System and method for call path enforcement
Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for call path enforcement. The method includes tracking, during run-time, a run-time call order for a series of function calls in a software program, and when executing a protected function call during run-time, allowing or causing proper execution of a protected function call only if the run-time call order matches a predetermined order. The predetermined order can be an expected run-time call order based on a programmed order of function calls in the software program. The method can include maintaining an evolving value associated with the run-time call order and calling the protected function by passing the evolving value and function parameters corrupted based on the evolving value. The protected function uncorrupts the corrupted parameters based on the passed evolving value and an expected predetermined call order. A buffer containing the uncorrupted parameters can replace the corrupted parameters.
Anti-cheat facility for use in a networked game environment
The invention is directed to detecting and taking action against unauthorized behavior, such as cheating, committed by a participant in a networked game. A game client receives from an anti-cheat server one or more encrypted blocks containing executable code and computer-readable data. The anti-cheat server transmits a series of challenges, at periodic or randomly-determined intervals, to the game client. A challenge includes instructions regarding the decryption and manipulation of a black box. The anti-cheat server monitors responses, if any, by the game client to the challenges, and determines whether the game client is engaged in unauthorized behavior. The nature of a challenge is such that the player is not easily able to determine or predict whether the challenge actually performs a meaningful cheat-detection procedure, whether the challenge is identical to a challenge received by another player, and whether the challenge is substantially the same as a previously-received challenge.
Identifying data associated with security issue attributes
A method for identifying data related to a software security issue is provided. The method includes accessing a software security issue and determining one or more attributes associated with the software security issue. The method also includes accessing aggregated software security data retrieved from a plurality of on-line sources and searching the aggregated software security data for the attributes associated with the security issue. The method further includes associating a portion of the aggregated data with the security issue based on matching the attributes associated with the security issue with contents of the portion of the aggregated data.
Integrating anti-virus in a clustered storage system
A method and system for integrating anti-virus in a clustered storage system. A clustered storage system provides anti-virus scanning with third-party software components. Specifically, the clustered storage system receives a request to access data from a client, retrieves the data from storage, and scans the data for viruses with third party software components that have been previously provided any one of a number of third party software vendors. If the data is free of viruses, the clustered storage system communicates the data to the client. Otherwise, the clustered storage system attempts to apply remedial actions to the infected file. For example, the clustered storage system may attempt to repair the file by removing the virus. If remedial action successfully removes the virus, the clustered storage system communicates the requested data to the client. Otherwise, the clustered storage system communicates an access denied message to the client.
Filtering malware related content
A submission filtering component filters malware related content received for analysis. The submission filtering component determines an analysis priority rating for each source from which malware related content is received. An analysis priority ratings is based on various factors indicative of how likely the source is to transmit malware related content that is important to analyze. The malware filtering component transforms the received stream of malware related content into a subset to be analyzed, based on the analysis priority ratings associated with sources from which malware related content is received. A malware analysis component analyzes the subset of malware related content.
Embedded system with authentication, and associated authentication method
An embedded system with authentication includes: a system read only memory (ROM), a processing circuit and an authentication circuit. The system ROM is arranged to store a boot code. In addition, the processing circuit is arranged to process at least according to the boot code in order to perform operations of the embedded system. Additionally, the authentication circuit is arranged to perform authentication on a command script in order to determine whether the command script is authenticated, and is arranged to prevent the command script from being executed by the processing circuit when the authentication circuit determines that the command script is not authenticated, wherein the command script is received from outside a chip where the system ROM, the processing circuit and the authentication circuit are positioned.
Image reading apparatus, authentication method, evaluation system, method, and computer program product
A TPM chip installed in an image reading apparatus records an operation log, and encrypts recorded operation log with a secret key. The image reading apparatus transmits encrypted operation log to an evaluation apparatus. The evaluation apparatus receives the encrypted operation log, decrypted received operation log, and evaluates an operation performed on the image reading apparatus based on decrypted operation log.
System and method for detection of network attacks
Disclosed are systems, methods and computer program products for detection of network attacks on a protected computer. In one example, the system comprises a proxy device configured to redirect and mirror traffic directed to the protected computer; a traffic sensor configured to collect statistical information about the mirrored traffic; a data collector configured to aggregate information collected by the traffic sensor and to generate traffic filtering rules based on the aggregated statistical information; a filtering center configured to, in parallel with collection of statistical information, filter redirected traffic based on the traffic filtering rules provided by the data collector.
System and method for a dynamic policies enforced file system for a data storage device
An autonomous data storage device for storing data files via an external file interface, the external file interface being controllable from an external device, the device comprising: a physical file storage for homogenous storage of files; the external file interface configured to allow sector level access to at least part of the physical file storage to support standard operating file system calls; an internal sector policy management unit located in between the external file interface and the physical file storage for sector level policy enforcement of the physical file storage, for one or more of the sector level managed sectors, the unit having an input for receiving instructions from the external file interface for sector oriented operations, and being configured to carry out sector policy management operations in accordance with.
Establishing trust relationships between computer systems
An offline trust system establishes a trust relationship between a trust authority computer system and a target computer system without relying on an active network connection between the computer systems. The offline trust system separates the trust establishment operation into a provisioning phase and a configuration phase. The provisioning phase can be performed entirely on the trust authority, while the configuration phase can be performed entirely on the target computer system requesting trust. The two phases can be performed at different times and do not assume any connection between the two computer systems. An administrator may perform the provisioning phase for many target computer systems at the same time. Thus, the offline trust system provides a way to establish trust between computer systems that is more reliable and less prone to failure.
Authorization and authentication based on an individual's social network
An individual's social network is used to authorize information flow to the individual and to authenticate the individual for access to certain information or services. Information flow to the individual is authorized if the source of the information is a member of the individual's social network who is connected to the individual along a path that does not traverse through anyone on a gray list of the individual. The black list identifies those members who previously sent unwanted communication to the individual or posted content that was deemed offensive by the individual. The gray list identifies those members who are one degree separated from any black list member. The individual is authenticated for access to certain information or services if a member of the individual's social network already has access and this member is connected to the individual along a path that does not traverse through anyone on a gray list of the individual, or if members of the individual's social network who are connected to the individual along a path that does not traverse through anyone on a gray list of the individual have an average authentication rating that is at least a minimum value.
Backup and archival of hosted online content
A system and method for the backup and archival of online content. In one embodiment, an archival manager receives user authentication information corresponding to a user account, wherein the user account corresponds to a website hosted by at least one content server, the website enables a user to create and store online content associated with the user account, and the online content associated with the user account is stored on a memory accessible by the at least one content server. The archival manager receives an archival schedule, wherein the archival schedule specifies at least one parameter for archiving the online content. According to the archival schedule, the archival schedule periodically archives the online content to an archive server.
Computer information security system and operation method thereof
The present invention relates to a computer information security system and method, the system includes a connection device and a sensor. When the connection device plug in to the predetermined computer, the sensor and the connection device are conjoint, a first identification code can be stored to the computer through the connection device, and generated an initialization setting of the second identification code to the sensor through the connection device. Therefore, when the sensor is out of the predetermined range of the connection device, the connection device will control the computer for encoding to prevent unauthorized user to use the computer; when the sensor is located within the range of the predetermined range of the connection device, the connection device will automatically input the first identification code to the computer to enable the user to directly use the computer without inputting the first identification code to avoid the complicated procedure of inputting the first identification code when the user return to work on the computer, thus to reinforce the security to the information in the computer and to make the operation more convenient.
Method and system for managing the functionality of user devices
A method for managing the functionality of a user device is provided that includes storing security information for a secure zone in a user device. The security information for the secure zone includes at least one peripheral associated with the secure zone. Based on the security information for the secure zone, the at least one peripheral associated with the secure zone is automatically disabled when the user device enters the secure zone.
Virtual distributed security system
A distributed security system is provided. The distributed security system uses a security policy that is written in a policy language that is transport and security protocol independent as well as independent of cryptographic technologies. This security policy can be expressed using the language to create different security components allowing for greater scalability and flexibility. By abstracting underlying protocols and technologies, multiple environments and platforms can be supported.
Broadcast receiving apparatus, application transmitting/receiving method and reception status information transmitting method
A broadcast receiving apparatus, application transmitting/receiving method and reception status information transmitting method are disclosed, by which information associated with a broadcast reception status can be transmitted to a broadcast transmitting terminal and by which a problem of a storage device can be transmitted to a broadcast transmitting terminal in advance in case of attempting to receive an application or the like that will be transmitted by the broadcast transmitting terminal. The present invention includes collecting information indicating a remaining size of the storage device and transmitting the collected information according to a network management protocol.
Network camera apparatus and distributing method of video frames
When a request for a transmitting method of video frames of the client apparatus is received in a communicating unit to communicate with said client apparatus, whether the received request for the transmitting method of the video frames is a request for the transmitting method of the video frames for recording or a request for the transmitting method of the video frames for a live display is discriminated. If the received request for the transmitting method of the video frames is the request for the transmitting method of the video frames for recording, each of the video frames formed in an image sensing unit is temporarily stored in a memory and each of the stored video frames is transmitted. If the received request for the transmitting method of the video frames is the request for the transmitting method of the video frames for the live display, a process for transmitting the latest frame among the video frames formed in the image sensing unit is repetitively executed.
Digital broadcasting system and method of processing data
A digital broadcasting system and a method of processing data are disclosed. Herein, additional encoding is performed on mobile service data, which are then transmitted, thereby providing robustness in the processed mobile service data, so that the mobile service data can respond more strongly against fast and frequent channel changes. The method of processing data in a transmitting system includes receiving mobile service data, encapsulating the received mobile service data to a transport stream (TS) packet, and outputting the encapsulated mobile service data as a mobile service data packet, and multiplexing a main service data packet including main service data and the encapsulated mobile service data packet, thereby transmitting the multiplexed data packets to at least one transmitter located in a remote site.
Systems and methods for packaging, distributing and managing assets in digital cable systems
Assets, such as content and related data are packaged, transmitted, received and managed in a digital cable television system to standardize the distribution of content and services from a content/service provider to subscribers in the system. The standardized format for packaging content enables the digital cable system to package, transmit, receive and manage diverse types of content, such as MPEGs, executable files, HTML pages, and the like, using standard system components without requiring reprogramming of the system to deploy new services. Service and content providers are freed from having to develop custom formats for delivering content and data to the cable system. Moreover, the standardized bundling of content and related data that is enabled by the invention allows the cable system operator to automate the deployment of services based on specific content and data to select subscribers.
Apparatus and method for providing EPG, and terminal and method for displaying EPG
Provided are an apparatus and method for providing en electronic program guide (EPG) and a terminal and method for displaying the EPG. The apparatus includes an information extracting unit extracting the information about the electronic program guide, which specifies broadcasts according to time and channel, from a broadcast signal, a document creating unit converting the extracted information about the electronic program guide into a document in a data format permitted in a user's terminal, and a command processor processing a service command regarding a broadcast selected based on the converted document. Accordingly, it is possible to make an EPG based on a user's favorite broadcasts and provide the EPG to the user's terminal.
High-speed programs review
High-speed programs review is described. In embodiment(s), a television client device can initiate a high-speed review of a group of programs that have been recorded together. A content distributor may record a group of television programs that have been previously broadcast for a particular television channel, and then maintain the programs for on-demand viewing when selected by a viewer. The client device can receive program information from the content distributor, and the program information can identify each of the progress when reviewing the group of programs at high-speed. The program information that corresponds to a program can then be rendered for display when the program becomes selectable for on-demand viewing while reviewing the programs at high-speed.
Verifying content distribution authority
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for verifying content distribution authority. In one aspect, a method includes receiving a request for broadcast content for a broadcast feed from a requestor. In response to the request, specifying verification content for inclusion in the broadcast feed, the verification content being scheduled for presentation at a specified time. The broadcast feed is monitored for presentation of the verification content at the specified time. In turn, a determination is made whether the verification content was presented by the broadcast feed at the specified time. In response to determining that the verification content was presented by the broadcast feed at the specified time, the requestor is verified as an entity having content distribution authority over the broadcast feed.
TV remote control signal log
An interceptor detects command signals from a TV remote control and logs the signals. The signals can be correlated not just to channel number but also to programs by accessing a program/channel database. A log of channels/programs that have been viewed by, e.g., a child can thus be obtained and viewed by a parent.
Methods and apparatus to monitor advertisement exposure
Methods and apparatus to monitor advertisement exposure are disclosed. An example method includes determining via a meter that a media content segment was presented at a media content presentation device and determining via an activity monitor different than the meter that a computing resource related to the media content segment was accessed by outputting an indication of an association between the computing resource access and the media content presentation after the presentation of the media content segment.
Optical information recording medium
The recording/reproducing quality of a multilayer optical information recording medium deteriorate not only due to interference from other layers caused by light converging on other information layers but also due to stray light converging on the surface of a protective layer and stray light that does not converge on other information layers but rather returns to an optical head through the same optical path as the reproducing signal. The thickness composition of intermediate layers (106, 107, and 108) and the protective layer (109) in a four-layer optical information recording medium are set so as to eliminate the influence of interference caused by stray light from other layers reflected up to three times.
Method of configuration processing of PCI device on virtualization apparatus and computer system
To simplify the structure and improve the performance of virtualization software. There is provided virtualization unit for capturing a configuration access to a physical device from a virtual CPU, identifying a partition to which the physical device belongs from a device address of the physical device accessed by the virtual CPU, and if the physical device does not belong to the virtual CPU's own partition, replacing a content of a configuration register that identifies the physical device with information on a nonexistent dummy device, and notifying the resultant to the virtual CPU. The physical device not belonging to the virtual CPU's own partition is recognized as a named valid device by using a dummy device driver corresponding to the dummy device. The dummy device driver rejects execution of processing common to all physical devices that is requested by the virtual CPU and disturbs operation of a physical device belonging to another partition.
Synchronization optimized queuing system
A synchronization optimized queuing method and device to minimize software/hardware interaction in network interface hardware during an end-of-initiative process, including network adapter queue implementations for network interface hardware for optimized communication in a computer system. An end-of-initiative procedure to ensure that the network interface hardware has received an interrupt enable and to recheck the interrupt queue is unnecessary in the present invention.
Hardware utilization-aware thread management in multithreaded computer systems
A device, system, and method are directed towards managing threads in a computer system with one or more processing units, each processing unit having a corresponding hardware resource. Threads are characterized based on their use or requirements for access to the hardware resource. The threads are distributed among the processing units in a configuration that leaves at least one processing unit with threads that have an aggregate zero or low usage of the hardware resource. Power may be reduced or turned off to the instances of the hardware resource that have zero or low usage. Distribution may be based on one or more of a number of specifications or factors, such as user power management specifications, power usage, performance, and other factors.
Quality assurance in software systems through autonomic reliability, availability and serviceability code generation
A system and method for automatic code generation includes parsing source code in a source program to automatically generate reliability, accessibility and serviceability (RAS) code in response to the source code. The automatically generated code is executed in a check in stage. All, a portion or none of the automatically generated code is selectively removed during a check out stage to keep the source program clean and focused.
Architecture and implementation method of programmable arithmetic controller for cryptographic applications
An architecture includes a controller. The controller is configured to receive a microprogram. The microprogram is configured for performing at least one of hierarchical or a sequence of polynomial computations. The architecture also includes an arithmetic logic unit (ALU) communicably coupled to the controller. The ALU is controlled by the controller. Additionally, the microprogram is compiled prior to execution by the controller, the microprogram is compiled into a plurality of binary tables, and the microprogram is programmed in a command language in which each command includes a first portion for indicating at least one of a command or data transferred to the ALU, and a second portion for including a control command to the controller. The architecture and implementation of the programmable controller may be for cryptographic applications, including those related to public key cryptography.
Automated test input generation for web applications
A method and apparatus is disclosed herein for automated test input generation for web applications. In one embodiment, the method comprises performing a source-to-source transformation of the program; performing interpretation on the program based on a set of test input values; symbolically executing the program; recording a symbolic constraint for each of one or more conditional expressions encountered during execution of the program, including analyzing a string operation in the program to identify one or more possible execution paths, and generating symbolic inputs representing values of variables in each of the conditional expressions as a numeric expression and a string constraint including generating constraints on string values by modeling string operations using finite state transducers (FSTs) and supplying values from the program's execution in place of intractable sub-expressions; and generating new inputs to drive the program during a subsequent iteration based on results of solving the recorded string constraints.
Systems and methods for improved parallel ILU factorization in distributed sparse linear systems
Systems and methods for parallel incomplete LU (ILU) factorization in distributed sparse linear systems, which order nodes underlying the equations in the system(s) by dividing nodes into interior nodes and boundary nodes and assigning no more than three codes to distinguish the boundary nodes. Each code determines an ordering of the nodes, which in turn determines the order in which the equations will be factored and the solution performed.
Methods and systems for selective code collapse
A content collapse feature is described that allows a user to designate what should be collapsed by designating a content property, such as attributes, identifications (IDs), tag classes, and the like. Input of one or more content properties come in from a user desiring to collapse various sections of content displayed in an IDE. One or more portions of the content corresponding to the content properties is identified by the IDE and then collapsed wherein the content in the collapsed portions are removed from the IDE display. The collapsed portions of content may either be replaced with a collapse indicator visible to users in the IDE display or hidden from view altogether in the IDE.
Method of automatic pattern based editing of business models
A method of automatic pattern based editing of business models on a canvas of business model editing application includes receiving a request to automatically edit a business model, constructing an initial current set C of elements from the business model, constructing an initial next set N of elements from the business model, and connecting elements between the initial current set C and the initial next set N until all elements in both the initial current set C and the initial next set N have been connected. The connecting is based on at least connecting elements sequentially if the elements exist from left to right on the canvas, and connecting elements in parallel or using a decision and merge combination if the elements exist from top to bottom on the canvas.
Clock jitter suppression method and computer-readable storage medium
A value held in storage elements coupled to a clock buffer and variably set with a threshold voltage is read out in a state where an analyzing target circuit within an IC operates. An analyzing process specifies an impact of noise in a power supply or ground voltage of the clock buffer and a location where the impact is large, based on the threshold voltage and position information of the storage element from which the read out value has an inverted relationship to the set logic value and each storage element that is a read target. A constraint condition for placement of constituent elements of the IC and routing therein is created from results of the analyzing process, and a re-placement or re-routing process re-places or re-routes the constraint condition to reduce the noise.
Reducing simultaneous switching noise in an integrated circuit design during placement
Methods, computer programs, and Integrated Circuits (IC) for minimizing Simultaneous Switching Noise (SSN) in the design of an IC are presented. In one embodiment, the method includes moving a candidate pin of the IC in an initial input/output (I/O) layout to create a candidate I/O layout. Further, in one operation the method calculates a first performance cost for the initial I/O layout and a second performance cost for the candidate I/O layout. The first and the second performance costs are based on an SSN cost for the initial layout and on an SSN cost for the candidate layout respectively. The method selects the layout to design the IC that has the lowest performance cost. The method operations are performed during the placement phase of an IC Computer Aided Design (CAD) tool.
Standard cell library and semiconductor integrated circuit
A standard cell library is used in design of a semiconductor integrated circuit. A driving force sequence of cells for a single function is in the form of geometric progression with a geometric ratio of the “pth root of 2,” where p is a natural number of 2 or more. A transistor in an output signal driving section of each of the cell is laid out using only layout devices which are limited to p types of sizes. Even if p is small, the driving force sequence can be formed in geometric progression with an extremely low increasing rate. At the same time, sizes of layout devices are discrete and limited, thereby easily securing accuracy of a performance model of a cell. As a result, the standard cell library allows a high-performance circuit to be designed in a highly reliable model.
Retiming of multirate system
Methods and apparatuses for retiming of multirate system for clock period minimization with a polynomial time without sub-optimality. In an embodiment, a normalized factor vector for the nodes of multirate graph is introduced, allowing the formulation of the multirate graph retiming constraints to a form similar to a single rate graph. In an aspect, the retiming constraints are formulated to allowed the usage of linear programming methodology instead of integer linear programming, thus significantly reducing the complexity of the solving algorithm. The present methodology also uses multirate constraints, avoiding unfolding to single rate equivalent, thus avoiding graph size increase. In a preferred embodiment, the parameters of the multirate system are normalized to the normalized factor vector, providing efficient algorithm in term of computational time and memory usage, without any sub-optimality.
Methods, systems, and computer program product for implementing hotspot detection, repair, and optimization of an electronic circuit design
Disclosed are a method, a system, and a computer program product for implementing hotspot detection, repair, and optimization of an electronic circuit design, which, in some embodiments, defines, identifies criteria for hotspots/metrics or optimization objective function; performs the initial hotspot or metric prediction; identifies correction candidate(s); applies a correction candidate to the electronic circuit design; and determines whether the outcome of applying the correction candidate is acceptable. The method or the system identifies custom correction candidate(s) or custom command(s) and identifies one or more hints for the predicted hotspots or metrics; provides a single architecture to use a first model for hotspot identification/correction and a second model for design check; and provides the capability to apply a correction for a hotspot or metric, evaluate the effectiveness of the correction on the fly, and revert any changes made to the electronic circuit design by the correction.
Method and apparatus for detecting contradictory timing constraint conflicts
The present invention discloses a method and apparatus for detecting timing constraint conflicts, the method comprising: receiving a timing constraint file; taking all test points in the timing constraint file as nodes, determining directed edges between the nodes and weights of the directed edges according to timing constraints relevant to the test points in the timing constraint file to establish a directed graph; searching for all directed cycles of the directed graph; and for each directed cycle, if the sum of the weights of the directed edges constituting the directed cycle satisfies a required condition, determining that a timing constraint conflict exists among the test points and the timing constraints constituting the directed cycle. The method and apparatus can automatically detect timing constraint conflicts with one hundred percent to reduce design turnaround time and engineer resources in ASIC projects.
Abstraction-based livelock/deadlock checking for hardware verification
Some embodiments of the present invention provide systems and techniques for checking a livelock in a circuit design. During operation, the system can identify a finite state machine (FSM) in the circuit design, wherein the FSM comprises a first set of state variables. The system can then construct an abstract machine of the circuit design, wherein the abstract machine includes the FSM and a second set of state variables. Next, the system can search for one or more livelocks in the abstract machine. If a livelock is found in the abstract machine, the system can verify that the livelock is a livelock in a concrete machine of the circuit design, wherein the concrete machine includes the FSM and a third set of state variables, wherein the second set of state variables is a subset of the third set of state variables.
