Image processing apparatus, image processing method, computer program and computer-readable recording medium
An image processing apparatus includes an alteration unit and a control unit. The alteration unit alters a first image file stored in a removable storage medium in order to generate a second image file. The control unit controls to store the second image file in the storage medium without deleting the first image file from the storage medium, if the first image file includes authentication data that is used to authenticate whether the first image file has been altered.
Data storing device for classified data
A controller in a hard disk serving as a data storage device stores a license including a content key for decrypting encrypted content data E and others in a secure data storage portion. The license is managed in the secure data storage portion in accordance with a LBA, and the LBA for storing the license, which is being processed for transmission, is stored as a log in a log memory of the secure data storage portion. When a failure occurs during the transmission processing, the license, which was being processed for transmission, is specified based on the LBA stored in the log memory.
Apparatus and method for monitoring and controlling access to data on a computer readable medium
The present invention provides a device driver and a method for controlling access to data on a computer readable medium. According to the invention, there is provided an interface for access to a device-driver stack for a media drive, a detector for detecting insertion of a computer readable medium in said media drive, and a monitor for monitoring accessing of data on said computer readable medium. A control device establishes a location of at least one demonstration zone on said computer readable medium and determines whether a data region currently being accessed is in said demonstration zone. Said control device modifies playback of data in dependence upon the outcome of said determination.
Systems and methods for determining characteristics of a network and analyzing vulnerabilities
A packet transmitted on a network is read and decoded. A network device and its operating system are identified by analyzing the decoded packet. If more than one operating system is identified from the decoded packet, the operating system is selecting by comparing confidence values assigned to the operating systems identified. A service running on the network device is identified from the decoded packet or subsequent packets that are read, decoded and analyzed. The network topology of a network is determined by reading, decoding, and analyzing a plurality of packets. A flow between two network devices is determined by reading, decoding, and analyzing a plurality of packets. Vulnerabilities are assigned to operating systems and services identified by reading, decoding, and analyzing packets. Network configuration policy is enforced on operating systems and services identified by reading, decoding, and analyzing packets.
Subjective and statistical event tracking incident management system
A method includes logging past event sequences in a knowledge base, receiving a real-time event sequence, comparing the real-time event sequence to the past event sequences to determine a predicted event sequence for the real-time event sequence, and providing the predicted event sequence, a suggested course of action with predicted outcome, and a recommendation of a user who previously encountered the event sequence. In the above manner, use of subjectively characterized and/or raw historic data to match real-time event sequences provides users with both subjective advice from those who had previously faced similar conditions as well as raw statistical predictions as to what is expected to come next. This allows the users to take a course of action that results in the most desirable outcome.
Connection based detection of scanning attacks
A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
Method for controlling brand integrity in a network environment
Certain methodology enables geographically-spaced common-brand users to publish locale-specific, content-controlled messages. The process provides selective access to pre-constructed, digital, plate-ready macrotemplates. A dynamic document server stores the macrotemplates and authorizes selective access thereto based upon user-supplied credentials. The user, having authenticated credentials, may access a select macrotemplate, which necessarily comprises a plurality of digital, plate-ready microtemplates, including at least one restricted access template and at least one open access template. Authorized users may edit a select microtemplate as dictated by the user's level of authorization. The user may thus send the content-controlled digital, plate-ready file to a publisher for publishing information or messages compiled upon the macrotemplate. The methodology thus enables geographically-spaced common-brand users to publish locale-specific, content-controlled messages.
Secure online repository
Techniques for secure online storage. A user is registered for securely storing documents on a network. User documents are stored on a network server. The user documents include documents for disposing of user property after death or for effecting user medical decisions. A secure network interface is provided for displaying the user documents remotely upon receiving a user security identifier. A secure network interface is provided for displaying the user documents remotely to authorized medical personnel who do not have access to the user security identifier.
Cryptographic offload using TNICs
A method for offloading a secure protocol connection, involving establishing the secure protocol connection between a host system and a remote peer, offloading the secure protocol connection to a network interface card (NIC) to obtain an offloaded secure protocol connection, determining whether a packet is associated with the offloaded secure protocol connection, and if the packet is associated with the offloaded secure protocol connection, identifying the offloaded secure protocol connection, performing cryptographic operations on the packet using at least one secret key to obtain a processed packet, and returning a status of the processed packet to the host system.
Network security device and method for protecting a computing device in a networked environment
A network security module for protecting computing devices connected to a communication network from security threats is presented. The network security module is interposed, either logically or physically, between the protected computer and the communication network. The network security module receives security information from a security service. The security information comprises security measures which, when enforced by the network security module, protect the computer from a security threat to the computer. The network security module implements the security measures by controlling the network activities between the protected computer and the network. The network security module also temporarily implements security patches until corresponding patches are installed onto the protected computer.
System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication
A network security module for protecting computing devices connected to a communication network from identified security threats communicated in a secured communication is presented. The network security module is interposed, either logically or physically, between the protected computer and the communication network. Upon detecting a secured communication, the network security module obtains a decryption key from the computing device to decrypt the secured communication. The network security module then processes the decrypted communication according to whether the decrypted communication violates protective security measures implemented by the network security module.
System and method of proxy authentication in a secured network
A method of controlling access to network services enables an authorized proxy client to access a service on behalf of a user. To permit the client to function as a proxy, the user registers proxy authorization information with a trusted security server. The proxy authorization information identifies the proxy client and specifies the extent of proxy authority granted to the proxy client. When the proxy client wants to access a target service on behalf of the user, it sends a proxy request to the trusted security server. The trusted security server checks the proxy authorization information of the user to verify whether the request is within the proxy authority granted to the proxy client. If so, the trusted security server returns to the proxy client a data structure containing information recognizable by the target service to authenticate the proxy client for accessing the target service on behalf of the user.
System and method for providing application services with controlled access into privileged processes
A system for providing application services in a computing environment having both user-mode processes and privileged-mode processes. A user-mode component is provided with an interface configured to access an exposed privileged-mode interface. A configuration component specifies a list of installable code components that are authorized for installation, wherein privileged-mode functions will only be executed in response to accesses by the user-mode code component when the installable code component is represented on the list.
Electronic device network system and data receiver search method using electronic device network system
A printing system in one implementation of an electronic device network system of the present invention includes a plurality of hosts, a plurality of storages, and a plurality of printers, wherein the hosts, storages, and printers are connected to one another on the Internet. The hosts, storages, and printers each have one of two data protecting functions, and each have three security levels. As a result, there is provided an electronic device network system that enables a user to transmit data through a transmission route according to a user's desired security level, while taking into account protection (security) of transmitted data between electronic devices on the network. In addition, there is also provided a data receiver search method using such an electronic device network system.
Method and system for architecting enterprise data security
A method for architecting enterprise data security solutions for an enterprise having multiple levels is provided. The method includes analyzing the enterprise levels and a workflow related to the plurality of levels and analyzing a data element having a security requirement. The method includes providing a reference model including the data element. The reference model associates the data element and the security requirement with the workflow. The method includes determining a vertical component of the data element using the reference model. The vertical component identifies the security requirement for the data element based on the workflow for each of the plurality of levels of the enterprise. The method includes identifying a technical component using the reference model and the vertical component. The technical component is operable to provide the security requirement of the data element for the workflow across each of the plurality of levels of the enterprise.
Interactive media system
An interactive media system includes a broadcasting device for broadcasting TV signals, and a receiving device for receiving TV signals. The TV signals, such as a TV commercial, contain screen related action codes that include device type, action type and other information. The receiving device includes storage for storing the reference address for other home electronic devices, and a button on a remote controller for the users to start interactive with the interactive media system. When the user presses the button, the receiving device will send the action codes to the designated other home device or another TV screen channel, to allow users to perform the action on the other home device instead of performing the action on TV. The system also allows users just use number keys/buttons on the remote controller to navigate web on TV.
Television multiplexing and transmission system and method
A television multiplexing and transmission system and method, which is using certain portions of the standard television channel-bandwidth to superimpose additional information by phase-modulating said information using precisely-derived frequency carriers combined with reference frequencies and injecting said phase modulated electronic signals at amplitudes below the standard minimum detectable signal without affecting the simultaneous orderly operation of the same standard television channels into which the additional information is multiplexed, which system may be used to simultaneously transmit to a plurality of users various data in response to their corresponding queries, with particular applications to CATV systems, comprising a user data unit, a multiplexing and transmission unit and a alternate frequency unit.
Content distribution method, reservation management device, and program storage medium
In a content supply system 100, in order to use a streaming server 102 to perform a live distribution, a user PC 106 used makes a reservation for a time zone, etc. to a server reservation control center 101. When the user PC 106 sends desired reservation information including the information on the setting of the disclosure level indicating whether distribution of the content should be open to the general public or accepted only to specific people in addition to the time zone above, etc. to the server reservation control center 101 via the Internet 103. Then, in the case of a content distribution based on a reservation, restrictions, etc. are put on the distribution from the streaming server 102 to the client terminal apparatus 107 according to the disclosure level setting information above.
In-program content telescoping
In-program content telescoping can enable a subscriber to telescope into content that is specially associated with a broadcast program. The selectable content is stored as video-on-demand (VOD) assets that are related to particular portions of broadcast programs. In a described implementation, content providers created association linkages between broadcast programs and the VOD assets. Each association links a VOD asset to a broadcast program and a specific trigger location within the associated broadcast program. The association linkage may be include in VOD asset metadata and in trigger information. In a described operation, a client device detects trigger information in a media transport stream. In response to a request, the client receives asset representation indicators for the VOD assets that are associated with the upcoming trigger location. Upon arrival of the trigger location in the media transport stream, the client displays the asset representation indicators for consideration by the subscriber.
Digital television broadcast signal receiver
A multi-directional antenna connected with a digital television broadcast signal receiver is arranged not to move one full turn instantaneously in response to an abrupt drop down in the intensity of a received signal thus to avoid any downward overshooting of the intensity of the received signal and eliminate any useless direction searching time while remains favorably controlled to face in the direction where the intensity of the received signal is at optimum. More specifically, the maximum of the intensity of a received signal at each channel is measured and the threshold is set to a level lower than the maximum. When the intensity of a received signal has dropped down from the threshold, the antenna remains not turned within a predetermined period of marginal time. The antenna is moved one full turn only when the intensity drops down from the threshold and stays continuously over the predetermined period of marginal time. Then, the maximum of the intensity of the received signal is modified and stored for future use.
Information processing system, information processing apparatus, and method
There is provided a technique which, in the case where the operation has not occurred in a manner as expected by the user, determines from which standpoint the operation was not as expected, and makes a response that is closer to the expectation.An information processing system according to the present invention includes: a reaction section for executing a first process based on a request from a user; an output section for outputting a result of a process; a signal detection section for measuring a signal concerning an event-related potential of electroencephalograms of the user; an analysis section for identifying a positive peak in the event-related potential and determining whether an elapsed time since the result is output and until the peak appears is closer to a first reference time or a second reference time; and a reaction modifying section for determining a second process in accordance with the determination result. This determination result indicates a degree of disappointment of the user, and the second process is to be determined in accordance with the degree. By the reaction section executing the second process, an operation is realized which conforms to the user's expectation even if the operation has not occurred in a manner as expected by the user.
Actuating module for a disk drive
An actuating module includes an actuating member, a magnetic plunger engaging the actuating member due to magnetic power and capable of disengaging the actuating member upon receipt of an actuating signal, and a flexible flat cable. The flexible flat cable includes a plurality of laterally connected data wires. The data wires includes at least one branch wire connected electrically to the magnetic plunger for transmitting the actuating signal to the magnetic plunger so as to release the actuating member.
Disc device with particular loading mechanism
A disc device includes the following: a traverse base 5 that can be moved between a recording/reproducing position and a standby position, on which an optical pickup 2 and a turntable 1 are mounted; a front cover 3 including a disc carrying surface 3a that carries a disc 4 and an aperture 3b that is formed in the disc carrying surface 3a and allows the turntable 1 to pass through when the traverse base 5 is moved between the recording/reproducing position and the standby position; and centering members 8 for holding and shifting the disc 4 to a position where the center of the disc 4 is aligned with the center of the turntable 1. The loading of a disc can be performed in an easy and highly flexible manner.
System for object discovery in heterogenous object systems
A system for object discovery in heterogeneous object systems includes a fixed object system having a registry. A callee object having a rendezvous name is registered in the registry of the fixed object system under the rendezvous name. The system also includes an adaptive object system having a remote procedure call protocol abstraction layer. The remote procedure call protocol abstraction layer is configured to access the registry of the fixed object system.
Pluggable window manager architecture using a scene graph system
Described is a pluggable policy component that determines the look and feel, or windows visual experience, of a computer user interface. Window-related instructions are redirected to the policy component, while client area change instructions are provided to a substrate (into which the policy component plugs in) that includes a composition component. The plug-in policy component handles windows-related (e.g., structural or attribute) changes to a scene graph to construct and maintain the scene graph, while the substrate handles program content changes to the client areas within windows. The substrate may include a desktop window manager that has access to the client areas in the scene graph, whereby the desktop window manager can copy a client area for rendering. For example, the desktop window manager can provide a supplemental live thumbnail image of a window.
Software configuration methods and common presentation layer
Methods and systems for backing up data of a client connected to a server. The methods and systems include operating a graphical user interface for displaying to a user information about the data of a client. At an administrator module and client module, initiating one or more wizard program modules including dynamic link libraries configured to carry a user through the steps to complete a backup function, each wizard program module having one or more application programming interfaces which allow the wizard program modules to communicate with the operating system on which the administrator module or client module is operating. A common presentation layer can also be included to provide one or more common user interface screens which are insertable into each wizard program module.
A method and system for providing an integration environment in which integration processes can be developed independent of integration servers and applications. The integration environment provides an application service interface for each application that is independent of the integration servers. An integration process that is developed to use the application service interface is compatible with any integration server that supports the applications that the integration process accesses. The integration environment provides a common service interface for each type of application. The common service interface is independent of the application that is providing the service and is also independent of the integration server. Thus, an integration process developed to use the common service interface is compatible with any application of the appropriate type and any integration server.
System and method for scheduling thread execution
A circular array structure is maintained having multiple time slots, where each time slot corresponds to a timeslice during which CPU resources are allocated to a particular thread. The time slots in the circular array include a queue of threads scheduled for execution during that time slot. A pointer index and an array of threads requesting immediate CPU resource allocation are maintained. A currently executing thread is suspended, and a next time slot during which the currently executing thread should resume execution is calculated. The suspended currently executing thread is appended to the queue of threads scheduled for execution at the calculated time slot. The pointer index is undated to point to the identified next sequential non-empty time slot. Any contents of the indexed time slot is appended to the array of threads requesting immediate CPU resource allocation. The thread at the top of the array is removed and activated.
Remote monitoring and software distribution system for servicing inserter systems
A method for controlling transfer of files in a network of inserters at a plurality of sites from a remote command center. The method retrieving inserter data stored at the plurality of inserter sites and storing the data at the command center. The command center further uploading software updates to the plurality of inserters in accordance with a predefined upload/download scheme. The upload/download scheme defined at the command center via a graphical interface. The upload/download scheme identifying one or more of the plurality of inserters for the file transfer transaction, identifying inserter data from the selected one or more inserters to upload to the command center, identifying software updates to download from the command center to the one or more selected inserters, identifying a time for the file transfer transaction, identifying a sequence for the upload and download portions of the transfer transaction; and executing the defined file transfer transaction.
Nullable and late binding
Systems and methods that enhance a programming language by introducing null unification on a type level in addition to a value level, for static types of both reference and value types T. An operator that adds a level of nullability (and removes such nullability) is introduced without a mention of the actual type, to steer overloading in a precise manner.
Computer system for compiling source program
A computer system includes: a storage unit that stores the source program and type information representing data types including a fixed-point type; a detecting unit that obtains the source program from the storage unit and detects a type specifier and an immediate from the obtained source program; a type specifier analyzing unit that analyzes the type specifier and links one of a variable and a function, data type of which is specified by the type specifier, to the type information of the fixed-point type when the type specifier is a floating-point type to store in the storage unit; and an immediate analyzing unit that analyzes the immediate and links the immediate to the type information of fixed-point type when the immediate is any one of a decimal number without a postfix and a decimal number with floating-point type postfix to store in the storage unit.
System and methods for tracing transactions
The disclosure is directed to an application server including memory including an instrumented computer executable application. The instrumented computer executable application includes a first routine including a first set of tracing instructions and external resource access instructions and the instrumented computer executable application includes a second routine. The second routine includes a first segment including a second set of tracing instructions and instructions configured to access the first routine and the second routine includes a second segment including the external resource access instructions.
System and method for a context-awareness platform
An improved system and method for a context-awareness platform that may be used to adapt an execution environment is provided. A framework with interfaces for setting, tracking, and getting context information about the execution environment of a computer system includes a context engine and a unified data store for aggregating context information at a platform level for access by executables running on the platform. The context engine may receive requests to perform context information operations from executables such as setting, tracking and getting context information in the data store. Upon receiving a notification of a change in context information, one or more executables may change the execution environment such as reconfiguring system settings. In this way, an executable may adapt its execution environment using context information.
Method and apparatus for detecting memory leaks in computer systems
A system that identifies processes with a memory leak in a computer system. During operation, the system periodically samples memory usage for processes running on the computer system. The system then ranks the processes by memory usage and selects a specified number of processes with highest memory usage based on the ranking. For each selected process, the system computes a first-order difference of memory usage by taking a difference between the memory usage at a current sampling time and the memory usage at an immediately preceding sampling time. The system then generates a memory-leak index based on the first-order difference and a preceding memory-leak index computed at the immediately preceding sampling time.
Methods and apparatus for software profiling
In one embodiment, a method is provided for use in a system which includes a target application, a profiler application and a debugging application, the profiler application being operative to attach to the target application and, upon attaching to the target application, performing operations to profile the target application, the debugging application being operative to monitor the target application. The method comprises attaching, by the profiler application, to the target application such that operations performed by the profiler application in profiling the target application are susceptible to monitoring by the debugging application. In one embodiment, the method further comprises generating helper code; transferring the helper code to the memory used by the target application; and causing the helper code to be executed from the memory used by the target application, wherein the helper code, when executed, causes the profiler agent library to be loaded to the memory used by the target application.
Method and system for automatically identifying and marking subsets of localizable resources
Embodiments of the present invention relate to methods, systems and computer-readable media for identifying a safe set of resources that can be used for localization of a software product. This identification involves loading and running a base product having one or more calls to an operating system (or an API) to load language specific data. The resource calls are intercepted after the resource is loaded into a resource loader, and information about the resource is captured for analysis. The display of resources is also intercepted to gather data on which resources are displayed and the context of this display. The process involves running automated tests and/or manual tests on the base product in its base language to identify those resources that are most frequently used, least often or never used, and those that are unsafe. These resources so identified are then analyzed to generate a safe secure resource list that can then be used for external localization of the software product.
A system for facilitating the creation of design specifications includes a computer and a database having stored thereon data indicative of a plurality of storage locations in a processed specification into which data may be entered. Software executing on the computer: displays a requirements document; receives an indication of a selected portion of the requirements document; based at least in part upon the indication of the selected portion of the requirements document, retrieves from the database a list of possible storage locations corresponding to the selected portion of the requirements document; displays the list of possible storage locations corresponding to the selected portion of the requirements document; receives an indication of a selected storage location; receives an indication of data selected in the requirements document to be stored in the selected storage location; and stores the selected data in the selected storage location in the processed specification.
An embedded macro establishes logic for object properties that define actions that execute when an event triggers. When an embedded macro is associated with an event, a regular event property value is set to an empty string and a shadow property associated with the regular event property is created. An application that supports embedded macros recognizes the empty regular property value as an indicator that a macro is embedded in the event. A binary representation of the macro is accessed from the shadow property and is executed when the event associated with the embedded macro triggers. An action safe list identifies trusted embedded macro actions. Embedded macro actions not included on the safe list are not executed such that untrusted actions are blocked from execution.
System and method for building and modifying software applications
A system for creating applications, such as web applications, allows a non-technical trained user to build and edit applications. The tool used to build the applications creates the application elements including actions, screens, data, header and footer, and scripts, which are stored and accessed as records in a database. The web application that is created can be exported to and installed within a website.
Method for extending the life and utility of an existing personal computer by adding instant-on embedded functions
The present invention provides a method and apparatus for converting, through add-on hardware and code, any of a variety of types and vintages of general purpose personal, laptop, or notebook computers to be an efficient, secure, dedicated system which run independently of the host system's resident operating system.
Managing parameters for graph-based computations
Ordering parameters in a graph-based computation includes determining a desired first ordering of a set of parameters associated with graph elements in a computation graph; determining an ordering constraint for the set of parameters; and determining a second ordering of the set of parameters that satisfies the ordering constraint according to the desired first ordering.
System and method for generating web sites in an arbitrary object framework
A method and system for generating a computer application is disclosed. The computer application is generated on a host system in an arbitrary object framework that separates a content of said computer application, a form of said computer application and a functionality of said computer application. Arbitrary objects are created with corresponding arbitrary names of various object types for generating said content of said computer application, said form of said computer application, and said functionality of said computer application. The arbitrary objects are managed in an object library. The arbitrary objects are deployed from said object library into a design framework to create said computer application.
Method of designing a circuit layout of a semiconductor device
In a method of designing a circuit layout of a semiconductor integrated circuit, a logic function of the integrated circuit is first designed. Then, a pattern layout of the integrated circuit is designed. The designed pattern layout includes a logic cell area and an open area. Next, a spare underground cell is inserted into the open area. The spare underground cell includes a functional element. A mask layout of the integrated circuit is then designed. The designed mask layout includes the logic cell and the spare underground cell.
Mask creation with hierarchy management using cover cells
A method and apparatus for translating a hierarchical IC layout file into a format that can be used by a mask writer that accepts files having a limited hierarchy. Cover cells of the original IC layout file or a modified file are designated, and the hierarchical file is redefined to include only those designated cover cells. Non-designated cover cells and other geometric data are flattened into the designated cover cells. The hierarchy of the modified file is then redefined to be less than or equal to the hierarchy limit of the mask writing tool.
Method and system for improving signal integrity in integrated circuit designs
A method and system of improving signal integrity in integrated circuit designs is disclosed. In some embodiments, signal integrity optimization is conducted in conjunction with detailed routing of an integrated circuit design based upon a global routing plan previously generated for the design.
Method and system for designing semiconductor circuit devices to reduce static power consumption
A method and system are disclosed for designing a complex integrated electronic circuit architecture including a plurality of circuit portions integrated into a single chip structure. The method includes providing at least one library of cells with a variable channel length L; creating a layout of an integrated circuit using the cells with an initial channel length L; performing a timing analysis of the integrated circuit to analyze more and less critical paths by evaluating respective path delays; selecting a set of less critical paths to be modified; evaluating the leakage currents of the less critical paths of the selected set; and modifying the variable channel length L of the cells which are involved in the less critical paths of the selected set on the basis of the corresponding evaluated leakage current and the respective path delays, whereby a modified integrated circuit with a reduced circuit leakage current is obtained.
Redundant critical path circuits to meet performance requirement
Method, system, IC and design structure for meeting a performance requirement using redundant critical path circuits, are disclosed. In one embodiment, the IC includes a plurality of redundant critical path circuits, wherein at least one of the plurality of redundant critical path circuits meeting a performance requirement is operational and the others are non-operational.
A technique for reducing a circuit listing. According to examples of the technique, at least a portion of a circuit listing is analyzed to identify occurrences of a circuit structure made up of a plurality of circuit components. For each identified occurrence of the defined circuit structure, an injection data object is created corresponding to the plurality of components, and the injection data object is substituted into the portion of the circuit listing in place of the plurality of components. For each occurrence of the defined structure, one or more properties of the occurrence of the defined structure may be determined and contained by the corresponding injection data object.
Distributable and serializable finite state machine
A distributable and serializable finite state machine and methods for using the distributable and serializable finite state machine are provided wherein finite state machine instance can be location-shifted, time-shifted or location-shift and time-shifted, for example by serializing and deserializing each instance. Each instance can be located-shifted between agents, and a persistent memory storage location is provided to facilitate both location-shifting and time-shifting. Finite state machine instances and the actions that make up each instance can be run in a distributed fashion among a plurality of agents.
Information processing apparatus and method, information processing system, and providing medium
The invention enables users to virtually attach information to situations in the real world, and also enables users to quickly and easily find out desired information. An IR sensor receives an IR signal transmitted from an IR beacon, and supplies the received signal to a sub-notebook PC. A CCD video camera takes in a visual ID from an object, and supplies the inputted visual ID to the sub-notebook PC. A user inputs, through a microphone, a voice to be attached to situations in the real world. The sub-notebook PC transmits position data, object data and voice data, which have been supplied to it, to a server through a communication unit. The transmitted data is received by the server via a wireless LAN. The server stores the received voice data in a database in correspondence to the position data and the object data.
An interface for displaying icons or input control portions corresponding to a plurality of functions on screen and pointing each icon or input control portion on screen selectively includes display control means which, along with repeatedly changing and displaying the icons or the input control portions in succession on screen, designates at least one icon or input control portion among the icons or the input control portions and displays the designated icon(s) or input control portion(s) on a permanent basis.
Conversation grouping of electronic mail records
Improved conversation grouping methods and systems are provided for electronic mail records. Electronic mail messages that are unread or flagged for follow-up are automatically displayed under an associated conversation grouping heading. If a conversation grouping contains only a single unread or flagged electronic mail message, the single electronic mail message is automatically displayed under the conversation grouping heading for review by a user. For a conversation grouping having no unread or flagged electronic mail messages, the latest electronic mail message in the grouping is automatically displayed under the conversation grouping heading.
System and method for dynamically generating a web page
A method for dynamically constructing a web page is disclosed which includes receiving a uniform resource locator identifying a web page. The web page references a plurality of elements. The method also includes receiving a user identifier representing a user and evaluating each of the referenced elements based on the user identifier to identify a subset of at least one element the user is authorized to access. The method further includes determining a data conversion specification associated with the user and determining a data representation specification associated with the user. The subset of elements that the user is authorized to access is converted and presented to the user. Systems and computer-readable storage media for defining and presenting a composite web page are also disclosed.
Selection accelerator in topology views
A selection accelerator in topology views is presented. A user uses a topology view to manage a computer network whereby the topology view includes a plurality of nodes and their relationships that correspond to computer network components. When a user selects a primary node, processing identifies related nodes, and displays a relationship identifier next the related nodes, such as a hierarchal level corresponding to the primary node. By viewing the relationship identifiers, the user is able to depress a key to select a plurality of related nodes based upon their relationships. In addition, the user is able to request an invert select which informs processing to select nodes related to the primary node which are not currently selected.
Multi-dimensional graphical display of discovered wireless devices
A device discovery and presentation system. The architecture facilitates automatically sensing devices, ports, or other wirelessly identifiable entities by detecting such entities, and displaying a 2-D or 3-D representation of the relative location of such entities to a user via a display. The architecture may be controlled to detect such entities in a confined envelope of space for a specified distance.
Display method, computer program product and computer system
The present invention relates to a display method. The display method includes displaying a labeled column chart on a graphical user interface, where the column chart having a plurality of labels. The display method further includes entering a first modification of one of the labels via a graphical user interface by a user and starting execution of labeling instructions that implement a labeling algorithm for generating a first modified labeled column chart in response to the entry of the first modification. The first modified labeled column chart is displayed.
System for capturing document style by example
A system and method of using an example document to create another document with the same style. The style is determined by examining the example file for syntax patterns that are required in a document of this type. Each pattern is used to create a section template (a sub-template for a larger template). After all the required sub-templates have been defined, by examining the example, we have a document template that may be used to format new documents. Along with user-specific content, a document generator uses the captured document template to generate sections of a new document. When a section of a document is generated, the sub-template that corresponds to that section of a document is inserted with user-specific content. The generated file ends up with the same kind of text spacing and positioning, ordering of sections, presence of annotations and other nonfunctional attributes as the example.
Creating a new music video by intercutting user-supplied visual data with a pre-existing music video
A method in which a pre-existing music video (which may be a professionally-created music video) is intercut with an end-user's own additional visual data (pictures or video). In a first phase, a plurality of temporal sections are defined in a pre-existing music video. In a second phase, which may be performed by a non-professional end-user, video data specified by the end-user are intercut with the pre-existing music video according to the temporal sections.
Multidimensional scorecard header definition
An object model and a user interface (UI) enable users of a scorecard application to define an order and categorization of elements including header and row components to break out the scorecard data for effective presentation of multidimensional scorecard views combined with data from non-multidimensional sources. Users are provided options to select individual or sets of members, or to provide queries that select sets of metrics for the scorecard view. Header components are defined at predetermined depth of layers enabling the user to view categorized metrics. Additional columns providing attribute information associated with the metrics can also be inserted in selected places within the scorecard matrix using the editing UI.
Interfaces for creation and access of extensible markup language paper specification documents
XPS documents are created and accessed via a collection of interfaces of various classes of an application programming interface. The application programming interface includes a document sequence class for reading and writing the document sequence of the XPS document, a fixed document class for reading and writing the fixed documents of the document sequence, a page class for reading and writing the pages of the fixed documents, and a resource class for accessing the resources of each page. Applications seeking to create or read XPS documents may utilize the application programming interface such that the complexities of creating and accessing the XPS document are abstracted away.
Framework for providing visual context to WWW hyperlinks
A method and a system for presenting Internet information to a user including providing to a user a visual image of a web page containing at least one hyperlink, and at least partially concurrently providing a visual image of another web page of at least one web site which is represented by the at least one hyperlink.
Multilinguistic industrial control and monitoring system
A control and monitoring system is adapted to collect parameter data from networked devices, and to display representations of the system or monitored data in a number of selectable languages on a monitoring station. Textual labels for the representations are stored in a system database. Component and system data may also be stored in the database for use in identifying and monitoring the components. The language used for the labels is selectable by a user via a menu, and the corresponding entries in the database are used in building the representations. The language may thus be changed in real time without interrupting the monitoring and control functions of the components or the monitoring station.
Method and system for decoding video, voice, and speech data using redundancy
A method and system for decoding video, voice, and/or speech data using redundancy and physical constraints are presented. Video, voice, and/or speech bit sequences may be decoded in a multilayer process based on a decoding algorithm and at least one physical constraint. For voice applications, the decoding algorithm may be based on the Viterbi algorithm. At least one estimated bit sequence may be selected by performing searches that start from trellis junctions determined during by the decoding algorithm. The estimated bit sequences may be selected based on corresponding redundancy verification parameters. At least one physical constraint test may be performed on the selected estimated bit sequences to select a decoded output bit sequence.
Register exchange network for radix-4 SOVA (Soft-Output Viterbi Algorithm)
Register exchange network for radix-4 SOVA (Soft-Output Viterbi Algorithm). Two trellis stages are processed simultaneously and in parallel with one another (e.g., during a single clock cycle) thereby significantly increasing data throughput. Any one or more modules within an REX (Register Exchange) module are implemented using a radix-4 architecture to increase data throughput. Any one or more of a SMU (Survivor Memory Unit), a PED (Path Equivalency Detector), and a RMU (Reliability Measure Unit) are implemented in accordance with the principles of radix-4 decoding processing.
Reduced processing in high-speed reed-solomon decoding
Processing polynomials is disclosed. At least a portion of processing associated with an error evaluator polynomial and at least a portion of processing associated with an error locator polynomial are performed simultaneously. The error evaluator polynomial and the error locator polynomial are associated with Berlekamp-Massey processing. Data associated with the error evaluator polynomial is progressively removed.
Semiconductor IC including pad for wafer test and method of testing wafer including semiconductor IC
Provided are a semiconductor integrated circuit (IC) including a pad for a wafer test and a method of testing a wafer including a semiconductor IC. The semiconductor IC includes a first address generator, a second address generator, and an address output unit. The first address generator generates a normal address having (M+N) bits or a first test address having M bits corresponding to voltages applied to a plurality of address pads. The second address generator generates a second test address having N bits corresponding to a voltage applied to an additional pad. Therefore, according to the semiconductor IC and the wafer test method, an additional pad is provided to generate an N-bit test address in wafer test mode such that the number of pads needed to test a device can be reduced. As a result, more semiconductor ICs can be tested simultaneously.
Removing the effects of unknown test values from compacted test responses
Methods, apparatus, and systems for filtering compacted test responses are disclosed. The methods, apparatus, and systems can be used, for example, to remove the effects of unknown test values. For instance, in one embodiment, a compacted test response from a compactor of a circuit-under-test is received. In this embodiment, the compacted test response includes one or more compacted test response values that are dependent on one or more respective unknown values. The compacted test response is filtered to remove the dependency of at least some of the compacted test response values on the one or more respective unknown values, and a filtered test response is output. Various filtering circuits and testing systems are also disclosed.
