1
Frederick E Shelton IV, Jerome R Morgan: Surgical instrument system including replaceable end effectors. Ethicon Endo Surgery, January 5, 2016: US09226751 (71 worldwide citation)

A surgical instrument system that includes a housing and a rotatable drive shaft, a motor operably coupled to the drive shaft, and a plurality of replaceable end effectors that can be connected to the housing. Each replaceable end effector includes a drive screw that is turned a fixed number of revo ...


2

3
Ralph F Osterhout: Micro doppler presentations in head worn computing. Osterhout Group, GTC Law Group & Affiliates, January 5, 2016: US09229234 (56 worldwide citation)

Aspects of the present disclosure relate to visual presentation techniques for micro-Doppler signatures.


4
David Weir, Kevin Durant, Patrick Flanagan, David Robinson: Methods and systems for detecting clamping or firing failure. INTUITIVE SURGICAL OPERATIONS, January 5, 2016: US09226750 (47 worldwide citation)

Systems and methods are provided for detecting failure in clamping of a material and/or firing of a staple into a clamped material and indicating such failure to a user on a user interface. The system and methods are particularly suited for use with end effectors having closing and/or firing mechani ...


5
H Sprague Ackley: System and method for detecting barcode printing errors. Hand Held Products, Additon Higgins & Pendleton P A, January 5, 2016: US09230140 (46 worldwide citation)

Barcode verifiers automate the verification process by capturing an image of the printed barcode and analyzing the image according to an industry specification. Industry specifications (e.g., ISO/IEC 15416,15415) identify common printing errors and prescribe test methods for detecting and quantifyin ...


6
Qifa Ke, Jia Deng, Simon Baker, Michael Isard: Image retrieval using discriminative visual features. MICROSOFT TECHNOLOGY LICENSING, Sandy Swain, Steve Wight, Micky Minhas, January 5, 2016: US09229956 (29 worldwide citation)

Image search results are obtained by providing weights to visual features to emphasize features corresponding to objects of interest while simultaneously deemphasizing irrelevant or inconsistent features that lead to poor search results. In order to minimize the impact of visual features that are un ...


7
Milton Diaz Perez: Video-on-demand content delivery system for providing video-on-demand services to TV service subscribers. BROADBAND iTV, Amster Rothstein & Ebenstein, January 5, 2016: US09232275 (25 worldwide citation)

A video-on-demand (VOD) content delivery system has a VOD Application Server which manages a database of templates ordered in a hierarchy for presentation of video content elements of different selected types categorized in hierarchical order. The templates include those for higher-order displays wh ...


8
Massi Joe E Kiani: Patient safety system with automatically adjusting bed. Masimo Corporation, Knobbe Martens Olson & Bear, January 5, 2016: US09226696 (25 worldwide citation)

A patient safety system including an adjustable bed and a patient monitoring system is disclosed herein. The adjustable bed can automatically adjust to a safe default configuration when the safety system detects that a care provider has left the patient's room or when the safety system detects that ...


9
Foster B Stulen, Randolph Stewart, Chad P Boudreaux: Closed feedback control for electrosurgical device. Ethicon Endo Surgery, January 5, 2016: US09226767 (25 worldwide citation)

Various example embodiments are directed towards a system and method for closed feedback control of a robotically controlled electrosurgical instrument. In one embodiment, the method comprises applying at least one electrosurgical signal to an electrosurgical end effector a robotically controlled su ...


10
Lyle W Paczkowski, William M Parsel, Carl J Persson, Matthew C Schlesener: Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services. Sprint Communications Company, January 5, 2016: US09230085 (23 worldwide citation)

A method of executing a trusted application on a trusted security zone enabled electronic device. The method comprises responsive to a trusted security subzone not being provisioned on the electronic device, generating, by a server, a temporary trust token, transmitting the temporary trust token to ...



Click the thumbnails below to visualize the patent trend.