Verification of logic circuit designs using dynamic clock gating
A method and system for verifying a logic circuit design using dynamic clock gating is disclosed. The method comprises choosing at least one master seed to determine initial values as initialization for said logic circuit and/or stimuli data for at least one interface of said logic circuit, choosing at least two different dynamic clock gating configurations for every chosen master seed, executing a functional simulation with said logic circuit for every chosen dynamic clock gating configuration by using said determined initialization and/or stimuli data based on a corresponding master seed, comparing simulation results of functional simulations against each other executed with said logic circuit for at least two different chosen dynamic clock gating configurations, and reporting an error if said at least two simulation results are not identical.
Generating a convergent circuit design from a functional description using entities having access to the functional description and to physical design information
A method of designing a circuit is described. In an embodiment, a physical design implementation for the circuit is created using a plurality of entities. These entities are named “genomes”. Each entity includes a portion of a functional description of the circuit that has been synthesized into a gate-level implementation. An entity is selected to facilitate the physical design implementation meeting a plurality of design constraints. Several steps (e.g., beginning with selection of an entity) of this method are repeated several times to meet the design constraints. As a consequence, the physical design implementation provides more accurate information for use in a final physical design implementation. Moreover, the physical design implementation can be created faster than prior techniques while still allowing a global view of the physical design implementation in meeting design constraints.
Compact model methodology for PC landing pad lithographic rounding impact on device performance
A method and computer program product for modeling a semiconductor transistor device structure having an active device area, a gate structure, and including a conductive line feature connected to the gate structure and disposed above the active device area, the conductive line feature including a conductive landing pad feature disposed near an edge of the active device area in a circuit to be modeled. The method includes determining a distance between an edge defined by the landing pad feature to an edge of the active device area, and, from modeling a lithographic rounding effect of the landing pad feature, determining changes in width of the active device area as a function of the distance between an edge defined by the landing pad feature to an edge of the active device area. From these data, an effective change in active device area width (deltaW adder) is related to the determined distance. Then, transistor model parameter values in a transistor compact model are updated for the transistor device to include deltaW adder values to be added to a built-in deltaW value. A netlist used in a device simulation may then include the deltaW adder values to quantify the influence of the lithographic rounding effect of the landing pad feature.
Secure exchange of information in electronic design automation
Described herein are methods and systems for secure exchange of information related to electronic design automation. Information deemed sensitive and otherwise worthy of protection may be secured by methods such as encryption, obfuscation and other security measures. The secured information may be provided to an electronic design automation tool for processing without revealing at least some of the secured information. For instance, rule files related to integrated circuit manufacturability may be selectively annotated to indicate portions thereof deserving of protection. An encryption tool may be used to secure the information so indicated and generate a file comprising secured information related to electronic design automation. An electronic design automation tool may then unlock and use the secured information without revealing the same. For instance, the tool may be a physical verification tool capable of verifying whether any of the one or more integrated circuit layouts may violate one or more of the secured rules. An error report may be generated without revealing the secured rules.
Engineering change order language for modifying integrated circuit design files for programmable logic device implementation
In an embodiment, a method to automatically process modifications to a set of design files is contemplated. The design files describe at least a portion of an integrated circuit design, and may be coded in a hardware description language. The modifications may be made to prepare the design files for inclusion in a programmable logic device implementation of the integrated circuit (or portion thereof). Specifically, the modifications may be specified using a set of commands which may be assembled by a user.
Skewed double differential pair circuit for offset cancellation
A differential system producing differential signals with offset cancellation utilizing a double differential input pair system is disclosed. It uses two parallel differential transistor pairs which are intentionally skewed. Nominally, the differential pairs are skewed in opposite direction from each, but with equal magnitude, so that the combination of the two differential pairs is nominally balanced. The current through each differential pair is then increased or decreased until any offset is sufficiently cancelled, using a selection means for providing an equi-potential value to first and second differential inputs in a calibration mode of the system and a comparison means for comparing first and second differential outputs in a calibration mode to determine the offset of the system.
Method for verifying optical proximity correction
A method for verifying an optical proximity correction includes: performing an optical proximity correction on a target pattern layout; performing a primary verification on the target pattern layout which has undergone the optical proximity correction; performing a secondary verification on defect weak points detected in the primary verification; and performing an additional optical proximity correction on hot spot points which are detected in the secondary verification and which may be generated as defects when transferred to a real wafer.
Systems and methods for configuring information displayed on a screen
A computer-implemented method for configuring information displayed on a screen is described. A display model is generated on the screen. The display model includes a status page and at least one configuration page. The pages of the display model are organized in a three-dimensional format on the screen. A header and a status icon are displayed on the at least one configuration page. At least one configuration page is filtered to prevent the at least one configuration page from being displayed on the screen.
Presentation of large objects on small displays
A method for presenting at least a part of an object is shown, including at least partially dividing at least one object into a plurality of sub-objects, presenting the plurality of sub-objects in a first representation, making at least one sub-object of the plurality of sub-objects an active sub-object, and in response to a user operation on the at least one active sub-object, presenting at least one of the at least one active sub-objects in a second representation. The at least one object may be a 2D object, e.g. a Hypertext Markup Language HTML page or a page of a text document, or a 3D object, e.g. a Virtual Reality Markup Language VRML object, and the display may be integrated in a portable electronic device. A device, a system, a computer program and a computer program product for performing such methods are also provided.
Expandable area for host table data display in a mobile device
A system, method and computer-readable medium are disclosed for providing improved display of a host terminal application interface. A host application translator reads characters stored in a character buffer of a computer host terminal application that is displayed to a user as a table of horizontal rows and vertical columns of characters. The host application translator receives a preference that determines which vertical columns are to be displayed and a second preference that determines the order in which the vertical columns are to be displayed. The host application translator reconfigures the display of the characters by displaying the vertical columns indicated by the first preference in the order indicated by the second preference and displaying information corresponding to the vertical columns that are not indicated by the first preference, thus providing user-selectable controls to expand or collapse this information.
Map display device
Weather information is acquired and stored from a satellite radio broadcast. On the basis of this weather information, weather information image data is created for displaying the weather information superimposed upon a map. When the weather information display map is scrolled, the range of the map data shifts. Together therewith, the range of the weather information image data also shifts. After a map has been drawn on the basis of the map data for the shifted range, icons or the like that describe the weather information are drawn as superimposed upon this map on the basis of the weather information image data for the shifted range. Then the image data stored in the image memory is read in, and the weather information display map that has been drawn is display upon the display monitor.
Systems and/or methods for paging control including selective paging element display according to a binary subdivision and/or a serial progressive display approach
Certain exemplary embodiments disclosed herein relate to paging systems and methods that help users navigate through large or small datasets. For example, in certain exemplary embodiments, paging control elements are provided according to either a binary subdivision approach or a serial progressive approach. Paging control elements are displayed according to either the binary subdivision approach or the serial progressive approach in dependence on a determination as to which approach is more advantageous based at least in part on factors such as, for example, total number of pages, current page location, distance to end points, screen size, etc.
In-vehicle display apparatus
An in-vehicle display apparatus includes (i) an operation device having an operation knob, and (ii) a display control device having a display section. The operation device has a drive section which gives force to the operation knob. When the display section displays a display window to enable a scroll display in which several selection buttons are circulated, the display control device acquires a reactive force map. The map specifies that a vibration is applied to the operation knob when the cursor is located on the selection button at the tail end of the series of the selection buttons in the display window. The display control device then instructs the drive section to apply the vibration to the operation knob based on the acquired reactive force map.
System and method for visualizing process flows
A method and system for visualizing process flows for business and manufacturing processes are described that includes a first view of the process as a tree showing the process elements and their interconnections, and a second view of the process in the form of a zoomable interface that displays selected nodes at magnifications that are continuously variable at the user's option. A selected node in the tree view opens the same node in the zoomable node view. When a second node is selected in the tree view, the zoomable node view zooms from the first selected node to the second selected node through each node intermediate between the first and second selected nodes. This enables a process analyst to view the content of selected process nodes in the context of nodes with which the selected nodes are associated and thus to have a thorough understanding of the process.
A portable terminal includes a page storage section, in which a Web page is temporarily stored while the Web page is being browsed. Thus, when the same Web page is browsed the next time, a control section compares the Web page with the previously stored page contents and moves the display range of the page, so that the updated portion is displayed at a predetermined position on a display section.
Integrated display and management of data objects based on social, temporal and spatial parameters
An embodiment is directed to displaying information to a user of a communications device. The communications device receives a query including a social parameter, a temporal parameter and a spatial parameter relative to the user that are indicative of a desired visual representation of a set of data objects. The communications device determines degrees to which the social, temporal and spatial parameters of the query are related to each of the set of data objects in social, temporal and spatial dimensions, respectively. The communications device displaying a first visual representation of at least a portion of the set of data objects to the user based on whether the determined degrees of relation in the social dimension, temporal dimension and spatial dimension satisfy the respective parameters of the query.
Merging modifications to user interface components while preserving user customizations
An application displays a user interface (UI) component. A client can apply customizations to this UI component. After the client applies customizations to the UI component, the client modifies a solution set containing solutions that modify the UI component. After the client modifies the solution set, the application displays a new version of the UI component. Modifications provided by the solutions in the solution set are applied to the new version of the UI component. In addition, the customizations remain applied to the UI component without the client manually re-applying the customizations to the UI component.
System and method for task management
A method of assigning tasks is provided. In one embodiment, the method includes displaying, on a user interface, one or more representations of tasks and a calendar of dates, each representation being indicative of a task to be completed. The method also includes receiving a user input indicative of a selected date from the calendar of dates and receiving a user input indicative of a selected representation of the one or more representations. The selected representation corresponds to a selected task. The selected date is assigned to the selected task. Further, the method also includes displaying on the user interface a list of constituents as a function of the selected date, receiving a user input indicative of a selected one or more constituents from the list, and assigning the selected one or more constituents to the selected task.
Software application for presenting flash presentations encoded in a flash presentation markup language (FLML)
A system for presenting FLASH presentations contained in a storage medium. Such a system can include a FLASH presentation (FLAPRE) markup language (FLML) document, a FLASH-based FLAPRE player, and a launching application. The FLML document can textually represent a user-created FLASH presentation using the FLAPRE markup language (FLML). The FLAPRE player can be configured to visually render the user-created FLASH presentation contained within the FLML document. The launching application can be configured to display the FLAPRE player and can support the use of FLASH animation.
Structuring document based on table of contents
A document is organized as a plurality of nodes associated with a table of contents. The nodes are clustered into a plurality of clusters based on a similarity criterion. One of the clusters is identified as corresponding to a highest or lowest level of the table of contents based on a selection criterion. The highest or lowest level is assigned to the nodes belonging to the identified cluster. The identifying and assigning are repeated to assign levels to the nodes belonging to each next highest or lowest level of the table of contents. The repeated identifying is based on the selection criteria applied disregarding nodes that have already been assigned a level. The document is structured based at least in part on the levels assigned to the table of contents nodes.
Methods, systems, and computer program products for navigating content
Methods, systems, and computer program products which enhance the use of digitized content by users are described. The methods, systems, and computer program products include causing portions of the content to be adjusted in size according to dimensions which would best facilitate electronic review of the content. The methods, systems, and computer program products include preparing illustrated content for navigation, specifying dimensions for areas within content collections such as pages and orders for viewing the areas, and correlating the specified dimensions and the specified order with instructions for rendering an enhanced view of the content areas. In some embodiments, the illustrated content comprises a digitized comic book.
System and method for serving multiple data objects and formatting functions in a single request
Disclosed is a novel framework by which the sources of data objects and/or formatting functions can be easily requested and managed. More specifically, the invention provides a system for and method of serving multiple data objects and/or formatting functions to a subscribing client via a single request. The system comprises a catalog with entries referencing components used to generate data objects and formatting functions, each of which has a unique identifier; and an engine for receiving requests from the subscribing client, wherein each request includes one or more catalog identifiers. This engine, for each identifier in each received request, executes any prerequisite components, sets the appropriate parameters, and executes the component referenced by said component identifier to obtain the requested data object or formatting function. The engine aggregates the data objects and/or formatting functions into a script library, which is returned to the subscribing client.
Annotating images with instructions
A method described herein includes the acts of receiving an image captured by a mobile computing device and automatically annotating the image to create an annotated image, wherein annotations on the annotated image provide instructions to a user of the mobile computing device. The method further includes transmitting the annotated image to the mobile computing device.
System and apparatus for error-correcting register files
A method, system and computer program product for enabling a register file to recover from detection of a parity error. A first register file and a second register file are associated with a parallel file structure. When the parity error is detected, the system determines whether the first register file or second register file is associated with the parity error. The register file determined to have the parity error is associated with an offending register and a non-offending register is associated with the “good” register file. Subsequent to the detection of the parity error, the system executes a repair sequence, whereby the register file associated with the offending register receives data from the register file associated with the non-offending register. The offending register file recovers from the parity error with or without the use of a parity interrupt.
Programmable compute unit with internal register and bit FIFO for executing Viterbi code
A programmable compute unit with an internal register with a bit FIFO for executing Viterbi code is configured to accumulate in the forward path the best-path to each state in an internal register and store the survivor trace back information bit for each state in each stage in a bit FIFO; and in the trace back, selecting the optimal best-path through the Viterbi trellis by tracing through the bit trace back information survivor bits beginning with the survivor bit of the last stage path; and generating in response to the Viterbi constrain length and a current bit FIFO address, the next bit FIFO address and decoded output bit for the next previous stage.
System and method of decoding data with reduced power consumption
A decoder is disclosed that can reduce power consumption at different stages of a decoding process. At a first stage where the decoder calculates residual values, the decoder can reduce power consumption by calculating residual values using less than a full set of division circuits. A reduced number of division circuits may be sufficient to successfully calculate residuals associated with the codeword to complete the decoding process. Division circuits that are not used may be disabled to reduce power consumption. At another stage of the decoding process where the decoder generates coefficients that are used to identify locations of errors in the codeword, the decoding process can limit power consumption by reducing the number of iterations of a polynomial generator by incorporating termination decision circuitry.
Memory system and method for providing error correction
An error correction decoder includes a syndrome computation circuit, an error correction and computation circuit and an error correction circuit. The syndrome computation circuit calculates a syndrome of read data. The error correction and computation circuit calculates a location of a single-bit error using a division operation between elements of the syndrome when the single-bit error exists in the read data. The error correction circuit corrects the single-bit error of the read data based on the location of the single-bit error.
DTV transmitter and method of coding main and enhanced data in DTV transmitter
A DTV transmitter includes a pre-processor pre-processing enhanced data, a data formatter generating enhanced data packets including the pre-processed enhanced data, and a multiplexer multiplexing the enhanced data packets with main data packets. The transmitter further includes an RS encoder RS-coding the multiplexed packets by adding systematic RS parity data to each main data packet and by adding non-systematic RS parity place holders to each enhanced data packet, and a data interleaver interleaving the RS-coded packets. The non-systematic RS parity place holders are placed after the enhanced data within each interleaved enhanced data packet, and a sequence of known data place holders is periodically included in the interleaved enhanced data packets.
Accelerating phase change memory writes
In a phase change memory, the memory array may be written in relatively small chunks. The writing of data to the array and, particularly, the writing of set data, may be accelerated using a hardware accelerator. The hardware accelerator may include an edge detector which detects a short duration signal pulse to trigger the writing of the set data to a cell. As a result, the writing of data may be accelerated, reducing the time to write in some cases.
System and method for low complexity raptor codes for multimedia broadcast/multicast service
A system and method for encoding symbols in a wireless communication is provided. The system and method includes a transmitter configured to encode data transmissions. The transmitter includes a raptor encoder configured to perform a coding operation. The raptor encoder generates intermediate symbols without using a half-code such that the intermediate symbols consist of precoded symbols and parity symbols. Thereafter, the intermediate symbols are encoded using a Luby Transform to produce and output encoded symbols. The transmitter further is configured to transmit one or more of the source symbols, parity symbols or encoded symbols.
Sequential circuit with error detection
Sequential circuits with error-detection are provided. They may, for example, be used to replace traditional master-slave flip-flops, e.g., in critical path circuits to detect and initiate correction of late transitions at the input of the sequential. In some embodiments, such sequentials may comprise a transition detector with a time borrowing latch.
Methods and apparatus for encoding data in a communication network
Methods and apparatus for encoding data in a communication network. In an aspect, a method is provided for coding data. The method includes generating one or more permutations of the data, determining weights associated with each permutation, calculating one or more code packets from each permutation based on the associated weights, and multiplexing the data and the one or more code packets into a code packet stream. In an aspect, an apparatus is provided for coding data. The apparatus includes permutation logic configured to generate one or more permutations of the data, and weight logic configured to determine weights associated with each permutation. The apparatus also includes processing logic configured to calculate one or more code packets from each permutation based on the associated weights, and a multiplexer configured to multiplex the data and the one or more code packets into a code packet stream.
Incremental redundancy with resegmentation
Different transmissions based on different content blocks which were segmented from the same digital content according to different segmentation schemes, where each of the content blocks has any substring in common with at least one of the other content blocks, are received by a receiving radio communication station, for example a mobile telephone or a mobile network base station. Certain encoded received bits derived from different ones of the transmissions are combined into combined bits. Other encoded received bits derived from one or more of the different transmissions are provided together with the combined bits to a decoder.
Low-density parity-check code based error correction for memory device
An accumulative repeat encoder facilitates encoding data written to memory, such that parity data is generated in accordance with a low-density parity-check (LDPC) code. The original data and associated parity data is stored in memory. During a read operation, a decoder component utilizes the parity data based on the LDPC code to facilitate decoding the data being read from memory. The decoder component is iterative and provides one or more decoding results based on probabilities that symbols or bits comprising the data have correct values. The decoder component analyzes a decoding result and references a parity-check matrix structured in accordance with the LDPC code to determine the accuracy of the decoding result. If the decoding result attains a desired accuracy, the decoding result is determined to represent the original data and is provided as an output.
Decoding method for low density generator matrix code
The present invention provides a method for decoding a low density generator matrix code (LDGC), applied for decoding transmitted original information bits encoded in LDGC code. The method comprises the following steps: A: deleting a part erased by a channel in a received code word sequence R filled by a known bit sequence to obtain an erased code word sequence Re, and deleting the rows corresponding to the erased part from a transposed matrix GIdgct of a generator matrix of the LDGC to obtain the erased generator matrix Ge; B: permuting columns of Ge such that an M-order square matrix with an element in the 0th row and 0th column being a vertex is a triangular matrix to obtain the permuted generator matrix Gf; and C: calculating the original information bits using Gf and Re.
Incremental redundancy retransmission method for fragmented packets
Incremental redundancy retransmission method suited to the transmissions of packets that can be fragmented into N packets of index i.
Methods and apparatus to improve communication in a relay channel
A system and method for relaying data communications in a Hybrid Automatic Repeat Request (HARQ) network. The system and method operable to receive a data communication packet from a base station during a first transmission time interval and simultaneously receive an acknowledgement signal from a subscriber station; and transmit a data communication packet to a subscriber station during a second transmission time interval and simultaneously transmit an acknowledgement signal to a base station.
Method and arrangement in a communication network system
A method and an arrangement enables an efficient radio resources utilization in a communication network system comprising a communication network node communicating with one or more user equipments over a radio interface on uplink and downlink channels. The user equipment provides the communication network node with information about a power shortage problem in the user equipment by using a pre-determined field, such as the E-TFCI field, of the uplink channel, whereby the communication network node is allowed to take a pre-determined action regarding available radio resources.
Method for variable sub-carrier mapping and device using the same
A variable sub-carrier mapping method comprising steps of: applying different bit interleaving schemes to different transmissions of a hybrid automatic retransmission request (HARQ) process in side of transmitter; and in the side of the transmitter, modulating symbols onto sub-carriers for transmitting. Different transmissions in one HARQ process adopt different bit interleavers or different symbol-to-sub-carrier mapping methods so as to realize that the same bit of different transmissions in one HARQ process is transmitted via different sub-carriers. Therefore, the system achieves the frequency diversity gain and reduces the probability of failure of HARQ transmission caused by that some bits are always transmitted via the sub-carrier with the same deep fading. In this way, the average HARQ retransmission times can be reduced and the system throughput can be improved.
Pipelined error determination in an error-correcting communication system
A sequence of data packets is received within an integrated circuit device and stored within a first memory thereof. Error descriptor values are updated within a second memory of the integrated circuit device based on error information associated with the sequence of data packets. The error descriptor values each include an address field to specify a corresponding storage region of the first memory and an error field to specify an error status of data values stored within the storage region. A sequence of multiple-bit error values are generated based, at least in part, on the error fields and address fields within respective subsets of the error descriptor values. Concurrently with generation of at least one of the multiple-bit error values the state of one or more bits of the data values stored in the first memory based are changed based on a previously-generated one of the multiple-bit error values.
Storage device with adaptive error-correcting code for improved areal efficiency
A method for adaptively applying an error-correcting code to a storage device is disclosed. A determination is made that a system is in an idle state of input/output requests. First data symbols are copied into a first location within a buffer. First data symbol errors corrected using a first error-correcting code. Second data symbols including corrected bits are written in a second location on the recording media with a second error-correcting code. An error number for the second data symbols in the second location is determined. If the error number is below a first threshold error number, the first data symbols are deleted. If the error number is above the first threshold error number, the second data symbols are deleted.
Inverted TCK access port selector with normal TCK data flip-flop
The disclosure describes a novel method and apparatuses for allowing a controller to select and access different types of access ports in a device. The selecting and accessing of the access ports is achieved using only the dedicated TDI, TMS, TCK, and TDO signal terminals of the device. The selecting and accessing of device access ports can be achieved when a single device is connected to the controller, when multiple devices are placed in a daisy-chain arrangement and connected to the controller, or when multiple devices are placed in a addressable parallel arrangement and connected to the controller. Additional embodiments are also provided and described in the disclosure.
Method for monitoring data processing system availability
A method, system, and product for monitoring the availability of a data processing system are proposed. The system runs a management application involving the periodic transmission of blocks of data from multiple local computers to a central computer. Whenever a block of data must be transmitted by a generic local computer, an expected transmission delay of a next block of data (with respect to the current one) is estimated and attached to the block of data. The central computer receiving the updated block of data can calculate an expected receiving time of the next block of data accordingly. If the next block of data is not received in due time, the central computer determines a failure of the local computer. The central computer also scans a subset of ports of the local computer, to ascertain whether the problem is due to a temporary unavailability of the application.