Semiconductor integrated circuit and method for controlling the same
A semiconductor integrated circuit includes a target circuit with at least a scan chain having sub scan chains of stages to sequentially shift a test data in response to a clock signal in a scan path test mode, and each of the sub scan chains includes first flip-flops connected in series. A backup control circuit controls the target circuit and a memory such that a plurality of sub internal state data of a data indicating an internal state of the target circuit are stored as a plurality of write data in the memory in a save mode through the sub scan chains and the plurality of sub internal state data are read out from the memory as a plurality of read data and set in the sub scan chains in a restore mode.
Standalone data storage device electromagnetic interference test setup and procedure
A data storage device includes a plurality of sectors and a port, the port having a transmitter and a receiver. In one embodiment a method includes coupling the transmitter to receiver, providing power to the data storage device, detecting that the transmitter is coupled to the receiver, and executing code for exercising the data storage device.
Memory with cell population distribution assisted read margining
A memory using techniques to extract the data content of its storage elements, when the distribution of stored states is degraded, is presented. If the distribution of stored states has degraded, secondary evaluations of the memory cells are performed using modified read conditions. Based upon the results of these supplemental evaluations, the memory device determines the read conditions at which to best decide the data stored.
Kalman filtering for grid computing telemetry and workload management
In one embodiment, a method and apparatus for Kalman filtering for grid computing telemetry and workload management is disclosed. The method includes monitoring telemetry data at a node of a grid computing engine with a Kalman filter, determining whether the monitored telemetry data is outside of a bounds of a predictive model of the Kalman filter, signaling an error condition for the node if the monitored telemetry data is outside of the bounds, and addressing the error condition by correcting a problem experienced at the node corresponding to the error condition. Other embodiments are also disclosed.
System for performing context-sensitive decisions about ideal communication modalities considering information about channel reliability
A system and method for identifying ideal channels for communications based on an analysis of communication channel reliability, communicating party preferences, and communicating party contexts is provided. The system attempts to optimize the utility of a communication based on inferred or directly accessed channel reliability data, communicating party preferences and communicating party contexts. Such optimization can be achieved using reliabilities, preferences and policies concerning handling the attempted contact based on a deterministic specification or through inferring reliability, context, content and task under uncertainty by employing decision-theoretic inferences. The methods may consider channels currently available as well as channels available at later times. Thus, the service can include automated rescheduling of communications based on a consideration of forecasts of reliability and availability. The approach may include the use of forecasts about the time required for a communication and the likelihood that a connection will be dropped or will lose fidelity over this period of time. The methods may also include a consideration of metadata within a standard schema that is transmitted along with a communication attempt, the metadata representing information about attributes like the potential communication channels, the identity of the contactor, the task at hand, and the context of the communicating parties. The invocation of the communication service may be performed in a variety of ways, including single button invocations, and via a communication service that is more deeply integrated with other applications and functionalities.
Thread interception and analysis
Apparatus and methods for intercepting and analyzing threads are disclosed. In one embodiment, a thread data recorder is configured to instrument one or more existing functions by modifying computer executable instructions in the functions to intercept threads calling the functions. In one possible implementation, the number of existing functions instrumented can be reduced by instrumenting choke point functions. The instrumented functions can also capture data associated with the threads as the threads execute at the function. This data can be saved to memory and compressed into logs. In one aspect, the data can be saved and/or compressed at a time when processor resources are being used at or below a predetermined level. The captured data can be used to analyze a functioning of a computer system in which the threads were produced.
A system LSI which is capable of precisely acquiring the status of a module which is referred to as a resource for debugging when a high-performance processor debugs a processing program executed by a small-scale processor. A function unit has a bus interface connected to a bus and a data processing unit. The function unit is controlled in accordance with a processing program. The processing program is debugged in accordance with a debug program. Functioning of the data processing unit is halted. The function unit control processor suspends execution of the processing program to assert a debug signal when the processing program satisfies a predetermined condition. The halting unit halts functioning of the data processing unit without halting the bus interface in the function unit when the debug signal becomes asserted. The debugging processor acquires a status of the data processing unit when the debugging processor detecting that the debug signal is asserted.
Method and system for configurable trigger logic for hardware bug workaround in integrated circuits
Aspects of configurable logic for hardware bug workaround in integrated circuits may comprise detecting within a chip at least one condition that would likely result in an occurrence of a hardware bug prior to the hardware bug occurring. Upon the detection of the condition, at least one trigger event may be generated within the chip via at least one debug signal, and the trigger event may be utilized to execute workaround code that may prevent the occurrence of the hardware bug. The debug signal may be generated inside the chip and/or outside the chip. The trigger event may be generated by combining a plurality of debug signals within the chip with at least one input or output signal of the chip.
Information processing apparatus, control apparatus therefor, and control method therefor
An information processing apparatus carrying out hardware diagnosis processing by means of initializing processing of each part of hardware when power supply in the apparatus is started, has a power-off initializing processing part carrying out the hardware diagnosis processing when the power supply in the apparatus is cut off; and a power-off timing control part controlling timing of cutting off the power supply in the apparatus in such a manner that the power supply in the apparatus is carried out after the hardware diagnosis processing and trouble reporting processing carried out by said power-off initializing processing part are finished.
Restarting an errored object of a first class
A method for executing a computer program on computing hardware, e.g., on a microprocessor, is provided, the computer program including multiple program objects and errors being detected in the method while running the computer program on the computing hardware. The program objects are subdivided into at least two classes, and multiple program objects are executed during one run, program objects of the first class being repeated when an error is detected and, when an error is detected in one program object of the first class, which has already been sent for execution, this program object of the first class is restarted instead of a program object of the second class after the other program objects of the first class of a run.
Information processing system and method for executing process during communication error
In information processing between computers which perform a remote operation via a network, all or a part of process information being executed by an operation target and data for use in a process are transmitted beforehand to an operation unit, and the operation unit continues the processing by use of the process information transmitted beforehand when connection via the network for communication between the computers is interrupted or cut. When it is detected that the communication returns to a normal state, the process information being executed by the operation unit and the data for use in the process are transmitted to the operation target, and the operation target continues execution of an information processing program by use of the received process information and the data for use in the process.
Distributed platform management for high availability systems
A distributed model for availability management (AM) functions is described. Core AM functionality is provided by at a global level, while supplemental AM functionality is provided at a local (e.g., cluster) level. Extension entities can be provided to supplement provided AM functions.
Dynamic clock phase alignment between independent clock domains
An apparatus and method is described for dynamically aligning clocks in independent clock domains with minimal latency. In the preferred embodiments, a reference clock in the destination clock domain that is some multiple times the data clock of the destination clock domain is used to sample a data sample signal from the source domain. The sampled data is used to determine at what time slice of the reference clock the data sample signal is changing and therefore at what phase of time slice or phase of the data clock the clocks can be aligned to ensure valid data will be transferred between clock domains.
Self-tuning time interpolator
A scaling factor used in time interpolation calculations is tuned so as to compensate for clock sources that generate timer interrupts both slower and faster than expected. The scaling factor is decreased when the timer interrupts are late and the scaling factor is increased when the timer interrupts are early. By being able to account for timer interrupts that are generated too early, time skips are minimized. The adjusted scaling factor is used in calculating system time and interpolation offset values.
Real time clock content validation
Disclosed is a method of validating the contents of a real-time clock in a digital circuit. A plurality of memory elements create a first random signature value when power is newly applied to a circuit. The plurality of memory elements maintain the first random signature value while power to the circuit is maintained. The first random signature value is stored as a reference value such that the reference value is not altered by a power interruption. When power to the circuit is lost and then regained, a second random signature value is created. The second random signature value likely will no longer match the reference value because both the reference value and the second signature are random. When the reference value does not match the signature value, the real-time clock value is considered invalid. User input may be employed to correct the real-time clock value.
Timing synchronization circuit with loop counter
An apparatus for synchronizing an output clock signal with an input clock signal includes a first timing synchronization circuit, control logic, and a counter. The first timing synchronization circuit is operable to generate a delay to synchronize a reference clock signal representative of the input clock signal with a feedback clock signal representative of the output clock signal responsive a strobe signal. The control logic is operable to generate an enable signal based on the reference clock signal and generate the strobe signal based on the feedback clock signal. The counter is operable to count cycles of the reference clock signal occurring between the enable signal and the strobe signal to generate a loop count for the first timing synchronization circuit.
Versatile clock management system for a single pin serial interface protocol
The present invention provides a versatile system for management of clocking for a serial interface. Serial input data, comprising a plurality of fields, and preceded by a specific input pattern, is provided to a receiver element. Within one of the fields in the serial input data, some information concerning the size the current serial data payload is included. Responsive to receiving the specific input pattern, the system of the present invention asserts a clock enable signal to activate clocking. A countdown corresponding to the size the current serial data payload is initiated. Once that countdown has reached zero, the clocking for the interface is disabled.
Power control methods for a portable electronic device
A power control method for a portable electronic device. The portable electronic device comprises a power supply unit and a volatile memory for storing data when the power supply unit supplies power thereto. First, the portable electronic device is set to enter a deep sleep mode. Then, data accessed from the volatile memory is transferred to a non-volatile memory. Finally, except for maintaining sufficient power to restore the device, the power supply unit is turned off.
System for retaining power management settings across sleep states
A method for adjusting power management setting of the operating system while the system is in a sleep state. When a user attaches or removes power to the information handling system while the system is in a standby mode of operation, the sleep state system generates a wakeup event. During the resume process, the operating system checks a current power state of the information handling system and compares the current power state to the power state settings present when the information handling system entered the sleep state, resets the power state settings if necessary and then causes the information handling system to reenter the sleep state.
Extension card incorporating power management device
The present invention provides an extension card incorporating a power management device applicable to electronic devices. During the operating process, if the removal of the top cover from the housing of the electronic device is detected, power supply to the electronic device is immediately cut off. The extension card incorporating the power management device is characterized in that a plurality of signal pins are disposed on a side of the power management device and electrically connected to a plurality of idle pins of the extension card, the idle pins conveying no signals processed by the extension card but transmitting a power-off signal to the motherboard when electrically connected to the connecting port of the motherboard.
Electronic apparatus supplying power to external equipment based on information received from a host or the external equipment
An electronic apparatus, capable of efficiently supplying power in accordance with execution process analysis of the electronic apparatus and classification of externally connected external equipment, includes an equipment connection section for connecting with multiple external equipments, a process judgment section for making a judgment as to a process to be performed by the electronic apparatus, an equipment selection section for selecting external equipment based on the judgment result of the process judgment section, and a power supply section for supplying power to the external equipment selected by the equipment selection section.
Power control in a data storage system
A network attached storage system includes at least one data moving device coupled to a control station for receiving commands from the control station, each of the at least one data moving devices including a board having mounted thereon a file server portion and a power control portion, wherein the power control portion receives a continuous power supply and controls the application of power to the file server portion based on commands from the control station.
Bitstream protection without key storage
An external storage device may transmit encrypted configuration data to a PLD during a configuration operation without transmitting the encryption key to the PLD and without retaining decryption information in the PLD. During a set-up operation, the encryption key is provided to the PLD, which generates an ID code upon power-up. The PLD generates a correction word in response to the encryption key and the ID code. The correction word is output from the PLD, which is powered-down, and is stored with the encrypted configuration data in the storage device. Then, during a configuration operation, the PLD is powered-on and re-generates the ID code. The correction word and the encrypted configuration data are transmitted to the PLD, which generates a decryption key in response to the re-generated ID code and the correction word.
Encryption/decryption management method in computer system having storage hierarchy
When a computer system including a data storage apparatus having a data storage area storing encrypted data is modified to have plural encryption/decryption units, a computer cannot appropriately use the encrypted data storage area if a path including the encryption/decryption means is not adequately determined.In a computer system having a computer 10, two or more data storage apparatuses 100 and 200 arranged hierarchically, plural encryption/decryption modules 199 and 299 on a path between the computer 10 and a data storage area 101, and a management computer 500 for managing the data storage apparatuses and the like, if there is an interoperability between the encryption/decryption modules 199 and 299 and the data storage area 101 is encrypted by the first encryption/decryption module 199, the computer 10 accesses the data storage area 101 using the second encryption/decryption module 299 (or an n-th encryption/decryption module closer to the computer than the second encryption/decryption module), rather than the first encryption/decryption module.
Method and apparatus for managing confidential information
The invention is a method and apparatus for managing the secure acquisition, storage and disclosure of confidential information using biometric keys to lock data storage devices, a secure data input/output device and authorization procedures to facilitate identity rights management; and/or metadata querying techniques to preserve the anonymity of disclosed personal data.
Method and apparatus to obtain service capability credentials
A service discovery mechanism may allow clients in a distributed computing environment to search for services. The service discovery mechanism may allow a client to request a capability credential from a service. In one embodiment, the client may present to the service a set of desired capabilities. The service may then respond with a capability credential that may convey to the client the rights to use the requested capabilities. A complete service advertisement may be needed to create a message endpoint for accessing the service. In an embodiment, the capability credential may be used by a client to obtain a complete advertisement for the requested capabilities. The capability credential may provide an additional level of security for the service provider. The capability credential that may be used to receive the complete advertisement may also be used to construct a message gate to communicate with the service where the gate embeds the capability credential in each message to the service.
Systems and methods for media authentication
A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes. Theft, distribution, and piracy of digital content on optical media, such as computer software (also games, video, audio, e-book content), is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the replication of media to another mass manufactured disc. The present invention, which helps to irrefutably identify a unit of optical media as the original, and can correspondingly identify any copy made by any currently available means as such a copy, may prevent an unauthorized individual from making use of any unauthorized copies. This offers significant advantages to content creators who wish to protect their products.
Conference session key distribution method in an ID-based cryptographic system
A conference session key distribution method used in an ID-based cryptographic system includes selecting two different temporary secret keys, generating a message and generating session key generation variables using the temporary secret keys of a session initiating party. Only valid participating parties receive the session key generation variables. Each party determines the session shared key from the session key generation variables.
Active verification of boot firmware
Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate. Finally, the computer system executes the boot code based on a result of the security check.
Encryption gateway service
An encryption management system of an enterprise is provided. The system includes an encryption/decryption component operable for enterprise messages to be secured by receiving and encrypting the messages received from enterprise applications. The encryption/decryption component further decrypts messages received from enterprise partners that are encrypted. The system includes an identity management component to manage access to the encryption management system, and a key management component to manage keys used by the encryption/decryption component. The system includes a notification component that initiates sending messages regarding events occurring in the encryption management system through communication with an enterprise messaging system. The system also includes a logging/auditing component to log events occurring in the encryption management system.
User selectable configuration options application for inaccessible nonvolatile storage at bootstrap
Embodiments of the present invention address deficiencies of the art in respect to applying user configurable options during bootstrap and provide a novel and non-obvious method, system and computer program product for user selectable configuration options application for inaccessible nonvolatile storage at bootstrap. In one embodiment of the invention, a method for user selectable configuration options application for inaccessible nonvolatile storage at bootstrap can be provided. The method can include powering up a motherboard for a computer system and reading user selectable configuration options for the computing system from sticky bits prior to bootstrap for the motherboard. The method further can include applying the user selectable configuration options to the computing system. Finally, the method can include performing bootstrap for the motherboard subsequent to applying the user selectable configuration options.
Method for initiating a display chip
A method and system for initiating a display chip in a computer system is provided, and the initiating system includes a non-volatile memory, an external storage media and a memory unit. A BIOS which is able to initiate the external storage media is stored in the non-volatile memory. First, a backup file is loaded into the memory unit from the initiated external storage media. Then, an initiating program is fetched from the backup file. Finally, the initiating program is executed to initiate a display chip of a computer system.
Reconfigurable integrated circuit, system development method and data processing method
An integrated circuit includes a processor. An arithmetic logic circuit group includes a plurality of operation units and a connection channel connecting the operation units in a reconfigurable manner. Parameter-based dedicated hardware can change a process specification thereof by parameter setting. An intermodule interface connects the processor, the arithmetic logic circuit group, and the parameter-based hardware to each other.
Memory-efficient instruction processing scheme
In a two-dimensional optical storage (TwoDOS) arrangement, at certain places on the optical disc, calibration pits are placed, for instance in the lead-in and/or additionally sparsely in the data. The signal waveform resulting from the read out of the calibration bits is measured, and matrix multiplication is performed on these signals to obtain the linear interference coefficients. This can be done since the bit sequence is known (along all of the bit-rows of the 2D patterns). From these linear interference coefficients, the electric field distribution of the read-out spots at the pitholes can be reconstructed. This information can be used in at least two ways: The signal processing unit can use this as input for its settings, so it uses a measured response of the optical channel instead of an expected response.
Processor with automatic scheduling of operations
A high speed processor. The processor includes terminals that each execute a subset of the instruction set. In at least one of the terminals, the instructions are executed in an order determined by data flow. Instructions are loaded into the terminal in pages. A notation is made when an operand for an instruction is generated by another instruction. When operands for an instruction are available, that instruction is a “ready” instruction. A ready instruction is selected in each cycle and executed. To allow data to be transmitted between terminals, each terminal is provided with a receive station, such that data generated in one terminal may be transmitted to another terminal for use as an operand in that terminal. In one embodiment, one terminal is an arithmetic terminal, executing arithmetic operations such as addition, multiplication and division. The processor has a second terminal, which contains functional logic to execute all other instructions in the instruction set. The invention is useful for arithmetic intensive applications, such as graphic processors.
Descriptor-based memory management unit and method for memory management
A memory management unit that includes: (i) multiple data segment descriptors, each data segment descriptor associated with a data memory segment; (ii) multiple program segment descriptors, each program segment descriptor associated with a program memory segment; and (iii) a controller, adapted to replace the content of the multiple data segment descriptors and the multiple program segment descriptors in response to a task switch. A method for memory management, the method includes: (i) providing multiple data segment descriptors; each data segment descriptor associated with a data memory segment, and providing multiple program segment descriptors, each program segment descriptor associated with a program memory segment; (ii) receiving and storing a program task identifier and a data task identifier; (iii) receiving a data access request and determining how to handle the data access request in response to a content of the multiple data segment descriptors; and (iv) receiving a program access request and determining how to handle the program access request in response to a content of the multiple program segment descriptors.
Page oriented memory management
A method and apparatus for managing memory allocation using memory pages. An arena is designated within one or more memory pages. The arena is divided into one or more memory blocks of the same size. Metadata is generated for the memory blocks at a location other than between the memory blocks, which is used when allocating memory to satisfy an allocation request of approximately the size of the memory blocks.
System, method and program for supporting a computer sizing having N level hierarchical resources
A technique for supporting the sizing of hierarchical computer resources is provided. The sizing support system includes a memory, a table definition module and field calculation module. The memory stores lower level resource data which indicates the kinds and the maximum number of lower level resources belonging to the resources of each hierarchy level, and resource data which indicates parameters of resources of each hierarchy level. The processing is executed in a unit of three levels. In the unit process of three levels, the table definition module generates a table frame indicating the possible configurations of first resource by referring the lower level resource data. The field calculation module calculates the performance and cost of the configuration in the table frame by referring the resource data.
Method and system for storing a sparse file using fill counts
A method for storing a first block and a second block, the includes storing the first block and the second block in a storage pool, and storing a third block in the storage pool, wherein the third block references the first block and second block and comprises a first fill count and a second fill count, wherein the first fill count corresponds to one selected from the group consisting of a number of data blocks directly referenced by the first block, a number of data blocks indirectly referenced by the first block, if the first block is an indirect block, wherein the first fill count is one if the first block is a data block.
Data processing system and method with copy protection
A data processing system includes a readout unit, a device ID storage unit, a storage medium writing unit, a determination unit, and a processing unit. The readout unit reads out data that have been stored on a storage medium, where the storage medium is removably mounted in an external storage unit. The device ID storage unit stores a device ID that is peculiar to a device. The storage medium writing unit writes the device ID that has been stored in the device ID storage unit to the storage medium. The determination unit makes a determination as to whether the device ID that has been written to the storage medium and the device ID that has been stored in the device ID storage unit are in agreement. The processing unit carries out either first processing or second processing depending on a determination made by the determination unit.
Dynamic timer configuration for task monitoring in a remote mirror and copy environment
A system is disclosed that includes a host system to issue a write command, a primary storage device to write data to a primary volume, and a secondary storage device to mirror the data to a secondary volume. A task timer may be initiated upon sending the data from the primary storage device to the secondary storage device. The secondary storage device may also send an acknowledge signal to the primary storage device in the event it successfully mirrors the data to the secondary volume. In the event the acknowledge signal is not received before the timer expires, the primary storage device may notify the host system that the primary and secondary volumes are in a suspended state. To alter the duration of the timer, the host system may be further configured to dynamically alter the duration of the timer by sending a command to the primary storage device.
Dynamic timer configuration for monitoring a long busy state in a remote mirror and copy environment
A system is disclosed that includes a host system to issue a write command, a primary storage controller to write data to a primary volume, and a secondary storage controller to mirror the data to a secondary volume. In the event the secondary storage controller is unable to mirror the data due to a busy state, a busy signal may be sent to the primary storage controller. The primary storage controller may initiate a timer in the event it receives the busy signal, and, in the event the busy state does not end before expiration of the timer, notify the host system that the primary and secondary volumes are in a suspended state. To alter the duration of the timer, the host system may be configured to dynamically alter the duration of the timer by sending a command to the primary storage controller.
Protection of point-in-time application data using snapshot copies of a logical volume
Providing protection of point-in-time application data includes obtaining a plurality of original snapshot copies of an original logical volume containing the application data, causing the original snapshot copies to be tested for data corruption, and restoring data corresponding to one of the original snapshot copies. Application data is accessible by an application prior to completion of the restoration. One of the original snapshot copies may be restored to the original logical volume and/or to a new logical volume different from the original logical volume. Prior to completion of the restoration, particular data may be restored to the original logical volume or to the new logical volume prior to an operation to access the particular data. The original snapshot copies may be provided as virtual devices.
Method and apparatus for managing direct I/O to storage systems in virtualization
A network storage virtualization method and apparatus in a network storage system having a plurality of network storage devices. According to the, present invention a client connected via a network is allowed to access the network storage devices as one virtual network storage system. In addition the client is permitted to access the network storage devices separate from the virtualized network storage system for other purposes such as reporting, verifying or backing up.
Dynamically determining and managing a set of target volumes for snapshot operation
Systems and methods for managing a backup process of a database are disclosed. Typically, one or more backup logical unit numbers (LUNs) are identified in a backup management file from one or more available LUNs identified in a universe file are allocated. The backup management file comprises a plurality of data containers, each data container specifying a subset of the one or more backup LUNs capable of backing up a database comprising one or more used database LUNs. One of the plurality of the data containers are allocated for a current backup of the database as indicated in the backup management file. The backup management file is checked and updated as necessary so that the one or more backup LUNs remain available as indicated in the universe file.
Data processing apparatus and image forming apparatus for managing a data deletion history
The present invention includes means for processing received data, storage means for storing the data, means for performing an invalidation process on the data stored in the storage means, and means for storing history information about the history of the invalidation process performed.
Apparatus, system, and method for dynamic address tracking
An apparatus, system, and method are disclosed for dynamic address tracking. A token module creates a token for a job that accesses data in a storage system comprising a plurality of storage devices. The token comprises a job name. The job is a batch job. A storage module stores location information for the data accessed by the job in a token table. The location information is indexed by the token. In addition, the location information includes an input/output device name, an address space, a data set name, and a storage device name. A communication module receives a diagnostic command comprising the job name. The token module reconstructs the token using the job name. The storage module retrieves the location information indexed by the token in response to the diagnostic command.
Prefetching data in distributed storage systems
Embodiments include methods, apparatus, and systems for prefetching data in distributed storage systems. One method of software execution includes using input/output (I/O) requests from multiple separate networked storage nodes in a distributed storage system to prefetch data for one of the multiple separate networked storage nodes.
Victim prefetching in a cache hierarchy
We present a “directory extension” (hereinafter “DX”) to aid in prefetching between proximate levels in a cache hierarchy. The DX may maintain (1) a list of pages which contains recently ejected lines from a given level in the cache hierarchy, and (2) for each page in this list, the identity of a set of ejected lines, provided these lines are prefetchable from, for example, the next level of the cache hierarchy. Given a cache fault to a line within a page in this list, other lines from this page may then be prefetched without the substantial overhead to directory lookup which would otherwise be required.
Methods of converting traditional volumes into flexible volumes
A filer converts a traditional volume to a flexible volume by: creating an aggregate on storage devices other than the storage devices of the traditional volume; on the aggregate, creating a flexible volume large enough to store metadata describing files residing on the traditional volume; on the flexible volume, creating metadata structures that describe the files of the traditional volume, except that the metadata indicates that data blocks and indirect blocks are absent and must be fetched from another location. As the filer handles I/O requests directed to the flexible volume, the filer calculates physical volume block number (PVBN) addresses where the requested blocks would be located in the aggregate and replaces the absent pointers with the calculated addresses. After the absent pointers have been replaced, the filer adds the storage devices of the traditional volume.
Method and device for utilizing a modified read-ahead command to store data on a record medium
A modified read-ahead (i.e., jump) command, contains a sequential access parameter SAP, JUMPm(X,Y:SAP), for instructing a disc drive to jump to block Y after having read block X. If the SAP parameter has a value indicating that a host, such as a PC, designed to recognize the SAP parameter, deliberately signals a disc drive to jump to a lower address (e.g., Y
Analysis for a multiple tag hit in a content addressable memory (CAM)
A tag storing unit stores, in a plurality of entries, a plurality of tags corresponding to a plurality of addresses, a parity bit of each of the tags, and a reverse bit obtained by reversing the parity bit. A data storing unit stores a plurality of data corresponding to the tags in a plurality of entries. A comparing unit compares an address for search with a tag of each of the entries. A determining unit performs an OR-operation on contents stored in a plurality of entries when a multiple hit occurs from a comparison by the comparing unit, and determines a cause of the multiple hit based on a parity bit and a reverse bit obtained after the OR-operation.
Information device including main processing circuit, interface circuit, and microcomputer
An information device includes a main processing circuit for executing signal processing related to a main function in the information device, a main microcomputer for controlling the main processing circuit, a receiver circuit for interfacing with the outside of the information device, and an interface microcomputer for controlling the receiver circuit, the interface microcomputer being provided separately from the main microcomputer.
Globally unique transaction identifiers
In one embodiment of the present invention, a method includes identifying a transaction from a first processor to a second processor of a system with a transaction identifier. The transaction identifier may have a value that is less than or equal to a maximum number of outstanding transactions between the two processors. In such manner, a transaction field for the transaction identifier may be limited to n bits, where the maximum number of outstanding transactions is less than or equal to 2n. In various embodiments, such a transaction identifier combined with a source identifier and a home node identifier may form a globally unique transaction identifier.
Executing application function calls in response to an interrupt
Executing application function calls in response to an interrupt including creating a thread; receiving an interrupt having an interrupt type; determining whether a value of a semaphore represents that interrupts are disabled; if the value of the semaphore represents that interrupts are not disabled: calling, by the thread, one or more preconfigured functions in dependence upon the interrupt type of the interrupt; yielding the thread; and if the value of the semaphore represents that interrupts are disabled: setting the value of the semaphore to represent to a kernel that interrupts are hard-disabled; and hard-disabling interrupts at the kernel.
Method and system for persistent reservation handling in a multi-initiator environment
Embodiments of the present invention provide a system and method for handling persistent reservations. More particularly, according to one embodiment of the present invention, a routing device that routes commands from multiple initiators to a target device can assert reservations for the initiators using its own reservation key rather than a reservation key provided by an initiator. The routing device can further maintain a registry of keys for multiple initiators that access the target device through the routing device. For a persistent reservation command received using a persistent reservation key in the registry, the routing device can forward the command to the target device server using the routing device's key. Thus, reservations for the multiple initiators will be held using the routing device's key. For persistent reservation commands received from initiators registered with the routing device, the routing device can handle conflict resolution and other persistent reservation processing.
Pseudo-full duplex communication using a half duplex communication protocol
In a communication system having a master-slave arrangement communicating with each other using the RS485 protocol, an FPGA with a buffer memory is provided in the master and slave, respectively, to handle the actual communication. The CPUs of the master and slave transfer data to and from the respective buffer memory. The master's FPGA initiates and maintains communication with the slave's FPGA. The masters FPGA and the slave's FPGA communicate with each other using the RS485 protocol by transmitting requests, acknowledgements and data. From the standpoint of the CPUs of the master and slave, the communication appears to be full duplex, although the actual communication between the FPGAs is half duplex. One particular application of the communication method is a KVM switch system where the KVM switch acts as the master and the computers connected to the KVM switch act as slaves.
Universal serial bus hub with wireless communication to remote peripheral devices
A wireless USB hub for connecting a plurality of remote peripheral devices to a computer for communication therewith without the need to physically connect the peripheral devices to the hub via a cable connection. The wireless USB hub includes a receiver for receiving wireless data transmissions from one or more remote peripheral devices. The wireless USB hub further includes a hub controller for passing appropriate peripheral device information to a USB upstream port and then to a computer.
Dual mode digital multimedia connector
The present disclosure relates to a portable storage device that can communicate with different types of host devices. In some embodiments, the portable storage device receives digital media content via a multi-mode device port and exports a derivative of the digital media content (for example, a media stream) via the same multi-mode device port. In some embodiments, the device port has at least one selectively active pin which is active when receiving digital media content and is dormant when exporting a derivative of the digital media content. Alternatively or additionally, the device port includes at least one selectively active pin which is dormant when receiving digital media content and is active when exporting a derivative of the digital media content. In some embodiments, the portable storage device selects a device mode and/or communications protocol in accordance with at least one detected feature of a complementary port and/or a host. Methods for operating the presently disclosed portable external storage device are disclosed herein.
A buffer includes a plurality of serial inputs, a plurality of de-serializers, each coupled to a respective input, a plurality n of buffers and a media access controller having inputs coupled to the plurality of de-serializers, data outputs coupled to the buffers, and two control outputs coupled to respective buffers for buffering input data at a clock rate one-nth that of the input data. Preferably the buffer is a bifurcate buffer. In operation, serial packets are received on a port. They must be converted to parallel data for processing by conventional CMOS logic, however there are limits serial to parallel conversion ratio. This buffer describe circumvents theses limits.
Methods and systems for interprocessor message exchange between devices using only write bus transactions
Systems and methods for reducing or eliminating use of read transactions by a message consuming device coupled through a shared bus to a message producing device to transfer a message from the producing device to the consuming device. Features and aspects hereof provide for use of only write transactions on the bus issued by the devices to transfer messages directly into the data memory of the consuming device. A memory manager on the producing device may manage allocation and freeing of buffer space within the data memory of the consuming device. The producing device notifies the consuming device when a message transfer is completed.
Low latency mechanism for data transfers between a media controller and a communication device
A mechanism and technique to transfer data between a communication device and media hardware in a computing device. More particularly, an embodiment of the invention uses a quality of service to assure deterministic latencies in direct data transfers between a memory buffer and each of a communication device and an audio hardware controller.
Computer system having an I/O module directly connected to a main storage for DMA transfer
A computer system includes a CPU (Central Processing Unit) and a main storage interconnected by a bus to the CPU. The I/O module for transferring received data and data to be transmitted to and from an external unit is directly connected to the main storage, which stores the received data or the transmission data, so that data transfer can be effected every minimum data cycle that allows an access to a memory macro included in the main storage. This accomplishes high-speed data transfer based on DMA (Direct Memory Access) transfer over the bus.
Data transfer apparatus, data transfer method, and program
A data transfer apparatus according to the present invention has; a DMAC and another DMAC which transfer data by direct memory access among a plurality of buses; a command queue which holds, as a queue, commands for instructing the data transfer; a bus information obtainment unit which obtains the commands from the command queue; a grouping unit which groups the held commands, based on a source and a destination designated in each of the obtained commands; a schedule unit which decides an order of issuing the commands sequentially from a group having more command, as a priority; and a selector which selects a command to be issued according to the decided order.
Direct memory access controller
A direct memory access controller is provided, in which an internal storage section storing control setting information; and a control section loading the control setting information from an external storage section to the internal storage section when a transfer request signal does not belong to a first group, and not loading the control setting information from the external storage section to the internal storage section when the transfer request signal belongs to the first group; are included, and a data transfer by a direct memory access is performed in accordance with the control setting information within the internal storage section.
Memory control apparatus and method
A memory control apparatus generates a plurality of commands whose unit of transfer is smaller than the unit of data transfer of a memory access request, and when the memory access request are transmitted from a plurality of request sources, issues the plurality of commands to a memory in alternate order for each request are executed by time division and concurrently.
