会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • Magnetic microparticles comprising organic substances
    • 包含有机物质的磁性微粒
    • US20070281034A1
    • 2007-12-06
    • US11803902
    • 2007-05-15
    • Dmitri KirpotinDaniel ChanPaul Bunn
    • Dmitri KirpotinDaniel ChanPaul Bunn
    • A61K33/26A61K31/7048A61K31/704A61K31/525A61K9/14
    • C07D401/12A61K47/6935A61K47/6939A61K49/1857A61K49/1863C07D241/46C07D487/04C07D493/08
    • The invention provides for water-dispersible microparticles comprising magnetic material and organic substance, such as a pharmaceutical or a pigment, that constitute in totality at least 50%, or preferably more that 70%, of the dry mass of the particle. The method of making such microparticles is also provided, comprising coating of the magnetic material in an aqueous colloid form with a layer of a polyelectrolyte, and combining the coated colloid with the organic substance having ionic charge opposite to that of the polyelectrolyte. When the organic substance is poorly soluble in water, the combining comprises dissolving of the substance in a water-miscible organic solvent, and combining said solution with the polyelectrolyte-coated magnetic colloid. The magnetic pharmaceutical microparticles are useful for magnetically-guided drug delivery, and/or for non-invasive monitoring of the drug distribution in the body. Magnetic microparticles comprising dyes and pigments are useful in magnetic inks.
    • 本发明提供了包含磁性材料和有机物质如药物或颜料的水分散性微粒,其总体上构成颗粒干质量的至少50%,优选多于70%。 还提供了制备这种微粒的方法,包括以胶态水溶液形式的磁性材料涂覆聚电解质层,并将涂覆的胶体与具有与聚电解质相反的离子电荷的有机物质组合。 当有机物质难溶于水时,其结合包括将物质溶解在与水混溶的有机溶剂中,并将所述溶液与聚电解质涂覆的磁性胶体组合。 磁性药物微粒可用于磁性引导药物递送和/或用于非侵入性监测体内药物分布。 包含染料和颜料的磁性微粒可用于磁性油墨。
    • 5. 发明授权
    • Floating ranking of product results
    • 产品结果浮动排名
    • US08635212B1
    • 2014-01-21
    • US13454818
    • 2012-04-24
    • Paul BunnShashidhar Anil ThakurAshutosh Shukla
    • Paul BunnShashidhar Anil ThakurAshutosh Shukla
    • G06F7/00G06F17/30
    • G06F17/30867
    • A ranked list of first search results based on a search query may be associated with a first search category, and each first search result may be associated with a first score. A ranked list of second search results based on the search query may be associated with a second, different search category, and a second search result may be associated with a second score. A final second score may be determined based on the second score and a function that maps scores associated with the second search category to scores associated with the first search category, information may be inserted relating to the ranked list of second search results at a position within the ranked list of first search results to form a set of search results, and the set of search results may be provided.
    • 基于搜索查询的第一搜索结果的排名列表可以与第一搜索类别相关联,并且每个第一搜索结果可以与第一分数相关联。 基于搜索查询的第二搜索结果的排名列表可以与第二不同的搜索类别相关联,并且第二搜索结果可以与第二分数相关联。 可以基于第二分数和将与第二搜索类别相关联的分数映射到与第一搜索类别相关联的分数的功能来确定最终的第二分数,可以将信息与第二搜索结果的排名列表相关联, 首先搜索结果的排名列表形成一组搜索结果,并且可以提供一组搜索结果。
    • 6. 发明申请
    • AUTHENTICATED ADVERSARIAL ROUTING
    • 认证的专业路由
    • US20110016316A1
    • 2011-01-20
    • US12922141
    • 2009-03-13
    • Yair AmirPaul BunnRafail Ostrovsky
    • Yair AmirPaul BunnRafail Ostrovsky
    • H04L9/00
    • H04L63/12H04L63/1416
    • A routing protocol is used to transmit messages from a sender to a receiver over a network of nodes, where adversaries can control links between the nodes and can also control the behavior of a large number of nodes. Various techniques can be used, along or in combination, to combat these effects. In one approach, certain trigger conditions are identified, the occurrence of which signals malicious behavior within the network. When signaled, the sender requests status reports from the intermediate nodes in an effort to determine which nodes are malicious. The information for the status reports is generated by nodes as packets are passed from one node to the next.
    • 路由协议用于通过节点网络将消息从发送方发送到接收方,其中对手可以控制节点之间的链路,并且还可以控制大量节点的行为。 可以沿着或结合使用各种技术来对抗这些影响。 在一种方法中,确定了某些触发条件,其中出现哪些信号表示网络内的恶意行为。 当发出信号时,发送方从中间节点请求状态报告,以确定哪些节点是恶意的。 当数据包从一个节点传递到下一个节点时,状态报告的信息由节点生成。