Redundant data path
Disclosed are redundant data path(s) for transmission of graphical data between components in a graphical display system. The redundant data path(s) are used to transmit graphical data by at least two independent means, so that if a failure in one data path occurs, a data transmitted via a separate data path can be used for display. The system is particularly advantageous for multiple-serial-module configurations. The redundant data path(s) minimize disruption of data display and make repair and maintenance of the display system more efficient. The invention includes apparatus for graphical display systems, and also includes methods of data transmission for graphical display systems, and methods of maintenance of graphical display systems.
Managing memory health
Systems, methodologies, media, and other embodiments associated with managing memory health are described. One exemplary system embodiment includes logic for detecting and correcting single bit memory errors. The example system may also include logic for selectively making unavailable a memory location associated with single bit memory errors.
A method of generating a heartbeat signal for an application comprising one or more objects that may enter a halt state is described. The method comprises: sending a status request to a defined interface on each object; and monitoring responses to the status requests to ascertain if each object is operating normally or in a halt state. The method further comprises: generating an application valid signal in the event that each object is operating normally; transmitting the application valid signal, if generated, to a monitoring component independent of the application; and generating at the monitoring component a heartbeat valid signal in response to receipt of the application valid signal.
Commit-time timestamping of temporal rows
A base table temporal row affected by a transaction is timestamped. The temporal row has a row ID. The temporal row in the base table is modified according to the transaction. The row ID for the modified temporal row is associated with an identifier for the transaction in a temporal work table. Upon committing the transaction: the temporal work table is searched to determine the row ID of the temporal row modified by the transaction, and a commit-time is saved into the temporal row identified by the row ID.
Synchronising between clock domains
An integrated circuit 2 is provided with multiple clock domains separated by a clock boundary 8. Data values are passed across the clock boundary 8 using a first-in-first-out memory (FIFO), a read pointer and a write pointer for the FIFO are passed across the clock boundary 8 and must be synchronized to the receiving clock frequency. The clocks being used on either side of the clock boundary 8 may be switched and have a variable relationship therebetween. Multiple synchronization paths are provided within pointer synchronizing circuitry 32 which are used depending upon the particular relationship between the clocks on either side of the clock boundary 8. A pre-switch pointer value is held in a transition register 44 until a post-switch pointer value is available from the new synchronizing path 36 when a switch in clock mode is made which requires an increase in synchronization delay.
System and apparatus for transmitting phase information from a client to a host between read and write operations
An asymmetrical IO method and system are described. In one embodiment, a host device includes shared resources for data synchronization of the host device and a client device. The shared resources include a shared phase interpolator. In an embodiment, data lines between the host and client are also used to transmit phase information from the client device to the host device, obviating the need for additional, dedicated lines or pins.
Automatic wakeup handling on access in shared memory controller
A hardware based wake-up scheme initiates memory power-up upon a normal access to a powered down memory. The access that triggered the power-up is buffered. Further accesses are stalled until the memory is completely powered up. The buffered access then proceeds to the memory and the processor is brought out of stall. In cases where the software does not directly control access to the memory, such as on a cache miss, this scheme avoids undesirable conditions due to access to powered down memories.
Dynamic control of reduced voltage state of graphics controller component of memory controller
A method includes detecting a trigger condition, and in response to detecting the trigger condition, reducing a voltage applied to a graphics controller component of a memory controller. The reduction in voltage may cause the voltage to be reduced below a voltage level required to maintain context information in the graphics controller component.
Data processing apparatus, image processing apparatus, and method of processing data
A data processing apparatus is switchable between a power saving mode and a normal operating mode. A transition triggering event determining section determines an event (e.g., detection of a document or operation of a power saving key) that causes the data processing apparatus to shift from the power saving mode to the normal operating mode, and a transition triggering event holding section stores the event. Then, a mode switching section causes the data processing apparatus to shift from the power saving mode to the normal operating mode in accordance with the event. An execution priority determining section determines based on the event, an execution priority level and/or an order of precedence in which a plurality of programs are executed during the normal operating mode. A program controlling section executes the plurality of programs in accordance with the execution priority level and/or an order of precedence.
System and method for policing bad powered devices in power over ethernet
A system and method for policing bad powered devices in power over Ethernet. Degradation of components within powered devices can lead to noise and ripple that exceed specified thresholds. This noise and ripple can adversely impact the operation of the power sourcing equipment. A noise detector implemented in the power sourcing equipment can detect the presence of such noise and ripple and modify the application of power to the particular port.
Power supply control device
The present invention discloses a power supply control device to which can be attached a number of electrical device(s), such as a computer or AV equipment. The power supply device is able to determine and monitor standby power usage levels of the device(s) so that when the control device detects that the connected electrical device(s) are not being used power supply is removed from the device(s).
System, method and memory device providing data scrambling compatible with on-chip copy operation
Data scrambling techniques implemented externally to a flash memory device are disclosed which can be used in concert with flash memory on-chip copy functionality operating internally to the flash device, thus supporting high performance copying operations. All the data stored in the flash may be scrambled, including headers and control structures. Robust file system operation may be achieved, including the capability to tolerate a power loss at any time, and yet be able to relocate data internally within the flash without having to de-scramble and then re-scramble the data. An exemplary hardware based solution has little or no impact on overall system performance, and may be implemented at very low incremental cost to increase overall system reliability. The data scrambling technique preferably uses a logical address, such as logical block address or logical page address, rather than a physical address, to determine a seed scrambling key.
Key storage administration
The present invention relates to a method and a system for allowing multiple applications to manage their respective data in a device (100, 200) having a secure environment (104, 204, 211) to which access is strictly controlled. The idea of the invention is that a storage area is allocated (301) within the secure environment (104, 204, 211) of a device (100, 200). The storage area is associated (302) with an identity of an application, the associated identity is stored (303) in the secure environment (104, 204, 211) and access to the storage area is controlled (304) by verifying correspondence between the associated identity and the identity of an accessing application. This is advantageous, since it is possible for the accessing application to read, write and modify objects, such as cryptographic keys, intermediate cryptographic calculation results and passwords, in the allocated storage area.
Low-level code signing mechanism
Before an application is allowed to execute a secure function, code signing keys associated with the application are analyzed for correspondence with the class that contains the secure function as well as correspondence with the secure function. Optionally, code signing keys associated with the application are analyzed for correspondence with the input parameters to the function.
Secure transformable password generation
The invention relates to generating and using secure transformable passwords. In one example, a user grants a third party access to an online account at a host server, and the user requests a transformed password from the host server. The host server associates an encryption key with the third party and generates a transformed password using the user's online account password and the encryption key. The user transmits the transformed password to the third party which may use the transformed password to access the online account. The host server generates a second transformed password and compares it to the password information received from the third party. If the received password information and the second transformed password are identical, access is granted. The invention also includes methods for invalidating the transformed passwords by changing the encryption keys to an invalid state.
Method and apparatus for facilitating password access to a device
A method of and apparatus for allowing a user to access an electronic device by entering a password from a first device having alphabetic letter keys and numerical digit keys and a second device having primarily numerical digit keys comprising creating an alphabetic letter conversion relationship between the alphabetic letter keys of the first device with the numerical digit keys of the second device, creating a numerical digit conversion relationship between the numerical digit keys of the first device with the numerical digit keys of the second device, receiving a first password entered from the first device having alphabetic letter keys and numerical digit keys, converting the first password to a second password that can be entered from the second device having primarily numerical digit keys by using the alphabetic letter conversion relationship and the numerical digit conversion relationship, and allowing a user to access the electronic device if the user enters the first password or the second password.
Image processing system
The object is to enable a user to efficiently set a function for an image processing apparatus using a display medium he carries. When a user operates his mobile phone to activate a function setting information input program, an input screen for setting a function is displayed. When the user inputs function setting information, the mobile phone performs a code conversion for the function setting information to create a code image, and displays it on a display section. The user holds up the code image displayed on the mobile phone to a reading section of an image processing apparatus. The reading section reads the code image. The image processing apparatus performs authentication of the user, and then, it extracts the function setting information from the code image and sets a function. The image processing apparatus performs image processing in accordance with the function.
Challenge-based authentication protocol
Methods and apparatus for authenticating a user are disclosed. According to one aspect of the present invention, a method for authenticating a user includes displaying a first representation of a challenge. The challenge is based on a ruleset. The method also includes receiving a first input, determining if the first input furthers a successful completion of the first representation of the challenge, and determining if the first input completes the first representation of the challenge. If it is determined that the first input completes the first representation of the challenge and that the first input furthers the successful completion of the first representation of the challenge, the method further includes positively augmenting a security indicator.
Multi-level file digests
Multi-level file digests for electronic files are disclosed. A top level digest represents a single digest for the associated electronic file. Lower level digests represent digests for portions of the associated electronic file. The top level digest is derived from the lower level digests. The top level digest is useful for facilitating rapid comparison to determine whether electronic files are the same. In one embodiment, electronic files are encrypted with a block encryption scheme, and digests are efficiently calculated and stored on a block-by-block basis. Advantageously, when modifications to an encrypted electronic file occurs, only those modified blocks need to be processed to undergo decryption and re-encryption to determine the appropriate digest.
Identity based network policy enablement
Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between two endpoint peers individually having the capability to identify and authenticate one or both of the endpoint peers. Communication session establishment, endpoint peer identity processing and authentication and data traffic encryption protocols are modified to allow intermediaries to track the communications between endpoint peers for a particular communication session and obtain information to authenticate the endpoint peers and identify data traffic transmitted between them. Intermediaries can use the identities of one or both of the endpoint peers to enforce identity based rules for processing data traffic between the endpoint peers for a communication session.
Secure instant messaging system
A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security certificates to users binding the user's IM screen name to a public key, used by sending users to encrypt messages and files for the user. The CA uses a subscriber database to keep track of valid users and associated information, e.g. user screen names, user subscription expiration dates, and enrollment agent information. A user sends his certificate to an instant messaging server which publishes the user's certificate to other users. Users encrypt instant messages and files using an encryption algorithm and the recipient's certificate. A sending user can sign instant messages using his private signing key. The security status of received messages is displayed to recipients.
Localized network authentication and security using tamper-resistant keys
The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device of the network. Each key comprises a unique serial number and a common network send cryptographic key and a common network receive cryptographic key used only during the authentication phase by all components on the LAN. Each client key further includes a secret cryptographic key unique to each client device. During authentication, two random numbers are generated per communications session and are known by both sides of the wireless channel. Only the random numbers are sent across the wireless channel and in each case these numbers are encrypted. A transposed cryptographic key is derived from the unique secret cryptographic key using the random numbers generated during authentication. Thus, both sides of the wireless channel know the transposed cryptographic key without it ever being transmitted between the two.
Secure messaging systems
A system is provided that uses cryptographic techniques to support secure messaging between senders and recipients. A sender may encrypt a message for a recipient using the recipient's public key. The sender may send the encrypted message to the message address of a given recipient. A server may be used to decrypt the encrypted message for the recipient, so that the recipient need not install a decryption engine on the recipient's equipment.
Time-controlled secure communication
A method for transmitting messages via a time-controlled communication system (ZK) between a number of IP cores is provided. Each IP core has an information-processing subsystem (IVS) and a network controller (NK). Each NK has at least two interfaces, one for the ZK and a one for the IVS, wherein a distinction is drawn between privileged and non-privileged messages of the ZK, and where the transmission parameters relating to the ZK of a port of the NK, such as the periodically recurring transmission time of a message and the maximum transmission duration after each transmission time, can be set by a privileged message via the ZK or directly by a privileged entity. Each NK intending to transmit a message starts to transmit the message autonomously exactly at the time of the next set transmission time and interrupts the transmission process no later than the assigned maximum transmission duration has elapsed.
Method and apparatus for ingress filtering using security group information
A method and apparatus for ingress filtering using security group information are disclosed. The method includes performing access control processing on a packet and sending access control information to an ingress node of the packet in response to the access control processing. The access control information includes security group information and an address of a network node. The security group information identifies a security group. The network node is a member of the security group and is a destination of the packet.
Proactive forced renewal of content protection implementations
A method, apparatus, and system for proactive forced renewal of content protection implementations in devices. The method includes, on a first substantially periodic basis, automatically pushing a new content protection implementation to a device that contains an existing content protection implementation; wherein the existing content protection implementation comprises (a) existing software for presenting protected content and (b) an existing key to facilitate presentation of protected content; and wherein the new content protection implementation comprises a new key to supersede the existing key for facilitating presentation of protected content. On a second substantially periodic basis, the method includes automatically pushing revocation data to the device, the revocation data to identify a plurality of revoked keys, each revoked key of the plurality of revoked keys comprising a key that has been superseded by the new key of the new content protection implementation.
Conversation rights management
Conversation rights for multi-modal communications are managed and enforced in an enhanced communication system. Through physical and/or software components, rights are assigned to a communication session and related components upon user request. Permitted participants of the session are provided access tools such as decryption keys. Restrictions based on the assigned conversation rights are extended to preserved recordings and associated documents of the communication session.
System and method for enabling bulk retrieval of certificates
A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, a certificate synchronization application is programmed to perform certificate searches by querying one or more certificate servers for all of the certificates on those certificate servers. If all of the certificates on a certificate server cannot be successfully retrieved using a single search query, due to a search quota on the certificate server being exceeded for example, the search is re-performed through multiple queries, each corresponding to a narrower subsearch. Embodiments described herein enable large amounts of certificates to be automatically searched for and retrieved from certificate servers, thereby minimizing the need for users to manually search for individual certificates.
Techniques for secure network communication
Techniques for secure network communication are provided. Credentials for a user along with a transparently generated secret are sent to a resource that the user desires to establish a secure communication session with. After successful authentication of the user, an initial sequence number for a first transaction of the session is set on a client of the user. Thereafter, with each transaction of the session the client supplies a new and unique sequence number to a server of the resource and uses the secret to encode and validate that transaction. The server of the resource does not permit any transaction that includes an invalid or previously used sequence number.
Network, IPsec setting server apparatus, IPsec processing apparatus, and IPsec setting method used therefor
There is provided an IPsec setting server apparatus capable of preventing inconsistency of setting among communicating apparatuses. An IPsec processing section subjects a data communication packet received from an interface section to IPsec processing. An SPD is referred to from the IPsec processing section and records policies for applying the IPsec. An SAD is referred to from the IPsec processing section and records an SA necessary for subjecting an individual kind of communication to the IPsec processing. A request processing section receives a setting request message from the IPsec processing apparatus and returns a distribution message. IPsec policies necessary for determining a requested setting are stored in a distribution policy storage section. Information on respective kinds of SA communication requested to be set is stored in a management table.
Predicated issue for conditional branch instructions
A method and apparatus for executing branch instructions is provided. In one embodiment, the method includes receiving a branch instruction, wherein a first path of the branch instruction branches to a target instruction, and wherein a second path of the branch instruction branches to one or more interceding instructions between the branch instruction and the target instruction. The method further includes issuing the one or more interceding instructions and the target instruction and determining if the branch instruction follows the first path or the second path. Upon determining that the branch instruction follows the first path, the one or more interceding instructions between the branch instruction and the target instruction are invalidated.
System to profile and optimize user software in a managed run-time environment
Method, apparatus, and system for monitoring performance within a processing resource, which may be used to modify user-level software. Some embodiments of the invention pertain to an architecture to allow a user to improve software running on a processing resources on a per-thread basis in real-time and without incurring significant processing overhead.
System and method to manage address translation requests
A system and method for servicing translation lookaside buffer (TLB) misses may manage separate input and output pipelines within a memory management unit. A pending request queue (PRQ) in the input pipeline may include an instruction-related portion storing entries for instruction TLB (ITLB) misses and a data-related portion storing entries for potential or actual data TLB (DTLB) misses. A DTLB PRQ entry may be allocated to each load/store instruction selected from the pick queue. The system may select an ITLB- or DTLB-related entry for servicing dependent on prior PRQ entry selection(s). A corresponding entry may be held in a translation table entry return queue (TTERQ) in the output pipeline until a matching address translation is received from system memory. PRQ and/or TTERQ entries may be deallocated when a corresponding TLB miss is serviced. PRQ and/or TTERQ entries associated with a thread may be deallocated in response to a thread flush.
Apparatus and method for executing rapid memory management unit emulation and full-system simulator
A method for performing rapid memory management unit emulation of a computer program in a computer system, wherein address injection space of predefined size is allocated in the computer system and a virtual page number and a corresponding physical page number are stored in said address injection space, said method comprising steps of: comparing the virtual page number of the virtual address of a load/store instruction in a code segment in said computer program with the virtual address page number stored in said address injection space; if the two virtual page numbers are the same, then obtaining the corresponding physical address according to the physical page number stored in said address injection space; otherwise, performing address translation lookaside buffer search, that is, TLB search to obtain the corresponding physical address; and reading/writing data from/to said obtained corresponding physical address. The present invention also provides an apparatus and computer program product for implementing the method described above.
Identifying dynamically changing virtual storage devices
Mechanisms are provided for detecting changes in virtual storage device configurations. The mechanisms detect an event corresponding to a change in configuration of a virtual storage device. The virtual storage device is comprised of a plurality of portions of a plurality of physical storage devices. The mechanisms further, in response to detecting the event, determine if the change in configuration of the virtual storage device results in a change in the types of physical storage devices that are part of the virtual storage device. Moreover, the mechanisms further transmit a notification, in response to a determination that the change in configuration of the virtual storage device results in a change in the types of physical storage devices that are part of the virtual storage device, of the results of the change in configuration of the virtual storage device to one or more registered recipients registered to receive such notifications.
Restricting memory areas for an instruction read in dependence upon a hardware mode and a security flag
An apparatus for processing data 2 includes a processor 8, a memory 6 and memory control circuitry 12. The processor 8 operates in a plurality of hardware modes including a privileged mode and a user mode. When operating in the privileged mode, the processor 8 is blocked by the memory control circuitry 12 from fetching instructions from memory address regions 34, 38, 42 within the memory 6 which are writeable within the user mode if a security flag within register 46 is set to indicate that this blocking mechanism is active.
Storage system and virtualization method
The storage system of the present invention is able to generate one virtual logical device from different logical devices which exist in each of the different storage control units and remote-copy all or part of the virtual logical device to another logical device. The same virtual identifier is set for a volume of the first storage unit and for a volume of the second storage unit. The path control unit of the host identifies a plurality of volumes which have the same virtual identifier as one virtual volume. A remote copy pair can also be set by a virtual volume and a volume of the third storage unit. The setting of the virtual volume and the setting of the remote copy can be performed by means of an instruction from the management server.
Memory system which writes data to multi-level flash memory by zigzag interleave operation
According to one embodiment, a memory system includes a first memory chip includes a first temporary memory and a first block, a second memory chip includes a second temporary memory and a second block, and a memory controller that controls writing of logical pages to the first and second memory chips. The memory controller forms a second unit having the same page number as the first unit by the first temporary memory and the lowermost physical page in the first block, forms a third unit having the same page number as the first unit by the second temporary memory and the lowermost physical page in the second block, and writes the logical pages by an interleave operation in order of the second unit, the third unit, the first unit in the first block, and the first unit in the second block.
Transactional memory in out-of-order processors with XABORT having immediate argument
Methods, systems, and apparatuses to provide an XABORT in a transactional memory access system are described. In one embodiment, the stored value is a context value indicating the context in which a transactional memory execution was aborted. A fallback handler may use the context value to perform a series of operations particular to the context in which the abort occurred.
Virtualizing storage for WPAR clients using node port ID virtualization
Mechanisms for providing to a plurality of WPARs private access to physical storage connected to a server through a VIOS are disclosed. In one embodiment, a server is logically partitioned to form a working partition comprising a WPAR manager and individual WPARs. Each WPAR is assigned to a different virtual port. The virtual ports are created by using NPIV protocol between the WPAR and VIOS. Thereby, each WPAR has private access to the physical storage connected to the VIOS.
Integrated memory control apparatus
An integrated memory control apparatus including a first interface decoder, a second interface decoder and an interface controller is provided. Wherein, the first interface decoder is coupled to a control chip through a first serial peripheral interface (SPI), the second interface decoder is coupled to a micro-processor unit through a general transmission interface, and the interface controller is coupled to a memory through a second SPI. When the interface controller receives the request signals from the control chip and the micro-processor unit, the control chip may correctly read data from the memory through the first and second SPI. On the other hand, the micro-processor unit may stop reading data from the memory through the general transmission interface. Therefore, the control chip and the micro-processor unit may share the same memory.
Consistency evaluation of program execution across at least one memory barrier
Multi-processor systems and methods are disclosed. One embodiment may comprise a multi-processor system including a processor that executes program instructions across at least one memory barrier. A request engine may provide an updated data fill corresponding to an invalid cache line. The invalid cache line may be associated with at least one executed load instruction. A load compare component may compare the invalid cache line to the updated data fill to evaluate the consistency of the at least one executed load instruction.
Methods for determining alias offset of a cache memory
A redundant array of independent disk (RAID) stack determines a first number of processor cycles to reload first data from a first memory address of a main memory into a processor of a data processing system. The RAID stack loads second data from a second memory address of the main memory into the processor, where the second memory address is configured to be an address offset from the first memory address. The RAID stack reloads the first data from the first memory address of the main memory and determines a second number of processor cycles to reload the first data from the first memory address of the main memory. An alias offset of a cache memory associated with the processor of the data processing system is determined based on the first number of processor cycles and the second number of processor cycle.
Apparatuses and methods providing redundant array of independent disks access to non-volatile memory chips
A controller may include a RAID controller and an access controller. The RAID controller exchanges data with a host and select ones of a plurality of RAID levels responsive to RAID level information. The access controller is connected to the RAID controller and to a plurality of channels that are each connected to a plurality of non-volatile memory chips. The access controller accesses data in at least one of the non-volatile memory chips connected to each of the channels according to the selected RAID level. The controller may alternatively or additionally include a storage device and a main processor. The main processor is configured to logically partition a plurality of non-volatile memory chips that are connected to each of a plurality of channels into a normal partition region and a RAID level partition region, where data access is performed according to a selected RAID level, in response partition information that is stored in the storage device.
System for determining allocation of tape drive resources for a secure data erase process
A system is provided to ensure a timely secure data erase by determining whether allocating an additional tape drive would improve secure data erase performance by evaluating a quantity of physical volumes to be secure data erased, a maximum queued threshold, an average time to an erasure deadline and a minimum expiration threshold. An additional tape drive is allocated for the secure data erase process when it is determined that allocating an additional tape drive would improve secure data erase performance.
