Technologies Found (38)
Array ( [cache_time] => 0 [counts_time] => 0 [query_time] => [category_counts_time] => 0 [total_time] => 0 )
Technology NameBriefcaseLead Researcher
Highlights Annotations may contain text, images, or audio materials Addresses a variety of educational needs Gloss is drawn from any available, appropriate resource such as dictionaries, translations, encyclopaedias, etc. Facilitates ...
More
Rappoport Ari
  Category Machine Learning, AI Keywords Data Labelling, Ballpark Learning Application In many classification problems, labeled instances are often difficult, expensive, or time-consuming to obtain. Unlabeled instances, on the other hand, ...
More
Shahaf Dafna
  Category Computer vision Keywords Anomaly detection, Nearest-neighbors, Feature pyramid Development stage Looking for industrial POCApplication A key human talent is the ability to detect the novel images that deviate from previous ...
More
Hoshen Yedid
  Category Computer Science and Engineering Keywords Neural Networks, Computer VisionApplication Motion blur due to *camera shake is one of the predominant sources of image degradation in handheld photography. Blind image de-blurring ...
More
Fattal Raanan
  Category Software Keywords Fintech, NLP, textual analysis Development stage Knowhow, open-source, interested in industry partnership for further product development  Application Several studies have found that there are various ...
More
Muchnik Lev
  Category Life Sciences and Biotechnology    Keywords Ultra low dose radiation CT scanning, repeat CT scanning Current development stage For medical device: TRL3 - Hypothesis testing and initial POC is demonstrated in limited number of ...
More
Joskowicz Leo
  Category Computer science and Engineering    Keywords Multilingual AI, Natural Language Processing, Semantic representation, Text-to-text generation and its evaluation Current development stage Know-how transfer; Looking for industrial ...
More
Abend Omri
Keywords: Anomaly Detection, Artificial Intelligence Application Anomaly detection is one of the fundamental problems in artificial intelligence. Anomaly detection systems are broadly applicable in artificial intelligence across a wide set ...
More
Hoshen Yedid
Category Computer science and Engineering    Keywords Cyber Security, Legacy Systems Current stage TRL2 Technology Concept Formulated; Looking for industrial design partners. Application Cyber-attacks on industrial control systems and ...
More
Gavish Matan
Our innovation: Neuropathic pain- One of our distinctive results which we optimized recently identifies several compounds that we identified as having a potential protective role in neuropathic pain. We pursued this finding in collaboration with ...
More
Tabach Yuval
Application The increase in machine size and the decrease in operating voltage causes more hard errors (component failure) and soft errors (bit flip) in high performance computing. Hard-error resiliency solutions such as checkpoint-restart ...
More
Schwartz Oded
Prof. Levy-Lahad Ephrat – Director of the Medical Genetics Institute at Shaare Zedek Hospital, Jerusalem Background Breast cancer is the most common cancer among women. In >70% of cases with suspected hereditary, no mutations could be found ...
More
Tabach Yuval
Application         In movie filming, poor sound quality is very common. Many speech segments are re-recorded in a studio during post-production to compensate for the poor sound quality that was recorded on location. The current compensating ...
More
Peleg Shmuel
Uzy Smilansky, The Weizmann Institute, and the Hebrew University of Jerusalem. Avshalom Karasik, Israel Antiquity Authority   Sophisticated yet user friendly computer applications to analyze and record archaeological artifacts, based on 3D ...
More
Grosman Leore
  A New family of second-generation wavelets constructed using robust data-prediction lifting scheme    Highlights Almost every application for manipulating and improving photographic images, such as noise reduction and detail enhancement, ...
More
Fattal Raanan
Methods and systems for processing an input. An input vector y is received that represents a noisy observation of Ax, where A is a data matrix and x is a data vector of unknown variables. Data vector x is recovered from the received input vector ...
More
Dolev Danny
Application Competitive applications processes are widely implemented across academic and nonacademic organizations. Managing the application processes is highly sensitive for both sides. Application processes like scholarships, tenure track ...
More
Kramer Diego
Application Machine learning is the most important technological development of the century, with countless applications. Modern machine learning algorithms utilize neural network architectures (deep learning). Today's neural networks do ...
More
Rappoport Ari
Keywords Group messaging, out-of-band authentication, end-to-end encryption, man-in-the-middle attacks Current development stage TRL4 Technology validated in lab               Background While actively communicating at multiple messaging ...
More
Segev Gil
Fast and simple editing of special video effects  Motion computation in video editing involves warping or manipulations of time in order to control the chronological time of events, including delaying or slowing down some activities while ...
More
Peleg Shmuel