t

Processor bridge power management

A power controller can set the power state of a processor bridge based on which processor modules are in a communicative state. In addition, for a power state where selected processor modules are expected to be non-communicative, the power controller can set the supplied voltage to have a reduced voltage guard band as compared to other power states. These power management techniques can reduce the power consumed by the processor.




t

Power shifting in multicore platforms by varying SMT levels

Power consumption in a microprocessor platform is managed by setting a peak power level for power consumed by a multi-core microprocessor platform executing multi-threaded applications. The multi-core microprocessor platform contains a plurality of physical cores, and each physical core is configurable into a plurality of logical cores. A simultaneous multithreading level in at least one physical core is adjusted by changing the number of logical cores on that physical core in response to a power consumption level of the multi-core microprocessor platform exceeding the peak power level. Performance and power data based on simultaneous multi-threading levels are used in selecting the physical core to be adjusted.




t

Methods and apparatuses for controlling the temperature of a data processing system

Methods and apparatuses to manage working states of a data processing system. At least one embodiment of the present invention includes a data processing system with one or more sensors (e.g., physical sensors such as tachometer and thermistors, and logical sensors such as CPU load) for fine grain control of one or more components (e.g., processor, fan, hard drive, optical drive) of the system for working conditions that balance various goals (e.g., user preferences, performance, power consumption, thermal constraints, acoustic noise). In one example, the clock frequency and core voltage for a processor are actively managed to balance performance and power consumption (heat generation) without a significant latency. In one example, the speed of a cooling fan is actively managed to balance cooling effort and noise (and/or power consumption).




t

Power management of multiple compute units sharing a cache

We report methods, integrated circuit devices, and fabrication processes relating to power management transitions of multiple compute units sharing a cache. One method includes indicating that a first compute unit of a plurality of compute units of an integrated circuit device is attempting to enter a low power state, determining if the first compute unit is the only compute unit of the plurality in a normal power state, and in response to determining the first compute unit is the only compute unit in the normal power state: saving a state of a shared cache unit of the integrated circuit device, flushing at least a portion of a cache of the shared cache unit, repeating the flushing until either a second compute unit exits the low power state or the cache is completely flushed, and permitting the first compute unit to enter the low power state.




t

Multi-cluster processing system and method of operating the same

A multi-cluster processing system and a method of operating a multi-cluster processing system are provided. The multi-cluster processing system includes: a first cluster including a plurality of first-type cores: a second cluster including a plurality of second-type cores; and a control unit configured to monitor loads of the first-type cores and the second-type cores, wherein when utilization of at least one of enabled first-type cores exceeds a predetermined threshold utilization of each of the first-type cores, the control unit enables at least one of disabled first-type cores in a first mode, and the control unit enables at least one of the disabled second-type cores and disables the first cluster in a second mode, wherein an amount of computation per unit of time of each of the second-type cores is greater than an amount of computation per unit of time of each of the first-type cores.




t

Image forming apparatus, system-on-chip (SoC) unit, and driving method thereof

An image forming apparatus is connected to a host device including first and second power domains which are separately supplied with power and includes first and second memories to be disposed in the second power domain, a main controller disposed in the first power domain and to perform a control operation using the first memory in a normal mode, and a sub-controller disposed in the second power domain and perform a control operation using the second memory in a power-saving mode, where when the normal mode is changed to the power-saving mode a power supply to the first power domain is shut off, the first memory operates in a self-refresh mode, and the main controller copies central processing unit (CPU) context information into a context storage unit, and when the power-saving mode is changed to the normal mode, the main controller is booted using the CPU context information stored in the context storage unit.




t

Power supply control system, method, and computer program product

According to an embodiment, a control system includes a detector, an estimating unit, a determining unit, and a controller. The detector detects an idle state. The estimating unit estimates an idle period. When the idle state is detected, the determining unit determines whether a first power consumption when writeback of data which needs to be written back to a main storage device is performed and supply of power to a cache memory is stopped, is larger than a second power consumption when writeback of the data is not performed and supply of power is continued for the idle period. The controller stops the supply of power to the cache memory when the first power consumption is determined to be smaller than the second power consumption and continues the supply of power when the first power consumption is determined to be larger than the second power consumption.