Storage system with guaranteed read latency
A method for writing data to persistent storage. The method includes receiving a first request to write a first datum to persistent storage including NAND dies, identifying a first NAND die in which to write a first copy of the first datum and a second NAND die in which to write a second copy, generating a second request to write the first copy of the first datum to the first NAND die and a third request to write the second copy to the second NAND die, and waiting until the first NAND die and second NAND die not are busy. Based on a determination that the first NAND die and the second NAND die are not busy: issuing the second request to the first NAND die, and issuing the third request to the second NAND die after the second request is complete.
Multi-protocol storage device bridge
A bridge includes a host interface via which data/commands are received from and transferred to a host, and a storage device interface via which data/commands are received from and transferred to a storage device. The bridge also includes one SDPC, a controller and a switching system that is configurable by the controller to connect the protocol converter to the host interface and the storage device interface if the storage device protocol used by the host device differs from the storage device protocol used by the storage device, and to connect the host device interface to the storage device interface, not via the bi-directional protocol converter, if the two storage device protocols are the same. The bridge may include two SDPCs, each for converting a different protocol to the host protocol and vice versa, with the switching system being configurable to switch between the two SDPCs. The bridge may omit the SDPC altogether, with the switching system being configurable to switch between connecting (1) the host device interface to the storage device interface, and (2) bypassing the storage device interface.
Memory access controller, system, and method
A memory access controller including a command analysis unit to receive write access request and command data and to analyze access to a memory, a command execution unit to output command and data control signals to the memory based on write data, and the analysis result, a mode setting unit to switch between a first operation mode in which a write access request is issued when both the command data and the corresponding write data are available, and a second operation mode in which a write access request is issued when the command data is available independently of availability of the write data corresponding to the command data, and a timing arbitration unit provided for each bus master to output the write access request and command data to the command analysis unit and output the write data to the command execution unit in accordance with the mode setting unit.
Techniques for performing host path detection verification
Described are techniques for verifying host path detection. First information from a first data storage system is received indicating a first set of one or more hosts and, for each host in the first set, which one or more devices of a first device set of the first data storage system are accessible to said each host in the first set over one or more associated paths to the first data storage system. Second information and the first information are received at a second data storage system. First processing is performed at the second data system to determine whether each host included in the first information has successfully completed path detection with respect to a second device set for the second data storage system.
Techniques for performing online data migration while effectively migrating SCSI reservations between source and target arrays
A technique migrates data from a source array to a target array while preserving SCSI reservation compliance. The technique involves providing an active-to-passive instruction to the source array while a first SCSI reservation enables hosts to access data on the source array using MPIO software. The active-to-passive instruction directs the source array to transition devices from active mode to passive mode and, upon receipt of a next SCSI instruction, output an indicator indicating that the first SCSI reservation has been cleared. The technique further involves transitioning devices of the target array from passive mode to active mode and beginning a data transfer operation which transfers data from the source array to the target array. The technique further involves automatically effectuating formation of a second SCSI reservation in place of the first SCSI reservation, the second SCSI reservation providing host access to the data on the target array using MPIO software.
SAS storage virtualization controller, subsystem and system using the same, and method therefor
A storage virtualization computer system. The storage virtualization computer system comprises a host entity for issuing an IO request, a SAS storage virtualization controller coupled to the host entity for executing IO operations in response to the IO request, and at least one physical storage device, each coupled to the storage virtualization controller through a SAS interconnect, for providing data storage space to the storage virtualization computer system through the SAS storage virtualization controller.
Storage virtualization computer system and external controller thereof
A storage virtualization computer system. The storage virtualization computer system comprises a host entity for issuing an IO request, a storage virtualization controller coupled to the host entity for executing IO operations in response to the IO request, and a at least one physical storage device, each coupled to the storage virtualization controller through a point-to-point serial-signal interconnect, for providing storage to the storage virtualization computer system through the storage virtualization controller. As an example, the point-to-point serial-signal interconnect can be a Serial ATA IO device interconnect.
Configuring an input/output adapter
A computer-implemented method includes initializing a driver associated with an input/output adapter in response to receiving an initialize driver request from a client application. The input/output adapter may be initialized to enable adapter capabilities of the input/output adapter to be determined. The computer-implemented method also includes determining the adapter capabilities of the input/output adapter and determining slot capabilities of a slot associated with the input/output adapter. The computer-implemented method further includes setting configurable capabilities of the input/output adapter based on the adapter capabilities and the slot capabilities.
Providing ring protection for access networks
According to one embodiment, an apparatus comprises one or more hub interfaces and one or more processors. A hub interface is coupled to an access network element of a ring network comprising a number of access network elements. The ring network comprises a pair of rings: a first ring traveling in a first direction and a second ring traveling in a second direction. The processors perform the following for each access network element: facilitate establishing a pair of point-to-point logical connections to couple a access network element to a hub interface at a corresponding dedicated bandwidth, a first connection traveling along the first ring, a second connection traveling along the second ring; facilitate establishing a pair of tunnels on the pair of point-to-point connections; and utilize the tunnels to protect the ring network.
Block floating point compression of signal data
A method and apparatus for compressing signal samples uses block floating point representations where the number of bits per mantissa is determined by the maximum magnitude sample in the group. The compressor defines groups of signal samples having a fixed number of samples per group. The maximum magnitude sample in the group determines an exponent value corresponding to the number of bits for representing the maximum sample value. The exponent values are encoded to form exponent tokens. Exponent differences between consecutive exponent values may be encoded individually or jointly. The samples in the group are mapped to corresponding mantissas, each mantissa having a number of bits based on the exponent value. Removing LSBs depending on the exponent value produces mantissas having fewer bits. Feedback control monitors the compressed bit rate and/or a quality metric. This abstract does not limit the scope of the invention as described in the claims.
Blade system and method for establishing a shortest path to transmit packets among blade servers of the blade system
A blade system and method establishes a shortest path to transmit packets in blade servers of the blade system. The blade system reads status information of each blade server using a shelf manager and connection information among the blade servers. A shortest path among the blade servers is calculated by a depth-first search (DFS) algorithm according to the connection information. The blade system sets a configuration file of the each blade server to transmit the packets among the blade servers according to the calculated shortest path.
Method and system for managing abnormal disconnects during a streaming media session
A method for streaming multimedia content in a wireless communication system. The exemplary method includes receiving, in a data network, a request from a mobile device to stream multimedia content to the mobile device from the data network, where the request is transmitted over a wireless connection. The method further includes streaming a portion of the requested multimedia content from the data network to the mobile device. The method also includes detecting termination of the wireless connection during the streaming and retaining information in at least one of a device in the data network and the mobile device, where the information indicates a point in the multimedia content stream where the termination of the wireless connection occurred. The method still further includes re-establishing the wireless connection and resuming streaming of the multimedia content based on the retained information.
System and method for non-disruptive check of a mirror
A system and method for verifying the consistency of mirrored data sets between source and destination storage systems is provided. A destination verification module sends version information to the source storage system where the source verification module determines whether the source and destination storage systems are utilizing compatible versions of the verification module. If the destination verification module receives an acceptable version from the source, the destination module then determines a base PCPI to utilize for verification and sends a PCPI identifier of the base PCPI to the source. The source verification module generates and transmits a data stream consisting of comprising of checksum information. The destination verification module compares the received data stream with checksum information retrieved from disk. If there are mismatches, i.e. the received data differs from the data retrieved from disk, the destination verification module logs the data mismatches in a verification log file.
Deterministic finite automata (DFA) instruction
A computer-readable instruction is described for traversing deterministic finite automata (DFA) graphs to perform a pattern search in the in-coming packet data in real-time. The instruction includes one or more pre-defined fields. One of the fields includes a DFA graph identifier for identifying one of several previously-stored DFA graphs. Another one of the fields includes an input reference for identifying input data to be processed using the identified DFA graphs. Yet another one of the fields includes an output reference for storing results generated responsive to the processed input data. The instructions are forwarded to a DFA engine adapted to process the input data using the identified DFA graph and to provide results as instructed by the output reference.
Data transferring method and content transferring method
In a method of transferring data in a data interoperable environment, a secure authenticated channel is established with a receiving entity corresponding to receiver information included in a received control message, when the control message is received form a control entity, a plurality of data designated by the control entity are transmitted to the receiving entity through the established secure authenticated channel, and an event message for representing a transmission status of the transmitted data is transmitted to the control entity. Accordingly, it is possible to transmit the plurality of data through a single transmission session and provide a transmission status of each data through an event.
Stateless gateways having remote dialog store
Gateway apparatus for facilitating communications using a stateful protocol (e.g., SIP or SIP/SIMPLE protocol). The gateway apparatus includes a plurality of gateway devices and a remote dialog store, wherein each of the plurality of gateway devices comprises export logic for causing dialog information associated with a first received message (e.g., a request or response) to be communicated to the dialog store, and retrieval logic for causing a lookup of the dialog information in response to a second received message, the second received message associated with the first received message. In one example the gateway devices are stateless, thereby relying on the dialog store for validating and routing messages. In another example, the gateway devices are stateful and rely on the dialog store for backup (e.g., if a gateway device crashes). The gateway devices may be configured for receiving and processing messages according to SIP protocol or SIP/SIMPLE protocol.
Methods and systems for browser file transfer
The present invention relates to transferring files between browsers and other browsers or peer-to-peer (P2P) clients. In an embodiment, a system for transferring files includes a first browser and a second browser. The system may have a first client coupled to the first browser and a second client coupled to the second browser. The system may have a relay server coupled to the first and second clients configured to receive data from the first client, send the data to the second client, and send an acknowledgement to the first client upon completion.
Client-based solution for seamless access to applications across networks
A client-based solution for seamless access to applications across networks is agnostic to the inter-network mix of application architectures with or without IMS. In one embodiment, the presence of an added layer of intelligence effectively traverses and is agnostic to the various standards layers.
Affiliate bandwidth management
Methods, systems, and machine readable media are disclosed for managing bandwidth usage of a content provider. According to one embodiment, a system for managing bandwidth usage of a content provider can comprise a content provider system adapted to maintain and provide content and a first affiliate system comprising an affiliate network, an affiliate server communicatively coupled with the affiliate network, and a client. The client can be adapted to selectively request the content from either the content provider system or the affiliate server of the first affiliate system based on bandwidth costs for the content provider system.
Method and apparatus for allocating resources among backup tasks in a data backup system
Method and apparatus for allocating resources among backup tasks in a data backup system is described. One aspect of the invention relates to managing backup tasks in a computer network. An estimated resource utilization is established for each of the backup tasks based on a set of backup statistics. A resource reservation is allocated for each of the backup tasks based on the estimated resource utilization thereof. The resource reservation of each of the backup tasks is dynamically changed during performance thereof.
Methods, systems, and computer program products for transmission control of sensitive application-layer data
Disclosed are methods, systems, and computer program products for identifying sensitive application-layer data and controlling transmission of the data in a network. According to one method, sensitive data in a system resource is identified at an application layer. A packetization of the identified sensitive data is detected. A flag indicative of the presence of sensitive data is inserted in a packet having at least a portion of the identified sensitive data in response to identifying the sensitive data and detecting the packetization. The flag is inserted in a portion of the packet corresponding to a layer other than the application layer. Transmission of the packet is controlled in a network based on the flag.
Method and apparatus for distributed upload of content
A system and method for distributed uploading of content utilizes one or more viewer systems, coupled over a network to a remote content source, to upload transmit at least a portion of the content to a remote storage system along with authorization/identification indicia identifying the viewer system. In one embodiment, fractional portions of the same content program from multiple different viewer systems are aggregated at the remote storage system for subsequent download streaming to a requesting of the viewer systems for viewing thereby at a second time, which is time-shifted from the initial transmission from the content source.
Classifying an operating environment of a remote computer
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer's ability to access a resource is determined based upon the computer's operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer's access to the requested resource.
System and method to publish information from servers to remote monitor devices
To assist in monitoring the intelligent messaging network, a system and method for publishing logging and status information from the servers is provided. A list of available servers accessible for monitoring by persons, devices, and applications via a remote monitor device can be provided. The remote monitor device may forward selected servers from the list of available servers in which they are interested. Also, particular information about the selected servers can be requested. Access to certain servers and information may be restricted to those with authorization. Authorization can be verified by the use of digital certificates. The requested information can then be gathered and provided to authorized persons or devices. Typically, the information includes logging and status information from the servers. The information can be provided as an XML page and viewed using, for example, a standard web browser. Further, if the information is provided to the remote monitor device as an XML page, a standard XML parser may be used to extract particular information from the XML page.
Method and system for personalized searching of information and product services by estimating an interest to a user
A method for providing automatic, personalized information services to a computer user includes the following steps: transparently monitoring user interactions with data during normal use of the computer; updating user-specific data files including a set of user-related documents; estimating parameters of a learning machine that define a User Model specific to the user, using the user-specific data files; analyzing a document to identify its properties; estimating the probability that the user is interested in the document by applying the document properties to the parameters of the User Model; and providing personalized services based on the estimated probability. Personalized services include personalized searches that return only documents of interest to the user, personalized crawling for maintaining an index of documents of interest to the user; personalized navigation that recommends interesting documents that are hyperlinked to documents currently being viewed; and personalized news, in which a third party server customized its interaction with the user. The User Model includes continually-updated measures of user interest in words or phrases, web sites, topics, products, and product features. The measures are updated based on both positive examples, such as documents the user bookmarks, and negative examples, such as search results that the user does not follow. Users are clustered into groups of similar users by calculating the distance between User Models.
Air conditioning system
An air conditioning system includes one or plural device group monitoring targets including one or plural indoor units and an outdoor unit, one or plural connection devices configured to be communicably connected to the indoor unit/units and the outdoor unit and have a unique ID, and a monitoring device configured to be communicably connected to the connection device/devices and have a monitoring memory that stores data received from the connection device/devices. When power supply is started respectively, the connection device/devices respectively performs communication with the indoor unit/units and the outdoor unit to collect configuration type information representing at least the configuration and the type of the device group monitoring target corresponding to the connection device, and respectively transmits the configuration type information to the monitoring device together with the ID of the connection device corresponding to the configuration type information.
Multi-network type coordinator for a single physical layer
Method for coordinating the use of a physical layer between a first network and a second network sharing the physical layer, the first network including at least one device operating using a first network protocol, the second network including at least one device operating using a second network protocol different from the first network protocol, a device in the first network not communicating with a device in the second network, including the procedures of determining required resources of the first network, determining required resources of the second network, requesting the required resources of the first network from a master device of the second network, requesting the required resources of the second network from a master device of the first network, allocating resources to the first network, by the master device of the second network, and allocating resources to the second network by the master of the first network.
System and method for obtaining in-use statistics for voice applications in interactive voice response systems
Systems and methods are provided for obtaining statistics from the use of a voice application. More particularly, the invention may comprise an interception engine that is configured to receive a document from an IVR application server and inject a marker(s) into the document, and pass the document on to an IVR browser. The interception engine is further configured to receive a response document from the IVR browser, remove the marker results, and pass the document on to the IVR application server. The marker results are used to create statistical information useful in the analysis of the operation of the voice application in the IVR system. In an exemplary embodiment, the markers are used in connection with a map of the call flow of the voice application.
Endpoint activity logging
The ability to identify a specific machine associated with activity taking place on the Internet is provided. This involves recording the association between MAC addresses, which are uniquely associated with endpoints, and local IP addresses, the recording of the association between local IP addresses and port numbers with public IP addresses and port numbers, and the recording of public IP addresses and source port numbers associated with public activity. By recording this information and correlating it, in real-time or in a post-processing step, the specific machine associated with public activity can be determined.
Generation of a master schedule for a resource from a plurality of user created schedules for the resource
A plurality of user defined schedules are received for collecting data on a plurality of resources. A schedule is generated for data collection on at least one resource, based on processing the plurality of user defined schedules to eliminate redundant data collection on the at least one resource. Operations are executed on the at least one resource in accordance with the generated schedule.
Method and computer system for optimizing a link to a network page
To optimize a link (221) which refers to a first network page (11) of a first server (10a) and which is displayed on a second network page (21) of a second server (20), the link is automatically assessed in dependence on link (22) activation by a user (50), wherein the assessment is carried out in dependence on the frequency of activation of the link (22) by any user. A static link is examined in dependence on the assessment of the link as to whether the display of the link on the second network page (21) should be continued. A dynamic link, which is generated in dependence on at least one predeterminable parameter, is examined in dependence on the assessment of the link (22) as to whether the at least one or another predeterminable parameter should be changed.
Remote network device management
An apparatus includes a network port and a switch management processor. The network port receives packets over a network, where the packets include a management packet and a trigger packet. The switch management processor executes a command in selected management packets received over the network when a trigger pattern generated based on the trigger packet matches a bit pattern stored in memory. The bit pattern is stored in the memory during a predetermined period after the management packet is received. The predetermined period is selected based on a desired security level.
Systems and methods for QoS provisioning and assurance for point-to-point SIP sessions in DiffServ-enabled MPLS networks
Systems and methods for efficiently provisioning and assuring Quality of Service (QoS) between user networks communicating over a DiffServ-enabled network, with QoS management transparency to SIP user agents. The system comprises user networks communicating via a core network, each user network having a source and destination SIP user agent respectively, a SIP proxy server between the source SIP user agent and destination SIP user agent, a Bandwidth Manager to provision a pipe between the source user network and the destination user network, wherein the pipe has a specified bandwidth, and a QoS Agent for accepting and/or rejecting a SIP session based on availability of bandwidth in the pipe; wherein the SIP proxy server is configured to forward an incoming SIP request to the QoS Agent. The method comprises provisioning a pipe between the SIP user agents or their respective user networks, and allowing/rejecting incoming SIP sessions based on the available bandwidth in the pipe.
Enhanced domain name generation and registration
Methods of the present inventions allow for generating and providing an enhanced domain name. An exemplary method may comprise providing an enhanced domain to a second party. The enhanced domain may comprise a domain name, a web space automatically enabled and associated with the domain name, and at least one application automatically enabled and associated with the domain name.
Systems and methods for coordinated management of power usage and runtime performance in performance-managed computing environments
Systems and methods are provided for dynamically controlling application placement and server resource allocation in a distributed system wherein a performance manager and power manager collaborate during run-time execution of data processing tasks to coordinate management and control of workload placement and server usage and dynamically determine a tradeoff between performance level and power usage that meets power and performance objectives.
Architecture and protocol for extensible and scalable communication
A system performs information technology (IT) tasks using a computer. Examples of IT tasks include installing or configuring software, displaying alerts, executing programs or scripts on the endpoint, or logging activities. In an embodiment of the system, a connection initialization module receives a request for a persistent connection over a network from a managed endpoint. The request is accepted and a persistent connection is opened with the managed endpoint. A tier-1 module then receives configuration information from the managed endpoint over the persistent connection. The configuration information includes a list of functional plugins on the managed endpoint, where a functional plugin comprises a software module for performing an IT task. The tier-1 module stores this configuration information along with information describing the persistent connection and maintains the persistent connection in an open state.
Method for selecting and configuring network supernodes
A method for selecting and configuring network supernodes includes (i) in a first set period T1, each node, other than a control node in a network, regularly sending information on interactions between the node and other nodes to the control node; and (ii) in a second set period T2, the control node dividing the nodes into a plurality of node clusters according to the received information on interactions among the nodes and selecting supernodes from each node cluster, where each node belonging uniquely to a node cluster.
Client-based solution for seamless access to applications across networks
A client-based solution for seamless access to applications across networks is agnostic to the inter-network mix of application architectures with or without IMS. In one embodiment, an application client registers in either an integrated mode or a standalone mode based whether an application availability notification is received within a predetermined period of time.
Technique for providing a reliable trust indicator to a webpage
A technique is provided for providing a trust indicator for a particular webpage. The trust indicator may indicate whether publishers of web content and/or end-users trust the content of the particular webpage and whether the particular webpage is popular. A user requests, via a web browser a webpage to be displayed. A process associated with the webpage requests a value to be displayed along with the webpage. The value may indicate 1) a number of links that link to the webpage, 2) a number of user-created tags that have been associated with the webpage, or 3) a trust rank that a web crawler associates with the webpage. A trust rank may be based, at least in part, on user-created tags that have been associated with the webpage. A value may also be associated with an advertisement that is displayed along with a particular webpage.
System, method, and computer program product for receiving security content utilizing a serial over LAN connection
A system, method, and computer program product are provided for receiving security content utilizing a serial over LAN connection. In use, an unsuccessful attempt to connect to a network for accessing security content at a remote second device is indicated by a first device, where the unsuccessful attempt results from a malfunction at the first device. Further, the security content is received at the first device utilizing a serial over local area network (LAN) connection established with the remote second device, based on the indication.
Variant streams for real-time or near real-time streaming
Methods and apparatuses for real-time or near real-time streaming of content using transfer protocols such as an HTTP compliant protocol. In one embodiment, a method includes dividing a stream of data, representing the contiguous time based content of a program (e.g. a live video broadcast), into a plurality of distinct media files, and generating a playlist file having a plurality of tags and Universal Resource Indicators (URIs) indicating an order of presentation of the plurality of distinct media files. The plurality of media files and the playlist file can be made available for transmission to a client device which can retrieve the media files using the playlist file.
Associating version information with a component document of a modular document
A modular document composed of plural component documents that are combined to allow presentation of the modular document is provided. The modular document contains references to the component documents. Version information is associated with at least one of the references to identify one of plural versions of a corresponding particular one of the component documents.
Method and system to collect and communicate problem context in XML-based distributed applications
A system providing a reproducible package of a web service scenario having at least one web service client and at least one web service coupled to said network. A collector extracts a set of message exchanges between the web service client and the web service, and a closure builder captures a service description. A workspace repository coup stores the set of message exchanges and the service description to create the reproducible package of the web service scenario. According to one embodiment, the reproducible packages provide mechanisms to share and replay XML message-based scenarios for distributed applications.
Employing pixel density to detect a spam image
A network device and method are directed towards detecting and blocking image spam within a message by performing statistical analysis on differences in edge pixel distribution patterns. An image spam detection component receives a message with an image attachment. Physical characteristics of the image are examined to determine whether the image is a candidate for further analysis. If so, then the image may be converted to a grayscale image, and then performing edge detection, followed by the elimination of non-maxima and thresholding of weak edges. Edge pixels and then employed to determine a normalized pixel density distribution (PDD). Various statistical analyses are applied to the resulting normalized PDD to determine a likelihood that the image is spam. A signature based exemption may be applied to images improperly identified as spam, based on trusted user feedback.