Flash-interfaced fingerprint sensor
A Flash-interfaced Fingerprint Sensor is disclosed. The sensor device interfaces directly with a flash memory interface chip. The flash memory interface chip incorporates the system for interfacing with flash memory devices, a fingerprint sensor/detector system, and an encryption subsystem for encrypting data being passed to and from the flash memory devices and the host computing device. The device further employs an advanced encryption approach that entails fingerprint decryption and verification on the host computer rather than on the portable memory apparatus. Once verification at the host computer is complete, memory and host functionality is enabled.
Rich targeting criteria for selection of driver packages
Systems and methods are disclosed that facilitate refining a list of candidate driver packages for a detected plug-and-play device. A device can be detected and a hardware ID there for can be determined and compared to hardware IDs in a data store to determine a preliminary list of driver packages that match the hardware device ID. The driver packages can be tagged with additional rich targeting criteria that must be satisfied in order for the driver package to be retained in the candidate list. If additional criteria in the driver packages are not satisfied, then the driver package can be excised from the candidate list to refine driver package compatibility with a computer to which the device is connected.
Recycling items in a network device
A network device includes a data structure and an ager. The data structure includes a group of positions. One or more of the positions are associated with at least one item. The ager is configured to sequentially analyze each position of the group of positions, and recycle, at each analyzed position, any item associated with the analyzed position.
Hardware control interface for IEEE standard 802.11 including transmission control interface component and a transmission status interface component
A standardized 802.11 hardware control interface may be provided such that a driver may communicate with any one or more of a variety of network adapters.
Data transmission system with a mechanism enabling any application to run transparently over a network address translation device
Data transmission system based upon the Internet protocol (IP) comprising a private transmission network (18) and a public transmission network or the like (16) interconnected by a network address translation device NAT (12) wherein at least a workstation WS (10) connected to said private transmission network has to establish a communication with a peer device (14) connected to the public transmission network, the local IP address of each data packet from the workstation WS being translated into a NAT address used to provide the route through the public transmission network. The system includes a registration server (19) connected to the public transmission network for registering the local IP address corresponding to the NAT address and providing the correspondence between the NAT address and the local IP address to the peer device in order for this one to replace in the IP header of each data packet received by the peer device, the NAT address by the local IP address.
Network performance monitoring in a content delivery service
A network architecture or framework that supports hosting and content distribution on a truly global scale allows a Content Provider to replicate and serve its most popular content at an unlimited number of points throughout the world. The inventive framework comprises a set of servers operating in a distributed manner. The actual content to be served is preferably supported on a set of hosting servers (sometimes referred to as ghost servers). This content comprises HTML page objects that, conventionally, are served from a Content Provider site. A base HTML document portion of a Web page is served from the Content Provider's site while one or more embedded objects for the page are served from the hosting servers, preferably, those hosting servers near the client machine. By serving the base HTML document from the Content Provider's site, the Content Provider maintains control over the content.
Enhancement of VRRP interface and router selection where an non-owner router is configured to respond to control and management messages addressed to an address associated with the virtual redundant router
An enhanced virtual router redundancy protocol for manipulating master router selection within a network is disclosed. The use of a priority control policy and priority values take into account conditions and events that may distinguish the desirability of one router over another. Explicit priority values may be specified to indicate the explicit priority of a particular router instance. Delta priority values may also be used to decrement or increment a base priority for a particular router instance. By using priority control policies and priority values to select a master, improved control, management, and manipulation of virtual router instances over a particular IP core network interface are enabled.
Automatically targeting and filtering shared network resources
Embodiments are provided to automatically target shared resources in a computer network which are pertinent to a query for information from a client and/or a server through the use of a shared resources portal. In one embodiment, a query is received in the shared resources portal from a requestor. The portal may then identify a target resource server to which to route the query by filtering the information provided by a number of shared resource servers in the network against information regarding an organizational role performed by the requester. The identified target resource server may be one which provides information pertinent to the organizational role performed by the requester. The query is then processed in the identified target resource server.
Internet protocol multicast replication
Various methods are provided for distributing datagrams over telecommunications networks. According to many of these methods, datagrams are multicast or broadcast to one or more nodes or Virtual Local Area Networks (VLANs) on the networks. Also provided are systems for distributing datagrams over the networks according to these methods. According to some of these systems, reductions are provided in the amounts of memory used to multicast and/or broadcast datagrams.
Method and apparatus of providing zero configuration single source multicasting reporting
Methods and apparatus for providing request compatibility in a multicast system are disclosed. In one aspect, a layer 2 switch is configured to receive traffic requests from a group of receivers, determine whether the traffic requests contain incompatible request types. If incompatible request types exist, then the switch may separate the traffic requests into groups based on type, and send the requests of different types to a router from distinct addresses.
Method and apparatus for processing simple network management protocol (SNMP) requests for bulk information
A method is disclosed for Simple Network Management Protocol (SNMP) bulk information processing. A request for a plurality of object instances stored in a storage space is received. The request specifies a condition and a maximum number of repetitions. The values of one or more object instances of the plurality of object instances are retrieved. The retrieval of object instance values is terminated when the condition is satisfied even though the maximum number of repetitions is not reached. For example, the condition may be specified by one or more pairs of Object Identifier (OID) values, wherein each pair is represented by a starting OID value and an ending OID value. In this example, the condition is satisfied when an OID value of an object instance that is retrieved is not lexicographically between the starting OID value and the ending OID value of any pair of the one or more pairs.
Control system, display device, control-use host computer, and data transmission method
A control system including control devices with each control device including a control unit and a display device connected with the control unit via a dedicated communication line and being capable of display corresponding to a control state of the control unit. The display device includes a communication port connected with a control unit and a communication port connected with a data processing device, and a data processing section. Further, the data transmission method includes a dedicated protocol communication transmitting data with a processing device and a common protocol communication transmitting data with another processing device. In addition, the control-host computer used in the control system includes a control unit controlling a control target and a display device.
Unsolicited message diverting communications processor
The spam blocker monitors the SMTP/TCP/IP conversation between a sending message transfer agent MTA—0 and a receiving message transfer agent MTA—1; catches MTA—0's IP address IP—0, MTA—0's declared domain D—0, from-address A—0; and to-address A—1; and uses this source and content based information to test for unsolicited messages. It interrupts the conversation when MTA—0 sends a RCPT command and uses the various test results to decide if the message is suspected of being unsolicited.If the message is suspected of being unsolicited and to-address is not in the save_spam database then the spam blocker logs the rejected message, sends an error reply to MTA—0 which forces MTA—0 to terminate the connection before the body of the message is transmitted. If the message is suspected of being unsolicited and to-address is in the save_spam database then the spam blocker logs the rejected message, substitutes a diversion address A′—1 for the to-address A—1 in the RCPT command, and send the modified RCPT command to MTA—1 and allows the conversation to continue. If the message is not suspected of being unsolicited then the spam blocker logs the allowed message, releases the intercepted RCPT command which allows the conversation to continue.
License management system and method with license balancing
A system for balancing a distribution of allocations for protected software over a communication network is disclosed. The system is comprised of at least one client computer and a pool of license servers coupled to the communication network. The client computers request authorizations to use the protected software, while a distribution of allocations is managed among the pool of servers for tracking and managing available allocations for using the protected software. One license server in the pool is designated as the current leader server. When a particular license server does not have a selectable minimum amount of available allocations, the current leader server re-assigns, where possible, the allocations within the pool by updating memory containing the distribution tables of license servers in the pool, to give at least one additional allocation to the particular license server.
Communication parameter setting method, setting server, and setting program
A setting server connected to a network for use in communication service outputs, to a user terminal provided on a user side, an interface on-screen image for inputting the communication parameters. The setting server accepts an input of user communication parameters from the interface on-screen image. The setting server connects to a communication apparatus on the side of a service provider that provides the communication service. Further, the setting server sets the user communication parameters to the communication apparatus.
System and method for operating a networked software application on a network with sporadic connectivity
A system and method for operating a networked software application on a network with sporadic connectivity is disclosed. A user may create in a client application on a user device business data transmission. The client application may transmit the order to a proxy module. A network detection module may check whether a network connection to a backend software application is available. If the network connection is available, the proxy module may transmit the order to a backend software application. The business data may be saved in the persistency module as it is being transmitted to the server. Otherwise, the proxy module may save the order in a persistency module. A middleware application may create a client specific subset of a set of master data stored with the backend software application. The middleware application may send the client specific subset to the proxy module. The proxy module may store the client specific subset in the persistency module to be used by the user in creating the order.
Method and system for file-system based caching
A method and system for file-system based caching can be used to improve efficiency and security at network sites. In one set of embodiments, the delivery of content and storing content component(s) formed during generation of the content may be performed by different software components. Content that changes at a relatively high frequency or is likely to be regenerated between requests may not have some or all of its corresponding files cached. Additionally, extra white space may be removed before storing to reduce the file size. File mapping may be performed to ensure that a directory within the cache will have an optimal number of files. Security at the network site may be increased by using an internally generated filename that is not used or seen by the client computer. Many variations may be used is achieving any one or more of the advantages described herein.
Service control architecture
A system, method and computer program product are provided for affording intention-based, context-sensitive services to mobile users. First provided is a database. Also included is a profiler module coupled to the database. The profiler module is adapted for collecting a state of a user along with profile information. Such profile information includes an identity, location, available services per location, devices per location, and/or security per location. In use, the profiler module communicates the profile information to the database for storage therein.
System and method for controlling transmission of data packets over an information network
An apparatus for controlling transmission of data packets in an information network comprises a Regional Transaction Processor (RTP) operable to communicate with a Data Enabling Device (DED) and at least one workstation. The DED searches data packets for content match information. The RTP includes instructions to generate information to include in a prompt to be presented at the workstation when the content match information is detected in at least one of the data packets. The prompt is based on information in the data packet. Transmission of the data packets through the information network is suspended by the DED until a response to the prompt is received that authorizes downloading the data packets to the workstation. If transmission of the data packets to the workstation is not authorized, the data packets are discarded by the DED.
Apparatus and method for detecting anomalous traffic
An apparatus and method for detecting anomalous traffic are provided. More particularly, an apparatus and method for detecting anomalous traffic based on entropy of network traffic are provided. The apparatus of detecting anomalous traffic includes: an entropy extraction module for extracting entropy from network traffic; a visualization module for generating an entropy graph based on the entropy; a graph model experience module for updating a graph model for each network attack based on the entropy graph; and an anomalous traffic detection module for detecting anomalous traffic based on the entropy graph and the graph model for each network attack and outputting the detection results to a user. In the apparatus and method, anomalous traffic is detected based on network entropy rather than simple statistics based on the amount of traffic, so that a false alarm rate of the apparatus for detecting anomalous traffic can be reduced.
Content display monitor
The invention can enable monitoring of the display of content by a computer system. Moreover, the invention can enable monitoring of the displayed content to produce monitoring information from which conclusions may be deduced regarding the observation of the displayed content by an observer. The invention can also enable monitoring of the display at a content display site of content that is provided by a content provider site over a network to the content display site. Additionally, the invention can enable the expeditious provision of updated and/or tailored content over a network from a content provider site to a content display site so that the content provider's current and appropriately tailored content is always displayed at the content display site. Aspects of the invention related to transfer of content over a network are generally applicable to any type of network. However, it is contemplated that the invention can be particularly useful with a computer network, including private computer networks (e.g., America Online™) and public computer networks (e.g., the Internet). In particular, the invention can be advantageously used with computer networks or portions of computer networks over which video and/or audio content are transferred from one network site to another network site for observation, such as the World Wide Web portion of the Internet.
System and method for reliable peer communication in a clustered storage system
A system and method for reliable peer-to-peer communication is provided. The system and method includes a cluster connection manager that acts as a unified resource for opening, closing and maintaining peer-to-peer communication channels between applications executing on storage systems comprising a storage system cluster. The cluster connection manager communicates with cluster connection manager clients to maintain and manage the communication channels. The cluster connection manager may also be operatively interconnected with a plurality of cluster interconnect devices, thereby enabling failover operation in the event that a cluster interconnect device suffers an error condition.
Method and system for presenting a single view of content in a home network
A system for providing single view of content in a network of devices includes a communication module that detects devices connected to the network, a directory module that discovers content in each detected device via the communication module and maintains a directory of such available content providing a single view of the discovered content for access thereto, and a content manager that provides access to the single view.
Traffic management in digital signal processor
A method and technique of managing network traffic using a digital signal processing integrated circuit (DSP). The DSP performs one or more of the following functions on the incoming network traffic: classification, policing, congestion control, segmentation and reassembly, queuing, scheduling, shaping and label switching. The DSP may have one or a plurality of processing cores. In one embodiment of the invention, each processing core of the DSP is dedicated to specific traffic management layer. The DSP, used in management of network traffic, provides quality of service (QoS) or class of service (CoS) control.
Method and Internet Protocol Television (IPTV) content manager server for IPTV servicing
There is provided a method and an Internet Protocol Television (IPTV) content manager server for IPTV service. The server comprises a Real Time Streaming Protocol (RTSP) stack adapted to request an establishment of a first RTSP session with an IPTV media server responsive to an IPTV service request from an Internet Protocol Television Terminal (ITF). The RTSP stack stores an identifier of the first RTSP session responsive to the request for the establishment of the RTSP session. Subsequently, the RTSP stack receives an RTSP session initiation message from the ITF requesting an establishment of an RTSP session. Upon receipt of the message, the content manager server authenticates the message, determines the existence of an existing RTSP session for the ITF, and thus acts to discard the session initiation message received from the ITF and to return the identifier of the first, already established, RTSP session.
Consistent data storage subsystem configuration replication
Consistency for replicating data storage subsystem configurations in accordance with a “golden” configuration file. A data storage subsystem comprises a blade system with a plurality of slots, the blade system configured to support a plurality of blades and a storage system, each arranged in a predetermined slot of the blade system. The storage system arranges a logical configuration of the server blades in accordance with a “golden” configuration file. The server blade slot versus WWN information is collected and provided to the storage system. The storage system converts the “golden” configuration file slot information to WWNs. The server blades are enabled for access to said storage system as they log on with WWNs in accordance with the “golden” configuration file.
Method and apparatus for reducing client-server messages associated with opening a file
A method is disclosed for reducing client-server messages. A first request to open a file is received. The first request includes first information that indicates a first access mode for opening the file. The first information is modified to indicate a most extended access mode for opening the file. The first request with the modified first information is sent to a file server that manages access to the file. A first response is received. The first response comprises second information which indicates a specific access mode for opening the file that is granted by the file server. The second information is stored in a cache. In response to a second request to close the file, the closing of the file is delayed.
Message stream analysis for spam detection and filtering
A system and method are described for performing a correlative statistical analysis on a stream of email messages to identify new spam campaigns. For example, a method according to one embodiment of the invention comprises: extracting a series of patterns from a stream of incoming email messages; performing a correlation between the patterns to identify recurring patterns within the stream of email messages over a specified time period; dynamically updating a spam filtering engine to include a particular recurring pattern if the number of times the particular recurring pattern is detected within the specified time period is above a first specified threshold value.
Presence information sharing method and system
Presence information is shared between a plurality of applications, to grasp a change of presence information of a different kind of application.An IM(X) server 3 receives a notification of a change of presence information from a client A1 (S902), and sends a change notification message for notifying the change of the presence information to a presence server 5 (S906). Then, the presence server 5 sends the change notification message received from the IM(X) server 3 to the IM(Y) server 4 (S908). The IM(Y) server 4 sends the change notification message received from the presence server 5 to a client B2 (S910).
Method and apparatus for a message targeting and filtering database system
A method and apparatus for a message targeting and filtering database system are provided to deliver bulk messages to demographically selected audiences of willing recipients while preserving each recipient's anonymity and control over his private personal data, accomplished by means of a radically distributed database technique in which all operations requiring unencrypted data access are distributed to individual client devices.
Transferring instant messaging (IM) messages
The present disclosure provides for transferring instant messages from one recipient to another recipient. In some embodiments, when an instant messaging (IM) message is received by one recipient, that IM message is conveyed to another recipient.
Organization-based content rights management and systems, structures, and methods therefor
A rights-managed email is provided for sending protected content from a sender to a recipient, whereby the recipient can render the protected content with a corresponding license if the recipient satisfies terms set forth in the license. In the email, a main information portion has a message that the email is rights management protected, and an attachment portion has the protected content. The recipient if enabled can render the protected content in the attachment portion. If not enabled, the recipient can only review the main information portion having the message. The enabled recipient recognizes that the email has the protected content in the attachment portion thereof, discounts the main information portion of the email, and examines the attachment portion of the email and proceeds based thereon to render the protected content in the attachment portion.
Method and apparatus for utility computing in ad-hoc and configured peer-to-peer networks
Executing a program structure by leveraging a peer-to-peer network comprises generating a program structure comprising a plurality of program instructions. A first of a plurality of network peers then executes a portion of the program instructions which initiates the execution of code hosted by said first network peer, where said portion comprising fewer than all program instructions. The first network peer then migrates one or more of the program instructions, together with any requisite data, to at least one other of the plurality of network peer. The at least one other network peer then continues execution of the program structure until one or more of the objections of the program structure are achieved.
Analysis of operations having input and output parameters and relating to network service
The present invention relates to a method of creating a data model for analysis of operations relating to services and to a method for analyzing such a data model. The operations involve parameters, and each operation has at least one input parameter and at least one output parameter. In the a data model there are nodes representing the parameters and directed relations representing the operations, and a directed relation representing an operation connects at least one node representing said at least one input parameter of the operation to at least one node representing said at least one output parameter of the operation. Computer programs and computers for creating or analyzing services using the described data model are also discussed.
Routing and wavelength assignment in optical networks
A method for solving routing and wavelength assignment (RWA) problems for all-optical networks involves formulating a joint optimization problem in which the routing of lightpaths and assignment of wavelengths on links of those routes to the lightpaths is expressed jointly in terms of a single optimization criterion. The method features formulation of the joint optimization problem as a continuous variable optimization problem with a convex constraint set. Integer constraints, for example, related to the fact that any particular lightpath is not permitted to split over multiple routes or over separate wavelengths on a link of its route, are not necessarily represented explicitly by the constraint set. However, the formulation of the objective function is such that although the problem is formulated in terms of continuous optimization variables, optimal solutions to the problem are integer or equivalent to an integer solution, thereby satisfying the integer constraints.
A carry-ripple adder has four summing inputs for receiving four input bits having the significance w that are to be summed, three carry inputs for receiving three input carry bits having the significance w, a summation output for outputting an output summation bit having the significance w, and three carry outputs for outputting three output carry bits having the significance 2w.
Scalable method and system for providing real time indications of currently open documents
A system for providing indications of documents currently opened by members of a group, in which document open and close operations are detected, and conveyed to a server system. The server system receives the document operation messages, and uses them to maintain lists of open documents associated with individual users through records in a user database that also indicate individual users' on-line status. When the server system transmits the on-line status of a user to other users that have an interest in that user (e.g. fellow members of a collaboration team, development project or the like, or user's having entered that user in their buddy list, etc.), an open documents list for that user is included in the message along with his or her on-line status information. The client systems maintain lists of currently accessing users for open documents they have received identifiers of within open documents lists contained in such on-line status messages. As a result, a user can select a user interface view, such as a file directory or other type of interface providing indications of multiple shared documents, and the disclosed system allows the user to quickly determine which documents are currently open by other users in a group.
Techniques for transaction semantics for a database server performing file operations
A method and apparatus for reverting a resource to a prior state in time is provided. Changes are committed to a resource at a particular point in time. After the particular point in time, a request, which may be a file system operation request, to revert the resource to a state prior to the particular point in time is received at a database server. In response to the request, the resource is reverted to the state prior to the particular point in time. The current state of the resource ceases to reflect the plurality of changes. Advantageously, if a requestor creates an incorrect version of a resource, the changes made to a schema-based resource are not compatible with the schema, or the changes of multiple requesters are not compatible with each other, the resource may be reverted to the earlier point in time.
Universal drill-down system for coordinated presentation of items in different databases
A computer readable storage medium includes executable instructions to receive context information specifying dimensional criteria defining a first value in a first data source. A context transfer to a second value in a second data source is generated based upon the dimensional criteria. The context transfer is performed in accordance with a translation model with a translation map for mapping between multiple data sources. The second value is supplied.
System for modeling architecture for business systems and methods thereof
A system and method for generating architecture for a business system is disclosed. The method comprises, in one embodiment, modeling a plurality of viewpoints adapted for describing the architecture of the business system in form of a collection of views and viewpoints and creating a software organization viewpoint adapted for providing architecture guidelines. An exemplary method further comprises creating a first plurality of notations for each of the plurality of viewpoints for describing the plurality of viewpoints and creating a second plurality of notations for capturing design rationale indicative of the first plurality of notations. Furthermore, an exemplary method comprises generating the architecture of the business system using at least one of the plurality of viewpoints or the software organization viewpoint, or at least the second plurality of notations, or combinations thereof.
Erasure coding and group computations using rooted binary and ternary trees
High throughput in data computations and processing is maintained while minimizing latency. A binary tree architecture is provided in which two trees are used simultaneously, and initiation of the trees is staggered to allow for optimal use of bandwidth. These techniques are desirable for erasure codes and other computations where the addition operator is commutative. Additionally, a ternary tree architecture may be used, in which three trees co-exist on the same set of nodes to maintain high throughput while further improving latency.
Transaction and task scheduler
The described implementations relate to efficient scheduling of transactions and tasks. A memory location, address, or variable previously accessed by a blocked entity is observed periodically to determine an appropriate time to wake and retry the blocked entity. If the previous accessed memory location, address or variable changes state, a scheduler wakes the blocked entity and the blocked entity retries processing. A doubly-indexed data structure of blocked entities and memory locations associated with the blocked entities may be used to efficiently determine when a retrying execution would be profitable.
Method and apparatus for controlling access to personally identifiable information
One embodiment of the present invention provides a system that controls access to personally identifiable information (PII) in a database system. During operation, the system receives a request from an application to perform a function which involves accessing information in the database system. In response to the request, the system identifies a purpose that the application has in making request to perform the function. Next, the system uses the purpose to identify a set of attributes in the database system, which are associated with the purpose. The system then determines if any of the identified attributes contain PII. If so, the system enforces access controls while accessing the identified attributes containing PII.
Storing the repository origin of data inputs within a knowledge store
An effective means for building an interlocking trees datastore from multiple data sources that contained within the datastore the knowledge of the origin of the data was needed, and is thus described herein. Should it be desired or necessary to identify the different sources of data within the Kstore data structure, the present invention teaches how an additional field for the origin of the data is created, how the origin of the data is stored in that newly created field, and how the interlocking trees data store takes that field and creates nodes within the structure, therefore embedding the origin information within the knowledge contained in the Kstore data structure.
Systems and methods for server management
Exemplary systems and methods for server management are provided. An exemplary system comprises a plurality of servers, with each server having the ability to access a database or, in some embodiments, be configured to perform a calculation, computation or make a determination of a particular value, values or other information. A communications network delivers queries to each server whereby a look-up table directs query processing by the servers. Further embodiments of the system feature a program logic controller for rebalancing the workload of the network servers. Exemplary methods of processing queries on the system comprise submitting a query to the network, communicating the query to each server in the network and each server looking-up on a look-up table the processing responsibilities of the servers in the network. The query is processed by the server having primary responsibility for processing the query while other the servers monitor query processing. Transmission of a query result to a user typically completes the process.
Phonetic self-improving search engine
The present invention relates to phonetic self-improving search engines. The search engine may include a phonetic database having a plurality of phonetic equivalent formulas stored therein, each of the phonetic equivalent formulas being associated with at least one respective pronounceable unit. After an initial query in a primary database fails to produce a positive result, an error memory database may be queried with a search string to obtain a positive result based on records of previously failed searches which ultimately found a positive result. If no record is found, the search string may be parsed into at least one pronounceable unit. Phonetically equivalent formulas may be applied to the at least one pronounceable unit to create at least one phonetic search string which is re-queried into the error memory database and the primary database. Successful positive results may be stored with the search string in the error memory database.
Multi-dimensional serial containment process
A computer implemented method, an apparatus, and computer usable program product for identifying a defective product is provided. A data processing system identifies a product status for products comprising at least one range of serial numbers. The data processing system then narrows the at least one range of serial numbers using a range flattening algorithm. The data processing system then applies a conditional mask algorithm to the at least one range of serial numbers to narrow the at least one range of serial numbers.
Generating misspells from query log context usage
A method and system to generate variants, including misspells from query log context usage are provided. Usage context obtained from the query logs is utilized to facilitate similarity determination. A Similarity Graph generation process generates a Similarity Graph, which is transformed to provide variants having varying edit distances. The transformed Similarity Graph is loaded into a hash table and provides query corrections in a search engine or related terms when bidding on keyword in an advertising system.
Apparatus, system, and method for efficiently supporting generic SQL data manipulation statements
An apparatus, system, and method are disclosed for efficiently supporting generic SQL data manipulation statements. The method includes determining whether an SQL statement includes extended indicator parameters such as DEFAULT and UNASSIGNED indicators. The method further includes delaying an authorization check for an operation for an SQL statement using extended indicators, and bypassing an SQL exception where an otherwise unauthorized operation involves an UNASSIGNED variable. The method further includes bypassing a database operation such as a referential integrity check where a data change would induce the database operation, but the data change involves an UNASSIGNED variable. The method further includes modifying the SQL statement when the SQL statement involves an UNASSIGNED variable in a predicate clause, allowing the SQL statement to properly execute.
Query framework system and method
A query framework system is provided. The query framework system comprises a query framework service for consuming a query and returning a result set, a provider application programming interface for defining a consistent application programming interface for providers, one or more providers incorporating query processing logic, and a configuration repository for storing the list of the providers in the query framework system and their properties.
System and method for facilitating full text searching utilizing inverted keyword indices
A system and method for facilitating full text searching utilizing inverted keyword indices in shared memory are provided. An inverted keyword index and an inverted keyword attribute index are created from keyword tokens from a set of documents. The keyword indices are stored in a shared memory buffer and accessed by a query processing component. Shared memory pointers corresponding to the indices are dynamically adjusted according to the addressing schema of the query processing component. The query processing component then processes data queries from the keyword indices stored in the shared memory buffer.
Method and system for tracking, evaluating and ranking results of multiple matching engines
The present invention in various implementations provides for a method and system for removing suspect duplicate data in a database having a plurality of datasets for a suspect processing transaction, using a plurality of matching engines, comparing results of matching engines in a logically predetermined comparative assessment, and thereafter providing an ordered priority of results of matching engines to identify suspect candidates.
Determining a weighted relevance value for each search result based on the estimated relevance value when an actual relevance value was not received for the search result from one of the plurality of search engines
A ranked list of search results is received from a search engine based on a search query. A relevance value of a particular search result in the ranked list is estimated based on its rank and based on relevance values and ranks of at least two others of the search results.
Aggregating context data for programmable search engines
Search results are generated using aggregated context data from two or more contexts. When two or more programmable search engines relate to a similar topic, context data associated with the programmable search engines are aggregated. The context is then applied to a query in order to present, in an integrated manner, relevant search results that make use of context intelligence from more than one programmable search engine.
Ranking search results using feature extraction
Methods and computer-readable media are provided for ranking search results using feature extraction data. Each of the results of a search engine query is parsed to obtain data, such as text, formatting information, metadata, and the like. The text, the formatting information and the metadata are passed through a feature extraction application to extract data that may be used to improve a ranking of the search results based on relevance of the search results to the search engine query. The feature extraction application extracts features, such as titles, found in any of the text based on formatting information applied to or associated with the text. The extracted titles, the text, the formatting information and the metadata for any given search results item are processed according to a field weighting application for determining a ranking of the given search results item. Ranked search results items may then be displayed according to ranking.
Ensuring timely servicing of desired transactions in a database server
Ensuring that desired transactions are serviced in a timely manner in a database server. Resources are reserved ahead for transaction classes of interest, and the corresponding information is stored in a resource reservation table. In one embodiment, each transaction instance is admitted for servicing only if the reservation table indicates that sufficient resources are reserved for the transaction at the time instance the transaction is received. Resources may be reserved for specific transaction instances by using a label value, which would be contained in each transaction for which the time slot is reserved.
Concurrent, lock-free object copying
Described is a technology by which a real-time data relocating mechanism is provided for multiprocessing environments, including supporting lock-free programs that run in parallel. The relocating mechanism moves an object by using a status field related to the data field, possibly in an interim (wide) object space, which is then copied to a to-space object. The status information for each data field of the original object contains information indicating where a current version of the data for each field is present, that is, in the original, wide or to-space object. In one example, a handshake mechanism of a garbage collector establishes preparation and copy phases between the mechanism and other threads that determine where memory accesses occur. Also described is support for program thread compare-and-swap (CAS) operations and/or multi-word atomic operations.
Method and system for transparent backup to a hierarchical storage system
A method and system are disclosed for transparent backup to a hierarchical storage system. A data management application requests a backup operation, communicating the request using the Network Data Management Protocol with a tape server and a data server. The tape server generates a unique identifier for the data set. In addition, the tape server transfers the data set from the data server to the hierarchical storage system and sends the identifier to the data management application in response to the request. The identifier identifies the data set within the hierarchical storage system. In a certain embodiment, the tape server stores and manages the data set in locations transparent to the data management application. The tape server and data management application may be logically distinct. The data management application may access the data set through the tape server using the identifier.
Version-controlled cached data store
Described are methods, systems, and apparatus, including computer program products for a version-controlled cached data store. A first node is associated with a first identifier and a first version. A control file is received, where the control file includes information associating a second node with a second identifier and a second version. The first version is compared with the second version when the first identifier and the second identifier are identical.
Method and an apparatus to filter autosupport data
A method and an apparatus to filter autosupport data are presented. In one embodiment, the method includes filtering autosupport data from a storage appliance using criteria provided by a user, with relational integrity of the autosupport data protected. The method may further include exporting the filtered autosupport data to a public network to be uploaded to a portal server over the public network.
System and method for planning and generating queries for multi-dimensional analysis using domain models and data federation
Data integration and data analysis using computing equipment, software as well as hardware, includes a system and method for integrating data from various data sources, structured and unstructured, without physically creating a data warehouse and automatically generating queries for analysis of the integrated data from a multitude of different views.
Computer systems and methods for the query and visualization of multidimensional database
A method and system for producing graphics. A hierarchical structure of a database is determined. A visual table, comprising a plurality of panes, is constructed by providing a specification that is in a language based on the hierarchical structure of the database. In some cases, this language can include fields that are in the database schema. The database is queried to retrieve a set of tuples in accordance with the specification. A subset of the set of tuples is associated with a pane in the plurality of panes.
Holistic dynamic information management platform for end-users to interact with and share all information categories, including data, functions, and results, in collaborative secure venue
A method and system dynamically and contextually manage information in an electronic computational environment. In one aspect, a desired project provides a context for management of a plurality of information elements, each element being in at least one of a plurality of categories. Each category in turn is a member of a category set, and the category set includes data category, function category, and result category. The context corresponds to at least one model that is defined by the elements and a set of rules governing permissible relationships among the elements. The method includes: receiving an input to the environment specifying a relationship among at least two information elements; using an integrity engine, operating to enforce such rules, to verify dynamically correctness of the relationship specified; and upon acceptance of the relation by the integrity engine, storing automatically the relationship specified, so as to permit dynamic interaction with respect to the context. The relation can be specified and implemented on the fly, without a preconceived design process. Related systems are also provided.
Methods and apparatuses to identify devices
Embodiments of the present invention include systems with Readers and Tags in which a Reader queries the Tags with a parameter that includes a level of probability of reply according to which the Tags individually and randomly decide whether or not to reply. In one embodiment, the Tags can switch between two states: A and B. The query command also specifies a state (A or B) so that only the Tags in the specified state can reply. After successfully sending the Tag identification data from a Tag to the Reader, the Tag switches to the other state from the specified state. In one embodiment, the operations about the two states are symmetric. In one embodiment, the Tags can remember the parameters used in a query so that a short form of query command can be used to repeat the query with the same query parameters.
Adaptive sales assistant
A computer-implemented method includes providing one or more initial questions, including a first question, selected from a database of possible questions, where the one or more provided questions are selected based on a sales phase of a sales opportunity. A first response to the first question is received, and one or more additional questions are provided, where each additional question is based at least in part on the first response to the first question. Additional responses to the additional questions are received, and a sales strategy associated with the sales phase of the sales opportunity is provided, where the sales strategy is based at least in part on the first response and the one or more additional responses and the sales strategy includes one or more actions to perform. The one or more included actions are selected from a database of possible actions based on their anticipated ability to increase a likelihood of success of the sales opportunity.