t

Security enclave processor power control

An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory.




t

Memory controller with transaction-queue-monitoring power mode circuitry

An integrated-circuit memory controller outputs to a memory device a first signal in a first state to enable operation of synchronous data transmission and reception circuits within the memory device. A transaction queue within the memory controller stores memory read and write requests that, to be serviced, require operation of the synchronous data transmission and reception circuits, respectively, within the memory device. Power control circuitry within the memory controller determines that the transaction queue has reached a predetermined state and, in response, outputs the first signal to the memory device in a second state to disable operation of the synchronous data transmission and reception circuits within the memory device.




t

Methods, systems, apparatuses, and computer-readable media for waking a SLIMbus without toggle signal

Arrangements for restarting data transmission on a serial low-power inter-chip media bus (SLIMbus) are presented. A clock signal may be provided in an active mode to a component communicatively coupled with the SLIMbus. Immediately prior to the clock signal in the active mode being provided, the clock signal may have been in a paused mode. While the clock signal was in the paused mode at least until the clock signal is provided in the active mode, the data line may have been inactive (e.g., a toggle on the data line may not have been present). Frame synchronization data for a frame may be transmitted. The frame synchronization data for the frame, as received by the component, may not match expected frame synchronization data. Payload data may be transmitted as part of the frame to the component, wherein the payload data is expected to be read properly by the component.




t

Identification and management of unsafe optimizations

Techniques for implementing identification and management of unsafe optimizations are disclosed. A method of the disclosure includes receiving, by a managed runtime environment (MRE) executed by a processing device, a notice of misprediction of optimized code, the misprediction occurring during a runtime of the optimized code, determining, by the MRE, whether a local misprediction counter (LMC) associated with a code region of the optimized code causing the misprediction exceeds a local misprediction threshold (LMT) value, and when the LMC exceeds the LMT value, compiling, by the MRE, native code of the optimized code to generate a new version of the optimized code, wherein the code region in the new version of the optimized code is not optimized.




t

Experiment manager for manycore systems

An execution environment may have a monitoring, analysis, and feedback loop that may configure and tune the execution environment for currently executing workloads. A monitoring or instrumentation system may collect operational and performance data from hardware and software components within the system. A modeling system may create an operational model of the execution environment, then may determine different sets of parameters for the execution environment. A feedback loop may change various operational characteristics of the execution environment. The monitoring, analysis, and feedback loop may optimize the performance of a computer system for various metrics, including throughput, performance, energy conservation, or other metrics based on the applications that are currently executing. The performance model of the execution environment may be persisted and applied to new applications to optimize the performance of applications that have not been executed on the system.




t

Network security appliance

Methods, devices, and systems that may be used to secure networked devices are provided. One method includes receiving, at a security device, encrypted configuration data from a management server connected to a data network, from packets addressed to a networked device. The method further includes managing, by the security device, packets between the networked device and other devices accessible through a network based upon the configuration data. The method further includes sending, by the security device, a plurality of encrypted heartbeat messages to the management server utilizing an address associated with the networked device as the originating address for packets in which the encrypted heartbeat messages are transmitted.




t

Method for operating invisible system services on android platform

A method for operating an invisible system service on Android platform is disclosed. The method for operating system services on Android platform includes selectively registering a created system service in a context manager according to a type of the created system service, where the type of the system service comprises a first type for permitting access from an outside and a second type for not permitting access from the outside, and the selectively registering comprises registering in the context manager the created system service belonging to the first type and not registering in the context manager the created system service belonging to the second type.




t

Method and apparatus for rejecting untrusted network

A method of accessing a communication system and a communication device for performing the same are disclosed. The method includes transmitting, by a communication device to a node of a communication system through a communication link between the communication device and the node, a request to negotiate basic capabilities for communicating with the node, receiving, by the communication device from the node, a response to the request to negotiate basic capabilities, and, transmitting, by the communication device to the node, a request to disconnect the communication link, when the response to the request to negotiate basic capabilities indicates that the node does not support authentication.