Host device and method for accessing a virtual file in a storage device by bypassing a cache in the host device
A host device is provided comprising an interface configured to communicate with a storage device having a public memory area and a private memory area, wherein the public memory area stores a virtual file that is associated with content stored in the private memory area. The host device also comprises a cache, a host application, and a server. The server is configured to receive a request for the virtual file from the host application, send a request to the storage device for the virtual file, receive the content associated with the virtual file from the private memory area of the storage device, wherein the content is received by bypassing the cache, generate a response to the request from the host application, the response including the content, and send the response to the host application. In one embodiment, the server is a hypertext transfer protocol (HTTP) server. In another embodiment, the server can determine if a request is associated with a normal user permission or a super user permission, and send a response to the host application only if it is determined that the request is associated with the normal user permission.
Handheld electronic device and associated method providing time data in a messaging environment
An improved handheld electronic device and an associated method are provided in which time data regarding certain aspects of a messaging conversation on a handheld electronic device are made available to a user. Such time data is provided, for instance, in situations where an interruption has occurred during a messaging conversation. Time data can also be provided to a user on demand in certain circumstances.
System and method for protecting mail servers from mail flood attacks
Most unsolicited commercial email (UCE) countermeasures call for a message by message analysis. However, some UCE attacks occur when a single sender of UCE floods a mail transfer agent (MTA) with a number of copies of a UCE, in a mail flood attack. The attacks rarely rise to the level of denial of service attacks but are significant enough to place a strain on MTAs and anti-UCE countermeasures. The anti-mail flood methodology disclosed herein provides a system and method for protecting mail systems from such mail flood attacks enabling anti-UCE countermeasures to work more efficiently.
Electronic mail communications system with client email internet service provider (ISP) polling application and related methods
An electronic mail (email) communications system may include a mobile wireless communications device, a wireless communications network connected to the Internet, and an Internet Service Provider (ISP) server connected to the Internet for receiving emails for a given user. The system may further include an email proxy server connected to the Internet for pushing emails from the ISP server to the mobile wireless communications device via the wireless communications network. A user computer may be connected to the Internet and may include a client email application for periodically polling the ISP server to detect new emails. The client email application may also send new email notifications to the email proxy server upon detection of new emails to cause the email proxy server to push the new emails to the mobile wireless communications device.
Predictive electronic mail addressing
A system for predictive electronic mail addressing is provided. The system comprises a computer system and an application, that when executed on the computer system, observes the instantiation of a draft electronic mail message on a client device. The system also analyzes at least one of an entry of a first addressee, an entry of text in the subject line, and an entry of text in the body of the draft electronic mail message. The system also identifies at least one list comprising a plurality of proposed addressees based on the analyzed entries. The system also displays the at least one list in a selection pane on the client device and enters the list into the addressee entry space of the draft electronic mail message when selected.
Routing of pooled messages via an intermediary
Message intermediation for multiple service instances, while allowing the service instance to control whether messages are processed under a transaction. The message intermediator chooses to dispatch messages among different backend service instances based on any routing rules. The message intermediator performs a peek-lock of message from a forward-end queue, and assigns the message to a service instance. The message is provided into a backward-end queue specific to the assigned service instance. The service instance may then process the message, perhaps under a transaction created at the service instance. Upon completion of processing, the message is deleted in the back-end queue, which causes the forward-end queue to delete the message under the same transaction created by the service instance. Whether or not this deletion at the forward-end is committed or rolled back depends on whether the transaction created at the service instance is committed or rolled back.
Subject line personalization
One or more conditions associated with personalizing a subject line of a message for each of one or more target recipients may be determined. One or more conditions may be evaluated to determine which of conditional text is included in and which of conditional variables are included with the subject line. One or more values may be determined, for each of the one or more target recipients, corresponding to each of universal variables and the conditional variables for inclusion with the subject line. The subject line of the message may be personalized for each of the one or more target recipients based on the evaluation of the one or more conditions, the subject line including text and values corresponding to the variables for inclusion with the subject line as determined based on the evaluation.
Electronic message system recipient recommender
An electronic message management system monitors proposed recipients for electronic messages (such as emails) and provides recommendations on alterations to the distribution set, such as by adding or removing recipients.
Method and an apparatus to screen electronic communications
A method and an apparatus to screen electronic communications have been disclosed. In one embodiment, the method includes extracting URLs from electronic communication and analyzing the URLs extracted to determine whether the electronic communication is of a first predetermined category. Other embodiments have been claimed and described.
Creating dynamic interactive alert messages based on extensible document definitions
An unsolicited dynamic interactive message is created wherein the message defines any graphical user interface elements to be displayed, the rules associated with the message, the appropriate methods and functions which can be performed and specific contextual interactions supported. The message definition can originate from a local or remote computer and can be pre and post processed as specified by the computing environment and the message definition itself.
Voting in chat system without topic-specific rooms
A method, system and graphical user interface for a chat system is disclosed. One aspect of certain embodiments includes receiving from respective users feedback data regarding the received messages or authors of the received messages and providing the feedback to the respective authors.
Server apparatus, network system, data transfer method, and program
Disclosed is a server apparatus including a registration means for associating a first apparatus with a plurality of second apparatuses as the control targets thereof, and registering the first apparatus and the plurality of second apparatuses associated, a constant connection session establishment means for establishing a constant connection session with each of the plurality of second apparatuses, a request reception means for receiving from the first apparatus a first request to transfer data between the plurality of second apparatuses, and a request transmission means for transmitting a second request to directly transfer data between the plurality of second apparatuses to one of the plurality of second apparatuses through the constant connection session in response to the received first request.
A service server can be operated in a more practical rate structure by extending the storage period and/or reducing the recording fee for information having a high utilization factor, or increasing the recording fee for information with a low utilization factor among the information stored in the service server. The service server includes a receiving device which receives the image information from a communication device on the information supplier side and records a recording fee of the received information, a transmitting and receiving device which transmits the information recorded in the recording device to a communication device on the information demander side upon an information service request from the information demander side, a counting device (information processing device) which counts an information service number from the information demander side, a recording device which records the counted information service number to be associated with the information supplier, and a recording fee calculating device (information processing device) which calculates a recording fee by reducing or increasing the recording fee recorded in the recording device.
Method and apparatus for managing transmission of TCP data segments
A communication device is arranged to transmit data segments over an interface, wherein the communication device comprises transmission management logic. In response to receipt of a data segment for transmission over the interface, the transmission management logic is arranged to determine a sequence number of a data segment to be transmitted and compare the sequence number of the data segment to be transmitted with at least one pending sequence number of a previous data segment. Based on the comparison, the transmission management logic either discards the data segment to be transmitted if the sequence number of the data segment to be transmitted matches the at least one pending sequence number of the previous data segment; or adds the sequence number of the data segment to be transmitted to the at least one pending sequence number and transmits the data segment over the interface if the sequence number of the data segment to be transmitted does not match the at least one pending sequence number.
Method and device for fast correlation calculation
The field of the invention is that of the reception of a radionavigation signal originating from a satellite positioning system such as the GPS system. The present invention concerns a method for calculating correlations between a first sequence and a second sequence, said first sequence and said second sequence having a duration DCode, the first sequence being extracted from a digital signal comprising a code, said code comprising elementary time divisions, called chips, of mean duration Dchip, said chips being synchronized with pulses delivered by an NCO oscillator at the mean frequency 2/Dchip, the second sequence resulting from a sampling at a frequency Fe of an analog signal, the frequency Fe being greater than 2/Dchip. According to the invention, the method comprises a step of aggregating samples of the second sequence, over consecutive integration intervals of duration equal on average to Dchip/2, starting at each pulse of the NCO oscillator, so as to determine results of elementary aggregates.
Managing snapshot storage pools
Various embodiments of the invention relate to an apparatus and a method of managing a snapshot storage pool (SSP) associated with a storage unit of a distributed data storage system. According to some embodiments of the invention, the apparatus may include a logic module and a processor. The logic module may be adapted to provide a threshold corresponding to a ratio between a current amount of storage resources used for storing snapshots in the SSP and a total storage capacity defined for the SSP. The processor may be adapted to trigger an action that may be effective for managing the SSP in response to the amount of storage resources used for storing snapshots in the SSP crossing the threshold.
Accelerated drill-through on association rules
A method, system and computer program product for processing data relating to transactions that enables, for example, performing a Drill-Through on a given association rule for a large number of transactions in a short period of time. A Drill-Through (DT) Preparation, which generates the prefix tree and the transaction group information, and the DT Execution, which determines the transactions supporting an association rule, may be carried out in order to extract hidden information from input data.
Storage device for generating and storing description information of multi-media contents including keywords in which duplicative keywords are replaced by reference information, and a computer readable storage medium for causing a computer to function as the storage device and to locate selected keywords in said multi-media content
There are provided a storage device and a computer-readable medium capable of efficiently storing keywords contained in description information and efficiently retrieving the keyword. A list producing portion (6) extracts the keywords from the description information and produces a keyword list correlating the keywords with the scene information containing the keywords. A description information converter (8) converts the keywords contained in the keyword list received from the list producing portion (6) among the keywords contained in the externally received description information into reference information for specifying the keywords in the keyword list received from the list producing portion (6). A storage (10) stores the converted description information provided from the description information converter (8) and the keyword list provided from the list producing portion (6).
Information processing device for selectively locating and reading description information of multi-media content divided into a time series at a first level that is further divided and correlated to a second level using a keyword/ID information and reference information representative of the keyword/ID
There are provided a storage device and a computer-readable medium capable of efficiently storing keywords contained in description information and efficiently retrieving the keyword. A list producing portion (6) extracts the keywords from the description information and produces a keyword list correlating the keywords with the scene information containing the keywords. A description information converter (8) converts the keywords contained in the keyword list received from the list producing portion (6) among the keywords contained in the externally received description information into reference information for specifying the keywords in the keyword list received from the list producing portion (6). A storage (10) stores the converted description information provided from the description information converter (8) and the keyword list provided from the list producing portion (6).
Generic information system builder and runner
An information system (IS) architecture comprising an application environment operative to develop, run and edit on the fly any IS application, and a database environment coupled to the application environment and including a generic and rigid schema operative to represent all business and application components of any application in the application environment as records of the generic and rigid schema. The generic and rigid schema provides an on the fly capability to change any business component or application component in a run time application, thereby leaving the schema and the application environment unchanged during system operation.
Set-level database access for performing row-sequential operations
A method and computer program are disclosed for increasing the efficiency of a row sequential database operation by transforming procedural logic, which applies serially to one row at a time, into set logic, which applies in parallel to many rows or all rows at once. The method includes dividing the row sequential operation into a plurality of portions. A hierarchy is determined for the portions. A set level operation is generated in accordance with the portion hierarchy.
Geographical distributed storage system based on hierarchical peer to peer architecture
A geographically distributed storage system including a global Peer-To-Peer (P2P) ring and a local P2P ring. The global P2P ring includes all storage nodes and the local P2P ring includes a group of the storage nodes. Each of the group of storage node belongs to the global P2P ring and the local P2P ring and each storage node includes global and local management information. The global management information includes a node table for managing topology information of a network connecting the group, a metadata table for managing locations of stored data objects, and a global routing table for managing routing in the global P2P ring. The local management information includes an object management table for managing stored data objects in the group, a Logical Unit (LU) management table for managing logical units in the group and a local routing table used for managing routing in the local P2P ring.
Parallel algorithm to implement temporal aggregate queries
A method executed by a plurality of processors in a database system to implement temporal aggregate queries. The database system has a temporal table. A plurality of consecutive temporal partitions are defined and allocated to the respective processors. A query is received to aggregate at least one attribute of the temporal table. In response to the query, a plurality of timestamps are identified in the temporal table, the respective timestamps are allocated to the respective temporal partitions, the value changes in the at least one attribute at the plural timestamps are computed within each partition using the respective processors to which each partition is allocated, and the value changes within each partition are aggregated using the respective processors to which each partition is allocated to produce an aggregate value for the query.
Method and system for improving utilization of human searchers
A method and system of improving utilization of human searcher(s) in a search system provides an ambassador guide who may categorize and structure a request, interact with a user, provide a search result, and review a search result. The ambassador guide improves response time, automation, and efficiency of use of searchers and resources of the search system. A toolset may be provided to an ambassador to assist in rapidly executing relevant tasks.
Data tranformations for a source application and multiple target applications supporting different data formats
Embodiments of the invention allow structured data to be transferred between a source application and target applications that process structured data in different formats. For example, structured data may have associated rules which transform the structured data based on some variables. The source application may register variable definitions for each variable in a registry. Each target application may read the registry and register values for the variables. Once values are registered, the source application transfers the structured data to a transformation engine that applies the rules, using the registered values for the variables, to transform the structured data into a format compatible with the target applications. The transformation engine may also determine distinct sets of variable values and transform structured data based on each distinct set. In doing so, the number of transformed data generated is limited to the number of distinct sets, thereby avoiding generating duplicate transformed data.
Apparatus and method of driving loadable device component
An apparatus for driving a loadable device component, the apparatus including: the loadable device component providing an application with a loading mechanism that is classified according to a load type property; a core framework module component defining a kind of the load type property; at least one eXtensible Markup Language (XML) data component containing configuration information and generation information of the loadable device component; and a device manager component driving a corresponding loadable device component after parsing the XML data component.
Information retrieval from a collection of information objects tagged with hierarchical keywords
The present invention can include a data processing system-implemented method or a data processing system readable media having software code for carrying out the method. The method can comprise formulating queries, searching for a plurality of information objects, or a combination thereof. In a specific embodiment, an original query with at least one keyword can be automatically expanded to an expanded query that includes at least one keyword that is not in the original query. The expanded query may be used to search for information objects that are relevant to the expanded query.
Automated feature selection based on rankboost for ranking
A method using a RankBoost-based algorithm to automatically select features for further ranking model training is provided. The method reiteratively applies a set of ranking candidates to a training data set comprising a plurality of ranking objects having a known pairwise ranking order. Each round of iteration applies a weight distribution of ranking object pairs, yields a ranking result by each ranking candidate, identifies a favored ranking candidate for the round based on the ranking results, and updates the weight distribution to be used in next iteration round by increasing weights of ranking object pairs that are poorly ranked by the favored ranking candidate. The method then infers a target feature set from the favored ranking candidates identified in the iterations.
Tag data structure for maintaining relational data over captured objects
Objects captured over a network by a capture system can be indexed to provide enhanced search and content analysis capabilities. In one embodiment the objects can be indexed using a data structure having a source address field to indicate an origination address of the object, a destination address field to indicate a destination address of the object, a source port field to indicate an origination port of the object, a destination port field to indicate a destination port of the object, a content field to indicate a content type from a plurality of content types identifying a type of content contained in the object, and a time field to indicate when the object was captured. The data structure may also store a cryptographic signature of the object to ensure the object is not altered after capture.
System and method for semantic search
Systems and methods for semantic search are provided. A corpus of information grouped into passages are indexed by semantic key terms generated from packed knowledge representations that document the semantic relationships of information within those passages. When a search is conducted, a query is similarly transformed into a packed knowledge representation that documents the semantic relationships from which semantic key terms are also generated. An inverted index relating the semantic key terms associated to the passages is searched using the semantic key terms generated from the query. A set of candidate passages is selected and refined by analysis of the semantic key terms and other information. The semantic representations associated with the set of candidate passages are then matched to the semantic representation of the query to determine a search result set.
Method and apparatus for maintaining and processing provenance data in data stream processing system
Techniques are disclosed for maintaining and processing provenance data in such data stream processing systems. For example, a method for processing data associated with a data stream received by a data stream processing system, wherein the system comprises a plurality of processing elements, comprising the following steps. A portion of data associated with the data stream is maintained. The maintained data comprises inputs to each processing element that contributed to an output of each processing element. In response to an alert generated by one of the processing elements, a scheduler is triggered to determine when a pre-calculation of a prospective query related to the alert should be executed. In response to the scheduler, at least a portion of the maintained data is used to determine a set of data that contributed to the alert such that the alert-contributing set of data can be used to respond to the prospective query upon arrival thereof.
Probabilistic recommendation system
A recommendations system uses probabilistic methods to select, from a candidate set of items, a set of items to recommend to a target user. The methods can effectively introduce noise into the recommendations process, causing the recommendations presented to the target user to vary in a controlled manner from one visit to the next. The methods may increase the likelihood that at least some of the items recommended over a sequence of visits will be useful to the target user. Some embodiments of the methods are stateless such that the system need not keep track of which items have been recommended to which users.
System and method for generating queries
The system utilizes (gets) training data that comprises a plurality of training documents. Each of the plurality of training documents comprises a training token(s). The plurality of training documents are clustered into a plurality of clusters based on at least one training token in the plurality of training documents. Each cluster contains at least one training document. A Boolean query(s) is generated for a cluster based on an occurrence of the at least one training token in a training document in the plurality of training documents. The system gets production data that comprises a plurality of production documents. Each of the plurality of production documents comprises a production token(s). The Boolean query(s) is then executed on the production data.
Methods and apparatus for distributed community finding
Methods and apparatus for a new approach to the problem of finding communities in complex networks relating to a social definition of communities and percolation are disclosed. Instead of partitioning the graph into separate subgraphs from top to bottom a local algorithm (communities of each vertex) allows overlapping of communities. The performance of an algorithm on synthetic, randomly-generated graphs and real-world networks is used to benchmark this method against others. An heuristic is provided to generate a list of communities for networks using a local community finding algorithm. Unlike diffusion based algorithms, The provided algorithm finds overlapping communities and provides a means to measure confidence in community structure. It features locality and low complexity for exploring the communities for a subset of network nodes, without the need for exploring the whole graph.
Systems and methods for customizing behavior of multiple search engines
The present invention relates to systems and methods for customizing search engine (CSE) behavior. In an embodiment of the present invention, a system customizes a query search of a plurality of search engines. The system includes a search executor configured to receive a search specification having a query modification description, a results modification description, and a specification of sections. The specification of sections includes a first section identifying a first search engine in the plurality of search engines and a second section identifying a second search engine different from the first search engine in the plurality of search engines. The specification of sections also includes a connecting section coupled to the first section and the second section. The connecting section has an associated condition controlling results combined from the first and second sections.
Records management system and method
A records management system and method that permits paper records to be tagged, stored and retrieved according to user criteria. The system includes a scanning module, a central server, one or more user workstations and an optical character recognition server. After scanning, the records may then be serialized and categorized by project, and then supplemented automatically by the system with a hypertext data file. The system provides for the manual input of additional hypertext data and merger of the hypertext data file with other records in the project. The end user may then search and/or filter records according to information contained in the hypertext data file. Because the pages may be sorted according to user criteria, the user may shuffle through pages from various different documents, thus allowing them to quickly retrieve the records they need and perform such actions as trend-spotting.
Collision detection and data corruption protection during an on-line database reorganization
A method for identifying a set of records in a database for relocation during an on-line database reorganization (ODBR) process. The relocating includes, for each of the records in the set: requesting a record reorganization lock (RRL) on the record, receiving the RRL, retrieving data from the current location of the record, storing the data in the new location of the record, and releasing the RRL. A request is received to update a target record in the set of records with updated data. The receiving of the request is from an application and overlaps in time with at least a portion of the relocating. Independent of the application, a RRL is received on the target record and the target record is updated by writing target data to the target record in the current location and writing the target data to the target record in the new location.
Information management server, information processing system, communication method and program
An embodiment of the invention includes an information management server with a registration unit that registers a status change condition of a database and a notification action so that they are associated with each other. Also, the information management server includes a communication unit that receives an acquisition request for a status change notification via database connection established with respect to a client and a change detection unit that detects a status change satisfying the condition of the acquisition request and invokes the notification action associated therewith. According to aspect of the invention, a notification unit causes the communication unit to send a notification including a result of the notification action via the database connection as a response to the acquisition request, and returns control of the connection to the client.
Information document search system, method and program for partitioned indexes on a time series in association with a backup document storage
Disclosed is a system in which an index registration unit registers an index, which will be used for search processing, as a partitioned index which is partitioned on a time series basis, and a search means reads indexes older than a specified point in time, which is used as a search base point, to perform search processing, thereby searching for information based on a point in time in the past.
Detection of inconsistencies in a file system
Described are techniques for correcting at least some inconsistencies in a file system accessed by at least one client, while maintaining the file system online. A file system checking utility is executed on the file system to detect and create corrections for inconsistencies in the file system. The file system is updated to include at least some corrections. Also described is a computer system comprising a file system accessed by a client. A file system checking utility is executed on the file system to detect at least some inconsistencies in the file system, and to create a corrected version of the file system that includes corrections to correct for at least some of the detected inconsistencies. A report is created. The file system is not updated with the corrected version unless the proposed corrections are approved. The file system checking utility may be periodically scheduled for execution.
A cluster arrangement having a first network, at least two data processing systems which each form an application node and which each have an operating system, and an application agent on each application node, which application agent is operable to monitor and identify entities executed on the application node; start a new entity or restart an entity which has been terminated prematurely on the application node; assess and decide whether it is possible to execute a new entity on the application node; send a request for execution of an entity to application agents at application nodes connected to the network; and report to application agents at application nodes connected to the network following an acceptance of the request for execution of an entity.
Mixed mode synchronous and asynchronous replication system
A replication system that includes an asynchronous replication mode and a synchronous replication mode replicates data associated with a plurality of transactions. The replication system includes one or more target nodes connected via communication media in a topology. Each target node includes a database and a plurality of appliers allocated thereto. Each transaction has one or more transaction steps or operations. A first set of transaction steps or operations are allocated to the plurality of appliers on an object-by-object basis when the replication system operates in asynchronous replication mode. A second set of transaction steps or operations are allocated to the plurality of appliers on a transaction-by-transaction basis when the replication system operates in synchronous replication mode. The replication system further includes one or more originating nodes, and the requests for the first and second sets of transaction steps or operations to execute on an originating node can be initiated during the same time period.
Multi-phase synchronization in a content management system
A content management system (CMS) provides a way to add a phase property to synchronization rules. In one suitable implementation, each of the synchronization rules has a corresponding phase value. In another suitable implementation, there are default synchronization rules and only synchronization rules other than the default synchronization rules have a phase value. A phase synchronization mechanism uses the phase property of the synchronization rules to evaluate only appropriate synchronization rules at each step as required.
