Filter Results
Researcher
- James (Jim) Tobin
- Samuel C Hollifield
- Adam G Stevens
- Ali Passian
- Brian K Post
- Brian Weber
- Chad Steed
- Corson L. Cramer
- Daniel R Coughlin
- Dustin B Gilmer
- Greg S Larsen
- Isabelle B Snyder
- James W Klett
- Joel A Dawson
- Joel M Asiamah
- Josh D Crabtree
- Junghoon Chae
- Justin West
- Kevin D Spakes
- Kim W Sitzlar
- Lilian V Swann
- Louise G Worrall
- Lucas R Koch
- Mary A Adkisson
- Milton N Ericson
- Mingyan Li
- Raymond C Borges Hink
- Richard L Reed
- Rob C Jordan
- Robert N Stewart
- Ryan A Kerekes
- Sally S Ghanem
- Samudra Dasgupta
- Srikanth B Yoginath
- Steven E Bullock
- Steven J. Guzorek
- Sudarsanam Babu
- Travis S Humble
- Trevor G Aguirre
- T S Oesch
- Varisara Tansakul
- Vlastimil Kunc
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
The invention relates to population growth projections and more specifically to a computer method for making such projections.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
The idea behind coded apertures is that a known pattern (i.e., the coded mask) can be placed between the signal and the detector so that the signal generates a shadow of the coded mask at the detector named the shadowgram.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
The invention relates to sensors and more specifically to a smart alarm that uses mathematical algorithms to detect fires more rapidly than conventional smoke alarms and to discriminate against conditions that would lead to false alarms.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
The subject invention relates to instrumentation and more specifically to an instrument for detecting changes in visibility conditions.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
The disclosure relates to cyber security systems and more specifically to the use of game theory. Information security analysis can be performed using game theory implemented in dynamic simulations of Agent-Based Models (ABMs).
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
Almost every major computer network is defended by signature-based Intrusion Detection Systems (IDSs) that are designed to alert whenever a pattern that indicates a known exploit is detected.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
The invention relates to RFID tags and more specifically to a protocol that provides both location and device authentication.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
The invention relates to remote monitoring and more specifically to a system for acquiring sensor data on a global scale. This communication device allows a user to remotely activate a system and obtain status updates regarding that system.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
The invention relates to remote monitoring and more specifically to a system for acquiring sensor data on a global scale.
![default image](/themes/custom/ornl/images/default-thumbnail.jpg)
With this technology, we propose a systematic method for constructing a potentially very large number of complementary anomaly detectors from a single probabilistic model of the data.