Methods and apparatus for generating decision trees with discriminants and employing same in data classification
Methods and apparatus are provided for generating a decision trees using linear discriminant analysis and implementing such a decision tree in the classification (also referred to as categorization) of data. The data is preferably in the form of multidimensional objects, e.g., data records including feature variables and class variables in a decision tree generation mode, and data records including only feature variables in a decision tree traversal mode. Such an inventive approach, for example, creates more effective supervised classification systems. In general, the present invention comprises splitting a decision tree, recursively, such that the greatest amount of separation among the class values of the training data is achieved. This is accomplished by finding effective combinations of variables in order to recursively split the training data and create the decision tree. The decision tree is then used to classify input testing data.
Memory assistance system comprising of a signal processing server receiving a media signal and associated data relating to information to be remembered and processing the input signal to identify media characteristics relevant to aiding user memory
Methods and systems for enhancing and/or improving one's memory are disclosed. In one embodiment of the invention, a computer-implemented memory assistance system is comprised of a client and a memory assistance server. The memory assistance server includes a signal processing server to receive and process media signals (e.g., audio, video, or photographs) and associated data received from the client. The signal processing server includes a variety of servers or services for processing signals and/or data. Each signal processing server or service identifies characteristics of the received media signal that are relevant to aiding a user in recalling and/or reinforcing an existing memory of a particular event or fact. In addition, the memory assistance server includes presentation logic to generate one or more media clips from the received media signal. Furthermore, the presentation logic determines a time and medium to present one or more media clips to a user so as to aid the user in recalling and/or reinforcing one or more existing memories of a particular event or fact.
Use of sequential nearest neighbor clustering for instance selection in machine condition monitoring
A method is provided for selecting a representative set of training data for training a statistical model in a machine condition monitoring system. The method reduces the time required to choose representative samples from a large data set by using a nearest-neighbor sequential clustering technique in combination with a kd-tree. A distance threshold is used to limit the geometric size the clusters. Each node of the kd-tree is assigned a representative sample from the training data, and similar samples are subsequently discarded.
Apparatus, method and product for optimizing software system workload performance scenarios using multiple criteria decision making
The present technique is an apparatus and method evaluating software performance. The method identifies performance scenarios using a knowledge base and selects the performance scenarios from a context module using operational laws. The system analyzes performance criticality of an application workload. Furthermore, the system comprises a context module that ranks the performance criterions depending on the input and the knowledge base stores and retrieves the performance criterions using the operational laws. The knowledge base comprises the criterions and their relevant ranks based of the application context. The present technique automates classification of performance criterions into benefit and cost categories with the usage of the operational laws.
Processing mixed numeric and symbolic data encodings using scaling at one distance of at least one dimension, clustering, and a signpost transformation
An apparatus and method for processing mixed data for a selected task is provided. An input transformation module converts mixed data into converted data. A functional mapping module processes the converted data to provide a functional output for the selected task. The selected task may be one or a combination of a variety of possible tasks, including search, recall, prediction, classification, etc. For example, the selected task may be for data mining, database search, targeted marketing, computer virus detection, etc.
Network management system utilizing a neural network
Preferred embodiments of the invention provide systems and methods to observe one or more network elements associated with a network, receive an indication of an event relating to one or more network element configurations associated with the network, observe a potential outcome associated with the network, store the potential outcome such that the potential outcome is associated with the event, determine a probable outcome based on the potential outcome and store the probable outcome such that the probable outcome is associated with the event.
Consistent weighted sampling of multisets and distributions
Techniques are provided that identify near-duplicate items in large collections of items. A list of (value, frequency) pairs is received, and a sample (value, instance) is returned. The value is chosen from the values of the first list, and the instance is a value less than frequency, in such a way that the probability of selecting the same sample from two lists is equal to the similarity of the two lists.
System and method for verifying digital signatures on certificates
A system and method for verifying a digital signature on a certificate, which may be used in the processing of encoded messages. In one embodiment, when a digital signature is successfully verified in a signature verification operation, the public key used to verify that digital signature is cached. When a subsequent attempt to verify the digital signature is made, the public key to be used to verify the digital signature is compared to the cached key. If the keys match, the digital signature can be successfully verified without requiring that a signature verification operation in which some data is decoded using the public key be performed.
Method for discouraging the distribution of illegal copies of computer programs over file sharing networks
Special CD-keys are generated so as to have special patterns recognizable by compliant installer programs, which require special actions to be taken by the compliant installer programs when recognized. Since the special patterns are different than those used for valid CD-keys, non-compliant installer programs will treat them as invalid CD-keys and refuse to install any computer programs for which the invalid CD-keys are provided. The special CD-keys are included in text files that have associated metadata indicating that they are for installing copies of computer programs to be protected. The text files are then offered by agent computers for downloading on file sharing networks.
System and method for revenue sharing for multimedia sharing in social network
When a person uses a first portable music player to wirelessly transmit a tune to a person with a second player in a social networking transaction for playing by the second player for a limited time, if the second person subsequently purchases an unrestricted version of the tune, the first person is compensated.
Self service terminal
A method of operating a self service terminal (SST) (12) is described, in which the SST (12) detects characteristics of a mobile computing device held by a user (16), and configures the user interface dependent on the detected characteristics. The characteristics may include features of the mobile device, such as communication facilities, or may include user identification information. Where the user is identified, a user profile may be retrieved from a remote SST operator (14). Certain embodiments of the invention may detect devices held by a second or subsequent user (18), and retrieve the relevant user profile prior to the second user (18) interacting with the SST (12).
Electronic payment methods
In an electronic payment method, the payer transmits to an authentication agency details of a proposed payment including an identifier associated with the payer, an identifier associated with the payee, and the payment amount. The authentication agency creates an authentication code relating to the payment and transmits it to a communications device associated with the payer. The payer receives the authentication code on the payer's communications device and transmits it, together with a secret identification code, back to the authentication agency. The authentication agency verifies the authentication code and the secret identification code and authorizes payment. Thereafter, a customer agency pays the payment amount to the payee.
Method of facilitating participation in lotteries
A method and system are presented for selectively entering lottery entries into a state lottery drawing via an internet web site, the method includes the initial step of entering the home page of the web site. There is querying of users for their sign-in identification to establish whether they are pre-registered user members or non-members. Pre-registered user members are presented with a choice of member functions and content as to account information, and selection of a game to be played. Non-members are presented with a choice of different functions and content including the ability to establish an account. Both members and non-members may access functions and content including information relating to gambling addiction, and descriptions of the games that may be played.
Systems and methods for automatic submission, audit and adjustment of mortgage insurance claims
Systems and methods are described for automatically processing mortgage insurance claims. In one described system, a central server computer receives inputs from, and provides outputs to, a servicer terminal connected into a network. The servicer terminal captures data from a servicer submitting a mortgage insurance claim. A claims database is connected into the network, containing data relating to the mortgage insurance claim. A claim audit rulebase is connected into the network, for automatically performing an audit and adjustment of the submitted mortgage insurance claim. The system automatically provides results of the audit and adjustment to the servicer at the servicer terminal, and presents the servicer with an option to interact with a claim representative to resolve any issues.
Trading system with internal order matching
Presented is a computer-based system for exchange order routing over a communication network which includes a client terminal configured to provide an end-user interface between the client terminal and a first server, the interface providing a template for building an order routing strategy including a stipulation string, and to submit one or more orders and the order routing strategy to the first server. A program executable within the communication network to implement the routing strategy by crossing the order on a first electronic exchange, and placing order liquidity on respective second electronic exchanges. A method implements the order routing strategy by receiving an order and a routing strategy containing a stipulation string having parameters of predetermined criteria, a first phase order processing allocates a first order quantity to a crossing location, a second phase order processing allocates a second order quantity to an idle location.
Computer software and system for automatic stock dealings
A computer readable medium is configured with instructions for causing a first computer system connected to a computer system of stock exchange market via a data communication network to automatically place a series of stock trade orders. The first computer system can include, for instance, a user computer, a brokerage computer, or both. An automated system for systematically and repeatedly placing stock trade orders based on predetermined conditions is also provided. In general, the automated system or computer system running the software operates by receiving and storing an automatic stock trading condition. A stock trading order can be placed immediately following a previously contracted order, or when a stock market status satisfies the preset stock trading condition. The first computer system preferably receives user input including basic information such as an item code of the stock and an account number of a stockholder. Automatic trade condition information can also be input into the first computer system by the user or a broker and preferably provides information for determining a desired selling price and quantity and/or a desired purchasing price and quantity for trading of the stock. Market data, preferably including the stock price is received into the first computer system via the data communication network, such as from the stock exchange market computer system. The first computer system can then determine whether a stock purchase or sale condition generated using the automatic trade condition information has been met and place a stock purchase or sale order via the data communication network when the stock purchase or sale condition is met. This system can systematically repeat the process using the automatic trade condition information as a guide for trading. The process can be repeated continuously or can be stopped when a predetermined condition is satisfied.
System and method for making positions held by a trader fungible
Positions held by a trader are made fungible by selecting a first position in a first futures contract that is deliverable and selecting a second position in a second futures contract, wherein the first and second futures contracts are traded in a first and second market, respectively. Offsetting the first and the second positions eliminates a delivery obligation of the trader.
Method and system for providing principal protection exposure to equity markets
Various embodiments of the present invention relate to methods and systems for providing principal protection exposure to equity markets. More particularly, one embodiment of the present invention relates to a computer implementable method for performing data processing operations associated with providing principal protection exposure to an equity market, comprising the steps of: carrying out a sale of a trust certificate to generate proceeds, which sale is from a trust to a first entity; allocating a portion of the proceeds of the sale of the trust certificate to a purchase of an equity security, which purchase is by the trust from the equity market; and allocating a portion of the proceeds of the sale of the trust certificate to a purchase of a put option on the equity security, which purchase is by the trust from a second entity; wherein the sale of the trust certificate to the first entity, combined with the purchase of the equity security by the trust and the purchase of the put option by the trust, provides the first entity principal protection exposure to the equity market without causing substantial income statement volatility.
Branch on bid searching method and apparatus
In a multi-unit combinatorial auction, reverse auction, or exchange, a number of bids can be received, with each bid including one or more items and for each item a desired quantity thereof. Each bid also includes a price. A number of unique combinations of bids can be formed from the received bids, and the one combination of bids which represents the best value in terms of an auction setting, a reverse auction setting and/or an exchange setting can be determined. Thereafter, the bids forming this combination can be declared the winning bids of the auction, reverse auction or exchange.
System and method for web trading
The present invention relates to a web trading system and method for performing financial transactions securely over a public data network, such as the Internet, using a web browser as the user interface. The financial transactions are offered, for example, by a financial institution to its customers at the institution's web site. They include transactions such as foreign currency exchange, currency and money market trades, and warrant trades. The web trading system and method provide secure communication protocol between the Internet user interface and a virtual private network (VPN) of a financial institution to enable implementation of trading applications by the financial institution's application servers across the VPN. Security for the financial transactions is provided by the web trading systems and software downloaded to the customer's personal computer (PC) and includes encryption, authentication, authorization, message and transaction integrity capabilities, registration authority, handshake protocol, and firewalls.
Software application portfolio management for a client
An information technology services providing company manages a portfolio of software applications for a client company. A plurality of the applications are preselected along with a recommendation for each. The recommendations have value drivers with parameters. Values for the parameters are received from the client as responses to questions or through collaboration with the client. A business value is then determined for the value drivers using the parameter values. Total cash flow, return on investment, net present value, internal rate of return, or other financial measures may be calculated. The client decides to proceed with the recommendations and the services providing company delivers services and software according to the recommendations.
System and method for analyzing tax avoidance
A system and method are provided for analyzing tax avoidance of a taxpaying entity. A taxpaying entity's financial information may be analyzed and used to compute a set of one or more financial ratios based at least in part on the entity's return on assets, capital, sales, and/or operating expenses. Those ratios may be compared to corresponding ratios for related firms operating in a predefined industry to identify whether the taxpaying entity engages in tax avoidance. The level of the taxpaying entity's tax avoidance may be calculated from analysis of the taxpaying entities controlled transactions. An adjusted tax liability may be produced after re-distribution, re-apportioning, or re-allocation of income, deductions, credits, or allowances.
System and method for voice over IP (VoIP) support for computer-implemented processes
System and method for providing customer support via Voice Over Internet Protocol (VoIP) for particular aspects of tax programs and other computer-implemented processes. Different areas of tax preparation may be identified as different modules in the tax program. After selecting a module, a user of the tax program may select a particular document or particular field on a document that the user may need assistance with. A user interface may provide one or more mechanisms whereby the user may access VoIP support targeted at the particular aspect (e.g., module, document, or field). By enabling users to select particular aspects of the tax program and to invoke VoIP support for aspects at which support is needed, embodiments may enable users to sort themselves into queues targeted at the particular aspects for which support is needed before contacting the vendor's support system.
Integrated on-line and on-site auctioning system including audio and/or video capabilities
A remote bidding supplement for traditional-style live auctions, comprising an audio/video system for streaming instantaneous and buffer-free live audio and video data from a live auction site to one or more remote auction bidders having a bidding device for receiving the data and for transmitting instantaneously remote auction bids for each item being auctioned at the live auction site; a clerk system for controlling and accepting auction bids received at the live auction site from onsite auction bidder and from remote auction bidders for each item being auctioned at the live auction site; a marquee system for displaying instantaneously at the live auction site auction bid information, including accepted auction bids, for each item being auctioned at the live auction site; and a bid system for broadcasting instantaneously to all remote auction bidders and to the marquee system the auction bid information for each item being auctioned at the live auction site, for receiving instantaneously auction bids from each remote auction bidder for each item being auctioned at the live auction site and for transmitting instantaneously to the clerk system each remote auction bid received for each item being auctioned at the live auction, and for broadcasting instantaneously to all remote auction bidders and to the marquee system the onsite and remote auction bids that have been accepted by the clerk system.
Method and system for facilitating browsing of an electronic catalog of items
An electronic commerce system provides various features for assisting customers in locating items and generating orders from a merchant's electronic catalog, and for assisting customers and merchants in communicating about such orders. A user-definable categories feature allows customers and/or merchants to define search queries for searching the electronic catalog, and to store these search queries under user-defined category names for subsequent use. An “active quote” feature allows the customer to view and modify quantities of items selected for prospective purchase throughout various catalog browsing or viewing modes. A message audit trail feature allows a customer and a merchant to send messages to one another that are linked to a particular order, and to view an order-specific log of such messages.
Electronic retail order communication
Multiple users are provided the ability to add or modify items in an open order created by an originating user on an electronic retail system. The originating user has the ability to verify and authorize a final purchase order that is submitted to the retail system. The originating user forwards an open order to other users, who are then allowed to add to the order, such as by adding items to a shopping cart. In a tandem browsing mode, other users are invited to observe the interaction of the originating user with an electronic retail system and modify an order for approval by the originating user.
Wireless payment mat device and method for retail environments
The present invention relates to a payment mat that wirelessly communicates with a payment device for payment of items, such as goods and/or services, in a retail environment. A customer presents the payment device within the radiation range of an antenna contained in the payment mat for payment. The payment mat may also include a visual indicator, audio indicator, keypad, transaction display, advertising display, receipt printer, and transaction card reader. The payment mat may be constructed out of a rigid or flexible material. The payment mat may be placed flat on counters in retail stores, nearby cash registers or order entry devices. The payment mat may be placed on drive-thru windows in retail environment, such as quick service restaurants (QSR) or pharmaceutical stores. The payment mat may be placed behind a secure order entry window.
Feedback cancellation in a network-based transaction facility
A method and apparatus for canceling feedback in a network-based transaction facility are described. In one embodiment, the method includes receiving a request to cancel feedback pertaining to a transaction in a network-based transaction facility from a first party to the transaction, determining whether feedback cancellation criteria are satisfied, and canceling the feedback pertaining to the transaction if the feedback cancellation criteria are satisfied.
Method and system for insuring club membership fees
A method for insuring initiation fees includes receiving information pertaining to an entity and a member, receiving information pertaining to the initiation fee, and processing the received information to determine whether to approve an insurance benefit for the initiation fee of the member. A system for implementing an insurance program for club initiation fees includes at least one user device and a server connected to the user device. The server is configured to receive, via the at least one user device, information pertaining to an initiation fee insurance program. The server is also configured to process the received information and transmit information to the user device regarding whether the initiation fee insurance application has been accepted or rejected.
Integrated medical software system
A medical management system is provided that integrates all aspects of healthcare provider practice management and managed care, including schedule management, patient registration, insurance information, EMR and billing and collections. The system integrates a central framework module, a scheduling module, a registration module, an account management module and an electronic record module to provide a seamless exchange of information. A clinical module provides template builder which allows the users to define a customized template. The custom and standard templates are used by a document builder to generate documents, such as progress notes and H&P notes, which are retained in the patient's electronic chart. The progress note template allows the clinician to record a patient encounter by presenting the clinician with predefined sections and sentences that are easily completed by the clinician during or after the patient encounter. The templates and documents generated are designed to closely resemble a paper chart. Information gathered during patient scheduling and triage are referenced to pre-populate the templates to avoid having the clinician entering redundant information. The documents are relied upon to automatically generate patient superbills and electronic requests are sent to a claims clearinghouse.
System and method for managing a patient with chronic disease
A system, method and apparatus for managing a patient affected with a disease. In one aspect, the invention is directed to an apparatus for managing a patient, the apparatus comprising a system that provides: A) a means for enrolling a patient into a system including storing general information about the patient into the system's database; B) a means for storing a schedule for the patient; C) a means for reminding the patient to execute the patient care activities; D) a means for retrieving patient information comprising responses to side effects questionnaires and laboratory results; E) a means for storing the patient information into the system; F) a means for analyzing the patient information and generating a recommendation; G) a means for submitting the recommendation to a provider for approval; and H) a means for receiving approval or a modified recommendation and sending the recommendation or modified recommendation to the patient.
System and method for implementing medical risk algorithms at the point of care
In a further aspect of the invention, the calculated results may be communicated as a graphical output 196, such as is illustrated in FIG. 27. The graphical output 196 may be accessed by pressing a graph report button 198 on the report output dialog box (FIG. 26). The graphical output 196 is useful to further illustrate to the physician and the patient the changes in the calculated risk value over time, and in relation to the cholesterol levels. The graphical output 196 is also useful as a further tool in enabling a patient to understand the relationship between their health habits and the associated risk factor, and in encouraging the patient to participate in their own medical decision making.
Method and system for evaluating a physician's economic performance and gainsharing of physician services
The invention relates to a method and system of physician economic performance evaluation in which the relative medical difficulty associated with patients admitted by a particular physician is determined and, given that measurement, judgments made concerning the relative amount of inpatient resources that the physician required. Also, one application of the present invention relates to a method for gainsharing of physician services using a surplus allocation methodology for rewarding physicians in relation to their performance. An incentive pool is determined from previous patient claims and payments made to physicians in advance, such as in a base year. Best practice norms are established for a plurality of classified diagnosis groups. In one embodiment of the present invention, the classified diagnosis related groups are adjusted for severity of illness to compensate for actual clinical challenges faced by individual physicians. The best practice norms can be used in the surplus allocation method for determining physician performance. The incentive is established proportional to the relationship between a physician's individual performance and the best practice norm.
Managing patient bed assignments and bed occupancy in a health care facility
An integrated health care delivery network with enabling software and network technology to maximize bed resources, manage varying census levels, and avoid patient diversions through real-time monitoring, automation and communication, is disclosed. Preferably, the present invention is embodied in a bed management system that interfaces with and complements existing Admission/Discharge/Transfer (ADT) systems. The bed management system is an easy-to-use business intelligence application that is designed to allow administrators, clinicians and managers to easily access, analyze and display real-time patient and bed availability information from ancillary information systems, databases and spreadsheets. It enables users to see trends and relationships in hospital (bed) management data directly from their desktop personal computers.
Method of permitting group access to electronically stored images and transaction card used in the method
A method of storing and viewing a collection of digital images includes the steps of: providing a plurality of users with a unique user ID associated with a URL identifying a network photoservice provider; providing each one of the plurality of users with a separate password to the unique user ID; at least one of the plurality of users transferring a set of digital images to the unique user ID employing their separate passwords; and viewing the images located at the unique user ID using the separate password.
Patent-related tools and methodology for use in the merger and acquisition process
The present invention is related to patent-related tools, and methodologies involving those tools, for assisting in all stages of the merger and acquisition process. The IPAM server may be used in conjunction with the tools and methodologies to aid in the merger and acquisition process. These tools or methods include, but are not limited to, a topographic map, a technology classification, a SIC classification, a radar diagram, a patent citation tree, a citation root tree, a citation count report, a citation frequency graph, a citation frequency report, a patent count/year, an application count/year, a patent aging graph, a U.S. primary class/subclass, an international patent class, an assignee patent count report by primary class/subclass, a patent count graph by number of patents, a top assignees primary class/subclass by percent of total, a months to issue patents, a features grouping, a document annotation, an inventor patent count/assignee, an inventor patent count graph, and inventor data.
Method, apparatus and computer program product for providing adaptive language model scaling
An apparatus for providing adaptive language model scaling includes an adaptive scaling element and an interface element. The adaptive scaling element is configured to receive input speech comprising a sequence of spoken words and to determine a plurality of candidate sequences of text words in which each of the candidate sequences has a corresponding sentence score representing a probability that a candidate sequence matches the sequence of spoken words. Each corresponding sentence score is calculated using an adaptive scaling factor. The interface element is configured to receive a user input selecting one of the candidate sequences. The adaptive scaling element is further configured to estimate an objective function based on the user input and to modify the adaptive scaling factor based on the estimated objective function.
Method for quantifying an ultra low-rate speech coder
A method of coding and decoding speech for voice communications using a vocoder with very low bit rate includes an analysis part for the coding and the transmission of the parameters of the speech signal and a synthesis part for the reception and the decoding of the parameters transmitted and the reconstruction of the speech signal. The method comprises: grouping together the voicing parameters, pitch, gains, LSF coefficients over N consecutive frames to form a superframe, and performing a vector quantization of the voicing information in the course of each superframe by formulating a classification using the information on the chaining in terms of voicing existing over 2 consecutive elementary frames.
Coding an audio signal of a sequence of audio values into a coded signal includes determining first and second listening thresholds for first and second blocks of audio values of the sequence of audio values; calculating versions of first second parameterizations of the parameterizable filter such that the transfer function thereof roughly corresponds to the inverse of the magnitude of the first and second listening thresholds, respectively; filtering a predetermined block of audio values of the sequence of audio values with the parameterizable filter using a predetermined parameterization which depends on the version of the second parameterization to obtain a block of filtered audio values corresponding to the predetermined block which is quantized; forming a difference between the versions of the first and second parameterizations; integrating information on, inter alias, the difference into the coded signal.
Learning edit machines for robust multimodal understanding
A system and method are disclosed for processing received data associated with a grammar. The method comprises receiving input data having a characteristic that the input data cannot be assigned an interpretation by a grammar, translating the input data into translated input data and submitting the translated input data into the grammar. The transducer coerces the set of strings encoded in a lattice resulting from recognition (such as speech recognition) to the closest strings in the grammar that can be assigned an interpretation.
Method and apparatus for natural language translation in a finite domain
A method and apparatus are provided for performing natural language translation in a finite domain, e.g., where the finite domain describes a specific subject area or field of use. In one embodiment, a method for translating user input relating to a finite domain includes receiving user input in a source language and translating the user input into a target language in accordance with the finite domain. In some embodiments, the resultant output is substantially grammatically correct and/or sociolinguistically appropriate.
Method for modeling a reservoir using a 3D wettability map generated from a wettability logging tool
A method is disclosed for modeling a reservoir, comprising: receiving a set of wettability logs from a wettability logging tool adapted to be disposed in a wellbore; generating a wettability map in response to the wettability logs; generating a gridded simulation model, the gridded simulation model including a plurality of grid cells; determining, for each grid cell of the gridded simulation model, a local value of wettability from the wettability map; determining, for each grid cell of the gridded simulation model, a permeability model and a capillary pressure model from the local value of wettability associated with each grid cell; and generating a set of simulation results representing characteristics of the reservoir.
Simulation condition input apparatus, computer readable medium, simulation condition input method and computer data signal
A simulation condition input apparatus inputs information required for simulation analysis on a system including plural element members. The apparatus includes a display unit, a specifying unit and an input unit. The display unit displays the plural element members on a screen with geometrical shapes corresponding to the element members. The specifying unit specifies a contact portion between at least one set of the element members, which is an information input target, on the screen of the display unit. The input unit displays a new window screen and inputs information about a contact state of the contact portion specified by the specifying unit.
Condensing unit configuration system
A system and method for configuring a condensing unit for a cooling system includes inputting one of a cooling system characteristic, a condensing unit characteristic and a compressor characteristic for the cooling system, applying embedded design rules and accessing a condensing unit database of component attributes and their relationships. A base condensing unit is determined based on the one of a cooling system characteristic, a condensing unit characteristic and a compressor characteristic for the cooling system. The method further includes selecting various accessories of the condensing unit for customizing the base condensing unit based on the particular application.
Multidimensional process corner derivation using surrogate based simultaneous yield analysis
A system and method for deriving semiconductor manufacturing process corners using surrogate simulations is disclosed. The method may be used to determine individual performance metric yields, the number of out-of-specification conditions for a given number of simulation samples, and a total yield prediction for simultaneous multi-variable conditions. A surrogate simulation model, such as a Response Surface Model, may be generated from circuit simulation data or parametric data measurements and may be executed using a large number of multi-variable sample points to determine process corners defining yield limits for a device. The model may also be used to simulate process shifts and exaggerated input ranges for critical device parameters. In some embodiments, the derived process corners may better represent physically possible worst-case process corners than traditional general-purpose process corners, and may address differences in process sensitivities for individual circuits of the device.
Method for process monitoring in a utility system
A process monitoring method that aggregates monitoring devices and optionally sensors into one or more groups that are each related to a process of a utility system. The monitoring devices are organized into a monitoring system hierarchy manually or automatically. A process algorithm determines from the hierarchy which monitoring devices are connected to a load. Monitored data from load-connected monitoring device pairs are correlated to produce a correlation coefficient that is compared against a correlation threshold selected between 0 and 1. When the correlation coefficient exceeds the threshold, the device pair is grouped into a process group. Other device pairs exceeding the threshold are likewise grouped into the process group. Multiple processes may be determined with the process algorithm. Sensors may also be grouped manually with the process group containing monitoring devices, which may include virtual monitoring devices. Alarms associated with monitoring devices and sensors are aggregated into one process alarm.
Strategies for identifying anomalies in time-series data
A strategy is described for identifying anomalies in time-series data. The strategy involves dividing the time-series data into a plurality of collected data segments and then using a modeling technique to fit local models to the collected data segments. Large deviations of the time-series data from the local models are indicative of anomalies. In one approach, the modeling technique can use an absolute value (L1) measure of error value for all of the collected data segments. In another approach, the modeling technique can use the L1 measure for only those portions of the time-series data that are projected to be anomalous. The modeling technique can use a squared-term (L2) measure of error value for normal portions of the time-series data. In another approach, the modeling technique can use an iterative expectation-maximization strategy in applying the L1 and L2 measures.
Delay line calibration
A tunable delay line is calibrated to maintain the delay of the delay line at a desired value or within a desired range of values. In some aspects a signal is passed through a delay line multiple times so that the cumulative delay of the signal through the delay line (e.g., as indicated by a count) may be calculated over a period of time. The count is compared with an expected count and, based on this comparison, the delay of the delay line is adjusted as necessary. In some aspects the signal may comprise a digital signal. In some aspects a delay through a delay line may be calculated based on analysis of amplitude changes in a signal caused by a phase shift imparted on the signal by the delay line. In some aspects a delay line is incorporated into a transmitted reference system to generate and/or process transmitted reference signals.
Sensor apparatus having sensor element
A sensor apparatus is disclosed. A sense circuit is provided to convert inputted physical quantity to electrical signal. An amplifier amplifies an analog signal outputted from the sense circuit. An A/D converter converts the output signal of the amplifier to digital data. A sensing interval setup unit sets a sensing interval for the sense circuit. A power supply unit supplies electric power to the sense circuit, the amplifier and the A/D converter. The amplifier and the A/D converter constitute an analog signal processing unit. A power supply control unit is provided to control the power supply unit. A storage unit stores the digital data outputted from the A/D converter every sensing interval of the sensing interval. A data value change judgment unit changes the setup of the sensing interval by the sensing interval setup unit. The data value change judgment unit also changes the control mode of the power supply control unit in response to judgment of value change between a plural number of digital data which are designated from the digital data being stored in the storage unit.
Design structure for measurement of power consumption within an integrated circuit
An design structure for measuring power consumed during operation of an integrated circuit. The design structure including: a data processing circuit having an input and an output, the data processing circuit configured to generate an output data signal on based on an input data signal; a power measurement circuit configured to measure an amount of electrical power consumed by the processing circuit in generating the output signal from the input signal, the power measurement circuit connected between the processing circuit and a power supply for the processing circuit; and a memory element configured to store a tag containing a value representing the amount of electrical power consumed by the processing circuit in generating the output data signal from the input data signal and either (a) the input data of the input data signal or (b) a pointer to the input data of the input data signal.
Fault monitoring method for work machine
A fault monitoring method for a robot (10) or other work machine (30) is disclosed, in which the period that starts when the robot or the work machine starts moving and ends when the work machine stops moving is set as one unit, the difference between the maximum torque and the minimum torque within the unit is set as a maximum fluctuation range, a fluctuation range control value is set on the basis of the maximum fluctuation range, an average is taken of the maximum fluctuation ranges at plural points during operation, a second average value (t1, t10, t100) is determined, and a fault is determined to have occurred when the second average value exceeds the fluctuation range control value.
Probe correction for gene expression level detection
Individual probes on micro-arrays are re-scaled and corrected with a set of probe dependent coefficients derived from genomic-DNA hybridization signals. A dynamic range for gDNA binding is determined by measuring a concentration signal curve. Signals for each probe are measured during multiple hybridizations within a linear range. Concentration insensitive probes are then found for two sets of experiments. Probes are discarded based on a threshold compared to their standard deviation divided by their average in each set. The correction coefficients are used to calculate a corrected intensity for each probe. Probes having high uncertainty (0.5 in one embodiment) are discarded. A weighting factor for each probe is determined along with an uncertainty factor. Finally, a call for each gene is made, such as absent, marginal or present.
Method of and apparatus for processing seismic data
A method of processing seismic data that includes including first and second modes of seismic energy where the second mode has been generated by partial mode conversion of the first mode at a boundary face of a layer of the seabed includes the step of cross-correlating a trace acquired at a receiver and including events corresponding to the first mode with a trace acquired at the same receiver and including events corresponding to the second mode. An event in the cross-correlated data that corresponds to partial mode conversion is identified, and the amplitude of this event is normalized, for example relative to the amplitude of the peak in the cross-correlogram at zero time delay. Information about the effects of the static shift produced by the layer and/or about vector infidelity can be arrived from normalized cross-correlograms for receivers in a receiver array.
Method for identifying and removing multiples for imaging with beams
The present invention incorporates the use of model-driven and data-driven methodologies to attenuate multiples in seismic data utilizing a prediction model which includes multiply-reflected, surface-related seismic waves. The present invention includes beam techniques and convolving a predicted multiples beam with a segment of a modeled pegleg beam to obtain a convolved multiples beam. The convolved multiples beam can then he deconvolved to attenuate the multiples that are present in the original input beam.
System, method and computer program product for searching and retrieving ranked points of interest within a polygonal area of interest
A method of searching and retrieving ranked points of interest (POIs) within a Polygonal area of interest (AOI) includes defining an AOI. The AOI has a Polygon shape and includes a plurality of points. The method also includes identifying at least one POI within the defined AOI, and organizing the identified POIs in an order of rankings associated with the identified POIs. Then, information related to the identified POIs is requested, and presented in the order of the rankings associated with the respective POIs.
Nudge compensation for curved swath paths
A method for adjusting a curved swath path in a swath generation apparatus used in an automated vehicle guidance system to compensate for changes in vehicle position signals.
Method of positioning perspective terrain on SVS primary flight displays using terrain database and radio altitude
The present invention is directed to a method of positioning perspective terrain on a SVS (Synthetic Vision System) based on a navigation solution, the vertical component of which is calculated utilizing a terrain database and sensing unit (which provides height above terrain). The terrain database provides elevation of terrain above MSL. A sensor, such as a GNSS sensor, may be utilized to calculate the navigation solution. In alternative embodiments, the navigation solution is calculated differently based upon the phase of flight. In one, the vertical component calculation utilizes the sensing unit at or below the sensing unit's rated altitude. In another, vertical component calculation blends the sensing unit with the sensor. The blending may be based upon percentages based upon altitude or utilize filtering such as Kalman filtering. The present invention is particularly advantageous for close to ground operations, insuring perspective terrain will stay consistent with the real world.
EGR detection via humidity detection
Various systems and methods are described for controlling an engine in a vehicle which includes an exhaust passage and an exhaust gas recirculation system. One example method comprises adjusting an engine operating parameter based on an exhaust gas recirculation amount, the exhaust gas recirculation amount based on a first humidity and a second humidity, the first humidity generated from a first humidity sensor at a first location and the second humidity generated from a second humidity sensor located in the exhaust passage of the engine.