t

Contactless authentication of optical disk drives

An optical disc drive (ODD) includes a radio-frequency identification (RFID) reader. The reader includes a circuit and a coil antenna which has a rotational symmetry with respect to a rotation axis of a motor, shaft and turntable of the ODD. The coil antenna can be secured to a wall of a housing of the ODD or around the motor and/or shaft. The reader can read an RFID tag on an optical disc. The RFID tag includes a circuit and a coil antenna which has a rotational symmetry with respect to the disc. As a result, the RFID tag can be read while the disc is rotating. A magnetic insulating material such as a ferrite polymer composite film is used to magnetically insulate the coil antenna. An authentication code can be read from the RFID tag to control access to content of the optical disc.




t

Variable domain resource data security for data processing systems

The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product configuration model. A variable domain is a set of resource data that can be described using a logical relationship data structure. The variable domain utilizes logical relationship expressions, such as a Boolean logic language, to define resource data in terms of parts, rules and/or attributes, and any other property that can be accessed for viewing, manipulation, or other purposes. The data security model represents an access control list (ACL) that includes security attributes as resource data and uses the same data structure and logical relationship expressions as an associated variable domain data model. An application, such as a configuration engine, can be used to create controlled access to the variable domain data model using the data security model.




t

Apparatus for controlling processor execution in a secure environment

Various embodiments described herein relate to apparatus for executing software in a secure computing environment. A secure processor can be used and configured to request a context swap from a first context to a second context when switching execution from a first portion of software to a second portion of software. A context manager, which can be in communication with the secure processor, can be configured to receive and initiate a requested context swap. A trust vector verifier, which can be in communication with the secure processor and the context manager, can be configured to load a trust vector descriptor upon command from a context manager.




t

Enabling web page tracking

Methods are provided for tracking data corresponding to a mobile device that accesses a web page. Once a mobile device is registered with a network, the mobile device is instructed to request permission before accessing a web page. An access request is received, and based on a user profile, the access request is approved such that the mobile device may access the web page. Access data that corresponds to the mobile device accessing the web page is collected so that it can be added to and stored in a database.




t

Managing physical presence across multiple blades

A method uses a firmware interface setup program for a selected compute node (“node”) to cause a firmware interface to enable a trusted platform module (TPM) on the selected node to receive a physical presence (PP) signal. The selected node is selected from a plurality of nodes within a multi-node chassis, wherein each node includes a firmware interface and a TPM. A device within the multi-node chassis is manually actuated to transmit a PP signal to each of the plurality of nodes, such that each node receives the PP signal. The PP signal is asserted to the TPM of the selected node in response to both enabling the TPM of the selected node to be able to receive the PP signal and receiving the PP signal. Still further, the method allows modification of a security setting of the selected node in response to the TPM receiving the PP signal.




t

Method of processing data to enable external storage thereof with minimized risk of information leakage

A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution framework) based on virtual machines (VMs) is utilized as a substitute for a trusted institution. Encryption of consolidated data can reduce risk of information leakage and enhance security. Since the virtual execution framework can control connection and direction of communication, financial institutions are allowed to apply encryption to data on their own, which makes the data further appropriate for external storage. By allowing financial institutions to apply their own decryption, it is possible to prevent one of two financial institutions from retrieving externally stored data into the external execution framework without intervention of the other. Additionally, associated acting subjects can be provided with freedom depending on the degree of information leakage risk.




t

System, method, and device for delivering communications and storing and delivering data

A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver. After verifying the wrap, the wrap is opened and a sister of the executable controller is installed into the platform memory to cooperate with the executable controller. Additionally or alternatively, the authentication driver may cooperate with the executable controller. The executable controller allows the platform processor to access data secured in a vault and/or verify the platform to create a connection to a connection server.