Data storage for file updates
A storage system according to one embodiment for managing a first file includes a blob storage and a handler. The blob storage may be configured to store data related to the first file temporarily. The handler may be configured to store in the blob storage any data related to the first file and received from an application. The handler also may be configured to transfer at least a portion of the data from the blob storage to persistent storage in response to a commit instruction received from an application or generated by the handler. The handler also may be configured to retrieve any portion of the data stored in the blob storage and to send the same to a requesting application in response to an access request.
Internet enabled computer system management
System configuration is verified. Configuration information for a managed system is generated. The configuration information indicates existing software and hardware residing on the managed system. The configuration information is sent from the managed system to a management system. The management system compares the configuration information from the managed system with database information that indicates software and hardware supported by the management system in order to generate validity information that indicates any software or hardware on the managed system that is not supported by the management system. The validity information is sent from the management system to the managed system.
Visualization recommendations based on measure metadata
A system includes reception of metadata associated with one or more measures, determination of a compatibility of the two or more measures based on the metadata, and determination of a first score associated with a first visualization based on the compatibility. Some aspects include determination of a second score associated with a second visualization based on the compatibility, comparison of the first score and the second score, and recommendation of one of the first visualization or the second visualization based on the comparison.
Group compositing algorithms for presence
Systems and methods presented herein construct groups and determine the presence for the groups. The groups can be constructed based on business logic. A set of components can model a group from the business logic, can establish a membership for the group, can determine one or more rules that govern presence determination for the membership, and can provide the group model, membership information, and the one or more rules to a rules engine. The rules engine can evaluate presence within the group model based on the membership and the one or more rules. The group presence can then be provided to one or more entities, applications, or workflows that subscribe to the rules engine for the group presence.
Method and system for managing computer systems
A management system for a computer system is disclosed. The computer system operates or includes various products (e.g., software products) that can be managed in a management system or collectively by a group of management systems. Typically, the management system operates on a computer separate from the computer system being managed. The management system can make use of a knowledge base of causing symptoms for previously observed problems at other sites or computer systems. In other words, the knowledge base can built from and shared by different users across different products to leverage knowledge that is otherwise disparate. The knowledge base typically grows over time. The management system can use its ability to request information from the computer system being managed together with the knowledge base to infer a problem root cause in the computer system being managed. The computer system being managed can also request the management system to process its knowledge base for possible problem cause analysis. The management system can also continually identify persisting problem causing symptoms.
Fast algorithm for convex optimization with application to density estimation and clustering
A method of maximizing a concave log-likelihood function comprises: selecting a pair of parameters from a plurality of adjustable parameters of a concave log-likelihood function; maximizing a value of the concave log-likelihood function respective to an adjustment value to generate an optimal adjustment value, wherein the value of one member of the selected pair of parameters is increased by the adjustment value and the value of the other member of the selected pair of parameters is decreased by the adjustment value; updating values of the plurality of adjustable parameters by increasing the value of the one member of the selected pair of parameters by the optimized adjustment value and decreasing the value of the other member of the selected pair of parameters by the optimized adjustment value; and repeating the selecting, maximizing, and updating for different pairs of parameters to identify optimized values of the plurality of adjustable parameters.
System and method for tagging signals of interest in time variant data
Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for tagging a known signal of interest. Initially, the system classifies the data from an input signal using a short-term classifier, wherein there are at least two classifications available, a first classification of the data as having no identified outputs and a second classification of the data as at least one potential signal of interest, wherein the short-term classifier also bypasses data that is known to be of no interest. After the short-term classifier classifies the inputs, it collapses the input data that is classified as having no identified outputs. This allows the short-term classifier to create time-variant data. Finally, the system will tag a known signal of interest in the time-variant data that was classified as having at least one potential signal of interest. Therefore, a system for tagging a known signal of interest is described.
Multimedia engagement study
A media engagement system determines engagement scores for media vehicles across multiple media channels. The engagements scores for a media vehicle comprise multiple dimension scores indicating various aspects of engagement for that particular media vehicle. The dimension scores may be related to inspirational, trustworthy, life enhancing, social interaction, personal timeout, and ad attention/receptivity engagement dimensions, for example. The dimensions scores associated with respective engagement dimensions are based on responses to specific statements in engagement surveys completed by multiple media consumers. Thus, each statement in the engagement survey is associated with at least one engagement dimension and the engagement dimension score is then calculated based on media consumer responses to the statements associated with the respective engagement dimension.
Dynamic interface between BPSS conversation management and local business management
The present invention relates to devices and methods that coordinate an external conversation process between entities with an internal workflow of one of the entities. More particularly, it relates to devices and methods that are compliant with an inter-enterprise conversation process standard for routing electronic commerce documents between enterprises. Particular aspects of the present invention are described in the claims, specification and drawings.
Cryptographic module for secure processing of value-bearing items
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a central database is disclosed. The cryptographic modules are capable of implementing the USPS Information Based Indicia Program Postal Security Device Performance Criteria and other required VBI standards. The modules encipher the information stored in the central database for all of the on-line VBI system customers and are capable of preventing access to the database by unauthorized users. Additionally, the cryptographic module is capable of preventing unauthorized and undetected modification, including the unauthorized modification, substitution, insertion, and deletion of VBI related data and cryptographically critical security parameters.
Method of packaging broadcast contents
A method of packaging broadcast contents are provided. The method includes: extracting a copy control bit from input broadcast contents and determining whether the broadcast contents will be stored after being encrypted based on the extracted copy control bit; creating usage rule information which includes an encryption method of the broadcast contents if it is determined that the broadcast contents will be stored after being encrypted; extracting the copy control bit from each new broadcast content sequentially input and detecting broadcast contents which include copy control bits indicating that the broadcast contents will be stored without being encrypted; and encrypting the input broadcast contents through the broadcast contents before the detected broadcast contents using the encryption method and packaging and storing the encrypted broadcast contents and the usage rule information. Therefore, the unauthorized copying of broadcast contents transmitted through a digital broadcast receiver can be prevented.
System and method for processing checks and check transactions with thresholds for adjustments to ACH transactions
A system and method of processing paper checks that divides into two independent paths the processing of a data file representing a check and the digital image of the check. The data files and image files are separated both in time and in space, with the data files being used to promptly initiate the transfer of funds to and from appropriate accounts, while the paper checks, at a remote location and typically lagging in time, are scanned to create digital image files and deposited as an image or substitute check if deemed ACH ineligible. The method provides for the comparison of data files to image files, based on MICR information, to find any unmatching or mismatched items for exception processing and a process to manage ACH-ineligible items as an image or substitute check. The system and method further provides for sorting exceptions according to transaction type (ACH eligible versus ACH-ineligible) and prioritizing the further processing of the exceptions based on transaction type.
System and method for correspondent bank customer ATM transaction processing
Systems and methods provide the customer of a correspondent bank, having a pre-arranged relationship with an ATM bank to use the ATM bank's ATM network, with the opportunity to deposit funds via check or cash using the ATM bank's ATM network. A correspondent bank profile and/or individual customer profiles are created and stored on the ATMs of the ATM bank and/or the backend system. The correspondent bank customer initiates a transaction with an ATM on the ATM network, is authenticated, and the ATM determines the customer is a customer of the correspondent bank. Based thereon, the ATM offers the customer the option to perform a deposit transaction. The ATM bank clears the deposited funds and sends transaction information to the correspondent bank including MICR data, check image, and transaction information. The transaction is settled through a demand deposit account owned by the correspondent bank and maintained by the ATM bank.
Interacting with user at ATM based on user preferences
Embodiments of the present invention provide apparatuses, methods, and computer program products that allow for interaction with a user at an automated teller machine (ATM) based on pre-established user preferences. For example, an ATM is provided having: (1) a user interface configured to receive user identifying information from a user; and (2) a processing device operatively coupled to the user interface and configured to use the user identifying information to determine a pre-established user preference, wherein the processing device is further configured to use the user interface to interact with the user based at least partially on the pre-established user preference.
System and method for managing meetings budgets and allocating and reconciling expenditures
A system, method, and computer program product for managing meetings and allocating and reconciling expenditures. Scheduling information for a plurality of meetings is stored in a database. A plurality of budgets is stored in the database, each of the budgets being associated with and defining budget items for one of the plurality of meetings. Transaction data are received describing a plurality of expenditures made using at least one transaction account, wherein the transaction data comprise an amount expended for each of the plurality of expenditures. A selection of an expenditure, from the plurality of expenditures, and a selection of a meeting related to the selected expenditure from the plurality of meetings are accepted from a user. An allocation of at least a portion of the amount of the selected expenditure to a budget item for the selected meeting is accepted.
Electronic mortgage document certification
Electronic documents corresponding to executed paper documents are certified. A certifying agent receives an electronic document and a corresponding paper document that had been executed pursuant to some transaction. The certifying agent compares the information contained in the paper to that in the electronic mortgage document. If the paper adequately corresponds to the electronic document and is otherwise sufficient, then the certifying agent certifies the electronic document so that other parties can reliably engage in transactions involving the electronic document without having to possess or otherwise inspect the executed paper document. Certification involves application of some form of indicia of certification to the electronic document, such as updating the value of a field corresponding to certification in the electronic document and/or applying a digital or electronic signature corresponding to the certifying agent to the electronic document.
System and method of implementing massive early terminations of long term financial contracts
A method of and system for terminating or assigning outstanding OTC derivative transactions between a plurality of financial institutions (banks). The system comprises: a processing station arranged to receive transaction data describing a plurality of transactions from a plurality of banks via the Internet. The processing station comprises: a linking module for linking different versions of the same transaction received from different parties to that transaction; an analysis module for determining a set of linked transactions between a plurality of different banks, wherein each bank has debts and claims towards other banks in the set; a calculation module arranged to calculate an aggregated value of each set of linked transactions and select the set of linked transactions which has an aggregated value within bank-specified tolerance limits acceptable for executing a termination; and an execution module for executing a termination or assignment of the selected set of linked transactions.
System and method for providing market updates in an electronic trading environment
A system and method are provided for modifying how market updates are provided in an electronic trading environment upon detecting one or more triggering events. One example method includes defining an event to be used to trigger modification of how market updates are provided to a client entity, receiving a market update from an electronic exchange, and, when the event is detected, modifying how the market update is provided to the client entity. As an example, the modification of how the market update is provided to the client entity may include providing less data in relation to market updates, and sending the market updates less frequently.
Method and apparatus of analyzing social network data to identify a financial market trend
In general, the present disclosure includes a system, method and architecture for use in analyzing content of a social network data to identify a financial market trend, e.g., a trend associated with a financial market instrument.
Method and system for administering a discounted security
An exchangeable security, tradable on a securities exchange is issued at a share price that is a discount from the share price of an underlying security or basket of underlying securities. At or prior to maturity of the exchangeable security, a holder of the exchangeable security may exchange a share of the exchangeable security for a share of the underlying security or basket of underlying securities. The exchangeable security may also include a linked payment that is redeemable for the full amount of the payment on maturity of the exchangeable security. Alternatively, the exchangeable security may be issued at the share price of the underlying security with the linked payment. The invention provides methods for issue, trade and redemption as well as systems for issue, trade and redemption of the security.
Order processing for automated market system
An electronic market for trading of securities includes a plurality of client stations for entering quotes for securities and a server process that receives quotes from the clients, aggregates the quotes and causes a total of all aggregated quotes to be displayed for a plurality of price levels on the client systems. The market uses a graphical user that depicts aggregated quotes in an aggregate window a plurality of price levels of a product traded in the market. The market also includes processes to handle lock/cross market conditions, match-off of order flow and provides a central quote/order collector that interfaces to disparate order delivery systems to minimize dual liability of market makers.
System and method for selecting securities for an investment portfolio
Methods and systems for selecting and weighting securities for an actively managed exchange-traded fund. An initial selection of stocks includes domestic or international stocks, which are selected based at least in part on market capitalization. Each stock is scored using a plurality of growth and value factors to generate one or more growth scores and one or more value scores. A selection score is determined for each stock, and the stocks are ranked according to selection scores. A predetermined amount of stocks are eliminated from the stock portfolio based on selection score ranking, and the remaining stocks are split into a plurality of sub-groups. A stock portfolio is generated by weighting the remaining stocks according to the sub-groups they are in, with each stock being equally weighted within its sub-group. An exchange-traded fund is offered to consumers based on the stock portfolio.
Apparatus and methods for handling trading data
A manually-assisted computer and communications apparatus is provided for periodically fixing a price of a currency or commodity. Successive rate samples of said currency/stock/commodity are received from a plurality of sources (80) over a period of time, recorded and filtered automatically (90) by reference to said historical record and predetermined validation criteria so as to categorize certain samples as valid or erroneous. The received & filtered samples are combined periodically (105-115) so as to derive a fixed rate, which is then released (120) to users. The filtering means distinguishes between rate samples of different contributors within the samples received from a given source, and also receives (OTR1) trading rates generated by an online trading system, in addition to rates quoted by other contributors. Trading rates are applied in said fixed rate in preference to quoted rates. Traders and clients contract (450, 455) to buy and sell currency at rates to be fixed by the apparatus at a future time.
Automatic savings program
A computer implemented method of processing a financial transaction executed by first person includes determining an automatic savings amount from the financial transaction by rounding up the amount of the financial transaction to the nearest dollar. The method further includes debiting the calculated savings amount from an account of the first person and crediting the savings amount to an account of a second person.
Procurement system managing off-contract internet purchases
A procurement system permits routine purchases through approved vendors in a catalog as well as off-catalog purchases via the web, the latter using a web access program that captures product information from the web to invoke the approval process normally used for catalog purchases.
Systems and methods for improving investment performance
Methods for a data processor implemented system monitor for enabling persons to turn over the allocation their investment assets, and/or receive assistance concerning how to receive disbursements from investments, in a manner that is free from or ameliorates the traditional conflicts of interest in previous systems. The methods are adapted to ameliorate the tension between other functions where the compensation may be affected by asset allocation. The systems and methods collect, monitor, and direct information from persons who hold indicative data, e.g., employers, to provide professional asset allocation services including automatic allocation, rebalancing, and reallocation of investment assets, on a regular basis; as well as assistance in determining how much to save or how to receive disbursements in a manner that ameliorates conflicts of interest, which, in the case of employee benefit plans, is consistent with the regulatory restraints of ERISA (Employee Retirement Income Security Act).
Accounting apparatus, accounting method and computer-readable recording medium for recording accounting program codes
An accounting apparatus according to an embodiment of the invention includes an accounting unit, an occupancy time counting unit and a charge discounting unit. The accounting unit is configured to impose a charge for use of a device that is an object of accounting on the basis of the number of operations and/or an operation time of the device. The occupancy time counting unit is configured to count an occupancy time that the device has been exclusively used by a user. The charge discounting unit is configured to discount the charge for use of the device on the basis of the occupancy time.
Method, device and system for configuration and quotation processing
A configuration and quotation processing method and system, a configuration and quotation device, and a configuration conversion device are provided. The method includes: acquiring a sales bill of material (SBOM) configuration rule of a product; calculating a configuration bill of material (BOM) of the product according to the SBOM configuration rule, a product price, and received quotation configuration parameters; filtering the configuration BOM according to a preset output content and structure rule to generate an SBOM of the product; and converting the SBOM into a base bill of material (BBOM) according to an SBOM to BBOM (S2B) conversion rule. As such, a client-oriented SBOM can be automatically generated, thereby ensuring the accuracy of the SBOM, and improving the work efficiency.
Methods and apparatus for analyzing revenue cycles of a facility
The present disclosure provides methods and apparatus for analyzing the revenue cycles of a facility to more accurately predict future financial performance. Using the methods and apparatus disclosed herein, accountants and financial planners are given forecasts of future accounts paid based on current accounts receivable and past accounts paid.
Management of loss reconciliation data
A cargo management system receives parcel data associated with cargo on a vessel. The parcel data may include bill of lading date, successor and predecessor data, cargo type data, and the like. The cargo management system identifies parcels that may be related, performs a parcel validation on the identified parcels, and receives or determines a relationship between the parcels. Then, the cargo management system performs voyage validation on the related parcels to create a voyage. The cargo management system then calculates a loss associated with each parcel, between parcels, and the entire voyage.
Apparatus and method for maintaining a consumer products database
This invention relates generally to an apparatus and a method for remotely capturing consumer product data and updating a consumer products database by a communication connection. A remote capture station provides data such as images and physical dimensions of consumer products for updating a consumer products database at a home location. This invention also relates to a method for consumer products database management including providing a capture station, engaging a consumer product with the capture station, capturing product data, transmitting the product data, and updating the consumer products database.
Buyer-initiated shipping system
A system and method in which a buyer registers for a buyer's shipping account and uses the shipping account to pay shipping costs associated with purchases made over the Internet. When a buyer purchases merchandise over the Internet from either a retailer's website or from an individual through an online auction, the buyer is capable of controlling the shipping process by logging on to their buyer's shipping account. Among other things, the buyer can use their shipping account to select the desired type of shipping service (overnight air or ground) and populate a shipping label with shipping information such as delivery address, return address, and preferred delivery time windows. Once the shipping label has been populated and verified, the shipping label is electronically transferred to the seller for use in shipping the package. The system and methods of the present invention allow the buyer greater control over the shipping process. In many cases, the present invention will also help buyers/receivers control costs by eliminating the shipper's shipping and handling fee.
Online negotiation system and method
A computer system and method carried out by the system for assisting parties in negotiation the sale price of real estate or personal property is disclosed wherein a web server receives a property listing from a seller at an asking price, receives a bid from a buyer at an offer price, compares the asking price to the offer price and determines whether the difference between the offer price and asking price is within a first, second, or third predetermined % value and notifies the parties whether they are cold, warm, hot, or matched. If there is a match, an agreement of sale may be generated.
On-line auction method across multiple auction sites
A computerized system and method for conducting electronic online auctions, which creates a perception of scarcity in the marketplace enhancing the demand for and marketability of the goods while minimizing the exposure time of the goods in the marketplace. The present invention improves the efficiency for conducting the liquidation sale of goods by directing the goods to auction venues having specific market parameters that will generate the highest bid. The present invention also provides suppliers with a dynamic market for expeditiously liquidating merchandise without undue exposure of their goods to the general market. The present invention is easily scalable on both its supply and demand end. The liquidation sale of merchandise is controlled by limiting the amount of available merchandise supplied to each auction venue. Furthermore, the metering of the auction merchandise is controlled as a function of both the product characteristic and the auction parameters.
Method and device utilizing polymorphic data in E-commerce
An aspect of the present invention includes a protocol for conveying data during an e-commerce session with a polymorphic response, comprising initiating a session with a message from a buyer application to a broker application and a session identifier assigned by the broker application; conducting the session between the buyer application and a supplier application; and concluding the session with a additional message which includes a schema identifier for the additional message, resolvable in a context of a system identifier; and a polymorphic response comprising a type and a version, wherein the polymorphic response includes additional data elements corresponding to values assigned to the type and version.
Systems and methods for managing orders made via a computer network
A system and method for allowing a user to schedule pickup of an ordered item provides a user interface having user interface elements for allowing a user to specify a frequency with which an order is it to be picked up, for informing a user as to availability of the item for pickup, and/or for allowing a user to request that an item be held in reserve for pickup within a given period of time, such as 24 hours. Frequency options provided to the user for selection when scheduling an order for pickup may include a one-time frequency, a daily frequency, a weekly frequency, a monthly frequency, and user specified dates. The information as to availability of the item for pickup is determined considering a time of order and real-time stocking information for the item.
System and method for providing requested information to thin clients
A system for, and method of, providing requested information to a client. In one embodiment, the system includes: (1) a core information database that contains core information gleaned from the Internet and restructured according to a predetermined taxonomy and (2) a client communications interface, coupled to the core information database, that receives a request message from a client containing a request for some of the core information, derives a database query from the request message, causes the some of the core information to be retrieved from the core information database, formats the some of the core information into a response message according to display limitations of the client and transmits the response message to the client for display thereby.
Method and system for informing a user of the effect of a hypothetical purchase on the user's finances at the point of sale
A method and system for displaying to a user the effect of a hypothetical purchase on the user's budgetary goals whereby a given product and/or service being considered for purchase and/or the cost of the given product and/or service being considered is identified and a product/service category database is searched to find a financial category associated with the given product and/or service. Financial budget/goal data indicating the given user's one or more budgetary and/or financial goals for a financial category associated with the given product and/or service for the given period of time, the current financial data indicating the given user's actual spending in the financial category associated with the given product and/or service for the given period of time, and the data indicating the cost of the given product and/or service being considered for purchase is analyzed to present the user data indicating the hypothetical remaining balance for the financial category associated with the given product and/or service for the given period of time that would result if the given product and/or service were actually purchased.
Ghosting payment account data in a mobile telephone payment transaction system
Techniques are disclosed for a mobile telephone, in conjunction with a payment transaction server, to be used directly as a payment device for a variety of financial transactions. Further, the transaction systems and methods for mobile telephone devices described herein allow a mobile telephone to participate in payment transactions in a manner that helps prevent identify theft and without relying on transferring amounts to/from one stored value account to another.
A method and a system that identify seller ads to potential buyers within a network-based commerce system are provided. The method and system may operate to receive a request including a product identification and financial metrics from a seller, and assign to the seller, based on a distance function and the product identification, a matching identification entry included in a set of identification entries. The method and system may further include operations to identify one or more seller ads associated with the matching identification entry, as determined by a relevance function based on the financial metrics and a distance measured between the matching identification entry and at least one extracted identification entry extracted from a selected content page and included in the set of identification entries.
Video content analysis for automatic demographics recognition of users and videos
A video demographics analysis system selects a training set of videos to use to correlate viewer demographics and video content data. The video demographics analysis system extracts demographic data from viewer profiles related to videos in the training set and creates a set of demographic distributions, and also extracts video data from videos in the training set. The video demographics analysis system correlates the viewer demographics with the video data of videos viewed by that viewer. Using the prediction model produced by the machine learning process, a new video about which there is no a priori knowledge can be associated with a predicted demographic distribution specifying probabilities of the video appealing to different types of people within a given demographic category, such as people of different ages within an age demographic category.
System and methods for discount retailing
A system and methods to mutually satisfy a consumer with a discount and a vendor with a minimum number of sales by establishing a tipping point associated with an offer for a good or service. If the tipping point is met, the sale of the good or service is executed and the consumer is charged and receives an indication of the discounted sale, such as a certificate. If the tipping point is not met, the discount offer is abandoned and the consumer is not charged. Once the tipping point is established, the vendor receives a payment, even before the consumer uses the certificate.