Method and device for controlling an internal combustion engine
In a method and a device for controlling an internal combustion engine (1) an optimized power yield of the internal combustion engine is made possible. In this case the internal combustion engine (1) is operated, depending on a criterion, either in a normal mode in which the maximum torque produced of the internal combustion engine (1) is restricted to a normal limit value or is operated in a power mode in which the maximum torque produced is restricted to a power limit value which is greater than the normal limit value. At least one operating variable of the internal combustion engine (1) is detected which is representative of its combustion power and the operation of the internal combustion engine (1) in the power mode is undertaken depending this at least one operating variable.
Control method for four-wheel drive vehicle
A drive force control method for a four-wheel drive vehicle including a torque distributing mechanism capable of changing a drive force distribution ratio between front and rear wheels and a drive force distribution ratio between right and left front wheels or between right and left rear wheels. This method includes the steps of increasing the drive force distribution ratio of the rear wheels to the front wheels according to an increase in absolute value of a lateral G signal, and increasing the drive force distribution ratio of a turning outer wheel as one of the right and left front wheels or one of the right and left rear wheels to a turning inner wheel as the other. A lateral G sensor signal is corrected by an estimated lateral G signal calculated according to a steering angle and a vehicle speed to obtain a control lateral G signal, which is used as the lateral G signal.
Hydraulic controller and control method with pressure and oil-condition sensing and failure
A hydraulic controller includes an actuator for electrically controlling the hydraulic pressure, a hydraulic-pressure sensing part for sensing an actual value of the hydraulic pressure in the actuator, and an ECU for controlling the actuator. The ECU includes a fundamental hydraulic-pressure value command part for carrying out setting and command of a fundamental hydraulic-pressure command value, a feedforward control part for calculating through an inverse filter a first target hydraulic-pressure command value in accordance with the fundamental hydraulic-pressure command value, a feedback control part for calculating a second target hydraulic-pressure command value in accordance with the sensed actual value of the hydraulic pressure and the fundamental hydraulic-pressure command value, and a target control-amount determination part for determining a target control amount of the actuator in accordance with the first and second target hydraulic-pressure command value, wherein the ECU controls the actuator in accordance with the determined target control amount.
Stabilizer control apparatus
In a stabilizer control apparatus for controlling a torsional rigidity of a stabilizer of a vehicle, an actual lateral acceleration and a calculated lateral acceleration are obtained. Then, influence amount caused by the calculated lateral acceleration is set to be greater than influence amount caused by the actual lateral acceleration, when the vehicle is moving straight, whereas the influence amount caused by the actual lateral acceleration is set to be increased, with the turning operation of the vehicle being increased, to actively control the rolling motion of the vehicle body.
PC-based automobile owner's manual, diagnostics, and auto care
A computer built into an automobile displays the owner's manual for the car. The user requests more information about the automobile through the computer, and the additional information is displayed to the user. Information may include a description of a specific function or device of the car, service history, and/or real time status of a component of the car.
Hybrid energy power management system and method
An energy management system is provided for use with one of a plurality of hybrid energy diesel electric vehicles. The energy management system includes a position identification device to provide position information of one the plurality of vehicles at incremental positions along one of a plurality of routes. More particularly, the energy management system includes a database to store historical data of a traction and/or auxiliary energy demand for each vehicle at incremental positions along each route, and an energy management processor coupled to the position identification device and the database. The energy management system retrieves historical data of each vehicle at incremental positions along each route to estimate an anticipated traction and/or auxiliary energy demand of the one of a plurality of vehicle at each incremental position along one of a plurality of routes.
Control device of vehicle
A hybrid ECU executes a program including the steps of: calculating an SOC of a battery when turn-on of pre-air-conditioning is requested; prohibiting pre-air-conditioning when the SOC does not satisfy a condition that the SOC is greater than an SOC (Y %) necessary for warm-up and running; and notifying a driver of prohibition of pre-air-conditioning.
Method and apparatus for swapping lead and remote locomotives in a distributed power railroad train
A method and apparatus for swapping functionality of a lead unit and an end-of-train remote unit on a distributed power railroad train. The communications system comprises a swap function that executes through a plurality of process steps to swap the functionality of the lead unit and the end-of-train remote unit. The train operating conditions must first be determined to ensure that the swap function can be executed. The communications system is placed in an idle mode and brakes and safety locks applied to ensure against train movement. Each remote locomotive in the train is commanded to a transition stage and reconfigured to receive commands and messages from the new lead unit. Once the train operator has relocated from the old lead unit to the new lead unit, the old lead unit transitions to remote status and the new lead unit commands an end to the transition period. The train brakes are released and the communications system placed in a normal operational mode, at which time motive power can be supplied for train movement.
Temperature setting of thermal processing plate using zernike coefficients
In the present invention, a thermal plate is divided into a plurality of thermal plate regions, and a temperature is settable for each of the thermal plate regions. A temperature correction value for adjusting the temperature within the thermal plate is settable for each of the thermal plate regions of the thermal plate. The line widths within the wafer for which the photolithography process has been finished are first measured, and Zernike coefficients of a Zernike polynomial indicating a plurality of in-plane tendency components are calculated from the measured values of the line widths within the wafer. Then, the temperature correction values for the regions of the thermal plate to bring the calculated Zernike coefficients close to 0 are calculated using a calculation model indicating a correlation between change amounts of the Zernike coefficients and the temperature correction values. The temperature of each of the regions of the thermal plate is set based on each of the calculated temperature correction values.
System and method for managing consumption of power supplied by an electric utility
A system for managing consumption of power supplied by an electric utility to power consuming devices includes at least one client device and a server. Each client device operates at least partially responsive to control messages received from the server and controls operation of one or more controllable devices. Each controllable device selectively enables and disables a flow of power to one or more of the consuming devices. The server stores information, on a per client device basis, relating to power consumed by the consuming devices. When a power reduction is requested by the utility, the server selects, based on client device information stored in the database, at least one client device to which to issue a power reduction message that indicates at least one of an amount of power to be reduced and an identification of a controllable device to be instructed to disable a flow of power.
Gait producing device for moving robot
By using a first dynamic model of a moving robot 1, a provisional motion, which indicates a provisional value of a desired motion of the robot 1, is created such that a desired value of a floor reaction force moment horizontal component and a permissible range of a translational floor reaction force horizontal component are satisfied on the first dynamic model. The difference between a floor reaction force produced on a second dynamic model, which has a dynamic accuracy that is higher than that of the first dynamic model, by the provisional motion and a floor reaction force produced on the first dynamic model is defined as a floor reaction force error. Based on this floor reaction force error, the provisional motion is corrected on the first dynamic model to generate a desired motion. The desired motion is generated such that the value obtained by adding the floor reaction force error to the floor reaction force generated on the first dynamic model satisfies the aforesaid desired value and permissible range.
Method and system for predictive modeling of articles, such as tampons
A modeling method for predictive modeling of a product, which may be but one example of a family of such modeling methods, includes receiving one of a processing condition of a process used to make a fibrous material into the product or a measurement of a property of the fibrous material or the tampon product, and calculating a virtual outcome from the one of the processing condition or the measurement received. The virtual outcome is one or more of not physically measured or not physically measurable, and has a relationship to the processing condition and a relationship to the measurement. The method also includes providing a measurement if the processing condition is received or a processing condition if the measurement is received, according to the virtual outcome calculated. A computing device may be programmed to carry out the method.
System and method for the production of goods or products
A computer-based system and method for production planning are described that relies on developing factory shop floor modeling. This modeling includes simulating the factory shop floor to create a Virtual Factory. This Virtual Factory provides the ability to assess any possible production sequence for determining an optimal of production sequence according to the criteria defined the user.
Method and apparatus for controlling a safety-critical process
The invention relates to a method and an apparatus for controlling safety-critical processes, such as the monitoring of protective doors, emergency stop switches, light curtains and the like. A control unit is connected to a plurality of I/O units via a data transmission link. The I/O units transmit process data to the control unit, with the process data being protected against transmission errors by means of a diversitary multiple transmission. The process data are encoded using a variable keyword in order to generate variably encoded process data. The variably encoded process data are transmitted to the control unit as part of the diversitary multiple transmission.
Socket alignment mechanism and method of using same
An alignment mechanism to align a microelectronic device to a socket, the device including an array of contact pads thereon. The mechanism includes a socket system having a socket and a device positioning mechanism disposed adjacent the socket and adapted to position the device in the socket. The mechanism also includes a control system adapted to receive alignment data on a position of the array of contact pads relative to two reference sides of the device, the control system further being adapted to control the device positioning mechanism as a function of alignment data to align the device in the socket.
Aggregating audit information with field conditions
The subject invention relates to a system and/or method that facilitates assessing unexpected field conditions based upon the verification of an audit log. A sensing component can monitor field conditions with respect to an industrial environment. An analysis component can analyze the field conditions and determine that an unexpected event has occurred and retrieve audit logs from a data repository to determine cause of the unexpected event.
Human-machine interface for a control system
A human-machine interface of a control system for monitoring and control of a process and including a computer generated model of the process. The process or a part or component of the process is displayed such that the model is arranged to map a point on the computer generated model to data held by the control system about the at least one part or component of the process. A method to monitor and control a process using the human-machine interface and a system including the interface are also described.
Medical device conductor junctions
A medical electrical lead includes a lead body, an inner assembly extending through the lead body, an outer insulative layer covering the inner assembly, and an electrode mounted outside the exterior surface of the outer insulative layer. The inner assembly includes an elongate inner structure forming a lumen, an elongate conductor extending along an outer surface of the inner structure, and a conductive fitting coupled to the elongate conductor.
Instrument and method for delivery of anaesthetic drugs
A stimulating needle and catheter system is provided for delivery of an anaesthetic drug to a nerve having a fascia sheath. The position of the stimulating needle may be identified after insertion into the body of a patient by electrically stimulating and thus locating a specific nerve. When a specific nerve is located, the catheter is inserted through the needle such that the distal tip of the catheter is located at a point slightly beyond the distal tip of the needle. The distal tip of the catheter may then be manipulated and the optimum position within the nerve determined by applying an electrical impulse through a wire located within the catheter from the proximal end to the distal tip of the catheter. A tunneling device is inserted into the skin of the patient to form a subcutaneous tunnel through which the proximal end of the catheter is inserted.
Tree-based electrical stimulator programming
The disclosure describes an implantable stimulation system that guides programming with a therapeutic tree. All possible stimulation parameters are arranged on the therapeutic tree, with each level of the therapeutic tree containing a different stimulation parameter type. Each level includes nodes that are connected to nodes of adjacent levels. A user, such as a clinician or a patient, creates a program path by moving through nodes of lower levels. The stimulation parameter types are arranged so that coarse adjustments occur at higher levels of the tree and fine adjustments occur at lower levels of the tree. The nodes of the program path define the stimulation parameters of the delivered stimulation therapy. In addition, a sensor may detect a physiological function to allow the system to automatically identify therapy efficacy and create the most efficacious program path for the patient.
System and method for improving ventricular sensing
An implantable medical device operates according to a ventricular pacing protocol (VPP) that precludes ventricular pacing in any cardiac cycle where a sensed ventricular event has occurred in the preceding cycle. Improved ventricular sensing, detection and classification is provided.
System and method for providing a waveform for stimulating biological tissue
An implantable programmable stimulator system includes memory that stores at least one waveform. A playback system provides an output waveform based on retrieving the at least one waveform from the memory. An output system is configured to drive at least one output channel based on the output waveform, the output system selecting the at least one output channel from a plurality of output channels in response to a selection signal.
Method and apparatus for utilizing amplitude-modulated pulse-width modulation signals for neurostimulation and treatment of neurological disorders using electrical stimulation
A computing device-controlled system is described for the generation of amplitude-modulated pulse-width modulation (AMPWM) signals for use in treating neurological dysfunction via cranial neurostimulation, where the AMPWM signal is specifically designed to minimize the electrical impedance of the tissues of the head. A low-frequency carrier signal is determined for the AMPWM signal by measuring EEG activity at a reference site or sites, generally corresponding with the location of suspected brain dysfunction. Carrier signal frequency is variably related to critical frequency components of the EEG power spectral density, determined from statistical analysis of amplitudes and variability, and dynamically changed as a function of time to prevent entrainment. The AMPWM signal is presented to a subject via a plurality of neurostimulation delivery modes for therapeutic use.
Method and system for atrial fibrillation analysis, characterization, and mapping
A method and system for atrial fibrillation analysis, characterization, and mapping is disclosed. A finite element model (FEM) representing a physical structure of a heart is generated. Electrogram data can be sensed at various locations in the heart using an electrophysiology catheter, and the electrogram data is mapped to the elements of the FEM. Function parameters, which measure some characteristics of AF arrhythmia, are then simultaneously calculated for all of the elements of the FEM based on the electrogram data mapped to the elements of the FEM. An artificial neural network (ANN) can be used to calculate the function parameters.
Optical system for measuring metabolism in a body and imaging method
In an optical measurement system and imaging method adapted to measure in vivo information in a living body without harming the living body, light rays of a plurality of wavelengths which are modulated in intensity with a plurality of different frequencies are irradiated on a plurality of irradiation positions on the surface of a living body, and time-variable changes in living body transmitting light intensity levels corresponding to the respective wavelengths and the respective irradiation positions are measured at different positions on the surface of the living body. Light is utilized to image the results of the measurements, in which the measuring time is shortened by estimating fluctuation attributable to the living body, and the presence or absence of a change in measured signal can be decided easily by displaying an estimation signal and a measured signal at a time.
A guide wire (1) to assist percutaneous endovascular deployment which has zones of varying stiffness. An elongate central zone (3) of high stiffness, a proximal zone (4) of transition from high stiffness to semi-stiffness and a distal zone (5) of transition from high stiffness to being relatively flexible. The distal zone (5) has three zones, a semi stiff zone (11) adjacent the central zone, a transition zone (13) being of flexibility of from semi-stiff extending to flexible and a tip zone (15) being of high flexibility. The distal tip has a small J curve (16) to ensure that it is atraumatic in vessels and to prevent damage to the aortic heart valve. The distal zone (5) can also have a large curve to assist with anchoring the guide wire into the aortic arch.
Systems and methods for internal tissue penetration
A medical system is a medical device, such as a catheter, that includes an inner core and an imager that is extendable from within an elongated tubular member and configured to penetrate a body tissue within a living body. The elongated tubular member has a distal end and is configured to slideably receive the inner core. The distal end is further configured to allow the inner core to advance outside the elongated member. The inner core has a distal end and is configured to rotate radially around a longitudinal axis of the elongated member. The device can further include an imager located at the distal end of the inner core, and the imager can be configured to image a body tissue and output an image signal to an imaging system communicatively coupled with the imager. The imaging system is configured to generate an image of the body tissue from the image signal of the imager when the imager is rotated and placed into contact with the body tissue such that the imager penetrates the body tissue.
Separate local RF transmit and receive coils for breast MRI system
A magnetic resonance imaging system for imaging human breasts, in which the system includes a main magnet providing a static magnetic field, a gradient coil insert received within the internal bore of the main magnet, the gradient coil insert including gradient coils providing a spatially varying magnetic field, a patient support table configured to support the patient within the patient opening, the patient support table including a patient support member with at least one breast opening sized and positioned so that in use the patient's breast extends through the opening and is accessible below the patient support member, an RF transmitter coil mounted on the patient support table in the vicinity of the at least one breast opening, and an RF receiver coil separate from the RF transmitter coil and mounted on the patient support table in the vicinity of the at least one breast opening.
Receiving apparatus containing performance inspection function of antennas
A receiving apparatus which is used while connected to a plurality of antennas, the receiving apparatus receiving a radio signal through the antennas to perform a predetermined process to the received radio signal, the radio signal being transmitted from a body-insertable apparatus inserted into a subject, includes a receiving antenna selection unit that selects the antenna which is suitable for reception of the radio signal when the radio signal is transmitted from the body-insertable apparatus; a sequential antenna selection unit that sequentially selects each of the plurality of antennas when performance inspection of the plurality of antennas is performed; and a signal processing unit that performs a predetermined process to the radio signal received through the antenna, the antenna being selected by the receiving antenna selection unit or the sequential antenna selection unit.
Low power distribution system for an unattended ground sensor system
A sensor system includes N sensor system modules that each include respective sensor function modules for processing and communicating signals from at least one external detector. M slave modules selectively control power to the sensor function modules. M and N are integers greater than one. A master power control module serially controls the M slave modules via a bus based on functions of the sensor function modules.
Method and apparatus of reduced power consumption in TDMA signal reception via backward output of input stream to eliminate receiver training period
The present invention aims to provide a reception apparatus that receives and demodulates a signal transmitted by using time-division multiplexing, with reduced power consumption. In detail, a receiving unit including a tuner operates to receive a signal only during a time period for which a desired signal is transmitted. The received signal is converted into digital data, and the digital data is stored into a memory. With the use of the digital data stored in the memory, a PLL performs all of the necessary operations from synchronization establishment to demodulation.
Mobile device with a smart battery having a battery information profile corresponding to a communication standard
Various embodiments are described for a mobile communication device having a main processor for controlling the operation of the mobile communication device; a device memory coupled to the main processor for storing a plurality of battery information profiles; and a smart battery coupled to the main processor for providing supply power. The smart battery includes a battery processor for controlling the operation of the smart battery and communicating with the main processor; and a battery memory coupled to the battery processor for storing a Battery ID indicating the model of the smart battery. The main processor is configured to communicate with the battery processor to obtain the Battery ID and select one the battery information profiles based on the Battery ID.
Alert signal generation
An alert signal of a communication device (1), such as the ring signal of a mobile phone, comprises a set of musical samples that are played by the communication device in sequence. The sequence may be randomly generated, either in response to the event causing the alert or in a set up phase. Alternatively, the user of the device can create a tune to be used as the alert signal by creating a sequence of samples. The user selects samples from a list of samples to create the sequence of samples as individual samples may appear more than once in the tune.
Transmitting and receiving method, and radio apparatus utilizing the same
A processing unit transmits, from at least one of a plurality of antennas, data corresponding respectively to the plurality of antennas. A control unit generates request signals with which to let a second radio apparatus supply information on rates at the second radio apparatus. When transmitting the request signal, the processing unit also transmits, from a plurality of antennas which includes antennas other than the antennas that transmit the data, known signals corresponding respectively to the plurality of antennas.
Transmitting and receiving method, and radio apparatus utilizing the same
A processing unit transmits, from at least one of a plurality of antennas, data corresponding respectively to the plurality of antennas. A control unit generates request signals with which to let a second radio apparatus supply information on rates at the second radio apparatus. When transmitting the request signal, the processing unit also transmits, from a plurality of antennas which includes antennas other than the antennas that transmit the data, known signals corresponding respectively to the plurality of antennas.
Transmitting and receiving method, and radio apparatus utilizing the same
A processing unit transmits, from at least one of a plurality of antennas, data corresponding respectively to the plurality of antennas. A control unit generates request signals with which to let a second radio apparatus supply information on rates at the second radio apparatus. When transmitting the request signal, the processing unit also transmits, from a plurality of antennas which includes antennas other than the antennas that transmit the data, known signals corresponding respectively to the plurality of antennas.
Portable handsfree device for cable connection to a mobile terminal
A portable handsfree for cable-connection to a mobile terminal is provided. The portable handsfree comprises a cable for connecting the portable handsfree to a mobile telephone at a first end of the portable handsfree and to a computer at another end of the portable handsfree such that data transmission between the mobile terminal and the computer can be enabled through the portable handsfree.
Semiconductor integrated circuit device
The semiconductor integrated circuit (RF IC) for a mobile telephone capable of transmitting/receiving the signals of plural bands reduces the DC offsets of the amplifiers located in the following stages of the mixers that demodulate or down-convert the reception signals. The invention scrambles the signal lines to transmit the outputs of the plural mixers that demodulate or down-convert the reception signals of different bands, so as to avoid the adjacent signal lines from making the same combination from the starting ends to the finishing ends.
Method and system for maintaining a wireless data connection
A system and method for establishing and maintaining an “always-on” data connection to a wireless network through the use of a back off timer and a service check timer is disclosed. The back off timer is initialized to a determined value when a connection is not established. When the timer expires, a connection attempt is made. As further connection attempts are made, the back off timer is set to ever-increasing values. When the data connection is established, the service check timer is initialized. The data connection status is determined at the expiry of the service check timer. When, at the expiry of the service check timer, the data connection is determined to be lost, the connection method is employed.
Mobile communication terminal and wireless communication module thereof
The present invention provides a mobile communication terminal comprising a wireless communication module and a host, wherein the wireless communication module further comprises a first interface connector and a module case; the host reserves positions for the insertion of the wireless communication module, and further comprises a second interface connector corresponding to the first interface connector positioned on the wireless communication module; the wireless communication module is connected to the host via the first interface connector and the second interface connector. The present invention also discloses a wireless communication module which is integrated with a SIM card unit. The present invention can reduce the waste in development and application, and shorten the development period of mobile communication terminals. Thus, the wireless communication module interface is simplified so that the wireless communication module interface is easy to use.
Throughput maximization using quantized rate control in multiple antenna communication
A feedback link between a receiver and a transmitter in a multiple antenna communication system is used to control the transmission rate and thereby improve system throughput performance.
Mobile phone and method of controlling transmission power
In a mobile phone of the present invention, de-spread circuits execute de-spread processing for receiving signals, and rake combines compose a plurality of information in the outputs of the de-spread circuits in correspondence to base stations, and calculate receiving levels of power control signals in individual channels in correspondence to the base stations to output the power control signals each having receiving level information to a comparator. The comparator outputs only the power control signal having the receiving level lying within a predetermined range from a maximum receiving level of the receiving levels of the power control signals from among the plurality of base stations to a decision circuit. The decision circuit decides based on the power control signal from the comparator whether a transmission power from the mobile phone should be increased or decreased to control the transmission power of a transmitter circuit, thereby preventing misrecognition of the power control signal.
Secondary station and method of operating the station
A secondary station has a receiver capable of resolving signals received (504,510) as a plurality of multipath signals from a plurality of base stations during a soft handover process. In order to decode and act upon the received signals in a very short period of time, an initial subset of received multipath signals is processed (506) to provide an estimate of the action needing to be taken by the station, which action is then implemented by the station (508). Later arriving signals are processed separately (512) and used to update the estimate, as a result of which the action already taken may be corrected (514).Such a secondary station is particularly suitable for decoding and acting upon power control commands included in received signals in a UMTS system, for which a very limited period of time is provided by the UMTS specification.
Reporting terminal capabilities for supporting short message service
A method for delivering a short message service (SMS) message to an interworking wireless local area network user equipment (UE) begins by registering the UE with an Internet Protocol short message gateway (IP-SM-GW). A capability report is sent from the UE to the IP-SM-GW, the capability report including the capabilities of the UE. A SMS message is transmitted from a short message service center (SMSC) to the IP-SM-GW. The capabilities of the UE are evaluated at the IP-SM-GW to determine whether the UE can receive the SMS message, and the SMS message is delivered to the UE via the IP-SM-GW if the UE has the capabilities to receive the SMS message.
Method and apparatus optimizing receipt of call/broadcast paging messages by self-powered wireless communications devices
A wireless communications network (120) responds to each incoming call placed to a wireless communications device (134) by transmitting a call-paging message (418) within a corresponding partition of a digital radio frame of prescribed format. Responsive to each occurrence of a broadcast event (404), the network transmits (414) a repeating broadcast-paging message announcing the availability of broadcast content from the network. The broadcast-paging message is transmitted multiple times within each digital radio frame. Another sequence (500) describes WCD operation in this network. Responsive to wakeup (502) from sleep, the WCD detects (509) received signal quality. The WCD also receives (510) scheduled network transmission of a call-paging message and a number of instances (at least one) of a repeating network transmitted broadcast-paging message that occurs multiple times for each scheduled transmission of the call-paging message. This number varies inversely with the detected signal quality.
Use of decremental assignments
Systems and methods are disclosed that facilitate dynamically assigning system resources in a wireless network environment by detecting a resource conflict between an existing resource assignment to one or more existing user devices and a new resource assignment for a subsequent user device. Upon detection of a conflict, a decremental assignment can be provided to the one ore more existing user devices to decrement the existing resource assignment in order to resolve a detected resource conflict. Decremental assignments can be implicit or explicit, and can facilitate mitigating transmission overhead costs due to their relatively small size when compared to conventional complete deassignment/reassignment messages.
Electronic message exchange over multiple wireless communication networks with a single device
Electronic messages such as pages are exchanged between a user device and a message service using one of multiple wireless communication networks. The wireless communication networks may include mobile and/or fixed wireless networks. The user device registers with the message service through at least one of the wireless communications networks. The user device may register through multiple wireless communication devices when available. The user device sends messages through the wireless network through which registration has been established and may apply rules to choose when registration has occurred via multiple wireless networks.
Aircraft based cellular system
An apparatus and method for providing an aircraft-based wireless communications service is disclosed. An exemplary system includes a plurality of aircraft each including on-board equipment for supporting wireless communications with one or more dual mode handsets and for exchanging wireless communication traffic and control information. One or more ground stations communicate with the plurality of commercial aircraft using feeder communications links exchanging the wireless communication traffic and control information and providing interfaces with a terrestrial telecommunications infrastructure. A control center manages the one or more ground stations and the on-board equipment of the commercial aircraft and dynamically assigns resources to the on-board equipment of the plurality of aircraft using an overlapped set of coverage patterns.
Method and apparatus for releasing connections in an access network
Plural communication connections are established between an external network and subscriber units by way of a an access network. The subscriber unit connection is supported by plural nodes. When a failure is detected in a node, those subscriber unit connections affected by that failure are identified. A message identifying those subscriber unit connections affected by the failure is sent to one or more other nodes. Affected subscriber unit connections identified in the message are released. Those unaffected connections not included in the message are maintained.
Direct-conversion transceiver enabling digital calibration
A transceiver for transmitting and receiving signals includes a transmitter operative to up-convert baseband signals from a baseband frequency into RF signals at a radio frequency (RF) frequency and output the RF signals, a receiver operative to receive RF signals and down-convert the RF signals into baseband signals having the baseband frequency, and a plurality of calibration paths coupling the transmitter to the receiver. Any of the calibration paths can be selected to be active when calibrating components of the transceiver. Tunable components can use calibration information to optimize transceiver performance.
Mobile terminal and a method for implementing the guardianship function
A mobile terminal with a guardianship function, includes: a first module, configured for collecting data related to use of the mobile terminal; a second module, configured for determining the use of the mobile terminal by analyzing the data collected by the first module; and a third module, configured for sending a short message informing the use of the mobile terminal determined by the second module. A method for performing the guardianship function at a mobile terminal is also provided. By using the mobile terminal and the method, a guardian is able to timely learn a ward's use of the mobile terminal, thus effectively monitoring the ward.
Safeguarding user data stored in mobile communications devices
The present invention permits safeguarding of private data entered into a memory chip of a cell phone by permitting the cell phone owner to erase the data in a lost or stolen phone, using an preset erase code and erase command in the cell phone or the network base station, and disabling or erasing circuitry on the memory chip, preferably an EEPROM chip.
Method and apparatus for supporting enhanced international dialing in cellular systems
A method and apparatus are provided that support enhanced international dialing in cellular systems using handset based code dialing. According to one aspect, the handset analyzes the dialed digits before sending the dialed number to the network. If the dialed digits begin with the country code of the area from which the call is placed, the country code will be removed and a national access code will be added in front of the digit strings. For international calls the dialed number may begin with a + indicator, followed by a country coded, an area code, and a customer number. The digit string is automatically translated into a new number based on the numbering plan of the area in which a call is being placed. The new number can then be sent to the network to set up the call.
Wireless communication device with call screening
A cellular telephone maintains a screening list of calling party numbers, and specifies call handling therefor. A mobile switching center is responsive to selected types of the specified call handling. The call handling can depend on whether the call is local or non-local, which is affected by the location of the cellular telephone. The call handling can also depend on the time at which the call is made. A subscriber updates his or her screening list via personal computer, and transmits via a communication network the updated screening list to a message center which sends the updated screening list to the cellular telephone via wireless communication. A calling party number can be specified as a wildcard.
Method and apparatus for electronic mailing of data utilizing a data reference
A mobile device for electronic mailing of data utilizing a data reference, the mobile device having: a communications subsystem for communicating with a wireless gateway; a user interface; a processor interacting with the user interface and the communications subsystem; an electronic mail application adapted to run on the processor; a data application adapted to run on the processor; and memory adapted to be accessed by the electronic mail application and the data application, the memory storing a data reference identifier for data in the data application, the data reference identifier capable of identifying the data on a data server remote from the mobile device, wherein the data application is adapted to interact with the electronic mail application to send data in an electronic mail message, and wherein the data is replaced in the electronic mail message with the data reference identifier.
Pushback methods and apparatus for use in communicating messages to mobile communication devices
One method involves the steps of causing a message to be sent to a relay network for delivery to a mobile device through one of a plurality of wireless networks coupled to the relay network; receiving, from the relay network, a result message when the mobile device is unavailable to receive the message, the result message comprising a message identifier; maintaining storage of the message in memory accessible by a host server after the result message is received; receiving, from the relay network, a status message which indicates that the mobile device is available to receive the message when the mobile device is available to receive the message; and causing the message to be sent again to the relay network for delivery to the mobile device in response to receiving the status message. During the unavailability, the relay network refrains from maintaining storage of the message.
System for identifying mobile terminal device automatically and value added service access
An automatic identification system of mobile terminal equipment, which consists of the mobile terminal equipment, mobile network communication platform and mobile terminal equipment service center. The mobile terminal equipment is provided with subscriber information handling means for transmitting terminal subscribers information to mobile terminal service center through communication channels of the mobile network communication platform. The mobile terminal equipment service center compares the terminal subscriber information with that in its database and then identifies and processes said terminal subscribers information. The terminal subscriber information includes the electronic serial number, terminal subscriber ID identification, terminal software version number and any one or any combination of two or more of the followings: network ID identification, base station number, short message center number Email address, LP internet protocol address and the information of registration place in subscriber identification card.
Methods and systems for providing wireless communications through a utility pole mounted antenna
Systems and methods are disclosed for providing wireless communications through, for example, a utility pole mounted antenna. The disclosed systems and methods may include receiving first data from a wire line network at a transceiver placed at a location on the wire line network. The location may be a place where the wire line network is present, where electrical power for the transceiver is present, or where a service provider of the wireless communications has a legal right to locate the transceiver. Furthermore, the disclosed systems and methods may include transmitting the first data wirelessly from the transceiver through an antenna wherein the transceiver and the antenna are located on a utility pole. Moreover, the disclosed systems and methods may include receiving second data at the transceiver wirelessly from a wireless device.
Integrated tracking filters for direct conversion and low-IF single conversion broadband filters
A radio frequency (RF) tuner includes a programmable tracking filter bank receiving an RF input and outputting a filtered RF signal. A mixer stage receives the filtered RF signal and outputs a first quadrature component of the filtered RF signal and a second quadrature component of the filtered RF signal. Two variable gain amplifiers receive the first and second quadrature components and output amplitude-controlled I and Q components of the filtered RF signal. In one embodiment, the programmable tracking filter bank includes a plurality of tank circuits each connected to the RF input through an impedance. Each tank circuit include an inductor and a capacitor connected in parallel thereby forming an LC network, and a plurality of switched capacitors in parallel with the LC network and switched in and out of the tank circuit by programmable switches. In another embodiment, the programmable tracking filter bank includes a plurality of peaked low-pass circuits each connected to the RF input through an impedance. Each peaked low-pass circuit includes a capacitor connected to ground, and a plurality of switched capacitors in parallel with the capacitor and switched in and out of the peaked low-pass circuit by programmable switches.
Receiver having tunable amplifier with integrated tracking filter
A receiver is disclosed. The receiver includes: a tunable low noise amplifier (LNA), the tunable LNA comprising: a plurality of LNAs for receiving and amplifying a plurality of frequency bands respectively; a plurality of first switches respectively coupled to the plurality of LNAs; a plurality of LC loads, respectively coupled to the plurality of first switches; a plurality of buffers, respectively coupled to the plurality of first switches; and a plurality of second switches, respectively coupled to the plurality of LC loads and an LO signal; a power detecting circuit for determining a signal power level corresponding to the LO signal; a first switch unit; and a controller, for isolating the output of the plurality of LNAs, selectively decoupling at least one of the LC loads according to the signal power level of the LO signal, and routing the LO signal to the second switches during calibration mode.
