DNA Based Storage
This technology is a new method and algorithm for storing digital data in strands of DNA via a system that enables Random Access...
DNA Based Storage
This technology is a new method and algorithm for storing digital data in strands of DNA via a system that enables Random Access and Rewrite Capabilities.
Current methods do not allow for the ability to quickly retrieve and edit data stored in DNA strands. Compared to current methods, this technology also has lower error rates and is more efficicent in accessing and editing data stored. In addition, this DNA bsed storage architecture enables Random-Access and Rewriting capabilities at lower cost than current methods, making data retrieval more affordable.
Invention Track Code: 2015-164
Asymmetric Lee Distance Codes for DNA-based Storage
This method of error correction for minimizing asymmetric errors occurring in nanopore sequencing uses a new family of codes that account for the high incidence of confusion resulting from T-C* substitution errors in nanopore sequencing.
This family of codes is a new set that has not been previously reported in literature. This is a unique application of Hamming and Lee metric codes.
Invention Track Code: 2016-034
Codes in the Damerau Distance for DNA Storage
This technology provides a coding scheme to address issues associated with DNA media aging in DNA-based storage systems.
As DNA-based data storage becomes more prevalent, an error-correction solution that accounts for the effects of aging DNA will become necessary to preserve data. This new family of codes represent the first coding scheme to address errors occurring as a result of DNA media aging in DNA-based storage systems.
Invention Track Code: 2016-037
Dr. Bo Liu from the University of IL has developed a software platform for Unmanned Aircraft Systems (UAS- aka drones) that facilitates safe and efficient recovery from...
Dr. Bo Liu from the University of IL has developed a software platform for Unmanned Aircraft Systems (UAS- aka drones) that facilitates safe and efficient recovery from both physical and software attacks. This software uses multi-core processing power to ensure that the drone can respond to any threat in real-time while remaining stable. This platform is among the first to address both issues of cyber-security and environmental threats to drones, combining previously established technologies into one consistent system.
A system for executing a cyber investigation by a non-expert user, including a computer having a processor, a memory, and a display; a computer-readable...
A system for executing a cyber investigation by a non-expert user, including a computer having a processor, a memory, and a display; a computer-readable medium having stored thereon instructions for execution of a wizard application, the processor adapted to execute the instructions when the computer-readable medium is inserted into the computer, the processor programmed to: receive case information; receive a type of activity being investigated in response to user inputs to select the activity type from a list of possible activity types; guide the user through capturing data related to the selected activity type through steps presented to the user through one or more screens shown in the display, the steps presented such that a non-expert user can follow them; receive user inputs through a screens to obtain information needed to continue capturing the data related to the selected activity; and store the captured data in a removable data storage device or medium for analysis and use in the cyber investigation.
A symmetric cryptosystem uses cascaded chaotic maps to encrypt plaintext and decrypt ciphertext. Received plaintext is encrypted using the cascaded chaotic...
A symmetric cryptosystem uses cascaded chaotic maps to encrypt plaintext and decrypt ciphertext. Received plaintext is encrypted using the cascaded chaotic maps to generate a ciphertext. The ciphertext can then be decrypted using the same cascaded chaotic maps in order to retrieve the plaintext.