Determination of decision support data concerning customer satisfaction improvement techniques
In relation to an entity such as a business having customers, a determination is made of at least one incremental satisfaction improvement value associated with increasing customer satisfaction of at least one customer by a fixed increment relative to a satisfaction scale. Based on the at least one incremental satisfaction improvement value, decision support data corresponding to a plurality of customer satisfaction improvement techniques is then determined, which decision support data may be presented in any desirable manner such as on a display device.
Demand modeling and forecasting for configurable products or services
A system and method for modeling demand for a configurable product or service and then forecasting demand for said product or service based on the statistical associations of options across features within said product or service. By use of this method a manufacturer, for example, would be able to produce product combinations in advance with an increased probability that they would meet customer demand or project parts inventory needs and build fewer unwanted combinations.
Contact center integration into virtual environments
A contact center has an interface with a virtual environment implemented in a computer system. The operation of the contact center includes receiving, from the virtual environment, spatial information relating to the spatial position within the virtual environment of an inhabitant of the virtual environment, and queuing a contact relating to that inhabitant in a queuing system of the contact center. Queuing decisions are based, at least in part, on the spatial information of the inhabitant in the virtual environment.
Method and computer-readable medium for administering an insurance policy premium payment deferral plan
Method and computer-readable medium for administering an insurance policy premium payment deferral plan are disclosed. According to one embodiment of the disclosure, a method for administering an insurance policy premium payment deferral plan that maintains an insurance policy in effect while permitting deferment of premium payments owed under the policy includes determining whether a policy is eligible for a premium deferral. The method also includes automatically producing a notification for the policy if the policy is eligible for the premium deferral. The method further includes determining whether the premium deferral has been selected if the insurance policy is eligible for the premium deferral. The method also includes automatically deferring an insurance premium payment if the insurance policy is eligible for the premium deferral and the premium deferral is selected.
Mortgage insurance system
Described is a system for offering financing to a couple seeking financing for the purchase of real estate, the improvement comprising gathering information from the couple regarding the couple and the piece of residential real estate; calculating, with computerized software, a divorce insurance policy premium for the couple based upon this and other information; determining the insurance policy premium's price with the mortgage financing; offering the mortgage financing, coupled with the insurance premium, to the couple; if the couple accepts, creating a legally binding document memorializing the mortgage insurance policy, wherein the legally binding document sets forth terms and conditions of the mortgage insurance policy; transmitting the completed, legally binding document to the couple; periodically and regularly charging the calculated periodic amount to the couple; and administering the mortgage insurance policy in such a manner that, upon divorce or legal separation of the couple, paying damages arising from the piece of real estate and associated with the divorce or legal separation.
Panel diagnostic method and system including active and passive strategies
A system and method for computerized medical self-diagnosis is disclosed. Beginning with direct interactive dialog between a patient and a computing device to obtain patient health items, the system automatically obtains a differential self-diagnosis using active and passive strategies based on an analysis of the patient health items in conjunction with known disease properties. In one embodiment, each strategy differential self-diagnosis is obtained with different analysis criteria of the patient health items. At least a portion of the strategy differential self-diagnoses are compared and a consensus self-diagnosis based on the compared differential self-diagnoses is determined and communicated to the patient.
Medical support system
A medical support system and method for performing at least one medical support process relating to diagnosis and treatment of a medical condition and that includes or employs medical records relating to patients and medical support databases including medical guidelines for the diagnosis and treatment of a medical condition. A medical support process includes one or more process phases. Each process phase includes one or more process operations wherein each of the process operations of a process phase includes one or more process forms providing interfaces between a user and the process operations. The medical records and the guidelines are to execute an interactive dialogue between the medical support process and the user to provide guidance to the user in performing the medical support process according to the guidelines and dependent upon the user inputs and the medical record.
Systems and methods for disease management algorithm integration
A method of formulating a medical order for a patient includes transmitting a medical order interface to a healthcare provider interface device. The medical order interface includes a plurality of selectable medical order items. The method further includes, in response to receiving a selection of a medical order item of the plurality of selectable medical order items, transmitting an authorization request interface to the healthcare provider interface device. The authorization request interface includes a set of selectable findings controls. Each selectable findings control of the set of selectable findings controls is associated with a set of medical findings associated with the patient. The authorization request interface includes a send control. In addition, the method includes, in response to receiving a selection of a select findings control and receiving selection of the send control, sending an electronic authorization request. The electronic authorization request includes the set of medical finding associated with the select findings control and order data associated with the medical order item.
Method for forecasting housing prices using a dynamic error correction model
A system and method for forecasting a price of a property in a first housing sub-market based on data related to a second housing sub-market are described. A price index is derived for the second housing sub-market, and an error correcting function is calculated for the first housing sub-market. A price index for the first housing sub-market is derived from the second sub-market price index and the error correcting function. An estimate of the price of the price of the property in the first housing sub-market is then provided. The estimate of the price can be used as the basis for an economic decision.
Dynamic inventory distribution system
Embodiments include systems and methods of delivery DVDs, games, other electronically or computer readable media, or other high value items through the mail or via any other delivery service for return and redelivery to a second customer. For example, in one embodiment, items returned by a first customer are identified during processing of a container or mailer containing the item, the second customer is determined, a new address label is affixed to the container, and the item is delivered to the second customer.
Electronic information access system and methods
An electronic information access system and associated methods. In one exemplary embodiment, the system comprises an antenna adapted to receive electromagnetic energy, the electromagnetic energy encoding first data associated with at least one person; and processing apparatus in signal communication with the antenna. The processing apparatus is configured to: access a first database containing second data relating to the one or more certain persons; analyze at least portions of the first data and the second data to determine if the at least one person is authorized to access the information; and if the at least one person is authorized access, facilitate download of the information to a personal electronic device (PED) of the at least one person.
Methods, apparatuses, and systems for providing timely user cues pertaining to speech recognition
A method is provided of providing cues from am electronic communication device to a user while capturing an utterance. A plurality of cues associated with the user utterance are provided by the device to the user in at least near real-time. For each of a plurality of portions of the utterance, data representative of the respective portion of the user utterance is communicated from the electronic communication device to a remote electronic device. In response to this communication, data, representative of at least one parameter associated with the respective portion of the user utterance, is received at the electronic communication device. The electronic communication device provides one or more cues to the user based on the at least parameter. At least one of the cues is provided by the electronic communication device to the user prior to completion of the step of capturing the user utterance.
Watermark synchronization signals conveying payload data
Steganographic synchronization signals (sometimes termed “orientation signals,” “marker signals,” reference signals,” “grid signals,” “calibration signals,” etc.) are sometimes included with digital watermarking signals to aid in correct decoding of the object thereby marked (e.g., a digital image file, audio clip, document, etc.). Digital watermark detection systems sometimes fail if the object encompasses several separately-watermarked components (e.g., a scanned magazine page with several different images, or photocopy data resulting from scanning while several documents are on the photocopier platen). Each component may include its own synchronization signal, confusing the detection system. In accordance with certain embodiments, this problem is addressed by a proximity-based approach, and/or a multiple grid-based approach. In accordance with other embodiments, the synchronization signal can—itself—convey watermark information, so it serves both a synchronization and a payload-conveyance function.
System and method for applying dynamic contextual grammars and language models to improve automatic speech recognition accuracy
The invention involves the loading and unloading of dynamic section grammars and language models in a speech recognition system. The values of the sections of the structured document are either determined in advance from a collection of documents of the same domain, document type, and speaker; or collected incrementally from documents of the same domain, document type, and speaker; or added incrementally to an already existing set of values. Speech recognition in the context of the given field is constrained to the contents of these dynamic values. If speech recognition fails or produces a poor match within this grammar or section language model, speech recognition against a larger, more general vocabulary that is not constrained to the given section is performed.
Associating source information with phonetic indices
The present invention relates to creating a phonetic index of phonemes from an audio segment that includes speech content from multiple sources. The phonemes in the phonetic index are directly or indirectly associated with the corresponding source of the speech from which the phonemes were derived. By associating the phonemes with a corresponding source, the phonetic index of speech content from multiple sources may be searched based on phonetic content as well as the corresponding source.
System and method for training an acoustic model with reduced feature space variation
Feature space variation associated with specific text elements is reduced by training an acoustic model with a phoneme set, dictionary and transcription set configured to better distinguish the specific text elements and at least some specific phonemes associated therewith. The specific text elements can include the most frequently occurring text elements from a text data set, which can include text data beyond the transcriptions of a training data set. The specific text elements can be identified using a text element distribution table sorted by occurrence within the text data set. Specific phonemes can be limited to consonant phonemes to improve speed and accuracy.
Speech recognition based on a multilingual acoustic model
Embodiments of the invention relate to methods for generating a multilingual acoustic model. A main acoustic model comprising a main acoustic model having probability distribution functions and a probabilistic state sequence model including first states is provided to a processor. At least one second acoustic model including probability distribution functions and a probabilistic state sequence model including states is also provided to the processor. The processor replaces each of the probability distribution functions of the at least one second acoustic model by one of the probability distribution functions and/or each of the states of the probabilistic state sequence model of the at least one second acoustic model with the state of the probabilistic state sequence model of the main acoustic model based on a criteria set to obtain at least one modified second acoustic model. The criteria set may be a distance measurement. The processor then combines the main acoustic model and the at least one modified second acoustic model to obtain the multilingual acoustic model.
A method of encoding one or more parent blocks of values, the number of values being the length of each block, the method comprising for each parent block: (a) determining a first sum of values in the parent block; (b) splitting the parent block into smaller subblocks; (c) for at least one of the subblocks, determining a second sum of the values in the subblock, selecting a likelihood table from the plurality of likelihood tables based on said first sum of values in the parent block and encoding the second sum using the likelihood table; (d) designating each subblock a parent block; (e) carrying out steps (a), (b), (c) and (d) until at least one parent block reaches a predetermined condition.
Method and apparatus to encode/decode low bit-rate audio signal by approximiating high frequency envelope with strongly correlated low frequency codevectors
A method of encoding a low bit-rate audio signal includes quantizing and encoding a plurality of low frequency sub-bands of an audio signal in a frequency domain, generating a codebook of codevectors using sub-bands of the audio signal spectrum, detecting an envelope of another frequency sub-band of the audio signal and quantizing and losslessly-encoding the detected envelope, selecting a codevector most similar to the higher frequency sub-band spectrum from the generated codebook's codevectors and determining its codebook codevector index, and generating a bit stream. Decoding the low bit-rate audio signal includes restoring and dividing a bit stream into a plurality of first frequency sub-bands and at least one second frequency sub-band and inversely quantizing the first frequency sub-bands in the bit stream, restoring codebook codevector index information and envelope information for the second frequency sub-band, generating a codebook of codevectors using the inversely quantized first frequency sub-bands, and restoring the second frequency sub-band using the restored codevector index information and the envelope information.
Method for processing natural language questions and apparatus thereof
A method and an apparatus for selecting an answer to a natural language question. The method includes: detecting a named entity in the natural language question; extracting information related to an answer from the natural language question; searching in linked data according to the detected named entity; generating a candidate answer according to a search result; parsing the candidate answer according to the information related to the answer; and obtaining a value of a feature of the candidate answer; and evaluating each candidate answer by synthesizing the value of the feature of the candidate answer.
Systems and methods for determining a power cycle of a power source of a mobile device
A computer-implemented method for determining a power cycle of a power source of a mobile device is described. An execution of one or more components on the mobile device is simulated. An amount of power drawn by the one or more components from the power source is estimated during the simulated execution of each of the one or more components. The estimated amounts of power drawn from the power source by each of the one or more components are aggregated to obtain a total estimate of power drawn from the power source. The power cycle of the power source is determined according to the total estimate of power drawn from the power source by each of the one or more components.
Systems and methods for constructing genomic-based phenotypic models
The invention provides a computer implemented process for constructing a scalable output network model of a bioparticle. The process includes computer implemented steps of: (a) accessing a database of network gene components including an annotated network set of open reading frames (ORFs) of a bioparticle genome; (b) forming a data structure associating the network gene components with network reaction components, the data structure establishing a data set specifying a network model of connectivity and flow of the network reaction components, and (c) transforming the data set into a mathematical description of reactant fluxes defining the network model of connectivity and flow, wherein the mathematical description defines a scalable output network model of a bioparticle.
Iterative multi-scale method for flow in porous media
Computer-implemented iterative multi-scale methods and systems are provided for handling simulation of complex, highly anisotropic, heterogeneous domains. A system and method can be configured to achieve simulation of structures where accurate localization assumptions do not exist. The iterative system and method smoothes the solution field by applying line relaxation in all spatial directions. The smoother is unconditionally stable and leads to sets of tri-diagonal linear systems that can be solved efficiently, such as by the Thomas algorithm. Furthermore, the iterative smoothing procedure, for the improvement of the localization assumptions, does not need to be applied in every time step of the computation.
Route curve generation system, method and storage medium
Control points needed to generate a curve becoming the route of a deformable linear structure from respective pieces of passing point information defined at two passing points are arranged and the initial arrangement of control points needed to generate a curve is determined by performing re-arrangement of the control points, on the basis of a positional relation between the control points thus arranged. The curve between two points is re-generated from the initial arrangement thus determined while modifying the arrangement of one or more control points, the re-generated curves are then evaluated and a curve meeting a predetermined condition is extracted from among the curves.
System and method for testing graphics card
A system is used to test a 3D image processing capability of a video card. The system includes a 3D model engine module, a 3D model module, a test parameter module, and a check module. The 3D model module is capable of building a 3D model engine. The test parameter module is capable of setting test parameters. The check module is capable of checking a test result. The 3D model is processed by the video card within the test parameters and a running environment which is set by the 3D model engine under the test parameters, and the check module checks if the video card processes the 3D model properly.
Compactor independent fault diagnosis
Methods, apparatus, and systems for performing fault diagnosis are disclosed herein. In certain disclosed embodiments, methods for diagnosing faults from compressed test responses are provided. For example, in one exemplary embodiment, a circuit description of an at least partially scan-based circuit-under-test and a compactor for compacting test responses captured in the circuit-under-test is received. A transformation function performed by the compactor to the test responses captured in the circuit-under-test is determined. A diagnostic procedure for evaluating uncompressed test responses is modified into a modified diagnostic procedure that incorporates the transformation function therein. Computer-readable media comprising computer-executable instructions for causing a computer to perform any of the disclosed methods are also provided. Likewise, computer-readable media comprising lists of fault candidates identified by any of the disclosed methods or circuit descriptions created or modified by the disclosed methods are provided.
In-plane compressive strength evaluation device and method therefor
An in-plane compressive strength evaluation device (10) provided with a memory unit (21) into which, when an in-plane compressive strength evaluation is actually performed using a test piece, an evaluation result is stored as first information; a first analysis unit (22) that obtains second information that is an evaluation result related to the load and a displacement of the structural model; an adjustment unit (23) that adjusts an elemental factor of the structural model that influences the in-plane compressive strength such that the second information approaches the first information; and a second analysis unit (24) that, in a state where the elemental factor used when the second information approaches the first information most closely expands the structural model into the structural form of the actual tube support plate, and that performs the in-plane compressive strength evaluation using the expanded structural model.
Low profile encircling ultrasonic probe for the inspection of in-situ piping in immersion mode
An ultrasonic probe encircles the perimeter of a target component to be ultrasonically tested and has a base and a pair of jaws pivotally mounted to the base at opposite ends of an arcuate inner surface of the base to encircle a target component with arcuate inner surfaces of the jaws as well. The inner surfaces form a coupling fluid chamber with an outer surface of the target component. Front and rear sets of seals connected to and extending along front and rear portions of the arcuate inner surfaces seal the chamber so that it can retain a coupling fluid such as water. An arcuate set of ultrasonic transducers is connected along at least one but preferably all of the arcuate inner surfaces for transmitting ultrasonic signals to the coupling fluid chamber and into the target component.
Method of determining physico-chemical properties of a petroleum sample from two-dimensional gas chromatography
A method of determining physico-chemical properties of a petroleum sample from two-dimensional gas chromatography. The amounts of molecular compounds present in the sample are determined by means of two-dimensional gas chromatography. At least one physical property, such as the octane number, is then determined from these amounts. A previously calibrated relation connecting the physical property to the amounts is used to this end.
Miniature ultrafine particle sensor
Theory and design of a new electrical-mobility based instrument for measurement of aerosol particle size distributions in real time is presented. Miniature Electrical Aerosol Spectrometer has a rectangular cross-section with two main regions: the Electrostatic Precipitator (ESP) and Classifier sections. The ESP section enables charged particle injection into the classifier section in a narrow range of streamlines at the desired location. The injected charged particles are then segregated based on their electrical mobility in the classifier section and collected on a series of plates that are connected to electrometers. Real-time particle size distribution measurements can be inferred from the electrometer signal strengths with the knowledge of the instrument transfer function. A theoretical approach is developed to calculate Miniature Electrical Aerosol Spectrometer transfer function considering the non-uniformity in the electric and flow fields inside the instrument, and accounting for the instrument dimensions and its operating conditions. The theoretical predictions of size classification characteristics are seen to compare well with numerical results. The modeling results suggest that an optimal operational domain exists for Miniature Electrical Aerosol Spectrometer.
Automated decision support for associating an unknown biological specimen with a family
Three methods of predicting whether an unknown biological specimen of a missing person originates from a member of a particular family comprise an initial automated decision support (ADS) algorithm for determining a list of relatives of the missing person for DNA typing and which typing technologies of available technologies to use for a listed relative. The ADS algorithm may be implemented on computer apparatus including a processor and an associated memory. The ADS method comprises determining a set of relatives of available family member relatives for DNA typing via a processor from a stored list of family member relatives according to one of a rule base, a table of hierarchically stored relatives developed based on discriminatory power or by calculating the discriminatory power for available family relatives to type. The ADS method may further comprise comparing at least one set of DNA typing data for the unknown biological specimen to DNA typing data from biological specimens from the determined set of relatives; calculating by the processor a likelihood function that the person is related to the family; and outputting a decision whether or not the person is related to the family.
Quantum chemistry simulations using optimization methods
Embodiments of the present invention provide, among other things, methods, apparatus, and systems for tuning a semiempirical process for predicting energy for different molecular configurations. In an example method, an energy value and an energy gradient are determined for each of a plurality of molecular configurations using an accurate method. A functional form of the semiempirical process is optimized using the determined energy values and energy gradients via multiobjective optimization. The functional form relates one or more parameters to energy values and energy gradients.
Pool and superpool matrix coding and decoding designs and methods
This application pertains to construction of pooled biological material such as DNA, RNA, proteins and the like that are able to be screened by a wide variety of methods such as PCR (Polymerase Chain Reaction), DNA/DNA hybridization, DNA/RNA hybridization, RNA/RNA hybridization, single strand DNA probing, protein/protein hybridization and a wide variety of additional methods. Our new method for construction of pools and superpools for screening differs in that the complete set is systematically divided into a variety of smaller subsets which are then re-pooled to make the final screening pools. This pooled material can be from individual samples or a population of samples. In order to reduce the analysis time, materials and expense, the pooling of high resolution small pools in a matrix allows for a lower number of user experiments to have higher resolution (as if the researcher had analyzed the complete set of small pools).
A navigation system includes: a map information acquiring unit for acquiring map information; an HOV lane decision unit for deciding whether an HOV lane is included in a road represented by the map information acquired by the map information acquiring unit or not; a road number processing unit for performing, when the HOV lane decision unit decides that the HOV lane is included, processing of adding information representing the HOV lane to a road number of the road including the HOV lane; and a display processing unit or a voice information unit for causing the road number passing through the processing by the road number processing unit to be displayed on the guide map or output in voice.
Image navigation method using parametric systematic error correction
A novel Parametric Systematic Error Correction (ParSEC) system is disclosed which provides improved system accuracy for image navigation and registration (INR). This system may be employed in any suitable imaging system and, more specifically, to all imaging systems that exhibit systematic distortion. The ParSEC system may be employed to any such system regardless of sensing type (remote or in situ) or imaging media (photon or charged particle) and is further applicable to corrected imaging of any celestial body currently detectable to remove distortion and systematic error from the imaging system employed. The ParSEC system of the instant invention comprises a software algorithm that generates at least about 12 correction coefficients for each of the INR system measurements such as stars, visible landmarks, infrared (IR) landmarks and earth edges. An iterative estimation algorithm such as, for example, least squares or Kalman filters may be employed to determine the at least about 12 correction coefficients from each set of measurement residuals. The improved image products provide more accurate weather forecasting such as wind velocity and temperature.
Interface for a GPS system
A protocol independent interface for processing, within a mobile device, protocol aiding data received at a call processor with a Global Positioning System (“GPS”) interface, where the protocol aiding data is produced according to a Geolocation Server Station protocol is disclosed. The protocol independent interface may include a means for receiving, at the GPS interface, the protocol aiding data received at the call processor, means for converting the received protocol aiding data to interface data that is transparent to the Geolocation Server Station protocol, and means for passing the interface data to a GPS module.
Navigation device and facility image display method
The invention provides a navigation device and a facility image display method, whereby a user can recognize various types of information about a facility from the image corresponding to the facility. The navigation device includes road information, etc., used for drawing map images; facility information including the nodes of the facilities and a plurality of attributes of the facilities; a buffer memory that stores data of icon images corresponding to each of the plurality of attributes of the facilities; a map drawing unit that draws a map image on the basis of the road information, etc., and draws any of the icon images corresponding to the plurality of attributes of the facilities contained in the facility information, at a position in the map image corresponding to the node identified in the facility information; and an image synthesizing unit that causes a display unit to display the drawn image.
Method of operating a navigation system using images
A method of operating a navigation system determines a route between an origin and a destination and provides a photographic image showing a geographic area through which the route passes. The photographic image shows the geographic area from a land-based viewpoint. The method overlays a route highlight on the photographic image identifying a path to be traveled. The route highlight includes a symbol indicating at least one feature of the route selected from a group consisting of handicap accessible route, tree-lined route, well-lit route, quiet route, scenic route, crowded route, peaceful route, and bicycle friendly route.
Method and apparatus for generating and using a regional-terrain model
A method and apparatus for computing position using a regional-terrain model is provided. The method includes obtaining from at least three satellites pseudorange measurements, computing a transitional position by using a default altitude with a large uncertainty, using this transitional position to obtain from a terrain model altitude information associated with a region, and computing an accurate three-dimensional position as a function of the pseudorange measurements and the altitude information. The region defines a boundary, and the boundary includes the transitional position.