t

Secured wireless access system and related method

The disclosure is directed to a system and method for establishing a secured wireless connection allowing the exchange of information between a wireless device and aircraft equipment. The secured wireless access system may require a user controlling the wireless device to interact with an onboard interface to initiate a connection. The user may be further required to enter a randomly generated security passcode to pair the mobile device to the aircraft equipment. Further security measures may be implemented, such as tiered user access levels restricting certain equipment and/or information based upon a user identity of the user requesting access.




t

Method for controlling content and digital device using the same

A method and device for controlling content that includes plural display pages in a sequence, the method including: displaying a current page included in the content; receiving a user input to or above a display screen of the display unit for changing from the current page to another page of the content; extracting fingerprint information from the user input; determining whether the content of the another page is or is not accessible based on the extracted fingerprint information; if all of the content of the another page is determined to be accessible based on the extracted fingerprint information, displaying the another page; and if any of the content of the another page is determined not to be accessible based on the extracted fingerprint information, displaying a page following the current page without displaying content of the another page that was determined not to be accessible.




t

Techniques to transmit commands to a target device to reduce power consumption

Techniques are described to transmit commands to a display device. The commands can be transmitted in header byte fields of secondary data packets. The commands can be used to cause a target device to capture a frame, enter or exit self refresh mode, or reduce power use of a connection. In addition, a request to exit main link standby mode can cause the target enter training mode without explicit command to exit main link standby mode.




t

Apparatus and method for managing power of an electronic appliance

There is provided a power management apparatus including: a managed appliance registering unit carrying out authentication on an electronic appliance connected to a power network and registering an electronic appliance for which the authentication has succeeded as a managed appliance, a control unit controlling operation of the managed appliance and supplying of power to the managed appliance, a managed appliance information acquiring unit acquiring, from the managed appliance, as managed appliance information, at least any of appliance information including identification information that is unique to the electronic appliance, information indicating an operation state of the electronic appliance, information indicating an usage state of the electronic appliance and power information of the electronic appliance, and an appliance state judging unit judging a state of the managed appliance based on the managed appliance information acquired by the managed appliance information acquiring unit.




t

Data transform method and data transformer

A data transform method and a data transformer. The method includes: importing a data transform rule; acquiring from the data transform rule a source data definition, a destination data definition and a data transform rule definition; predicting resource energy consumption parameters of a data transform node server according to the source data definition, the destination data definition and the data transform rule definition; and deploying a resource energy consumption optimization policy of the data transform node server according to the predicted resource energy consumption parameters of the data transform node server.




t

Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method

A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases each one of which is assigned to one set of the sets of client computers. Each database further storing encrypted data items, each data item being encrypted with one of the user or user-group specific cryptographic keys, the key identifier of the cryptographic key with which one of the data items is encrypted being stored in the database as an attribute of the one of the encrypted data items. The log-in component comprising assignment information indicative of the assignment of the databases to the set of client computers.




t

Biometric attribute anomaly detection system with adjusting notifications

A system, methods and server for monitoring health and safety of individuals in a population and sending alert notifications when exceptions are detected include comparing biometric data obtained from the individuals to a biometric model generated for the individual through computer-learning methods. Biometric data may be gathered by wireless biometric sensor devices which transmit biometric data to receiver devices, which relay the biometric data to a server. The biometric model may be maintained in the server and include nominal and threshold biometric parameters for each individual based on biometric sensor data gathered or analyzed over a period of time. An alert may be issued by the server when an individual's biometric data is outside a threshold in the biometric model. The transmitted alert may depend upon the nature of the exception, user settings and past notification experience. Alerts may be escalated when not answered within defined durations.




t

Diagnostic radio frequency identification sensors and applications thereof

An integrated passive wireless chip diagnostic sensor system is described that can be interrogated remotely with a wireless device such as a modified cell phone incorporating multi-protocol RFID reader capabilities (such as the emerging Gen-2 standard) or Bluetooth, providing universal easy to use, low cost and immediate quantitative analyses, geolocation and sensor networking capabilities to users of the technology. The present invention can be integrated into various diagnostic platforms and is applicable for use with low power sensors such as thin films, MEMS, electrochemical, thermal, resistive, nano or microfluidic sensor technologies. Applications of the present invention include on-the-spot medical and self-diagnostics on smart skin patches, Point-of-Care (POC) analyses, food diagnostics, pathogen detection, disease-specific wireless biomarker detection, remote structural stresses detection and sensor networks for industrial or Homeland Security using low cost wireless devices such as modified cell phones.