Integrated transceiver with envelope tracking
A transceiver comprises an amplifying circuit for amplifying an input signal to produce an output signal. A power supply is operable for varying the level of power supplied to the amplifying circuit in response to variation of an input signal envelope directed to the power supply. A processing circuit is operable for digitally detecting the input signal envelope to provide variation of the power supply level. The processing circuit is further operable for digitally delaying the digital input signal envelope to time align the power supply level with the input signal.
Circuits and methods for modulators that receive symbols, and provide I (incident, or in-phase) and Q (quadrature) component values from a look-up table for subsequent filtering and digital-to-analog conversion. The I and Q component values depend on frequency correction and time index signals such that operating frequency differences between a handset and base station are compensated for, and the transmitted symbols are continuously phase shifted by 3π/8 radians.
Wireless communication device and radar detection method therefor
A wireless communication device includes a receiver circuit that receives a wireless signal. Here, the wireless signal includes a signal from a node in a communication network to which the wireless communication device belongs and a radar signal. The receiver circuit detects a received power of the wireless signal. The wireless communication device further includes a radar signal detection circuit, coupled to the receiver circuit, which determines if the wireless signal comprises the radar signal based on the received power of the wireless signal.
Multiplying symbol streams by rectangular matrix of (P/M)×1 vectors
Closed loop multiple-antenna wireless communications system with antenna weights determined by maximizing a composite channel signal-to-interference-plus-noise ratio minimum. Multiplexed symbol streams over subsets of antennas enhance throughput.
Systems and methods for managing out-of-band device connection
Systems and methods for managing connection of devices to a wireless network using out-of-band communications.
System and method for establishing a wireless connection between wireless devices
Described is a system and method for establishing a wireless connection between wireless devices. The method comprises obtaining data of a corresponding computing device. The device conducts wireless communications using a predetermined wireless protocol. The obtained data is processed to generate a wireless address of the device and a first message is transmitted to the device for establishing a wireless connection. The first message is addressed to the wireless address. When a first response message is received from the device, a second message is transmitted to the device. The first response message is generated in response to the first message and includes the wireless address. The second message includes synchronization data. When a second response message is received from the device, the wireless connection is established with the device. The second response message is generated in response to the second message.
Bluetooth communicator, short range wireless communicator and program
While a handsfree device being multi-profile compatible is maintaining a connection for a handsfree profile (HFP) with a mobile phone handset, the handsfree device cuts off the connection for the HFP based on a user's operation. After cutting off, the handsfree device establishes a connection for a dial-up network profile (DUN), and subsequently transmits a request for a connection for the HFP while maintaining the connection for the DUN. Subsequently, the handsfree device determines whether the handset is multi-profile compatible according to the response to the request from the handset. Based on the determination that the handset is multi-profile compatible, the handsfree device executes the processes for the HFP while maintaining the connection for the DUN.
Methods and apparatuses for configuration automation
Methods and apparatuses for automated configuring of user preferences. In one aspect of the present invention, a method to operate a data processing system, includes: detecting whether or not a portable device is connected to the data processing system; and automatically configuring one or more user preferences of the data processing system according to an identity of the portable device in response to a change in whether or not the portable device is connected to the data processing system. In one aspect of the present invention, call forwarding of at least one of a land line phone and a mobile phone is automatically configured when the mobile phone is brought close to the land line phone or when the mobile phone is taken away from the land line phone.
Method and system for determining attenuation and controlling uplink power in a satellite communication system
A method and system for determining attenuation and controlling uplink power in a satellite communication system includes receiving a beacon signal and establishing a clear sky uplink power value. A fade value is determined in response to the beacon signal and in response to the clear sky uplink power value and the fade value, an uplink power is determined. The fade value corresponds to a delta value in addition to the clear sky uplink power to obtain the final uplink power.
System and method for receiving broadcast content on a mobile platform during international travel
A vehicle information system for passenger vehicles, such as automobiles and aircraft, and methods for manufacturing and using same. The vehicle information system includes a universal antenna system and a universal receiver system for receiving viewing content provided by diverse content sources during travel, including international travel. The universal antenna and receiver system provide selected viewing content for distribution throughout the vehicle information system and presentation via one or more passenger interfaces. As the vehicle approaches the coverage region of a selected content source, the vehicle information system automatically reconfigures the universal antenna and receiver system to receive viewing content from the content source without requiring manual adjustment to, or replacement of, the universal antenna system and/or the universal receiver system. Passengers traveling aboard the vehicle thereby can continuously enjoy the viewing content during travel with limited interruption in service and without unwanted travel delays.
Audience response systems, methods and apparatus
A wireless audience response system can have a host unit, presenter device, and a plurality of audience response units with keypads, with the host unit being communicatively coupled to a computer. In some embodiments, the audience response units can be used to execute functions using application programs within the computer remotely. Also, in other embodiments, the audience response units track delay times required for transmitting input data, with the delay times being usable in comparing response times at the host unit.
Duplex simultaneous reading apparatus, copying apparatus, image processing apparatus and image processing method
A duplex simultaneous reading apparatus having an image reading unit for simultaneously reading a first surface and a second surface of a document, the duplex simultaneous reading apparatus includes: a detection unit for detecting any specified pattern image from image data read by the image reading unit; and a selection unit for selectively inputting the read image data of the first surface of the document and the read image data of the second surface to the detection unit in block units, wherein the detection unit detects the specified pattern image in the first surface or the second surface of the document, from the block-unit image data inputted by the selection unit.
Cleaning blade for use in image-forming apparatus
A cleaning blade, for use in an image-forming apparatus, for removing toner which remains on a surface of a photoreceptor drum thereof, with the cleaning blade in contact with the photoreceptor drum. The cleaning blade is formed from a sheet composed of a thermosetting elastomer composition. The roughness degree of a ridgeline formed longitudinally on a cleaning blade edge which contacts the photoreceptor is set to not more than 10 μm. The straightness degree of the ridgeline is set to not more than 100 μm. In a test of supplying 150,000 sheets of paper conducted by mounting the cleaning blade on the image-forming apparatus, a change rate ΔRe of an average roughness degree value Re of the ridgeline formed longitudinally on the edge is set to not more than +0.7, and a sectional length Ws45 of a wear surface of the edge, inclined at 45 degrees, which contacts the photoreceptor is set to not more than 50 μm.
Image forming apparatus forming a developed image using an image carrier
An image forming apparatus includes an image carrier; a charger that electrically charges the image carrier; an image forming section that forms an electrostatic latent image on the image carrier and develops the electrostatic latent image; a transferring-fixing section that transfers the image from the image carrier and fix the image onto a recording medium; a cleaning member; and a cleaning member moving section. The cleaning member cleans an unnecessary substance adhering onto a surface of the image carrier by abutting against the surface of the image carrier, and is capable of moving between an abutment position and a separation position where the cleaning member is separated from the image carrier. The cleaning member moving section moves the cleaning member from the separation position to the abutment position in accordance with a surface resistance of the surface of the image carrier.
Cleaning device, fixing device, and image forming apparatus
A cleaning device according to the present invention comprises which includes a cleaning belt, an unwinder, a winder, and a detector. The unwinder is wound with the cleaning belt. The winder winds up the cleaning belt intermittently from the unwinder along a path leading past a cleaning position where the belt is brought into contact with a body to be cleaned. The detector is fitted in a detecting position on the path between the unwinder and the cleaning position. The cleaning belt has an end point set on it near its trailing end and associated with the detecting position. When detecting the end point, the detector outputs a detection signal.
Image forming apparatus with accurate correction of color misalignment
An image forming apparatus includes a detection unit configured to cause a light emitting device to emit light, to cause a light receiving device to receive the light reflected by an object, and to produce a detection signal having a varying signal level responsive to an intensity of the received reflected light, a color misalignment correction unit configured to correct color misalignment resulting from positional misalignment between the developer images of respective colors on a transfer body by controlling an exposure unit in response to detected data indicative of the developer images detected in the detection signal, and an adjustment unit configured to identify a plurality of peak positions in the detection signal detected with respect to a single developer image and to adjust the detected data indicative of the developer images detected in the detection signal in response to difference in the peak positions.
Image forming apparatus with extended image carrier life
An image forming apparatus includes: plural image carriers that are disposed at intervals and in a line, and that are driven to rotate while carrying images; an intermediate transfer belt that have an endless shape, and that is disposed to be laid on plural rolls so as to be able to contact the image carriers; plural transfer rolls that rotate while being brought into contact with the image carriers through the intermediate transfer belt in a first position, respectively, so as to transfer the images on the image carriers to the intermediate transfer belt; and a moving mechanism that moves a part of the plural transfer rolls to a second position keeping apart from the plural image carriers while the part of the plural transfer rolls are kept in contact with the intermediate transfer belt.
Developing device with pulsation developer flow and image forming apparatus
In a developing device including a developer tank having a developing area tank and an agitating tank, a first agitating member, a second agitating member, a toner hopper, and a toner storing container, a toner replenishing port is formed in an agitating tank, and two flows of the developer are produced by a rotation of the first agitating member provided with a first agitating blade and a second agitating blade, from both ends of a longitudinal direction of the developer tank to a vicinity of the toner replenishing port. These two flows collides with each other in a vicinity of the toner replenishing port to produce a pulsation flow of the developer from the toner replenishing port into the toner storing container through the toner hopper.
Image forming unit, process cartridge, and image forming apparatus
An image forming apparatus includes a plurality of toner-image forming units. Each toner-image forming unit includes a photosensitive drum and a charging unit that is arranged to abut against or remain detached from the photosensitive drum, and that electrically charges the photosensitive drum. Each of the toner-image forming units forms an image of a different color. At least one of the charging units functions as a corona charging unit and at least another one of the charging units functions as a non-contact charging unit.
Pullout unit and image forming device
A pullout unit including a pullout component that is provided at a main body of a device so as to be able to be pulled out from the main body of the device, and that faces a conveying route surface of the main body of the device to form a conveying route on which an object to be conveyed is conveyed, and a scraping member that is provided at the pullout component at the inner side in a pullout direction in which the pullout component is pulled out, and that scrapes the object to be conveyed on the conveying route surface when the pullout component is pulled out, is provided.
Image forming apparatus and cartridge
An image forming apparatus includes a belt unit, a plurality of photosensitive drums, a cartridge, a casing, a cartridge holding unit and a first guide unit. The looped belt has a first surface outside of the loop, and is stretched to form a substantially straight portion on the loop that extends in a first direction. The casing has a base surface. The cartridge holding unit holds the cartridge at a first predetermined position in the casing. Each circumferential surface of the plurality of photosensitive drums contacts the straight portion of the first surface when the cartridge is held by the cartridge holding unit at the first predetermined position. The first guide unit guides the cartridge into the first predetermined position, and allows the plurality of photosensitive drums to move apart from the straight portion of the first surface when the cartridge is detached from the first predetermined position.
Charge corotron auto-cleaner device
High torque causing machine failures and motor damage are corrected by the embodiments of this invention. Springs are put on both ends of the lead shaft and the windings around the lead shaft are reduced to substantially reduce the torque created during a power on-power off situation in addition to during normal operations.
Image forming apparatus using peak AC potentials to move toner toward an image bearing member and a developer carrying member, respectively
An image forming apparatus includes a photosensitive drum to which an electrostatic image is formed and a developing sleeve carrying a developer including toner carrier. An alternating voltage is applied to the sleeve to form an alternating electric field between the sleeve and the drum to develop the electrostatic image with the developer. A relation |K1|<|K2| is satisfied, where K1: a slope at an electric field intensity Ed=|(Vp2−VL)/D|, K2: a slope at an electric field intensity Eb=|(Vp1−VL)/D|, VL: a potential [V] of the electrostatic image at which a maximum density is obtained, Vp1: a peak potential [V] that provides a potential difference to move the toner toward the drum, Vp2: a peak potential [V] that provides a potential difference to move the toner toward the sleeve, and D: a closest distance [m] between the drum and the sleeve.
Charge roll with axial end portions in contact with cleaning member and image forming apparatus
A charge roll disposed in an image forming apparatus, for charging an image carrier for carrying an image, and to be cleaned by a cleaning member, the charge roll including: a shaft and an electrically conductive layer provided around the shaft, an axial end portion of the electrically conductive layer in an area in contact with the cleaning member being formed into skin layer portions thinner than other portions of the electrically conductive layer, is provided.
Image forming apparatus that displays process information requiring execution relating to exchanged components,controlling method of the same
An image forming apparatus determines process items needed as exchanged components and an order of executing the process items needed for a plurality of kinds of exchanged components based on priority order information of the process items and causes a display unit to control a display for ordering to execute process items needed for the components according to the determined order of execution.
Paper change detection method
A method for detecting a media change includes the steps of comparing a previous media condition to a current media condition, detecting a media change when the previous media condition is in one state and the current media condition is not that one state and, prompting a user to make appropriate menu selections when the media change is detected.
Apparatus and method for generating an optical single sideband signal
A single sideband signal is generated from an input optical signal. An optical phase modulator performs optical phase modulation on the input optical signal in accordance with a control signal to produce the single sideband signal. A converter converts the input optical signal into a corresponding electrical signal. A control signal generator generates the control signal in response to an optical signal pulse shape of the input optical signal.
Optical transmitter, optical communication system and method for adjusting optical transmitter
An optical transmitter includes a light-emitting element, a driving circuit, a temperature detection unit, a storage device and a control circuit. The driving circuit causes, based on an input signal, the light-emitting element to emit an optical signal having a pulse shape. The temperature detection unit detects an ambient temperature of the light-emitting element. The storage device stores temperature characteristics information of the light-emitting element. The control circuit controls the driving circuit based on the ambient temperature detected by the temperature detection unit and the temperature characteristic information stored in the storage device, so that an extinction ratio of the optical signal having the pulse shape becomes substantially constant.
High immunity clock regeneration over optically isolated channel
An optically isolated circuit device includes a first opto-isolator circuit that is driven by a first clock signal, and the output of the first opto-isolator circuit is used to drive a phase-locked loop (PLL) that is configured to synthesize a second clock signal having a frequency that is a multiple of the first clock signal frequency. The second clock signal is used as an input to a suitable clocked circuit of a type that benefits from optical isolation, such as an analog-to-digital converter (ADC).
Information-processing system using free-space optical communication and free-space optical communication system
In a system for data communication between an information terminal to be operated by a user and remote communication nodes, the present invention intends to suppress the power consumption of the information terminal. For that purpose, communication nodes 2, 3 and 4 each emit diffuse light carrying a pilot signal blinking at a low frequency to notify the presence of the communication node and an ID signal belonging to a higher frequency range, the ID signal containing inherent address etc. for identifying each communication node. A mobile phone 1 as the information terminal captures an image and processes the image data to detect the pilot signal of each communication node. Then, determining the position of each node and setting a limited range for reading the pixels around that position, the mobile phone 1 reads the detection signals of the pixels within the limited range at high speed and obtains identification information. This information is used to identify each node and eliminate influences of any other light source that apparently resembles the pilot signal.
Fiber optic radio frequency distribution system
A scalable, flexible, automated radio frequency distribution system (FORFDS) employs fiber optics to eliminate the need for metallic/coaxial type interconnections between onboard and fixed-site radios and antennas. Key elements of the FORFDS may include, for example, 1) electrical to optical conversion (and vice versa) of RF signals, 2) optical switching, 3) automated control and monitoring, including Ethernet interfaces, and 4) high density packaging. The system is compatible with JTRS (2 MHz to 2000 MHz), is scalable and cost effective (no longer in the laboratory or concept high cost ranges), compared with known technologies.
Wavelength assignment in an optical WDM network
The path selection and wavelength assignment to a selected path are performed by mapping the wavelength reach to the demand distribution (agile reach) resulting in a 50-60% increase in the network reach. The network reach is further increased (about 2.2 times) when on-line measured performance data are used for path selection and wavelength assignment. The connections may be engineered/upgraded individually, by optimizing the parameters of the entire path or of a regenerator section of the respective path. The upgrades include changing the wavelength, adjusting the parameters of the regenerator section, controlling the launch powers, mapping a certain transmitter and/or receiver to the respective wavelength, selecting the wavelengths on a certain link so as to reduce cross-talk, increasing wavelength spacing, etc.
Passive optical network optical time-domain reflectometry
Optical Time-Domain Reflectometer (OTDR) troubleshooting of a passive optical network (PON) can be enhanced by deploying cascaded splitters, at least some of which have multiple inputs. That is, at least some of the splitters in the PON have not only a first input coupleable to the optical line terminator (OLT) or output of another splitter but also a second input directly coupleable to an Optical Time-Domain Reflectometer (OTDR). Optical time-delay reflectometry can be performed upon a selected portion or segment of the PON by selecting a splitter and transmitting an optical test signal from the OTDR directly to the input of the selected splitter and analyzing the reflected signal.
Methods and apparatus for optimizing utilization in reconfigurable optical add-drop mulitplexer based ring network
Techniques are disclosed for generating a hitless migration plan to optimal state, given an optimal routing and wavelength assignment for demands. For example, a technique for use in performing a circuit transition in accordance with an optical ring-based network comprises obtaining a first (e.g., initial) circuit layout and a second (e.g., final) circuit layout for a given set of demands to be routed on the optical ring-based network. The technique then comprises calculating a transition sequence plan useable to transition the network from the first circuit layout to the second circuit layout such that substantially no network service disruption occurs due to the circuit transition. The transition sequence plan is calculated by determining a minimum set of circuits that when moved from first positions in the first circuit layout result in a feasible transition sequence for remaining circuits in the first circuit layout. Wavelength equivalence and demand equivalence properties may be applied individually or jointly.
Disclosed is a flash device which includes a mounting portion removably mounting a flash device on a photographic apparatus, a first base having the mounting portion, a second base mounted on the first base such that the second base can turn around a shaft located approximately parallel with an optical axis of the photographic apparatus, and a flashlight-irradiating unit mounted on the second base such that the flashlight-irradiating unit can turn around a shaft at least in a vertical direction which is orthogonal to the optical axis of the photographic apparatus and is approximately horizontal when the photographic apparatus is located with a horizontal position. In the flash device, the first base has an auxiliary light irradiation unit to irradiate a photographic subject with auxiliary light.
Camera systems, methods and units therefor
A system whose most common use is that of inspecting conduits such as sewers, drainage pipes, water, gas and oil conduits. The system comprises the following individual components: a rotary contact assembly, a control unit, a push rod assembly, and a video camera assembly mounted on a carrier. It also includes a video display unit which may be on the carrier or separately provided. Each of these components may be easily disconnected and reconnected so that any failed component can be determined and replaced in the field, yet maintaining the system's integrity against damage from the type of effluent in which it is required to operate. There are novel splices for damaged wires and/or push rods. Such splices are for damage repairs and changes in length of push rod assemblies which can done in the field instead of having to return the entire system to have any repairs made.
Control electronics for brushless motors
An electronic control circuit controls a brushless DC motor. It includes an input power supply control circuit. A microcontroller integrated circuit has control functions to control a brushless DC motor. Additional control functions are provided by software program instructions, which when executed, cause the microcontroller integrated circuit to perform additional control functions for the brushless DC motor.
Broadcast program recording method and broadcast receiver, and information recorder for the same
A broadcast receiver includes a tuner section for receiving a broadcast program, an MPEG decoder 126 for converting a signal coming from the tuner section into a given format, and a hard disk drive (HDD) for recording the converted digital signal. In the broadcast receiver, a HDD medium of the HDD for recording the received broadcast program has, separately, a stream area for storing stream data as a video/audio signal, and a management data area for storing management data other than the stream data, and these areas are formatted by each different given unit. With such a structure, the broadcast receiver becomes highly-usable, requiring less time for the search operation on an HDD at the time of system startup. There is also a method for recording broadcast programs received by the broadcast receiver, and an information recorder for such use.
Recording medium, playback apparatus, program, and playback method
A BD-ROM contains a plurality of titles which can be branched among, and a Java application. The Java application is a program described in a programming language for a virtual machine. A life cycle where execution by the virtual machine is enabled is predetermined. Each of the titles contains an application management table indicates an application that has a life cycle bound to the title.
Apparatus for managing removable storage media that can be connected thereto, and method, program, and system LSI for managing removable storage media
A storage media management apparatus includes a dividing unit 63e that divides a content into a plurality of content parts, a management information generating unit 63c that generates a plurality of pieces of content management information in correspondence to the plurality of content parts, each piece of content management information including (a) reconstruction information for reconstructing the content by concatenating a corresponding content part with the other content parts, and (b) individual information for making the corresponding content part individually usable, a content recording 63d unit 63d that records each content part together with a corresponding piece of content management information onto a different one of the storage media, and a table editing unit 61 that judges whether the content is to be concatenated and made usable, or the content parts are to be individually made usable.
Cable exit trough with cover
A cable exit trough with pivoting cover. The cover having a cover plate and a pivot plate hingedly mounted thereto for easy access to the trough. The exit trough may define an insert aperture for receiving modular cable management inserts. The modular insert providing an additional cable management device such as a curved guidewall. The cable management device may alternatively be fixed to the cable exit trough. Removable snap-mounted flanges may also be included in the exit trough.
Fiber distribution hub having an adjustable plate
A fiber distribution hub includes a cabinet having a panel with an adjustable plate disposed on the back panel. The adjustable plate is selectively moveable between a first position on the back panel and a second position on the back panel to provide space adjacent to cable openings in the cabinet.
Fiber optic enclosure with external cable spool
A fiber optic telecommunications device includes an enclosure defining an interior. A first fiber optic adapter is provided at the enclosure. A spool is provided at an exterior of the enclosure. A fiber optic cable, which includes a first optical fiber, is wrapped around the spool. A first fiber optic connector is mounted at a first end of the first optical fiber. The first end of the first optical fiber is positioned within the interior of the enclosure. The first fiber optic connector is inserted within the first fiber optic adapter. The enclosure and the spool are configured to rotate in unison about a common axis when the fiber optic cable is unwound from the spool.
Apparatus and methods for achieving phase-matching using a waveguide
The present invention relates to an apparatus and methods for achieving phase-matching between various waves and/or modes by operation of a waveguide. Phase-matching between interacting waves is achieved by total internal reflection and transverse Bragg reflection waveguides. Using second harmonic generation in GaAs/AlGaAs as an example, properties are investigated and quantified such as nonlinear coupling efficiency, bandwidth, tunability, and limitations due to dispersion. The technique is advantageous when compared to alternate technologies, where it is particularly attractive as a material independent means to obtain ultra-low-loss nonlinear optical elements for monolithic integration with coherent light source and other active devices.
Asymmetric Mach-Zehnder interferometer having a reduced drive voltage coupled to a compact low-loss arrayed waveguide grating
The invention relates to an asymmetric Mach Zehnder Interferometer (MZI) having a reduced drive voltage, coupled to a compact low-loss arrayed waveguide grating (AWG) to provide a broader passband with low ripple. The integrated device has a compact stackable design for improved manufacturing yield. Inputs and outputs of the device are disposed in alignment on opposite sides of a silicon chip with the MZI having an opposite curvature to the AWG. To achieve this alignment, waveguide arms of the MZI are crossed without coupling between them before the optical signal is combined and coupled into the AWG.
Metal waveguide device and nano plasmonic integrated circuits and optical integrated circuit module using the same
Disclosed is a metal waveguide device, and nano plasmonic integrated circuits and an optical integrated circuit module using the same. The nano plasmonic integrated circuit module includes an input coupling unit, an input focusing unit, a surface plasmon polariton waveguide for guiding surface plasmon polaritons, a signal sensing/processing unit, an output defocusing unit, and an output coupling unit for converting surface plasmon polariton signals into optical signals. The optical integrated circuit module includes the nano plasmonic integrated circuit module, thus realizing highly integrated photonic circuits having a micro structure, low power consumption and low price.
Solid-state image pickup device, method of driving solid-state image pickup device and imaging apparatus
There is provided a solid-state image pickup device including: a pixel array portion which includes a plurality of unit pixels each having a photoelectric conversion element and an output transistor for outputting a signal according to charge obtained by photoelectric conversion of the photoelectric conversion element; a comparing portion which compares the signal output from each of the unit pixels with a ramp-shaped reference signal; a measuring portion which starts an operation in synchronization with the supply of the reference signal to the comparing portion, performs the operation until the comparison output of the comparing portion is inverted, and measures a time until the comparison of the comparing portion is finished; and a detecting portion which detects a predetermined image pickup condition and fixes the comparison output of the comparing portion to a state before the comparison starts when the image pickup condition is detected.
Magnification and pinching of two-dimensional images
In one embodiment, an embedded device is provided which comprises a region of interest defining mechanism to define a region of interest (ROI) within an image. A transformation mechanism of the embedded device applies a nonlinear magnification or pinching transformation to the region of interest such that magnification or pinching within the region of interest varies from a greater amount at a focal point of the region of interest to a lesser amount at an outer border of the region of interest.
Unified visual measurement of blur and noise distortions in digital images
A system and method are provided for unified visual measurement of blur and noise distortions in digital image data, the system including a processor, an input adapter in signal communication with the processor for receiving digital image data, a visual discrimination model (VDM) simulation unit in signal communication with the processor, a just noticeable difference (JND) analysis unit in signal communication with the processor, and a JND selection unit in signal communication with the processor; and the method including receiving digital image data, simulating a single-ended VDM, analyzing individual JND channels, including the responses of the highest spatial frequency channel(s), and selecting a reference JND level corresponding to low noise and blur distortions.
Methods to estimate noise variance from a video sequence
A noise estimation system that estimates noises in a sequence of video frames, uses a an image structure remover and a noise variance calculator. The image structure remover computes the difference over a local window in two consecutive frames. The noise variance calculator estimates the noise variance (standard deviation) from the distribution of the local difference. If there is no motion or small motion between two consecutive frames, the image structure can be removed by calculating the local difference, whereby very robust estimation is obtained.
Image processing device, image processing method, image processing program and computer-readable recording medium on which the program is recorded
An image processing device includes a region extraction unit, a region compression unit, and a region synthesis unit for synthesizing the image data of the regions compressed by the region compression unit. The device further includes a compression method selection unit for selecting a compression method for each region, wherein the selection unit selects the compression method in accordance with a type of the region from among the plurality of compression methods, and wherein for each type of region, the selection unit selects a compression method only from compression methods in the plurality of compression methods that are designated for the type of region. And, the region compression unit performs the compression process for the image data of each region using the compression method selected for the region by the compression method selection unit.
Data encoding apparatus, data decoding apparatus, data encoding method, data decoding method, and recording medium recorded with program
This data encoding apparatus includes: a prediction unit for calculating a prediction value of target data using read data; a subtractor for calculating a prediction error value, which is the error between the target data and the prediction value; a filtering unit and a subtractor for performing filtering on the prediction error value relating to the target data and a determined prediction error value, to calculate a corrected prediction error value relating to the target data; an absolute value calculation unit for calculating the absolute value of the corrected prediction error value; a k parameter determination unit for determining the code length of a fixed length code part using the flatness and dynamic range of the absolute corrected prediction error value; and a Golomb-Rice encoding unit for encoding the absolute corrected prediction error value by dividing it into a variable length code part and the fixed length code part.
Processing of images using a limited number of bits
The invention relates to a method as well as a system, a device, an encoder and a decoder, and a computer software product for image processing by the method. In the invention, the number of bits is limited in the bit string of a pixel to be processed, wherein the pixel is encoded with the limited number of bits. A prediction value corresponding to said pixel is searched for. If it is found, the difference between the pixel and the prediction value is determined, to select the method for encoding the bit string of said pixel. Also, a code word is encoded in the bit string, to indicate the selected encoding method. If the prediction value is missing, the number of bits in said pixel is limited by quantizing. By means of the invention, a fixed number of bits is obtained for all encoded pixels in an image.
Image processing apparatus and control method therefor
This invention switches the number of bits per pixel between object types when converting code information into image data, thereby rendering one entire page at high speed while minimizing the influence on print quality. For this purpose, an apparatus analyzes received PDL data, and generates a DL (Display List) serving as a rendering unit. The apparatus determines whether the DL is a character/line image or a halftone image including a photograph image. When determining that the DL is a character/line image, the apparatus resizes the DL in accordance with the resolution of a printer engine, and renders each color component at an 8-bit precision (integer). When determining that the DL is a halftone image including a photograph image, the apparatus resizes the DL in accordance with the resolution of the printer engine, and renders each color component at a 10-bit precision (8-bit integral part+2-bit decimal part).
Method for classifying a signal
The present invention relates to a method for classifying a signal (S). An intermediate signal (IS) is decimated in order to obtain a processed signal (PS) as a new intermediate signal (IS). A processed signal (PS) is compared with respect to the signal (S) to be classified to thereby generate comparison data (CompDAT). Based on the comparison data (CompDAT) said signal (S) to be classified is classified, thereby classification data (ClassDAT) are generated.
Apparatus and method for recognizing an image
Disclosed are an apparatus and a method for recognizing a specific subject from a still image or a moving image at a high speed. An object of the apparatus and the method is to reduce the amount of information required for image recognition. One feature vector value is extracted by using one feature template for dividing an image into a plurality of areas, and learning and image recognition is performed with respect to a subject to be recognized in the image using the extracted feature vector value.
Method and apparatus for extracting feature information, and computer product
An apparatus for extracting feature information from each of a plurality of electronic documents that constitutes a group of documents, for each of a plurality of viewpoints includes an extracting unit that extracts feature information from each of the electronic documents for each of the viewpoints, a calculating unit that calculates a score for each of the viewpoints with respect to the feature information that is extracted from more than one viewpoint, and a determining unit that determines the viewpoint for the feature information that is extracted from more than one viewpoint, based on the score calculated.
Precise grayscale character segmentation apparatus and method
Precise grayscale character segmentation apparatus and method. The precise grayscale character segmentation apparatus comprises an adjustment and segmentation unit for adjusting and segmenting an inputted low resolution text line image undergone coarse segmentation, so as to generate an adjusted character image; a character image binarization unit for generating a binary character image from the character image inputted therein; a noise removal unit for removing noise information in the binary character image generated by the binarization unit; and a final character image segmentation unit for generating a precisely segmented character image from the binary character image from which noise has been removed.
System and method for vascular segmentation by Monte-Carlo sampling
A method of segmenting tubular structures in digital images includes selecting a point in an image of a tubular object to be segmented, defining an initial state of the selected point, initializing measurement weights, a conditional probability distribution and a prior probability distribution of a feature space of the initial state, sampling the feature space from the prior probability distribution, estimating a posterior probability distribution by summing sample measurements weighted by the measurement weights, and segmenting a cross section of the tubular object from the posterior probability distribution.
Image processing device, image processing method, and storage medium storing program therefor
A image processing device has a reading unit, a graphics area extraction unit, a writing area extraction unit, a character string extraction unit and an association unit. The reading unit reads a document. The graphics area extraction unit extracts a graphics area from the document read by the reading unit. The writing area extraction unit extracts a writing area from the document read by the reading unit. The character string extraction unit extracts a character string presented in the graphics area. The association unit associates information of the writing area with the graphics area based on the character string extracted by the character string extraction unit.
Recognizing or reproducing a character's color
A method, apparatus and system, each capable of recognizing or reproducing a character color, are disclosed. An original image is divided into a character image and a background image. The color information of the character image is obtained to generate a color palette of the character image. A color, defined by the color palette, is assigned to each of the characters in the character image. The color palette may include a main color palette and a minor color palette.
Color form dropout using dynamic geometric solid thresholding
Dropping out of color form backgrounds from images of completed forms to obtain color form dropout images retaining only the respondent information. In one embodiment, a color form image processing method (100) includes retrieving (102) a template image, retrieving (104) a respondent image, registering (106) the images against one another to establish correspondence between pixels in the respondent and template images, dilating (108) the template image, and performing (110) a color form dropout including comparing (112) corresponding pixels in the respondent and dilated template images, and determining (114) whether to keep corresponding pixels by applying (116) a geometric solid threshold comparison to assess both color similarity and relative darkness, and removing (118) pixels from the respondent image based on such comparison.
Image collation system and image collation method
There are provided a three-dimensional data input means (10) for input the three-dimensional data of an object, a reference image storing unit (30) for storing a reference image of at least one object, a pose candidate deciding means (20) for generating a pose candidate that is a candidate for the pose of the object, a comparison image generating means (40) for generating a comparison image close to the reference image while projecting the three-dimensional data onto a two-dimensional image in accordance with the pose candidate, and an image comparing means (55) for performing comparison based on either a distance value or similarity degree between the reference image and the comparison image. This allows comparison or search to be performed with high accuracy even when the reference image of the object is captured under different conditions such as pose and illumination, even when no three-dimensional object model of the object can be obtained in advance, or even when only one or few reference images exist.
PC board inspecting method and apparatus and inspection logic setting method and apparatus
A PC board inspecting method capable of detecting deviation of an IC component at high speed with small storage capacity utilizes inspection logic particular to a component to be inspected. The inspection logic includes a color condition for specifying a color appearing in the body of the component to be inspected. The component is radiated with a plurality of color rays at different angles of incidence. An image formed by reflection light of the color rays is captured, and an inspection image including at least part of an edge of the body of the component to be inspected is captured. By using the color condition, a component body area satisfying the color condition is extracted from the inspection image by an image process.
