Ben - Gurion University of the Negev | Date: 2017-02-01
The invention relates to a system for protecting a computerized device from a malicious activity resulting from a malicious code, which comprises^ (a) a first DC supply monitoring unit which is located within a separate computerized environment, namely an environment which is totally separated and isolated both physically and in terms of connectivity from the hardware and software of the computerized environment of the device! (b) a memory database for storing one or more signatures of known malicious events, each of said signatures describes the temporal effect of a malicious event, respectively, on the power consumption from the DC supply of the device! and (c) a microprocessor within said DC supply monitoring unit for continuously monitoring the power consumption from said DC supply of the device, comparing temporal characteristics of the power consumption with said malicious events signatures in said database, and alerting upon detection of a match, wherein said DC supply monitoring unit is at most physically connected to the DC supply of the device.
Bar - Ilan University and Ben - Gurion University of the Negev | Date: 2017-03-08
A gain cell includes a write bit line input, a read bit line output, a write trigger input and a read trigger input. The gain cell also includes a write transistor, retention element and read transistor. Each of the transistors includes a respective first diffusion connection, gate connection and second diffusion connection. The write transistor first diffusion connection is connected to the write bit line input and the write transistor gate connection is connected to the write trigger input. The read transistor first diffusion connection being connected to the read bit line output and the second diffusion connection is connected to the read trigger input. The retention element buffers between write transistor and the read transistor during data retention. The retention element also connects or disconnects a write transistor diffusion connection to/from a constant voltage in accordance with a retained data level at the read transistor gate connection.
Ben - Gurion University of the Negev | Date: 2017-03-22
The present invention relates to co-assembled nanoparticles comprising at least one polypeptide comprising a polyanion; and at least one amphiphilic peptide capable of forming a -sheet structure, a derivative or a salt thereof, the amphiphilic peptide comprising at least 2 pairs of alternating hydrophobic/hydrophilic amino acid residues, wherein the hydrophilic amino acid residue is positively charged, and methods of preparation of said nanoparticles. There are further provided pharmaceutical compositions comprising the co-assembled nanoparticles and a pharmaceutically active ingredient, dissolved, entrapped, encapsulated or attached to the co- assembled nanoparticles. The present invention further provides therapeutic uses of said pharmaceutical compositions.
Ben - Gurion University of the Negev | Date: 2017-03-29
The invention relates to a system for protecting a computerized device from activities within the device bootstrap, which comprises: (a) a DC supply monitoring unit for monitoring power consumption of the DC supply of the device during bootstrap; and (b) a database for storing one or more valid bootstrap signatures, each of said valid bootstrap signatures describes a valid variation of power consumption pattern, respectively, from the DC supply of the device; wherein, during bootstrapping of the device, said DC supply monitoring unit continuously monitors the power consumption from said DC supply of the device, compares characteristics of the power consumption with said one or more valid bootstrap signatures in said database, and alerts upon detection of a mismatch.
Ben - Gurion University of the Negev | Date: 2017-04-19
Abstract Abstract Abstract The invention is a device for up-conversion of Short Wavelength Infra-Red (SWIR) images into visible images. The device comprises a sub micrometer thickness structure that is composed of several sub-layers, each having a typical thickness of tens to hundreds of nanometers. The device is composed of two main sections one on top of the other: (a) a highly efficient SWIR absorption thin layer and (b) a highly efficient organic light emitted diode (OLED). The generated visible image is emitted from the OLED through a top transparent cathode, which is deposited on the OLED.
Ben - Gurion University of the Negev | Date: 2017-03-29
The present invention relates to the realization of an ADC by using a one shot time cell as an analog-to-time converter and a time -to- digital converter. The present invention relates in general, to the design and Integrated Circuit (IC) implementation of a fully-digital fully-synthesizable, delay-line analog-to- digital converter (DL-ADC). The present invention is specifically relevant for power management applications where the silicon area of the controller is of key importance. The design of the ADC is based on the approach of delay cells string to reduce design complexity and the resultant of the silicon area.
Ben - Gurion University of the Negev | Date: 2017-06-28
The present invention generally relates to a flexible catheter device capable of being introduced into body passages, withdraw fluids therefrom or introduce fluids thereinto, and which includes electrodes configured to apply electrical signals in the body passage for carrying out thrombus dissolution and/or thrombectomy, wherein one of said electrodes is designed to contact the thrombus material and remove it or dissolve it, and wherein the electrical voltage signals are a unipolar pulsatile voltage signal.
Ben - Gurion University of the Negev | Date: 2017-06-07
The present invention relates to a method and a framework that automatically and dynamically derives a misuseability score for every IT component (e.g., PC, laptop, server, router, smartphone, and user or any other element that can be connected to organization network or to the internet). The dynamic framework of the present invention supports the risk analysis process. The misuseability score encapsulates the potential damage that can be caused to the organization in case that an asset is compromised and misused, for example, as part of a cyber-attack.
Ben - Gurion University of the Negev | Date: 2017-04-05
The present invention discloses stable composite membranes comprising a porous support having one or more thin selective layers coated on a top surface thereof, whereas at least one of said thin selective layers comprises a crosslinked fluorinated silicone polymer, and further wherein the total thickness of said one or more thin selective layers ranges between 0.1 to 10 microns. The use of these membranes in the process of olive oil wastewater treatment and the valorization of polyphenol-rich by-products, are also disclosed.
Eichler J.,Ben - Gurion University of the Negev
Nature Reviews Microbiology | Year: 2013
Although N-glycosylation was first reported in archaea almost 40 years ago, detailed insights into this process have become possible only recently, with the availability of complete genome sequences for almost 200 archaeal species and the development of appropriate molecular tools. As a result of these advances, recent efforts have not only succeeded in delineating the pathways involved in archaeal N-glycosylation, but also begun to reveal how such post-translational protein modification helps archaea to survive in some of the harshest environments on the planet. © 2013 Macmillan Publishers Limited. All rights reserved.