t

Monitoring or feedback systems and methods

The present invention generally relates to systems and methods for monitoring and/or providing feedback for drugs or other pharmaceuticals taken by a subject. In one aspect, the present invention is directed to devices and methods for determining a species within the skin of a subject; and producing feedback to a subject based on the determination of the species. The feedback may be, for example, visual, audible, tactile, a change in temperature, etc. In some cases, information regarding the determination of the species may be transmitted to another entity, e.g., a health care provider, a computer, a relative, etc., which may then provide feedback to the subject in some fashion. In some cases, the feedback may be directly indicative of the species, e.g., whether the species is present, the concentration of the species, whether a by-product of a reaction involving the species is present, whether a compound affected by the species is present, etc. However, the feedback may also be indirect in some embodiments. For example, the subject may be presented with an external reward, e.g., based on the determination of the species within the skin. For instance, a reward such as cash, coupons, songs, discounts, personal items, etc., may be offered based on the level of compliance of the subject. Still other aspects of the invention are generally directed to kits involving such devices (with or without the drug to be monitored), methods of promoting such systems, or the like.




t

System and method for detecting and preventing drowsiness

A system for preventing drowsiness in a driver by employing a thermal grill. The system includes a detection module and an intervention module. The detection module monitors a driver's parameters to determine whether the driver is drowsy. If the driver is determined to be drowsy, the intervention module activates a thermal grill with interlaced hot and cold regions. This activation causes the hot regions to approach one temperature and the cold regions to approach another. Additionally, this activation leads to an uncomfortable sensation for the driver, alerts the driver, and prevents the driver from getting drowsy.




t

Method and system for determining treatments by modifying patient-specific geometrical models

Systems and methods are disclosed for evaluating cardiovascular treatment options for a patient. One method includes creating a three-dimensional model representing a portion of the patient's heart based on patient-specific data regarding a geometry of the patient's heart or vasculature; and for a plurality of treatment options for the patient's heart or vasculature, modifying at least one of the three-dimensional model and a reduced order model based on the three-dimensional model. The method also includes determining, for each of the plurality of treatment options, a value of a blood flow characteristic, by solving at least one of the modified three-dimensional model and the modified reduced order model; and identifying one of the plurality of treatment options that solves a function of at least one of: the determined blood flow characteristics of the patient's heart or vasculature, and one or more costs of each of the plurality of treatment options.




t

Automatic detection and correction of magnetic resonance imaging data

Systems and methods for processing magnetic resonance imaging (MRI) data are provided. A method includes receiving MRI data comprising a plurality of k-space points and deriving a plurality of image data sets based on the MRI data, each of the plurality of MRI image sets obtained by zeroing a different one of the plurality of k-space points. The method further includes computing image space metric values for each of the plurality of image data sets and adjusting a portion of the MRI data associated with ones of the image space metric values that fail to meet a threshold value to yield adjusted MRI data.




t

Region-growing algorithm

A region growing algorithm for controlling leakage is presented including a processor configured to select a starting point for segmentation of data, initiate a propagation process by designating adjacent voxels around the starting point, determine whether any new voxels are segmented, count and analyze the segmented new voxels to determine leakage levels, and identify and record segmented new voxels from a previous iteration when the leakage levels exceed a predetermined threshold. The processor is further configured to perform labeling of the segmented new voxels of the previous iteration, select the segmented new voxels from the previous iteration when the leakage levels fall below the predetermined threshold, and create a voxel list based on acceptable segmented voxels found in the previous iteration.




t

System and method for automatic detection of a plurality of SPO2 time series pattern types