Separator sheet handling assembly
A test assembly is used to determine a characteristic of a separator sheet. The test assembly includes a source of light to illuminate at least a portion of the separator sheet. The test assembly also includes a vision inspection system to record at least one discrete image of the illuminated surface of the separator sheet and apply at least one test to the discrete image to determine the characteristic of the separator sheet.
In order to check the authenticity of a banknote or other such document it is printed with two patches of magnetisable ink, and each patch is magnetised to present a multipole sequence of alternating polarity. If the document is folded to bring the two patches together and then rubbed to and fro in the direction of the pole sequences, they will be subject to alternating forces of attraction and repulsion which can be sensed through the fingertips and gives the impression of a physically rippled texture notwithstanding that the patches actually have a smooth surface. The presence or absence of this effect can therefore be used to distinguish between a genuine document bearing such magnetised patches and a counterfeit which may be visually identical but lacks the correct magnetisation. In a variant only one of the patches is printed on the document itself and the other is on a separate “key” device which is rubbed over it to test for the presence of the correct magnetisation.
Systems and methods for computer aided detection of spinal curvature using images and angle measurements
A method for providing automatic detection of curvature of a spine and computation of specific angles in images of the spine includes automatically displaying the curvature of the spine as a line in an image of the spine, and computing at least one of a first angle or a second angle based on the line of the curvature of the spine.
Method for processing available time/phase-dependent primary data sets of a computer tomograph of a displaced object to form a three-dimensional image sequence
A method and a device are disclosed for processing available time/phase-dependent primary data sets of a computer tomography of a displaced object, preferably a beating heart, in order to produce an image sequence 3D-recording set records for representing the displacement of an object. The method includes the following steps: calculating and representing of a 3D reference display of any particular orientation in relation to any particular displacement phase of an available present primary data sequence of a CT-scan, determining the desired calculation parameters of the image sequence which is to be calculated, single transfer of the calculation parameter to the calculation process and automatic creation of the entire image sequence with the predetermined calculation parameters.
System for and method of web signature recognition system based on object map
The present invention includes a system and a method of validating an identity of a user using a pointing device by comparing a sampled mouse signature with an authenticated mouse signature. The method includes presenting a virtual pad including a background graphic image, a plurality of objects positioned on the background graphic image to a user. The user moves the pointing device to manipulate a cursor on the background graphic image. The method includes a step of sampling a plurality of events corresponding to positions of the cursor to provide a sampled mouse signature including a set of position vectors. The present invention includes comparing the sampled mouse signature to a stored mouse signature representing the identity of a user, and validating the identity of a user in response to the comparing step.
System and method for iris identification using stereoscopic face recognition
Disclosed herein is a system and method for iris recognition including stereoscopic face recognition, which can recognize irises using a stereoscopic face recognition system in order to recognize an authenticatee. The system includes two or more face recognition cameras for photographing two or more face images of an authenticatee; a recognition system for receiving the face images photographed by the face recognition cameras from the face recognition cameras and creating stereoscopic face information on the basis of the face images; and one or more iris recognition cameras controlled by the recognition system to photograph focused irises of the authenticatee using the created stereoscopic face information.
Method and system for creating and operating biometrically enabled multi-purpose credential management devices
A method and system used to integrate and control multiple secure credentialing approaches including magnetic stripes, bar codes, contact and contactless SmartCard chips, Short Message Systems (SMS), Global Positioning Systems (GPS), vicinity type Radio Frequency Identification Devices (RFID), and proximity type RFID, into compact, self-powered, biometrically-protected devices.
Real-time image detection using polarization data
The present invention relates to a system and method of detecting polarized identification indicia in real-time. A frame of image data is provided having a plurality of pixels, wherein each pixel includes polarized light intensity information. An intensity value is determined for each of the pixels from the polarized light intensity information. A first portion of the pixels having intensity values within an intensity range is selected. The pixels in the first portion having similar angle of linear polarization values within a tolerance range are analyzed, thereby detecting the polarized identification indicia in the image data.
Correlation-based system for watermarking continuous digital media
A correlation-based system for watermarking continuous digital media at the system application level. It is a post-compression process for watermarking where no a priori knowledge of the underlying compression algorithm is required. Per each compressed media frame, a current unique digital signature is generated based on the data from the current compressed frame plus the digital signature that has been previously generated. The signature thus generated is then used in conjunction with the next compressed frame to generate the next unique digital signature. All digital signatures are correlated according to the above process until a “reset” signal is issued. A new chain of correlated digital signatures is produced by the system with a pre-determined initial signature.
Loudspeaker with air deflector
An air deflector is positioned relative to the through bore in the pole piece of the motor structure of a speaker such that the flow of air entering and leaving a cavity overlying the voice coil and pole piece is directed along a flow path which passes in thermal communication with at least a portion of the inner surface of the former of the voice coil opposite the wire winding on the outer surface of the former.
Hearing device with locking system for connectors
The present invention provides a hearing device with locking apparatus comprising a first component (10) with a housing (11) being adapted to be carried outside of or at the human body, a second component (20) to be inserted either partially or fully into an ear canal of a human body and connecting means connecting mechanically said first and said second component (10;20). The connecting means comprise a tube (30) and a first fastener (31) being arranged at one end of said tube (30) and being adapted to detachably connect said second component (20) with said connecting means. The first fastener (31) further comprises an individual locking element (5;9) to be swiveled into retaining or locking surfaces (24′) arranged within said second component (20), thereby contacting outer surfaces of said first fastener (31) in its connected state with said second component (20). The first fastener (31) thus will be detachably secured to the second component (20) of the hearing device.
Interchangeable attachment means for attaching a conductor to a hearing aid
Attachment means for attaching a conductor to a hearing aid having a hearing aid housing. The attachment means is adapted to be located partially in said hearing aid housing wall, so as to have a first part located in said hearing aid housing wall and a second part protruding through an aperture in said hearing aid housing wall.
Method for controlling a hearing aid
The invention relates to a method for controlling a hearing aid (1a, 1b) using a control unit (7), which is linked to the hearing aid (1a, 1b). The latter receives acoustic signals via a microphone (2a, 2b), amplifies said signals and outputs them by means of a loudspeaker (3a, 3b). In said hearing aid (1a, 1b) digital signals are processed according to a predetermined algorithm and data concerning the acoustic environment is created and forwarded to a control unit (7) via a communication interface (6a, 6b). To improve the quality and ease of operation, the data in the control unit (7) is analysed and an optimal algorithm is calculated, which is transmitted to the hearing aid (1a, 1b) via the communication interface (9).
Room impulse response
Audio loudspeaker and headphone virtualizers and methods use room impulse responses with modified individual head-related transfer functions prior to superposition including middle truncation; and perform convolutions in the frequency domain with zero-padded sections to avoid circular convolution overlap.
Audio apparatus for vessel
An apparatus (12) which overcomes the foregoing inconveniences of manually adjusting the audio device (10) volume related to a vessels speed and participants distance behind the vessel in a towable activity. This apparatus (12) controls audio volume levels (14) set at V2 and (16) set at V1 where V2 is greater than V1 and audio volume level (14) is achieved when vessels engine or propulsion shaft RPM is above set point (22) for a time greater than designated by (24), thereby controlling audio volume as a relation to vessel speed.
Audio bandwidth expansion
Bandwidth expansion for audio signals by frequency band translations plus adaptive gains to create higher frequencies; use of a common channel for both stereo channels limits computational complexity. Adaptive cut-off frequency determination by power spectrum curve analysis, and bass expansion by both fundamental frequency illusion and equalization.
Method for individually fitting a hearing instrument
A method for individually fitting a hearing instrument to a user, by: starting operation of the hearing instrument; pre-defining a desired target loudness function perceived by the user defined as function of frequency and input sound pressure level at the microphone; measuring for a given measurement parameter set of perceived loudness levels and frequencies or frequency bands the respective transducer input audio signal level to be applied to the transducer input to achieve the respective perceived loudness level at the respective frequency or frequency band, said measurement parameter set having at least a low, intermediate and high loudness levels, and said intermediate loudness level being measured for a larger number of frequencies or frequency bands and with a finer frequency resolution than said low and high loudness levels; calculating an individual gain function to be implemented in the audio signal processing unit to achieve the pre-defined target loudness function by taking into account the measured transducer input audio signal levels; and operating the hearing instrument with the individual gain function.
Method and system for providing audio-guided deployment of data processing systems
A method for providing audio-guided deployment of a data processing system is disclosed. An unpack instruction related to a data processing system in a first container for audio presentation is designated, and one or more position sensors in the first container are queried to determine whether the position sensors are spatially configured for audible presentation of the unpack instruction. In response to determining that the position sensors are not spatially configured for the audible presentation of the unpack instruction, a position sensor error message is audibly presented. One or more radio frequency sensors associated with the first container are queried to determine whether the first container contents are ready for audible presentation of the instruction, and in response to determining that the first container contents are not ready for audible presentation of the unpack instruction, a radio-frequency sensor error message is audibly presented. In response to determining that the first container contents are ready for audible presentation of the unpack instruction, audio-guided deployment of the data processing system is provided by audibly presenting the unpack instruction.
Rapid acquisition of state vectors in an encrypted data communication system
A state vector acquisition technique for a counter-based cryptographic data communication system is disclosed. The acquisition technique facilitates receipt of the state vector components (the short component and the long components) in any chronological order. The state vector components are saved upon receipt, and a counter for each long component is initialized upon receipt of the long component. After receipt of all components, the receiver device constructs a current state vector value based upon the received component values and the long component counter values.
System and method for access authentication in a mobile wireless network
A system and method is provided for authenticating access in a mobile wireless network. The system and method comprise exchanging an extensible authentication protocol (EAP) packet with an access terminal over a high rate packet data radio link and a signaling interface through a radio access network, encapsulating the EAP packet in an authentication authorization and accounting (AAA) packet, and sending the AAA packet to an authentication server for authentication.
Key establishment method and system using commutative linear function
Provided are a key establishment method and system using commutative linear functions. In the method, a server defines a set of linear functions that use elements of a first finite field as coefficients and satisfy a commutative rule, selects a first linear function from the set, and selects a predetermined element from a second finite field. Next, the server selects a second linear function corresponding to each of nodes from the set, generates a predetermined combination function based on the first and second linear functions, generates a value of the second linear function using the selected element as a factor, and transmits the combination function and the value of the second linear function to a corresponding node. Each node receives the value of the second linear function from a server, exchanges the received values with the other nodes, computes a value using the exchanged value as a factor of the combination function, and establishes the computed value as a shared key between the nodes. Therefore, each node can perform key establishment with a small amount of computation and low memory consumption, while guaranteeing end-to-end security.
Data authentication with a secure environment
Included are systems and methods for data authentication. At least one embodiment of a system includes a secure processor configured as a physically secure environment, the secure processor further configured to receive a control word from a headend, the secure processor further configured to encrypt the received control word using a first encryption key. Other embodiments of a system includes a transport processor configured to receive the encrypted control word, the transport processor further configured to decrypt the received control word using a first decryption key, wherein the first decryption key is compatible with the first encryption key.
Method and apparatus for integrating customer care inquiries across different media types
A method and apparatus for integrating queries across different media types so that the response time performance of a customer care agent, such as time to respond and/or time to repair can be uniformly measured are disclosed. The present method can provide configurable time to respond and time to repair targets on a per media type basis or on a per queue basis across all different media types. Individual media type and/or queue thresholds can be set and alarms and notifications can be triggered when customer care agents exceed these thresholds.
Method for verifying telephone call back information for return calls which are initiated via the internet
According to the inventive method, call back information is transmitted to a telephone network via an internet terminal using a click-to-dial service. In order to verify the information, the telephone network extracts internet terminal specific information from the access server via the internet. After comparing the call number information which is contained in the call back information and in the internet terminal specific information, the return call is initiated or suppressed. Return calls to subscribers who do not want to be called are thus suppressed.
Privacy screening services
A privacy screening service allows a subscriber to send a call screening request during a telephone call. The call screening request may comprise a Dual-Tone Multi-Frequency key (e.g., “Touch Tones”) on a telephone keypad, a softkey entry on a communications device, and/or a data message from an Internet Protocol phone or client application. The call screening request may store incoming line identification (ICLID) information of the connected communications signal in a database, add the ICLID information to a Do Not Call list, update a subscriber's profile with the ICLID information, and/or storing the ICLID information in a subscriber's blocked communications list. The Do Not Call list, the subscriber's profile, and/or the subscriber's blocked communications list may include communications instructions for the called number as well as include communications instructions for other registered communications addresses (e.g., other telephone numbers, an email address, and other communications addresses of the subscriber).
POTS battery removal for IP/ATM-based network equipment
The present invention discusses a method and apparatus for selectively providing a power to an alarm system, such as the power source provided by a telephone company, to alarm equipment located at customer's premises in a Fiber to the Premises (FTTP) telephone network. This power source is commonly used to power the POTS lines in a Service Provider's network. Two signals, one relating to the optical connectivity of the network and one relating to the connectivity of virtual circuits, are monitored at the customer premises. A logical operation is performed so as to remove a power source if either of the two signals is lost.
An X-ray tube is disclosed. The X-ray tube can include a cathode configured to emit electrons, an anode that has a surface arranged parallel to an emission direction of the electrons and is configured to collide with the electrons and emit X-rays, and a guide positioned between the cathode and the anode to modify the direction in which the electrons travel such that the electrons collide with the surface of the anode. The X-ray tube according to an embodiment of the invention can be used to improve the unevenness in X-ray intensity.
Imaging method and modality for medical application
A CT scanner pre-scans a patient by radiating rays of a lower amount from one direction to obtain a perspective prescanning image. An operator defines a main scanning area, in which images for medical application are to be captured, with reference to the prescanning image displayed on a monitor screen. A site recognizer analyzes data of the prescanning image to recognize anatomical structures located in the defined main scanning area. Based on the recognized anatomical structures and order data designating a site of inspection, it is judged whether the main scanning area corresponds to the site of inspection designated by the order data. If not, a warning is displayed on the monitor screen. The site recognizer may recognize all anatomical structures contained in the prescanning image, so that a default main scanning area may be defined on the basis of the recognition results and the order data.
Apparatus and method for supporting fuel assemblies in an underwater environment having lateral access loading
A fuel rack for supporting radioactive fuel assemblies in an underwater (or other submerged) environment that reduces the depth required for the pool to effectuate the fuel rack loading procedure. The fuel rack is specially designed to afford lateral loading. In one embodiment, the fuel rack comprises a body structure comprising at least one substantially vertically oriented elongated cell for receiving a nuclear fuel assembly, the body having a top, a bottom and a first lateral side; at least one elongated slot in the first lateral side of the body structure that forms a passageway into the cell through which a vertically oriented fuel assembly can be loaded; and means for supporting a fuel assembly within the cell in a substantially vertical orientation. In another embodiment, the invention is a method of laterally loading a fuel rack that utilizes rotation of the fuel assembly to secure the fuel assembly within its designated cell.
Data synchronization apparatus
A data synchronization apparatus is provided. The data synchronization apparatus comprises a first-in first-out buffer (FIFO buffer), a control circuit and a phase-locked loop (PLL). The FIFO buffer receives and stores a plurality of data and provides a FIFO adjustment signal according to the number of the data stored in the FIFO buffer. The data stored in the FIFO buffer are sent out to an external device at a clock rate derived from a master clock signal. The control circuit provides a PLL adjustment signal according to the FIFO adjustment signal. The PLL provides the master clock signal and adjusts the frequency of the master clock signal in response to the PLL adjustment signal.
Partial response receiver
A receive circuit for receiving a signal transmitted via an electric signal conductor. A first sampling circuit generates a first sample value that indicates whether the signal exceeds a first threshold level, and a second sampling circuit generates a second sample value that indicates whether the signal exceeds a second threshold level. A first select circuit receives the first and second sample values from the first and second sampling circuits and selects, according to a previously generated sample value, either the first sample value or the second sample value to be output as a selected sample value.
Iterative interference cancellation using mixed feedback weights and stabilizing step sizes
A receiver is configured for canceling intra-cell and inter-cell interference in coded, multiple-access, spread-spectrum transmissions that propagate through frequency-selective communication channels. The receiver employs iterative symbol-estimate weighting, subtractive cancellation with a stabilizing step-size, and mixed-decision symbol estimates. Receiver embodiments may be implemented explicitly in software or programmed hardware, or implicitly in standard Rake-based hardware either within the Rake (i.e., at the finger level) or outside the Rake (i.e., at the user or subchannel symbol level).
Broadcast signal receiver and control method thereof
The present invention relates to a broadcast signal receiver comprising a low noise amplifier for receiving an RF signal and selectively amplifying the received RF signal; a tuner for tuning the RF signal selectively amplified by the low noise amplifier to a predetermined channel; a signal analyzer for demodulating a signal output from the tuner and calculating a signal-to-noise ratio of the demodulated signal; and a controller for determining the strength of the signal output from the tuner, and controlling a selective amplifying operation of the low noise amplifier on the basis of the determined signal strength and the signal-to-noise ratio. Thus, the present invention provides a broadcast signal receiver and a control method thereof, which prevents poor picture quality when the LNA is turned on due to the RF signal having a weak electric field.
Frequency compensated communications reception
Frequency compensated communications reception includes compensating for frequency offset in a received signal by constructing a reference signal for comparison with a training sequence in a received signal. The reference signal is formed from basis functions and the training sequence. It is obtained by minimising a cost function J constructed from an adaptively weighted combination of basis functions, the training sequence, the received signal and a constraint requiring non-zero signal power. Multi-element antenna signals are weighted with a beamforming weight vector w in J given by formula (I), where X is a matrix of received signal samples, C is a diagonal matrix containing elements of the training sequence, F is a matrix having columns defining basis functions, v is a vector of adaptive weights, index H indicates complex conjugate transpose and λ is a Lagrange multiplier constraining beamformer power. A single element antenna signal x is scaled in J given by formula (II), where α is a scaling factor, * indicates a complex conjugate, and x is a vector of received signal samples.
System for processing and transmitting digital broadcasting signal and method thereof
A system for transmitting a digital broadcasting signal includes a supplementary reference signal (SRS) inserter receiving a dual transport stream in which a normal stream and a turbo stream are multiplexed, and inserting an SRS into a stuffing region provided in the dual transport stream, a Reed-Solomon encoder encoding the dual transport stream having the SRS inserted therein, an interleaver interleaving the encoded dual transport stream, a turbo processor detecting and encoding the turbo stream from the interleaved dual transport stream, stuffing the dual transport stream with the encoded turbo stream, and compensating for a parity corresponding to the encoded turbo stream, and a trellis/parity corrector performing a trellis encoding of the dual transport stream processed by the turbo processor, which can robustly process a turbo stream included in the dual transport stream and easily confirm the channel state between a transmitter side and a receiver side.
Space time transmit diversity (STTD) decoder within a HSDPA rake receiver
A Space Time Transmit Diversity (STTD) Decoder includes a physical channel despreader, a delay buffer, an upper processing branch, a lower processing branch and a combiner. The upper processing branch is operable to apply a conjugate of a first channel estimate to the delay buffer symbol output and produce non STTD encoded symbols. The lower processing branch is operable to read delayed delay buffer symbol outputs and apply a conjugate of a second channel estimate when active in the STTD mode. The lower processing branch then may apply an STTD decoder scheme to the delay buffer symbol output to produce non STTD encoded symbols. The combiner then combines the non STTD encoded symbols of the upper processing branch and non STTD encoded symbols of the lower processing branch to produce a single set of non STTD encoded symbols.
Apparatus, method and computer program product providing closed loop transmit antenna operation for systems using multiple antennas
A method includes determining weights corresponding to each of a plurality of antennas used to transmit data signals, each weight suitable to modify a corresponding one of the data signals prior to transmission using a corresponding one of the antennas; and transmitting information corresponding to at least one of the weights, the information allowing at least the at least one weight to be determined. Another method includes receiving information corresponding to at least one of a plurality of weights, the plurality of weights corresponding to a plurality of first antennas used to transmit first data signals, where each weight was used to modify a corresponding one of the first data signals prior to transmission using a corresponding one of the first antennas; using the received information, determining the plurality of weights corresponding to the plurality of first antennas; and using at least the plurality of weights; and decoding second data signals received using a plurality of second antennas to create at least one output signal.
Video encoding with motion-selective wavelet transform
A method encodes a video by applying a dual-tree discrete wavelet transform to the video to generate sequences of wavelet coefficients. The sequences are compressed to produce a compressed bitstream corresponding to the video. The compression iteratively selects the wavelet coefficients in a large to small order, and entropy encodes the selected wavelet coefficient.
Classifying image areas of a video signal
A method of enhancing picture quality of a video signal is disclosed. The method comprises the steps of receiving base layer images of standard definition pictures from a base layer decoder; defining image areas of the standard definition pictures; classifying image areas into image types by assigning a class number; and generating enhanced pictures based upon the standard definition pictures and the classification of the image areas. A circuit for enhancing picture quality of a video signal is also disclosed. The circuit comprising a base layer decoder; a classifier coupled to the base layer decoder, the classifier generating a class number for image areas of a standard definition picture; a summing circuit coupled to the classifier; an exchange stream decoder coupled to the summing circuit, the exchange stream decoder generating an index; and a codebook table coupled to the summing circuit. The codebook table preferably stores a plurality of codevectors based upon the class number and the index.
Decision feedback equalizer (DFE) architecture
A decision feedback equalizer (DFE) and method includes summer circuits to add a dynamic feedback signal representing an h2 tap to a received input and to speculate on an h1 tap. Data slicers receive and sample the outputs of the summer circuits using a clock signal to produce even data bits and odd data bits. First and second multiplexers receive the even data bits and the odd data bits. A first output latch is configured to receive an output of the first multiplexer to provide a select signal for the second multiplexer and to drive the dynamic feedback signal to an even half summer circuit of the summer circuits. A second output latch is configured to receive an output of the second multiplexer to provide a select signal for the first multiplexer and to drive the dynamic feedback signal to an odd half summer circuit of the summer circuits.
Channel equalizer, method and computer program for equalizing a channel
A channel equalizer, method and computer program for equalizing a channel. The channel equalizer may include a feed forward filter and a switching unit. The switching unit may receive a signal input to the channel equalizer and an output signal from the feed forward filter, and may supply one of the input signal and output signal as an input to the feed forward filter.
Signaling system with selectively-inhibited adaptive equalization
An integrated circuit having a receiver that selectively inhibits incoming data from being used to update adaptively generated controls. Sampling circuitry generates a plurality of samples of an incoming signal. Control circuitry generates an inhibit signal in either a first state or a second state according to whether the plurality of samples meets a randomness criterion. Tap weight update circuitry receives the inhibit signal from the control circuitry and updates a plurality of equalizer tap weights based on the plurality of samples if the inhibit signal is in the first state. The tap weight update circuitry refrains from updating the plurality of equalizer tap weights based on the plurality of samples if the inhibit signal is in the second state.
Link adaptation in wireless networks for throughput maximization under retransmissions
The present invention implements a method and system for dynamically adapting the modulation and coding scheme for radio links in a wireless communications network based on a retransmission environment model in order to maximize throughput and most efficiently allocate bandwidth resources. The present invention encompasses a refined calculus and methodology for deriving the link adaptation thresholds in a retransmission environment using a complex model and analysis of the retransmission environment. The present invention holds particular application for wireless data communications as opposed to real time data services because it is based on a retransmission model applicable primarily for data services. A critical component of this new link adaptation system is a “no transmission” cutoff mode that is selected for SIR below a base threshold value. This new mode prevents system instability and misallocation of bandwidth in a wireless communication system.
QoS control method for transmission data for radio transmitter and radio receiver using the method
A radio transmitter/receiver having a QoS control unit for outputting the transmission data in order taking the quality of service (QoS) into consideration. In the case where the information transmission rate for a radio section is not lower than a threshold value, the QoS control operation of the transmission data is omitted, and the transmission data are output in the order of input. In the case where the information transmission rate for the radio section is lower than the threshold value, on the other hand, the QoS control mode is switched in accordance with the information transmission rate for the radio section.
Semiconductor optical devices, systems and methods of manufacturing the same
A semiconductor optical device includes a silicon substrate and a Group III-V semiconductor gain layer. The Group III-V semiconductor gain layer is formed on the silicon substrate. The silicon substrate or the Group III-V semiconductor gain layer has a dispersion Bragg grating formed therein. In a method of manufacturing a semiconductor optical device, a Group III-V semiconductor gain layer is formed on a silicon substrate. A dispersion Bragg grating is formed on the silicon substrate or the Group III-V semiconductor gain layer.
Wavelength control in phase region of semiconductor lasers
Particular embodiments of the present invention relate generally to semiconductor lasers and laser scanning systems and, more particularly, to schemes for controlling semiconductor lasers. According to one embodiment of the present invention, a laser is configured for optical emission of encoded data. At least one parameter of the optical emission is a function of a drive current IGAIN injected into the gain section of the semiconductor laser and one or more additional drive currents I/VPHASE, I/VDBR. Mode selection in the semiconductor laser is altered by applying a phase shifting signal I/VΦ to the phase section that is synched with a wavelength recovery portions in drive current IGAIN such that a plurality of cavity modes are shifted by one half of the free spectral range at each wavelength recovery portion. In this manner, patterned variations in the wavelength or intensity profile of the laser can be disrupted to disguise patterned flaws that would otherwise be readily noticeable in the output of the laser.
Network device for embedding data in a data packet sequence
A network device is deployed in an in-line fashion, preferably at a data traffic point along a network. Depending on the constraints of data packets in a data packet sequence from a website, the network device is configured to modify some of the data packets or fabricate new data packets to embed the selected data in the data packet sequence. By keeping the headers of the data packets substantially identical, changes to a data packet or addition of a new data packet become transparent to users as well as to the website.
Wireless methods and devices employing plural-bit data derived from audio information
Wireless devices and methods employ steganography for a variety of purposes. An exemplary application is a battery-powered cell phone, having, e.g., a microphone, a speaker, a modulator, an antenna, and an RF amplifier. In such application, steganographic techniques can be employed to encode, or decode, signals processed by the phone. Some embodiments use an image sensor to capture watermarked image data. The phone can respond to detection of such marked imagery by overlaying distinctive graphics on a cell phone display screen. Such graphics may be positioned within the display, and affine-warped, in registered relationship with the position of the watermarked object, and its affine distortion, as depicted in the image data.
Boundary processing between a synchronous network and a plesiochronous network
The techniques described herein allow a more efficient transmuxing operation for transferring data from a synchronous domain (e.g., SONET) to a plesiochronous (e.g., PDH) domain as compared to the prior art, in which extraction of data streams, jitter filtering and stuff bit generation are processed separately. The techniques described herein include extraction of data from the plesiochronous data stream without complete extraction of the underlying native data stream. Filtering is performed based on synchronous timing, which results in a simpler filter design.
Network combining wired and non-wired segments
A local area network (60) within a residence or other building, including both wired (5) and non-wired segments (53). The wired segments are based on new or existing wires (5a, 5b, 5c, 5d, 5e) in the building, wherein access to the wires is provided by means of outlets (61a, 61d), such as a telephone system, electrical power distribution system, or cable television wiring system. The non-wired segments are based on communication using propagated waves such as radio, sound, or light (e.g. infrared). The wired and non-wired segments interface in the outlet, using a module (50) that serves as mediator between the segments. The module can be integrated into the outlet, partially housed in the outlet, or attached externally to the outlet. Such a network allows for integrated communication of data units (24b) connected by wires and data units (24a, 24d) connected without wires.
Device for generating a multimedia file addressed to a telecommunications terminal and related multimedia file
Different types of media (text, sound, animated images, . . . ) are transmitted to a relay center. According to the invention, this data is split up in terms of common synchronization points (PS0, . . . , PS4), and packets are assembled together combing all of the data of each media type that is defined between identical synchronization points. As a result, each packet contains data that is to be executed simultaneously on the telecommunications terminal. A particular application lies with mobile terminals.
Systems and methods for automatic provisioning of data flows
A system automatically provisions a data flow. The system provides a flow range. The system receives a data unit associated with an unprovisioned data flow, determines whether the unprovisioned data flow falls within the flow range, and creates an automatically provisioned data flow based on the unprovisioned data flow when the unprovisioned data flow falls within the flow range.
Universal controller and signal monitor
A universal controller supports multiple different computer protocols to enable endpoint communications between two or more electronic devices according to a desired protocol. Controller firmware modules embedded in an integrated circuit identify a particular protocol in a data communication received from a first external device, select from among multiple protocol drivers embedded in the modules a protocol driver corresponding to the particular protocol identified, and transmit content of the received data to one or more second external devices according to the particular protocol. The universal controller includes a bus translator module parsing bit streams received from the first external device into protocol data, status data, and content data, a protocol firmware module providing multiple different protocols drivers, and a control interface selecting, responsive to protocol data parsed, a particular protocol driver to establish data communication with a second external device according to the desired communication protocol. Data communication may originate from any of multiple second external devices, and different protocols may be transmitted simultaneously for multi-channel or redundant communication between the external devices.
Fallback for V.42 modem-over-internet-protocol (MoIP) gateways method and apparatus
The invented method and apparatus include a transport mechanism for transporting a non-V.42, e.g. a V.14 or synchronous modem, data stream in a modem relay connection utilizing the standard V.14 raw or character mode, the transport mechanism including a rate-control mechanism for substantially speed-matching the end-to-end flow of data. Preferably, speed-matching is based on a calculated effective data rate—which takes into account various character and link framing and compression overhead—rather than a physical layer rate. Rate-control methods include the use of receive not ready (RNR) to control data flow in a V.42 leg of a mixed non-V.42 and V.42 connection, a single leaky bucket technique and effective data rate-matching. Also proposed is a lossless compression mechanism (e.g. run-length encoding (RLE)) for encoding a data bit stream into modem relay packets. An auto-detection method on the non-V.42 leg in the character mode is proposed for determining character size to enable extraction and packetizing thereof for modem relay transmission.
Multicore communication processing
Mechanisms for processing of communications between data processing devices are provided. With the mechanisms of the illustrative embodiments, a set of techniques that enables sustaining media speed by distributing transmit and receive-side processing over multiple processing cores is provided. In addition, these techniques also enable designing multi-threaded network interface controller (NIC) hardware that efficiently hides the latency of direct memory access (DMA) operations associated with data packet transfers over an input/output (I/O) bus. Multiple processing cores may operate concurrently using separate instances of a communication protocol stack and device drivers to process data packets for transmission with separate hardware implemented send queue managers in a network adapter processing these data packets for transmission. Multiple hardware receive packet processors in the network adapter may be used, along with a flow classification engine, to route received data packets to appropriate receive queues and processing cores for processing.
Communication method and communication device as well as computer program
Communication performed within a network including a plurality of communication stations is provided, in which when an access control is performed so that communication timing of a packet can not collide with that of another station by detecting a signal which is transmitted from another station, “a header area processed not to become easily an error such as a physical layer header portion of a packet” which is transmitted from a communication station is made to have at least information which is required for extracting information in a payload of the packet and a field for controlling an access reservation of transmission of a packet which is generated as a result of transmission of another packet so that processing using the field can be performed.
Communication service provider that controls an access interface of an access provider where the access interface is located at a customer premise
A communication service provider transfers an access request to an access provider to support a service for a customer. The communication service provider receives an authentication code and a corresponding authorized action from the access provider and distributes the authentication code to service provider personnel authorized to initiate the corresponding authorized action. In response to an input by the service provider personnel, a control system transfers an action request to an access interface at the customer premise wherein the access interface performs the corresponding authorized action based on the authentication code and the corresponding authorized action.
Decomposed H.323 network border element for use in a voice-over-internet protocol network
A decomposed H.323 border element is disclosed that is useful for providing an entry point from one or more H.323-based networks into a SIP-based VoIP network. In one embodiment, the signaling element of the BE is separated into a separate functional entity from the media control element to facilitate a single signaling entity controlling multiple media entities. In another embodiment, the security element of the border element is also separated from the media control element so that firewall and network address translation elements may be performed by a separate functional entity. In a further embodiment, the media transcoding element is separated from the media control element. In a final embodiment, the internetworking facility between the SIP and H.323 element is separate from the H.323 gatekeeper elements.
Storage apparatus and data transfer method
A controller controls exchange of data between a plurality of storage units based on transfer rates of the storage units and a fixed rate. If at least one of the transfer rates of a transfer-source storage unit and a transfer-destination storage unit are different than the fixed rate, the controller accumulates a certain amount of data, and outputs accumulated data to the transfer-destination storage unit at the transfer rate of the transfer-destination storage unit so that data is transferred from the transfer-source storage unit to the transfer-destination storage unit at apparently at the fixed rate.
