILARITY VALUE OF DETECTED BLOB AND ITS SURROUNDING (708) AND TRIGGERING ALERT WHEN EVENT IS DETECTED AND VERIFIED (710). THE MOST ILLUSTRATIVE DRAWING IS

    METHOD TO DETERMINE AND VISUALIZE LINE-OF-SIGHT

    公开(公告)号:MY152573A

    公开(公告)日:2014-10-31

    申请号:MYPI20092358

    申请日:2009-06-10

    Applicant: MIMOS BERHAD

    Abstract: A METHOD TO DETERMINE AND VISUALIZE HUMAN LINE-OF-SIGHT FROM A SEQUENCE OF IMAGE IS DESCRIBED. FIRST, A MOTION BLOB IS DETECTED FROM THE IMAGE (20). THEN, THE HUMAN LOCATION FROM THE MOTION BLOB IS DETECTED AND TRACKED (30) BY ENCLOSING A RECTANGLE AROUND THE BOUNDARIES OF THE BLOB. THE FACE REGION IS THEN DETECTED FROM THE BLOB (40). AFTER THAT, THE GAZE DIRECTION FROM THE BLOB IS DETECTED (50). LATER, THE LINE-OF-SIGHT IS VISUALIZED FROM THE FACE REGION TOWARDS A DIRECTION DETERMINED BY GAZE DIRECTION (70). THE HUMAN BLOB AND VISUALIZATION IS REPRESENTED IN A 3-DIMENSIONAL CUBE CORRESPONDING TO THE SEQUENCE OF IMAGE.

Patent Agency Ranking