The disclosed embodiments relate to pulse oximetry. An exemplary pulse oximeter comprises a probe that is adapted to be attached to a body part of a patient to create a signal indicative of an oxygen saturation of blood of the patient, and a processor that is adapted to receive the signal produced by the probe, to calculate an SPO2 value based on the signal, to detect a plurality of pattern types of SPO2 indicative of pathophysiologic events, and to produce an output indicative of a detected one of the plurality of pattern types.




t

Analyte monitoring device and methods of use

An analyte monitor includes a sensor, a sensor control unit, and a display unit. The sensor has, for example, a substrate, a recessed channel formed in the substrate, and conductive material disposed in the recessed channel to form a working electrode. The sensor control unit typically has a housing adapted for placement on skin and is adapted to receive a portion of an electrochemical sensor. The sensor control unit also includes two or more conductive contacts disposed on the housing and configured for coupling to two or more contact pads on the sensor. A transmitter is disposed in the housing and coupled to the plurality of conductive contacts for transmitting data obtained using the sensor. The display unit has a receiver for receiving data transmitted by the transmitter of the sensor control unit and a display coupled to the receiver for displaying an indication of a level of an analyte. The analyte monitor may also be part of a drug delivery system to alter the level of the analyte based on the data obtained using the sensor.




t

Analyte sensors comprising hydrogel membranes

Generally, embodiments of the present disclosure relate to analyte determining methods and devices (e.g., electrochemical analyte monitoring systems) that have improved signal response and stability by inclusion of a coating including a hydrogel, a crosslinker, and a swelling modulator, where the coating is disposed proximate to a working electrode of in vivo and/or in vitro analyte sensors, e.g., continuous and/or automatic in vivo monitoring using analyte sensors and/or test strips. Also provided are systems and methods of using the, for example electrochemical, analyte sensors in analyte monitoring.




t

Reference electrodes having an extended lifetime for use in long term amperometric sensors

The present application provides Ag/AgCl based reference electrodes having an extended lifetime that are suitable for use in long term amperometric sensors. Electrochemical sensors equipped with reference electrodes described herein demonstrate considerable stability and extended lifetime in a variety of conditions.




t

Device and method for electroimpedance tomography

A device for electroimpedance tomography with an electrode belt (2), which has electrodes (E1 . . . E16), wherein at least two groups (5, 6) of electrodes located next to each other are formed and the electrodes of one group are contacted with at least one, multiwire feed cable (7, 8). For a reduced noise level during data acquisition, provisions are made for at least one electrode (E9) of two mutually adjacently located electrodes (E8, E9) of two different groups (5, 6) to have an additional electrode feed line (15), which is led over the feed cable (7) of the adjacent group (5).




t

MRI-guided localization and/or lead placement systems, related methods, devices and computer program products

MRI compatible localization and/or guidance systems for facilitating placement of an interventional therapy and/or device in vivo include: (a) a mount adapted for fixation to a patient; (b) a targeting cannula with a lumen configured to attach to the mount so as to be able to controllably translate in at least three dimensions; and (c) an elongate probe configured to snugly slidably advance and retract in the targeting cannula lumen, the elongate probe comprising at least one of a stimulation or recording electrode. In operation, the targeting cannula can be aligned with a first trajectory and positionally adjusted to provide a desired internal access path to a target location with a corresponding trajectory for the elongate probe. Automated systems for determining an MR scan plane associated with a trajectory and for determining mount adjustments are also described.




t

Magnetic resonance imaging apparatus and magnetic resonance imaging method

A magnetic resonance imaging apparatus includes an acoustic control unit and an image data acquisition unit. The acoustic control unit applies a gradient magnetic field for controlling a sound in synchronization with a signal representing a respiratory body motion. The image data acquisition unit acquires imaging data by subsequently imaging to control the sound and generate image data based on the imaging data.




t

Determining and placing spinal implants or prostheses

A procedure and system for determining and placing spinal implants or prostheses includes measuring a change in position of vertebrae at an affected level of a patient's spine from a first position where the patient reports greatest pain at the affected level, to a second position where the patient reports least pain at the affected level. Spinal implants or prostheses are selected so as to urge the affected level of the spine toward the second position and away from the first position when the implants are placed at the affected level. In one embodiment, an implant device is formed by one or more inflatable balloons that are placed at determined locations inside a disc space at the affected level. When the balloons are inflated, vertebrae above and below the balloons are urged toward the second position and away from the first position at the affected level.