Queueing system for processors in packet routing operations
In a data-packet processor, a configurable queuing system for packet accounting during processing has a plurality of queues arranged in one or more clusters, an identification mechanism for creating a packet identifier for arriving packets, insertion logic for inserting packet identifiers into queues and for determining into which queue to insert a packet identifier, and selection logic for selecting packet identifiers from queues to initiate processing of identified packets, downloading of completed packets, or for requeuing of the selected packet identifiers.
Method and system for apportioning channels in a programmable multi-source, multi-destination system
This invention further features a method of apportioning channels in a programmable multi-source, multi-destination system, the method including determining the source for each channel by: a) computing the sum of the number of channels carried by the current and all preceding sources, b) computing a source identifier for each channel based on the computed sum of the number of channels carried by the current and all preceding sources, determining which section of the source the channel is located based on the computed source identifier, and determining the destination for each channel by: a) computing the sum of the number of channels carried by the current and all preceding destinations, and b) computing a destination identifier of the first channel sent to each destination based on the computed sum of the number of channels carried by the current and all preceding destinations.
Data communications method and structure
An embodiment of a method, system, and structure communicating messaging data in a header of a packet are provided. The data structure includes a data packet comprising a header and a payload, wherein part of the header includes first and second data portions, wherein the first data portion indicates a type of message encoded in the second data portion, and wherein the second data portion includes message data. An embodiment of a method includes encoding a communications message, which would otherwise be inclusive in a payload portion of a packet into a portion of a header of a packet, encoding an indication that indicates a type of messaging that said messaging is, and facilitating the communication of the packet to a destination.
System and method for path compression optimization in a pipelined hardware bitmapped multi-bit trie algorithmic network search engine
For use in a pipeline network search engine of a router, a path compression optimization system and method is disclosed for eliminating single entry trie tables. The system embeds in a parent trie table (1) path compression patterns that comprise common prefix bits of a data packet and (2) skip counts that indicate the length of the path compression patterns. The network search engine utilizes the path compression patterns and the skip counts to eliminate single entry trie tables from a data structure. Each path compression pattern is processed one stride at a time in subsequent pipeline stages of the network search engine. The elimination of unnecessary single entry trie tables reduces memory space, power consumption, and the number of memory accesses that are necessary to traverse the data structure.
System and method for optimal delivery of multicast content
Methods and systems consistent with the present invention provide a way to provide optimal delivery of multicast content by retail ISPs in a wholesale aggregation network environment. A broadband network gateway dynamically informs an access node of a mapping between a multicast domain corresponding to the retail service provider, allowing the gateway to send multicast data to the access node for replication to subscribers instead of replicating the multicast data at the gateway. The gateway dynamically informs the access node of the mapping using a standardized access node control protocol. The gateway can also dynamically instruct the access node to update or delete the mapping.
Multicast path building method and device
An RPF Neighbor having the least traffic flow is estimated and a multicast distribution path via the RPF Neighbor is selected so as to split the load between routers constituting the Equal-cost Multipath and lines.
Multicast system, communication apparatus, and multicast method for connection setup before multicasting
A message-type determining unit determines whether an IGMP message received from a user terminal is a join message. A table controlling unit determines that a connection needs to be established when receiving a join message from a user terminal. The table controlling unit determines that a connection needs to be removed when all the user terminals have left a multicast group. A CID obtaining unit obtains the CID of a connection to be established or removed. A C control-message generating unit generates a C control message to request connection establishment or connection removal. A C control-message transmitting unit sends the C control message to an OLT.
Reducing network traffic to teredo server
Methods and systems for reducing network load on a Teredo server.
Default route coding
A multi-level lookup table includes a plurality of search levels with each search level including a plurality of subtrees, each subtree representing a plurality of nodes. A search of the multi-level lookup table for an entry corresponding to a search key results in a value stored in an entry associated with the node in a subtree. A default value is associated with the root of the subtree. Multiple entries for the subtree can store the default value. To minimize route update time, the default value associated with the subtree is stored in a single location. Instead of storing the default value in multiple entries, each entry stores a use default indicator to indicate that the default value stored in the single location is to be used. To further reduce the number of locations to modify to update the default route, the single location can store an inherit indicator to indicate that the default value for the subtree is inherited from another subtree.
Unicast trunking in a network device
A network device for selecting a port from a trunk group to transmit a unicast packet on the selected port. The network device includes at least one trunk group including a plurality of physical ports. The network device also includes a table with a plurality of entries. Each entry is associated with one trunk group and includes a plurality of fields that are associated with ports in the trunk group. Each entry also includes a hash field that is used to select bits from predefined fields of an incoming unicast packet to obtain an index bit for accessing one of the plurality of fields. The network device transmits the unicast packet to a port associated with an accessed one of the plurality of fields.
Packet transmission control method, packet transmission control apparatus and packet transmission control program product
According to an embodiment, previous data group input time is subtracted from current data group input time in order to obtain a difference time each time a data group is input. The difference time is subtracted from a packet transmission interval in order to obtain an interval difference. The interval difference is added to a total difference time. If the total difference time is not greater than the first predetermined value, then the input data group is transmitted as a packet. Otherwise, the input data group is discarded and the total difference time is initialized to a value obtained by subtracting the packet transmission interval from the first predetermined value, if the total difference time is greater than the first predetermined value.
Apparatus and methods for handling shared services through virtual route forwarding (VRF)-aware-NAT
Methods and apparatus for performing NAT are disclosed. Specifically, NAT is performed at a service provider network device associated with an interface of a service provider network. When a packet is sent from a VPN to a node outside the service provider network (e.g., to access a shared service), the packet includes a VPN identifier (or VRF identifier) In accordance with various embodiments, each packet includes an MPLS tag that includes the VPN identifier. The VPN identifier is stored in a translation table entry. The storing of the VPN identifier will enable a reply packet from the shared service network to the customer VPN to be routed using a routing table identified by the VPN identifier.
Error notification and forced retry in a data storage system
A data transmission system includes a first data transmission device for receiving commands from a host; a second data transmission device for transmitting commands to a memory device; and a crossbar device for receiving commands from the first data transmission device over a first link and transmitting the commands to the second data transmission device over a second link. The crossbar device includes status logic to detect a command transmission error on the first link from the first data transmission device and transmits a retry command to prompt the first data transmission device to retry the transmission of the command over the first link. The second data transmission device reports a transmission error on the second link to the status logic of the crossbar device and the status logic of the crossbar device transmits the retry command to prompt the first data transmission device to retry the transmission of the command over the first link.
Apparatus and method for matrix memory switching element
A matrixed memory array device is disclosed that includes input ports and output ports. Each input port is coupled to a first data bus and each output port is coupled to a second data bus that is different and separate from the first data bus. A memory brick is placed at each cross-point between first data buses and second data buses so as to switchably couple frames of data from input ports to output ports. Each memory brick contains a plurality of eight transistor (8-T) memory cells that can be used to store, erase, read, write, and switchably couple a data bit from the input port to a corresponding output port.
Redundancy gateway system
A redundancy gateway system that can avoid short interruption of data communication caused by system switching in gateway units configured in a multiplex manner for a plurality of systems, and that can maintain the communication state prior to the system switching and avoid degradation of communication quality. A duplicate of a received packet is generated, thereby supplying the packet of the same content to a configuration of gateway units. For each packet, a common write pointer corresponding to identification information appended to the packet is generated. Each gateway unit writes the packet to its own jitter buffer in accordance with the common write pointer corresponding to each supplied packet, sequentially reads out the written packet from the jitter buffer, and generates a TDM signal. One of the gateway units is selectively switched and only the TDM signal generated by the one gateway unit is supplied to a TDM network.
IP telephony with user localization for call control management
Fixed station equipment automatically determines whether a telephony user is in close proximity to the station and then automatically adopts a profile that properly directs calls according to whether the user is “in-office” or is “away.” Call controls are automatically set corresponding to predetermined profiles of the user, and the station includes a computing device and a fixed telephone outlet. It is detected whether a short range, mobile transmitter corresponding to the user is within a predetermined distance of the station. When the transmitter is within the predetermined distance, then a near-station profile is adopted for the user, wherein the near-station profile directs calls within the IP telephony system to the fixed telephone outlet. When the transmitter is not within the predetermined distance, then an away profile is adopted for the user, wherein the away profile directs at least some calls within the IP telephony system to the user via a wireless communication system.
Method and system for inserting selected comfort signal
During communication over the network, periods of silence may exist. During these periods, the system may enable a user at a user terminal to select a type of comfort signal to be played. The system may monitor transmission to detect periods of silence. The system may adapt the monitored transmission by adding the selected comfort signal during the periods of silence, as background noise, or during periods of silence and as background noise.
Method and apparatus for dynamically debiting a donation amount
A method and apparatus for dynamically debiting a donation amount from an account in a communications network is described. In one embodiment, an interface associated with a network service bill used to allow a subscriber to designate the donation amount is provided to a customer. The data specifying the donation amount from said subscriber is then received by a dedicated application server. Afterwards, the donation amount is debited from the account associated with the network service bill.
Wide area network with a large number of endpoints and a high bandwidth optical backbone
The present invention relates to the networking of a large number of endpoints using a high bandwidth optical backbone. The large number of endpoints, which may be thousands or more in number, connect through a local access telecommunications networks to points of presence. From each point of presence, the connection with the endpoints are routed directly to an optical node, which provides access to and from the high bandwidth optical backbone. No intermediate network layer is employed between the point of presence and the optical node, thereby reducing network complexity, increasing network stability, and eliminating limitations on bandwidth available to the endpoints imposed by an intermediate network layer and communications protocols employed therein.
Identification fragment handling
A device stores forwarding information associated with fragments of a first data unit, stores information common to the fragments of the first data unit, receives fragments of a second data unit, and forwards the fragments of the second data unit based on the forwarding information of the first data unit and the information common to the first data unit.
Communicating control information in mobile communication system
The present invention relates to communicating control information in a mobile communication system, by which new control information can be transmitted more quickly. The present invention comprises transmitting a first data block comprising control information for transmitting first data when no resources for the transmission of the first data are available, receiving second data from an upper layer to be transmitted, wherein the second data has a higher priority than the first data, and transmitting a second data block comprising updated control information for transmitting the first and second data when no resources for the transmission of the first and second data are available.
Base station modulator/demodulator and send/receive method
A base station, in a mobile communication network, includes a receive component to receive, from a higher rank station in the network, a particular data unit that includes multiple data units multiplexed together; a master processor to determine that the first portion of the particular data unit is destined for the base station and that the second portion of the particular data unit is not destined for the base station, and discard the second portion of the particular data unit; and a slave processor to determine that the second portion of the particular data unit is destined for the other base station and that the first portion of the particular data unit is not destined for the other base station, and send the second portion of the particular data unit to the other base station.
Wireless LAN cell breathing
Utilization of wireless access points (APs) is optimized by dynamically managing transmitted AP power levels of beacon packets to control wireless AP coverage. This permits traffic congestion at one wireless AP to be reduced and shifted to other wireless APs. AP coverage management is provided by a centralized mechanism that employs various interpretations and/or measurements of client received power to handle dynamic changes in client workloads. The control does not require protocol changes to clients that utilize a wireless AP and can also incorporate hand-off costs and/or manufacturer specified power level constraints. Thus, these techniques can be employed in existing wireless LANs without impacting clients. Various instances are employable with continuous power and/or discrete power based wireless APs, providing a non-client impacted means to increase throughput and/or load balance.
Radio control device and method of selecting spread code
The object of the invention is to prevent reduction of the system capacity caused by the use of a channelization code belonging to the secondary scrambling code. Instead of trying to select a channelization code belonging to each of the primary and secondary scrambling codes for one cell in a conventional manner, selection of a channelization code belonging to the primary scrambling code is tried sequentially for a plurality of cells (S02, S04). If the selection of the code has been failed, it is determined whether selection is tried again under a different condition (S06). Then, when trying again, selection of a channelization code belonging to the secondary scrambling code is tried sequentially for the plurality of cells (S07, S09).
Method and apparatus for providing enhanced messages on common control channel in wireless communicaton system
A method and apparatus for providing new configurations for transmitting control information between a mobile terminal and a network using a common control channel (CCCH) logical channel/transport channel. The new configurations enable messages to be sent that are larger than currently allowed and the availability of the new configurations is indicated such that mobile terminals that do not support the new configurations are not impacted.
In a communication system including an external maintenance terminal and a communication device in which boards including a maintenance-and-operation board and a switchboard are installed, the switchboard is directly connected to the external maintenance terminal, and a predetermined address is assigned for use only in communication between the maintenance-and-operation board and the external maintenance terminal, and set in the switchboard. When communication is performed between ones of the boards, the switchboard connects the ones of the boards on the basis of the local addresses of the ones of the boards. When communication is performed between the maintenance-and-operation board and the external maintenance terminal, the switchboard connects the maintenance-and-operation board to the external maintenance terminal, and translates a global address of the external maintenance terminal into the predetermined address and vice versa.
Method and apparatus for acquiring point-to-multipoint MBMS service information in a wireless communications system
In order to prevent a receiving terminal from wasting system resource and power, the present invention provides a method of acquiring point-to-multipoint MBMS service information for the receiving terminal in a wireless communications system. The method includes the following steps of determining an activation state of MBMS services in the receiving terminal before the receiving terminal performs an MBMS point-to-multipoint Control Channel (MCCH) acquisition procedure, and performing the MCCH acquisition procedure by the receiving terminal if at least one MBMS service has been determined activated.
Method for adaptively reassigning addresses of nodes according to changes in volume of wireless network
A method of adaptively reassigning addresses of nodes according to changes in volume or a wireless network. The method includes receiving, at the node of the wireless network, information according to the changes in volume from a coordinator as a top level of the tree structure, calculating, at the node, a family tree indicating information and a location of the node in the tree structure according to an old logical address of the node and the information, and calculating a new logical address of the node according to the change in volume and the calculated family tree; and transceiving, at the node, a data packet according to the newly calculated logical address. Accordingly, overheads of the whole network for changing addresses may be reduced when changes in volume of the network occur, so that dynamic changes in volume of the network may be rapidly and actively implemented.
Webserver alternative for increased security
A system and method for preventing unauthorized access to a website's sensitive information in which a website web server is located on a public network with a public IP address and known port number, but only performs a listening function. The responding function is located on a separate device on a private network with a private and dynamic IP address and having a randomly assigned port number. The responder has no listening sockets (open ports expecting to receive from client application) and therefore does not listen to the public network, and therefore is not accessible to unauthorized access, much in the way that a private user's PC is not accessible to unauthorized access. The web server having the listening function does not initiate connection with the device having the responding function because its private IP address is unreachable from the public network and unknown, even to the web server, and by virtue of the fact that there are no listening sockets to accept any requests. Instead, the communication link between the device having the responder function and the web server having the listening function is initiated by the device having the responder function.
Conditional protocol control
In one embodiment, a system for adapting the interoperation of nodes in an information processing system is disclosed. The system includes a protocol handler, a protocol attribute information store and a protocol attribute selector. The protocol handler manages a first connection and a second connection over the network using a protocol. The protocol attribute information store holds a plurality of attributes. The protocol attribute selector evaluates first information related to a first connection, utilizes the protocol attribute information store to determine first protocol attributes corresponding to the first connection, and communicates the first attributes for the first connection to the protocol handler. Additionally, the protocol attribute selector evaluates second information related to a second connection, utilizes the protocol attribute information store to determine second attributes corresponding to the second connection, and communicates the second attributes for the second connection the protocol handler. The protocol handler uses first attributes for the first connection and second attributes for the second connection.
Systems and methods for the implementation of a remote test access feature using virtual connection points and sub-network connections
Systems and methods for the implementation of a remote test access feature using virtual connection points and sub-network connections by the merge-and-split of flexible permanent virtual circuits. A sub-network connection is created between a remote test set and a connection termination point of a circuit of interest through the provision of two endpoints of interest. Subsequently, monitoring and management capabilities are established and operation, administration, and maintenance functions are performed at a centralized location using a network management system. The remote tap used may employ any protection scheme and mesh restore, as necessary, either manually or automatically, in the event of signal degrade or failure scenarios. The endpoint of the remote tap may be selectively changed, and the remote tap re-groomed for a different circuit of interest via a simple point-and-click.
Network interface card transmission control protocol acceleration offload failure detection and recovery mechanism
A computer implemented method and data processing system for the detection and recovery of a network interface card TCP acceleration offload failure. Responsive to a failure to receive an acknowledgement of a transmission control protocol segment containing a request for a transmission control protocol offload function in a network interface card, the transmission control protocol segment is retransmitted without the request for a transmission control protocol offload function. When an acknowledgement of the retransmitted transmission control protocol segment without the request for a transmission control protocol offload function is received, a counter is incremented which indicates a failure of the transmission control protocol offload function. Responsive to the counter exceeding a predefined number of allowed failures, all requests to the transmission control protocol offload function for the network interface card are stopped.
Flow generation method for internet traffic measurement
Provided is a flow generation method for Internet traffic measurement. In the flow generation method, dependency between packet collecting time and flow generating time is removed using a virtual timer and a flow generation completion processing interval is controlled to skip by a unit time in response to a user's request. Also, a fragmented packet processing method is selectively used at need and a FIN timeout is applied selectively to a timeout mechanism used in flow generation completion. Thereby, this invention can improve accuracy and efficiency of Internet traffic measurement.
High performance probabilistic rate policer
A data flow rate policer enforces data flow policies for a number of data flows using a probabilistic policy enforcement mechanism. The policer includes a memory that stores the state of each data flow in a compact data structure. Additionally, the policer includes one or more policing engines that implement the actual data flow policies based on information derived from the data structures. The policing engines may be implemented in hardware to increase performance.
Method of and apparatus for transmitting residential Ethernet stream
Residential Ethernet stream transmitting method and apparatus are provided. The residential Ethernet stream transmitting method includes transmitting a data frame comprising multi-cycle traffic information and receiving the data frame within an admission control condition based on the multi-cycle traffic information.
Point-to-multipoint data transmission
The initial transmission of data packets in a point-to-multipoint communication network may often be delayed when retransmissions of erroneously decoded data packets are required. According to an aspect of the present invention, point-to-multipoint data transmission and retransmission of erroneously decoded data from a transmitting station to a plurality of receiving stations is performed, where retransmitted data is sent via at least one communication channel, which is different from the one used for the initially transmitted data. Advantageously, due to this there may be no need for further communication between the transmitting station and the receiving stations. Furthermore, according to an aspect of the present invention, the initial transmission of data packets is not delayed by retransmissions.
L2VPN redundancy with ethernet access domain
Redundancy for Virtual Private Network (VPN) service with an Ethernet access network is provided by a full-mesh of dedicated pseudowires connected among the network-facing provider edge (n-PE) devices, each of which is associated with the same Ethernet access network. A provider Bridge Protocol Data Unit (BPDU) generated by a provider bridge node in the Ethernet access network and received at an input interface of one n-PE device is relayed (without being processed) to all other n-PEs associated with that access network over the full-mesh of dedicated pseudowires. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
Method and apparatus for reliable communications in a packet network
A system and method are disclosed for reliable communications in a packet network. A system that incorporates teachings of the present disclosure may include, for example, a network management system (NMS) having a controller programmed to establish between first and second customer edge (CE) routers in a full mesh packet network first and second logical data tunnels conforming to an isolation protocol, synchronize packet data in the first and second logical data tunnels, enable packet data exchanges between the first and second CE routers over the first logical data tunnel, direct the first and second CE routers to duplicate the packet data exchanged between them over the second logical data tunnel, and direct the first and second CE routers to synchronously switch to the second logical data tunnel upon detecting a fault in the first logical data tunnel.
Fault tolerance in a wireless network
A wireless network comprises a plurality of nodes that communicate over wireless communication links. A virtual site is established at a primary node included in the plurality of nodes. A backup node is selected for the virtual site from the plurality of nodes. When the primary node is able to do so, the primary node performs predetermined processing for the virtual site and replicates at the backup node data related to the processing. When the primary node is unable to perform the processing, the backup node performs the processing for the virtual site using at least some of the data replicated at the backup node.
Communication connection control systems and methods
Communication connection control systems and methods are disclosed. If a control failure recovery function is to be enabled for a data communication connection established by a communication connection controller by communicating control information with a remote controller, an indication that the control failure recovery function is supported at the controller is included in the control information communicated with the remote controller. Each of the controller and the remote controller may support, for example, either or both of a local control information recovery function or a resynchronization function to reduce the amount of time that the data connection is interrupted during a temporary failure of one of the controllers.
Data detection method and receiver
A method of recovering data for use in a receiver that simultaneously receives a plurality of code division multiple access data signals, each data signal experiencing a similar channel response. A combined signal over the shared spectrum in a time slot is received and sampled. The combined signal comprises the plurality of data signals. The sampled signal is used to estimate the similar channel response, and a channel response matrix is constructed. A channel correlation matrix is constructed based in part on the estimated channel response matrix. A fast Fourier transform (FFT) decomposition of a circulant matrix approximation of the channel correlation matrix, and the sampled data signals, are used to determine a spread data vector. The spread data vector is despread to recover data from the matrix.
Diffraction element, objective lens unit, optical pickup and optical disc apparatus
A diffraction element for diffracting a particular wavelength of incident optical beam includes: a base section made from a first resin and provided with a predetermined diffraction pattern; and a cover section made from a second resin and covering the diffraction pattern, wherein a rate of change of refraction index of the first resin is substantially the same as a rate of change of refraction index of the second resin in a temperature range between a first temperature and a second temperature.
Optical pickup apparatus and method to reproduce information onto and from discs having different thicknesses and storage capacities
An optical pickup apparatus and method for recording and/or reproducing information onto and/or from optical discs having diverse specifications. Particularly, a diffraction grating for use in the optical pickup apparatus includes a substrate for refracting an output beam from a laser diode at a predetermined refractive index, a liquid crystal for refracting the beam, which is transmitted through the substrate, at a different refractive index and direction according to a track pitch of the optical disc, an electrode material for supplying power to the liquid crystal, and a switch for controlling power supply to the electrode material. Electrode materials are aligned with various spacing in order to change the refractive index of the liquid crystal according to the wavelength of a laser and the specification of an optical disc used. Also, power supply to the electrode materials is controlled depending on the optical disc specification.
Drive and method for determining the type of optical record carrier
The present invention relates to a drive for accessing an optical record carrier (2) comprising means (4) for determining the type of record carrier, in particular for distinguishing a read-only record carrier from a recordable or rewritable record carrier having a wobbled groove in the lead-in zone, said means comprising: a DPD measuring unit (41) for measuring the differential phase detection (DPD) signal, a PP measuring unit (42) for measuring the push-pull (PP) signal in case no DPD signal could be measured, a wobble locking unit (43) for locking, in case a PP signal could be measured, to the wobble embedded in said wobbled groove using a first and/or a second polarity setting, and an indication unit (44) for generating a first indication signal indicating that the record carrier is a read-only record carrier if a DPD signal could be measured and that the record carrier is a recordable or rewritable record carrier if no DPD signal but a PP signal could be measured and if locking to the wobble has been successful. In a further embodiment a second indication signal in generated indicating the type of polarity in case of a recordable or rewritable record carrier.
Optical disk apparatus and data read-out control method
An optical disk apparatus includes an optical pickup head (PUH) which outputs a laser beam through an objective lens. When a control unit receives an instruction to halt data read-out from an optical disk, the control unit moves the PUH to a predetermined position, stores a focus driving voltage corresponding to a position of the objective lens in a memory unit, and halts the output of the laser beam from the PUH. When the control unit receives an instruction to resume the data read-out, the control unit resumes the output of the laser beam from the PUH, starts a focus search on the basis of the focus driving voltage that is stored in the memory unit, moves the objective lens in a direction toward the optical disk, and achieves focus adjustment.
Cassette library device and method of controlling the attitude thereof
A cassette library apparatus and a posture control method thereof are provided. A swing arm (16a) is capable of chucking or releasing a cassette (1) by getting into a recessed part (10a) of the cassette (1) and getting out of the recessed part (10a) when a swing frame (34) swings up and down. The apparatus includes a swing mechanism (47, 48) for swinging the swing frame (34) and the swing arm (16a), a stepping motor (45) for driving the swing mechanism (47, 48), a device (51, 52) which detects the swing arm (16a) being in a specific posture, and a device (55) which detects the posture of the swing arm (16) by counting a number of pulses supplied to the stepping motor (45) when the posture of the swing arm (16a) is changed from the specific posture by drive of the stepping motor (45).
Address synchronous circuit capable of reducing current consumption in DRAM
An address synchronous circuit includes an address control signal generating unit for generating a control signal in response to operation mode signals of a semiconductor memory and an internal clock signal, and an address synchronous unit for controlling output of an address which is buffered in accordance with a clock enable signal, in response to the control signal.
Driving method and driving circuit and low power memory using the same
A driving circuit includes a first switch, a first driver and a second driver. The first switch has a first terminal coupled to a first voltage. The first driver includes a second switch and a third switch. The second switch has a first terminal coupled to a second terminal of the first switch, and a second terminal coupled to a first capacitor. The third switch has a first terminal coupled to the second terminal of the second switch, and a second terminal coupled to a second voltage. The second driver includes a fourth switch and a fifth switch. The fourth switch has a first terminal coupled to the second terminal of the first switch, and a second terminal coupled to a second capacitor. The fifth switch has a first terminal coupled to the second terminal of the fourth switch, and a second terminal coupled to the second voltage.
Differential latch-based one time programmable memory
A differential latch-based one time programmable memory cell is provided. The differential latch-based one time programmable memory cell includes a differential latching amplifier having a first set of fuse devices coupled to the first input and a second set of fuse devices coupled to the second input. Only one set of fuse devices can be programmed in a memory cell. If one or more fuse devices in a set of fuse devices are programmed, the side having the programmed fuse will present a lower voltage at its input to the differential latching amplifier. Differential latching amplifier outputs a “0” or a “1” depending on the side having the programmed fuse.
Semiconductor memory device and method for operating the same
Semiconductor memory device and method for operating the same comprise an auxiliary driver configured to output an internal strobe signals generated corresponding to a read command as a plurality of auxiliary strobe signal in response to a control signal, wherein the auxiliary driver bypass a first output auxiliary strobe signal, and delay to output the rest of the auxiliary strobe signal among the outputted auxiliary strobe signal and a strobe signal generator for driving the auxiliary strobe signal to output the delayed auxiliary strobe signal as a data strobe signals.
Circuitry and method for indicating a memory
Circuitry and a method for indicating a multiple-type memory is disclosed. The multiple-type memory includes memory blocks in communication with control logic blocks. The memory blocks and the control logic blocks are configured to emulate a plurality of memory types. The memory blocks can be configured into a plurality of vertically stacked memory planes. The vertically stacked memory planes may be used to increase data storage density and/or the number of memory types that can be emulated by the multiple-type memory. Each memory plane can emulate one or more memory types. The control logic blocks can be formed in a substrate (e.g., a silicon substrate including CMOS circuitry) and the memory blocks or the plurality of memory planes can be positioned over the substrate and in communication with the control logic blocks. The multiple-type memory may be non-volatile so that stored data is retained in the absence of power.
Mask ROM with light bit line architecture
For improving performance of mask ROM, bit line is multi-divided for reducing capacitance, so that multi-stage sense amps are used for reading, wherein a local sense amp receives an output from a memory cell through the bit line, and a global sense amp receives the local sense amp output. By the sense amps, a voltage difference in the bit line is converted to a time difference for differentiating data “1” and data “0”. For example, data “1” is quickly transferred to an output latch circuit through the sense amps with high gain, but data “0” is rejected by a locking signal based on data “1” as a reference signal. Furthermore, a buffered data path is used for transferring data wherein the buffered data path includes a forwarding write line and a returning read line. Additionally, alternative circuits and memory cell structures for implementing the mask ROM are described.
Pipe latch device of semiconductor memory device
A pipe latch device includes an output controller for outputting first and second output control signal groups based on a DLL clock signal and a driving signal; an input controller for generating an input control signal group; and a pipe latch unit for latching data on a data line when a corresponding input control signal is activated, and outputting latched data when a corresponding output control signal is activated, wherein the output controller includes a plurality of shifters, each for delaying an input data signal by half clock and one clock to output a first and second output signals in synchronization with the DLL clock signal and the driving signal; and a plurality of output control signal drivers for outputting the first and second output control signal groups based on the first and second output signals.
Storage device employing a flash memory
A semiconductor disk wherein a flash memory into which data is rewritten in block unit is employed as a storage medium, the semiconductor disk including a data memory in which file data are stored, a substitutive memory which substitutes for blocks of errors in the data memory, an error memory in which error information of the data memory are stored, and a memory controller which reads data out of, writes data into and erases data from the data memory, the substitutive memory and the error memory. Since the write errors of the flash memory can be remedied, the service life of the semiconductor disk can be increased.
Method for erasing a P-channel non-volatile memory
A present invention relates to a method of erasing a P-channel non-volatile memory is provided. This P-channel non-volatile memory includes a select transistor and a memory cell connected in series and disposed on a substrate. In the method of erasing the P-channel non-volatile memory, holes are injected into a charge storage structure by substrate hole injection effect. Hence, the applied operational voltage is low, so the power consumption is lowered, and the efficiency of erasing is enhanced. As a result, an operational speed of the memory is accelerated, and the reliability of the memory is improved.
Method of operating non-volatile memory device
An operation of a non-volatile memory device. A method of operating a non-volatile memory device in accordance with an aspect of the present invention, a first program operation is performed by applying a first program voltage to word lines of memory cells, constituting a memory block. As a result of the first program operation, threshold voltages of the memory cells are firstly measured. A second program operation is performed using a second program voltage, which is increased as much as a difference between a first threshold voltage, that is, a lowest voltage level of the firstly measured threshold voltages and a second threshold voltage, that is, an intermediate voltage level of the firstly measured threshold voltages. The second program operation is repeatedly performed by increasing the second program voltage as much as the difference between the first and second threshold voltages until the lowest threshold voltage becomes higher than a program verify voltage. A pass voltage is then set by reflecting a first voltage level, that is, a difference between a program voltage applied in a last program execution step and the first program voltage.
Non-volatile memory and method for ramp-down programming
A ramp-down programming voltage is used to program a group of nonvolatile memory cells in parallel, step by step from a highest step to a lowest step. Overall programming time is improved when a conventional setup for program inhibit together with a verify after each program step are avoided. A program voltage estimate is provided for each cell indicating the programming voltage expected to program the cell to its target. Initially, all but those cells having estimates at or above the current program voltage step will be program-inhibited. Thereafter, with each descending program voltage step, additional cells will be un-inhibited. Once un-inhibited, a cell need not be re-inhibited even if programmed to its target. This is because subsequent program steps are at lower voltages and ineffective in programming the cell beyond its target. The un-inhibit operation in one implementation amounts to simply pulling the associated bit lines to ground.
Method of determining a flag state of a non-volatile memory device
In a method of determining a flag state of a non-volatile memory device, an arithmetic logic unit of a microcontroller is employed without an additional circuit. The method includes providing n flag state information about n flag cells, resetting an entire flag state information value, sequentially reading first to n flag state information, increasing the entire flag state information value depending on a read result of the first to n flag state information, and determining a flag state by comparing the entire flag state information value and a critical value.
Flash memory device having multi-level cell and reading and programming method thereof
There is provided a flash memory device with multi-level cell and a reading and programming method thereof. The flash memory device with multi-level cell includes a memory cell array, a unit for precharging bit line, a bit line voltage supply circuit for supplying a voltage to the bit line, and first to third latch circuits each of which performs different function from each other. The reading and programming methods are performed by LSB and MSB reading and programming operations. A reading method in the memory device is achieved by reading an LSB two times and by reading an MSB one time. A programming method is achieved by programming an LSB one time and programming an MSB one time. Data having multi-levels can be programmed into memory cells by two times programming operations.
Method of operating a flash memory device
A method of operating a flash memory device wherein the width of threshold voltage distribution of memory cells is adjusted by setting different conditions of a program operation in accordance with levels of threshold voltages of the memory cells. As a result, width of the threshold voltage distribution of memory cells may be narrowed.
Voltage conversion device and vehicle
A DC/DC converter includes a reactor, IGBT devices, a dead time generation unit, and a DC-CPU. The dead time generation unit operates in response to a reference signal for a duty ratio, to output first and second activation signals provided with an inactive period corresponding to a dead time preventing both of the IGBT devices from conducting. The DC-CPU corrects a tentative duty ratio calculated as based on a voltage control value, in accordance with a value of a current flowing through the reactor, to output the reference signal. Preferably the DC-CPU associates the value of the current of the reactor with three states and when the value approaches a value at which a state transitions to a different state, the DC-CPU gradually switches a correction value.