t

Velocity measurement of MR-imaged fluid flows

Velocity of MR-imaged fluid flows is measured. Data representing a measure of distance traveled by flowing fluid appearing in at least two MR images of a subject's tissue taken at different respective imaging times is generated. Data representing at least one fluid velocity measurement of the flowing fluid is generated by calculating at least one instance of distance traveled by the fluid divided by elapsed time during travel based on different respective imaging times. Data representing at least one fluid velocity measurement is then output to at least one of: (a) a display screen, (b) a non-transitory data storage medium, and (c) a remotely located site.




t

System and method for acquiring images from within a tissue

Systems and methods for imaging within depth layers of a tissue include illuminating light rays at different changing wavelengths (frequencies), collimating illuminated light rays using a collimator, and splitting light rays using a beam splitter, such that some of the light rays are directed towards a reference mirror and some of the rays are directed towards the tissue. The systems and methods further include reflecting light rays from the reference mirror towards the imager, filtering out non-collimated light rays reflected off the tissue by using a telecentric optical system, and reflecting collimated light rays reflected off the tissue towards the imager, thus creating an image of an interference pattern based on collimated light rays reflected off the tissue and off the reference mirror. The method may further include creating full 2D images from the interference pattern for each depth layer of the tissue using Fast Fourier transform.




t

System and method for fiducial deployment via slotted needle

Embodiments include a fiducial deployment system and method for use thereof. A fiducial may include one or more protuberances configured to engage one or more slots in a needle of the system. The needle may be configured to deliver a plurality of fiducials to a target location in serial fashion, one at a time. In certain embodiments, echogenic placement of fiducials may present certain advantages.




t

Biopsy marker with in situ-generated imaging properties

An intracorporeal marker, for marking a site within living tissue of a host, includes an outer body portion of biodegradable material. An inner body portion is located in the outer body portion. The inner body portion includes biological material that becomes calcified in the living tissue of the host over time. An agent interacts with the biological material to promote calcification of the biological material of the inner body portion in the living tissue of the host.




t

Three dimensional imaging of veins

A three dimensional imaging system includes a first laser emitting light at a first wavelength, and a scanner for scanning the laser light in a pattern on the target area. A photo detector receives light reflected from the target area as a contrasted vein image, resulting from differential absorption and reflection therein of the first wavelength of light. The intensity of the first laser is incrementally increased, and the photo detector thereby receives a plurality of contrasted vein images, each being at incrementally distinct depths beneath the target skin surface. Image processing is performed on the plurality of vein images to successively layer the veins in the images according to their depth, to create a single processed vein image. A second laser emitting a second wavelength of light is used in combination with the scanner to project the processed vein image onto the target area to overlay the veins therein.




t

Device and method for wound imaging and monitoring

A device for fluorescence-based imaging and monitoring of a target comprising: a light source emitting light for illuminating the target, the emitted light including at least one wavelength or wavelength band causing at least one biomarker associated with the target to fluoresce; and a light detector for detecting the fluorescence.




t

Lymphatic pressure-measuring system and method for controlling same

The present invention has an object to measure lymphatic pressure with more safety and ease at lower cost. To achieve this, a lymphatic pressure-measuring system 1 includes: a manchette 11 fitted on a vital observation portion; a measurement unit 13 that measures and outputs pressure of the manchette 11; an infrared camera 21 that detects fluorescence emitted from fluorescent dye previously injected into a lymph vessel in the vital observation portion; and an image processing device 22 that generates and displays an image showing a position of the fluorescent dye in the lymph vessel based on a detection result of the infrared camera 21. The infrared camera 21 repeats the detection while the pressure of the manchette 11 decreases from first pressure to block a lymph flow in the vital observation portion to second pressure at restart of the lymph flow. The measurement unit 13 repeats the measurement during the period.