Position detection apparatus and position detection program
A position detection apparatus includes a storage unit for storing map information including road information; a detection unit for detecting information for calculating an absolute position of a moving object; a position calculation unit for calculating the absolute position of the moving object and an error variance relating to an error of the moving object from the detected information; a read-out unit for reading out from the storage unit the road information of a road relating to the calculated absolute position; an existence probability calculation unit for calculating an existence probability of the moving object existing on the road from the absolute position, the error variance, and the read-out road information; a selection unit for selecting a position whose existence probability is maximum out of the calculated existence probability; and a map-matching processing unit for making the selected position a position of the moving object on the road.
Method for providing contents in real time and navigation system for executing the method
The present invention relates to a method of providing a content in real time and a navigation system for providing a content in real time which recognizes an allowance time for providing the content by considering a time, a distance, a road straightness from a current guide point to a subsequent guide point, receives the content from a predetermined content providing server in real time, and provides the content during the allowance time. A navigation system for providing a content in real time, the navigation system including: an allowance time recognition unit recognizing an existence of an allowance time for providing the content while navigating; a server connection unit connecting to a predetermined content providing server via a communication network; a content receiving unit receiving the content from the content providing server; and a content providing unit providing the received content during the allowance time.
Vehicle speed determination from audio input for dead reckoning determination in a portable navigation device
A portable navigation device displaying map information and navigation instructions for use in a vehicle is disclosed. The portable navigation device includes a memory, a display for displaying the map information and navigation instructions, and a microphone for inputting sound signals to the portable navigation device. A processor is used for controlling operation of the portable navigation device and for determining the speed of the vehicle. To determine the speed, the processor receives the sound signals input by the microphone, analyzes the sound signals, determines a speed at which the vehicle is moving according to characteristics of the analyzed received sound signals when not receiving Global Positioning System (GPS) signals with the portable navigation device, and estimates a current location of the vehicle based on the determined speed of the vehicle.
System and method for detection of average speed of vehicles for traffic control
The invention relates to a method and a system for identifying moving objects by employing a tag, said tag comprising at least alphanumeric characters and said tag being extracted from pictures taken by cameras located in at least two different points within a certain distance comprising extracting alphanumeric characters of said tag from the pictures taken by at least two cameras; converting said alphanumeric characters into other new characters of another representation space; creating a string of said new characters for each of the tags extracted from the pictures taken by the cameras at different locations, said cameras being synchronized and said pictures taken by the cameras within a predetermined time interval; comparing the strings by associating a correlation score; inputting a threshold score; identifying the moving object if the correlation score is over the predetermined threshold score.
Knock determining device
An output signal of a knock sensor is filtered with a plurality of band-pass filters to extract vibration waveform components of a plurality of frequency bands (f1-f4). Weighting coefficients (G1-G4) which multiply the vibration waveform component of each frequency band are established in such a manner as to be a small value as a noise intensity of each frequency band becomes larger. Thereby, the vibration waveform component of a plurality of frequency bands is synthesized by weighting according to an influence of a noise intensity of each frequency band. Even when the noise is superimposed on the vibration waveform component of any of the frequency bands, it becomes possible to reduce the influence of the noise and to synthesize the vibration waveform component of each frequency band, and an accurate knock determination can be performed based on the composite vibration waveform.
Microprocessor controlled automated mixing system, cogeneration system and adaptive/predictive control for use therewith
A microprocessor controlled automated, multi-fuel apparatus to blend hydrogen, bio-fuel and/or natural or propane gases. This novel multi-stage apparatus first converts cooking oils into bio-fuel. The system automatically blends the bio-fuel with at least one of or both hydrogen gas, generated by a self-contained on-board hydrogen electrolyzer, and/or natural or propane gases. This blended “Hyenrich” gaseous fuel drives various processes including, but not limited to, cogeneration systems and electrical generators to produce “green” electricity by utilizing an adaptive and predictive learning algorithms to significantly reduce cost per kilowatt and lessen dependency on the over taxed utility grid, while simultaneously reducing emissions of CO, CO2 and NOx, making the method and apparatus an environmentally-friendly energy device.
Vehicular control apparatus and method for shift-by-wire device
In vehicular control method and apparatus for a shift-by-wire device, a selected shift position is modified to at least one of a vehicular parking position, a neutral position, and a traveling position, the selected shift position is modified to the vehicular parking position when a power switch is switched to an OFF position, and the modification of the shift position to the vehicular parking position is inhibited when an operation pattern of an operation input section while the power switch is in the ON position is made coincident with the operation pattern prescribed as a cipher code which inhibits the shift position modification to the vehicular parking position, the operation patterns being constituted by a combination of operation patterns which would not be carried out in the operation section during an ordinary traveling.
Device for classifying at least one object in the surrounding field of a vehicle
A device for classifying at least one object in the surrounding field of a vehicle with the aid of an environmental sensor system, the device classifying the at least one object on the basis of its shape and its dimensions, and the environmental sensor system ascertaining the dimensions.
Wireless vehicle test equipment
A system using a number of portable or wrist-worn remote controller units that communicate with a number of sensor units or sensor head sets for vehicle or automotive testing. An optional central communications controller can coordinate communications between the wrist-worn units and the sensor sets. A particular remote unit can associate with particular sensors or a particular sensor set and thus receive and transmit data only with that sensor set. Mechanics or technicians can run tests and take data completely from the remote units. The remote units generally contain a display screen that can show all parts and results of any vehicle test procedure. Various wireless communications techniques can be used to establish this communication.
Method for servicing a vehicle
A system and method for monitoring at least one characteristic of a vehicle is provided, wherein the method includes generating a data set that includes data responsive to the at least one characteristic. The method further includes comparing the data set against predetermined parametric data and creating trend data for a plurality of the data sets. Furthermore, the method includes analyzing the trend data to determine if action should be taken regarding the vehicle.
System and method for autonomous vehicle control
A system for localizing an autonomous vehicle to a target area can include a position indicator adapted for association with the vehicle in a three dimensional configuration, a detection device configured to detect the position indicator, a computation device configured to compute a position of the vehicle based on the detected position indicator and the relationship of the configuration to the vehicle orientation, a transmitter configured to receive information from the computation device and produce a signal carrying the information, a receiver configured to receive the signal from the transmitter and filter the information therefrom, and a control system configured for association with and control of one or more directional control components of the vehicle, the control being based on the information received from the receiver relating to localizing the vehicle to the target area. A method of for localizing a vehicle to a target area is also disclosed.
System and method for autonomous vehicle localization
An autonomous vehicle capable of determining its position in a space through improved communications with beacons is disclosed. The autonomous vehicle utilizes time of flight as well and angular information to determine position, and is capable of intelligent interaction with the beacons.
Navigation system, hybrid vehicle with same, and method of searching for route for hybrid vehicle
When passage through a road pricing area where an exhaust gas emission vehicle is subjected to billing is predicted, ECU acquires a current SOC of a power storage device, and estimates a required energy quantity for passing through the road pricing area where an exhaust gas emission vehicle is subjected to billing by EV traveling. Further, a determination is made whether or not the vehicle can pass through the road pricing area by EV traveling based on the current SOC and the required energy quantity as estimated. When a determination is made that the vehicle cannot pass through the road pricing area by EV traveling, ECU executes steps of guiding a route to an adjacent charging station and/or steps of guiding a bypass.
Vehicle system for varied compliance benefits
Exemplary methods, systems and components enable selective control of an operational mode for a vehicle that is subject to an administrative standard. In some instances a qualified person or entity may attain a possible consequential result related to a user-selected vehicle operation mode that may involve a vehicle operation paradigm and/or a vehicle travel route and/or a vehicle travel destination. In some embodiments, implementation of the selected vehicle operation mode may modify a conformity status of the vehicle relative to the administrative standard. Various accessible records may be maintained regarding administrative compliance states and their respective benefits, as well as regarding certification of preferable consequential results available to qualified recipients based on a correlated vehicle operational mode.
Driver information device
A driver information device includes an output unit for outputting items of driver information, a pause having a predetermined length being inserted between the outputting of a first and a second item of information.
Fault situation processing arrangement of a load distribution system of a local electric power transmission network
A processing arrangement for the fault situation of a local electric power transmission grid comprises a generator-specific element arranged to monitor the fault situation of a data communication bus and the statuses of the switches of the electric power transmission network and to compare the status data concerning the same switch. In case of a fault situation the generators change into droop control only if there are no other possibilities to continue with the normal adjustment of the generator.
Computerized method for making changes to an irrigation system and apparatus for implementing such method
The present invention relates to a computerized method for operating changes to an irrigation system. The method includes the steps of: providing a computer processing apparatus having storage media; installing a computer program product for sizing and changing the system; loading a general database of components susceptible of being used in the system onto the storage media; loading an initial combination of components defining the configuration of the system before the change; introducing technical specifications about the final configuration of the system into the computer program product; operating one or more changes to the system in accordance with the technical specifications of the final configuration thereof. The computer program product is designed to provide a first list of components concerned by the changes and a second list containing the changes.
Pneumatic actuator system and method
A pneumatic actuator system (200) is provided according to the invention. The system (200) comprises a pneumatic actuator (100) including an actuator component (108), with the pneumatic actuator (100) being configured to include a first actuation phase and a second actuation phase. The system (200) further comprises one or more feedback sensors configured to provide one or more actuation feedback values, an actuator valve (213) coupled to and providing a first pneumatic pressure and a second pneumatic pressure to the pneumatic actuator (100), and a controller (240) coupled to the one or more feedback sensors and the actuator valve (213). The controller (240) is configured to receive the one or more actuation feedback values from the one or more feedback sensors and control the actuator valve (213) in order to actuate the actuator component (108) according to an actuation profile and according to the one or more actuation feedback values.
Robot and method of controlling the same
Disclosed is a method of defining control angles to use a limit cycle in order to balance a biped walking robot on a three-dimensional space. In order to balance an FSM-based biped walking robot right and left on a three-dimensional space, limit cycle control angles to balance the robot according to states of the FSM-based robot are set on the three-dimensional space, and the limit cycle control angles on the three-dimensional space are controlled using a sinusoidal function to allow relations between the control angles and control angular velocities to form a stable closed loop within a limit cycle.
A robot system is disclosed which includes at least two robots, each having a related processing unit. The processing units are connected to each other via a network bus for data transmission, and distributed sensors are provided for gathering first and/or second measurement data within a local extension of the robot system. First measurement data gathered by at least one first sensor are transmissible to at least one processing unit related thereto. Second measurement data gathered by at least one second sensor are feedable into the network bus and provided to the at least two processing units connected thereto. The processing units can analyze the second measurement data as a variable dynamic share of workload for feeding result-data of the analysis into the network bus.
System and method for continuous sorting operation in a multiple sorter environment
The present application relates to a system and method for sorting mailpieces prior to their delivery to the postal authority. The system and method allow for the running of different first pass sort schemes on multiple sorters in a sorting facility without stopping operations for no-count mode, without losing mailpiece tracking, or waiting for all first pass sorting to complete before re-running the mail that was not sorted to the finest depth of sorting. With the present application, mailpieces that can be run a second time can be run concurrently during first pass without the high risk no-count mode or loss of data integrity.
Method for identifying transportation items, particularly luggage items
A method of identifying transportation items which are physically different from one another, particularly for identifying automatically sortable passenger luggage in air, rail, or ocean travel, using electronically readable information associated with the transportation item. To be able to automatically identify transportation items, particularly luggage items, even when information storage media fitted to them cannot be read or can be read only imperfectly, it is proposed that, before or when the transportation item is surrendered to a transport and/or sorting system, special sensors be used to ascertain specific physical features of the respective transportation item and that these specific physical features be stored in a database as an electronic feature data record (signature) together with an identification code associated with the transportation item, the stored feature data records being compared with a subsequently produced feature data record for a transportation item as required, in order to identify the transportation item using its associated identification code when there is at least a sufficient match between the subsequently produced feature data record and one of the feature data records stored in the database.
Feature extraction apparatus, feature extraction method, and program thereof
Provided are techniques which offer an advantage of reduced time and reduced storage capacity required to calculate the feature value of AAC-format song data. A feature extraction unit includes: an MDCT coefficient extraction unit which extracts MDCT coefficients from AAC-format song data; a classification unit which locates the MDCT coefficients thus extracted by the MDCT coefficient extraction unit on Mel frequency regions so as to uniformly classify the MDCT coefficients into classes, the number of which is the same as that of a predetermined number of Mel filter banks; an integrating unit which extracts the MDCT coefficients classified by the classification unit by applying a predetermined window function, and integrates the MDCT coefficients thus extracted, in increments of the Mel filter banks; and a feature calculation unit which calculates the feature value by performing logarithmic cosine conversion of the integrated results obtained by the integrating unit.
Method for outputting audio-visual media contents on a mobile electronic device, and mobile electronic device
A method for outputting audio-visual media contents on a mobile electronic device is provided. The method may include receiving a request for the output of an audio-visual media content which is stored in a compressed format in a memory in a mobile electronic device; checking of whether a copy of the requested media content is stored in an uncompressed format in a nonvolatile memory in the device; and outputting the stored copy of the requested media content instead of the requested media content if a copy of the requested media content is stored in an uncompressed format in the nonvolatile memory in the device.
Fast synthesis sub-band filtering method for digital signal decoding
In order to reproduce audio signals which have been compressed or encoded for storage or transmission using, for example, MPEG audio encoding, a synthesis sub-band filter is employed which performs an inverse modified discrete cosine transform. The computational cost of the IMDCT implementation is reduced by pre-calculating arrays of sum and difference data. The arrays of sum and difference data are then used in two separate transform calculations, the results of which can be used in the generation of pulse code modulation audio data.
Signal processing apparatus, signal processing method, and program therefor
A signal processing apparatus subjects an audio signal to musical pitch analysis using different analysis techniques for the higher and lower frequencies. When an audio signal is input, a first extractor extracts a high-frequency signal, and a second extractor extracts a low-frequency signal from the audio signal. A high-frequency processor extracts pitch components from the high-frequency signal by applying the short-time Fourier transform. A low-frequency processor extracts pitch components from the low-frequency signal by dividing the low-frequency signal into a plurality of octave components. A synthesizing unit then combines the pitch components thus extracted from the high-frequency signal and the low-frequency signal and outputs the analysis result.
Modal advertising for wireless devices
Methods and computer-readable media are provided for the delivery of digital content to mobile devices. An audio content, a video content or an audio-video content is associated with a web page and the web page is published to a server location suitable for viewing. Once the web page is selected, the content is sent to the wireless device through streaming or by initiating a download. After the content is available to the device, an application programming interface executes the content for the user to listen, view or both.
Method for providing functions in an industrial automation system, control program and industrial automation system
In order to provide functions in an industrial automation system having control units which are coupled via a communication network, functions of the automation system are made available by services. Components of a service are subdivided into service-specific components and into components which can be reused by a plurality of different services. Service-specific components and reusable components have a standard configuration interface. Service components are linked to a service by a service configuration unit via the standard configuration interface. Functions for monitoring and/or controlling a defined quality of service are assigned to the reusable components.
Smart power management system and method thereof
The present invention provides a smart power management system, comprising a power management apparatus and at least one electric socket device. The plurality of electric socket devices produce a second wireless signal according to power consumption, and the power management apparatus receives the second wireless signal and computes relevant cost or the carbon footprint information shown on a display unit for reference. In addition, the power management apparatus also compares a setup signal inputted by a user to the second wireless signal, the electricity cost or the carbon footprint information to produce a first wireless signal, thereby controlling the plurality of electric socket devices for providing power supply or stopping power supply.
Method and apparatus for sensing mechanical energy of an implantable lead
An apparatus comprises an implantable sensor and a signal analyzer circuit communicatively coupled to the implantable sensor. The implantable sensor is configured for coupling to an implantable lead and the implantable sensor provides an electrical vibration sensor signal representative of mechanical vibration of the implantable lead. The signal analyzer circuit is configured to determine a baseline of the vibration sensor signal, detect a change in the vibration sensor signal from the baseline vibration sensor signal, and provide an indication of the change to a user or process.
Thermal therapy temperature sensor calibration method
A thermal therapy of body tissue with electromagnetic energy is controlled by feedback from one or more temperature sensors placed in the vicinity of the tissue to be treated. The temperature sensors are calibrated by comparing stabilized temperature values of the one or more temperature sensors against a normal range of body temperature and adjusting sensed temperature to a value within a normal body temperature range if the actual temperature value of a stabilized temperature sensor is less than the normal body temperature range. The temperature adjustment to the temperature sensor is maintained throughout the thermal therapy which reduces the risk of thermal damage to healthy tissue located near the tissue to be treated.
Direct inductive/acoustic converter for implantable medical device
Systems and methods for communicating with or powering implantable medical devices using a direct inductive/acoustic telemetry link are disclosed. An illustrative system includes an interrogator device located outside of the patient's body, an implantable medical device including an energy translator circuit adapted to convert inductive or RF signals received from the interrogator device into an acoustic signal for driving an acoustic transducer, and a remote device adapted to sense one or more parameters within the body.
Method of implanting a medical implant to treat hearing loss in a patient, devices for faciliting implantation of such devices, and medical implants for treating hearing loss
In one embodiment, a method of treating hearing loss in a patient, comprises: creating a first channel in osseous tissue at or immediately adjacent to the promontory of the patient; creating a second channel through the first channel to the scala tympani or the scala vestibuli; and implanting a hearing device in the first channel, the hearing device being in fluid communication with cochlear fluid through the second channel, the hearing device being adapted to drive cochlear fluid to activate auditory receptor cells in the cochlea of the patient.
GI lead implantation
A method is provided, including physically contacting a gastric implantation site of a stomach via a transluminal approach, physically contacting the site via a transabdominal approach, stabilizing the site, and implanting an electrode at the site based on the physical contact provided by the transluminal and transabdominal approach. Other embodiments are also described.
Retention assemblies for implantable electric stimulation systems and methods of making and using
A connector assembly includes a lead or a lead extension, a connector, and a retention assembly disposed in the connector. The connector includes a connector housing defining a port at a distal end of the connector, and a plurality of connector contacts disposed in the connector housing. The port is configured and arranged for receiving a proximal end of the lead or the lead extension. The connector contacts are configured and arranged to couple to at least one terminal disposed on the proximal end of the lead or the lead extension. The retention assembly includes a retention mechanism that can be engaged and reversibly disengaged without the use of tools beyond conventional operating-room surgical instruments.
Cross-band communications in an implantable device
An ambulatory monitoring device includes a sensor to monitor a physiological signal and a battery power source. The device also includes a wireless receiver adapted to monitor a first frequency band having frequencies below 1 MHz and configured to detect and receive, using less than 10 micro-amps of current from the battery power source when operating, wireless communications within the first frequency band from a remote device at least one meter away. The device further includes a wireless transmitter adapted to transmit—after receipt from the remote device of a first wireless communication within the first frequency band that includes an invitation for further communication—a second wireless communication in a second frequency band having frequencies above 10 MHz, the second wireless communication comprising data indicative of the physiological signal as sensed by the sensor.
Advanced patient management with composite parameter indices
Systems, devices and methods for defining, identifying and utilizing composite parameter indices from health-related parameters are disclosed. One aspect is a programmable device having machine executable instructions for performing a method to assist with managing a patient's health. In various embodiments, a first set of at least two health-related parameters is acquired. A first composite parameter is generated using the first set of at least two health-related parameters. Other aspects and embodiments are provided herein.
Sustaining ventricular tachycardia detection
An apparatus comprises an implantable ventricular depolarization sensing circuit configured to provide a sensed ventricular depolarization signal, a timer circuit configured to provide a ventricular time interval between ventricular depolarizations, and a controller circuit communicatively coupled to the ventricular depolarization sensing circuit and the timer circuit. The controller circuit includes a ventricular tachycardia (VT) detection circuit configured to declare an episode of VT when a number of accelerated beats are detected, calculate a hysteresis VT detection threshold interval, and deem whether the episode of VT persists using the hysteresis VT detection threshold interval.
Method of tuning bandstop filters for implantable medical leads
A TANK filter is provided for a lead wire of an active medical device (AMD). The TANK filter includes a capacitor in parallel with an inductor. The parallel capacitor and inductor are placed in series with the lead wire of the AMD, wherein values of capacitance and inductance are selected such that the TANK filter is resonant at a selected frequency. The Q of the inductor may be relatively maximized and the Q of the capacitor may be relatively minimized to reduce the overall Q of the TANK filter to attenuate current flow through the lead wire along a range of selected frequencies. In a preferred form, the TANK filter is integrated into a TIP and/or RING electrode for an active implantable medical device.
Remote pace detection in an implantable medical device
A system embodiment for stimulating a neural target comprises a neural stimulator, a pace detector, and a controller. The neural stimulator is electrically connected to at least one electrode, and is configured to deliver a neural stimulation signal through the at least one electrode to stimulate the neural target. The pace detector is configured to use at least one electrode to sense cardiac activity and distinguish paced cardiac activity in the sensed cardiac activity from non-paced cardiac activity in the sensed cardiac activity. The controller is configured to control a programmed neural stimulation therapy using the neural stimulator and using detected paced cardiac activity as an input for the neural stimulation therapy.
System for provisional radio frequency cardiac stimulation for replacement of the pacemaker
The present invention relates to a device for provisional cardiac stimulation during replacement of pacemakers (PMs). Said device enables fitting on an electrode catheter separated from the pocket of the PM of a radio-frequency coil (2) connected to an external apparatus (3) for generating variable-frequency pulsed signals. The device according to the invention can be used in the case of both unipolar and bipolar electrodes. According to a preferential embodiment, a sterile plate or electrode is set subcutaneously and connected to the external generator (3) for completing reclosing for cardiac stimulation, hi the event where there is the need to intervene in order to replace of a PM with bipolar electrodes, the subcutaneous plate is preferentially used; the subcutaneous plate is preferentially used as positive electrode, used RF stimulation will in this case be performed in a unipolar way by the combined action of the plate and of the electrode probe of the electrode catheter.
Systems, devices and methods for acute autonomic stimulation
Various system embodiments comprise a medical device, comprising a flexible tether, a neural stimulation circuit, and a controller. The flexible tether is adapted to be fed into a patient's throat. The flexible tether includes a plurality of electrodes. The neural stimulation circuit is adapted to deliver neural stimulation. The controller is adapted to control the neural stimulation circuit to provide a neural stimulation therapy using at least one electrode from the plurality of electrodes, and to implement a neural stimulation test routine. The neural stimulation test routine is adapted to assess neural stimulation efficacy for electrode subsets of the plurality of electrodes to identify a desired electrode subset for use in delivering the neural stimulation therapy to elicit a desired response.
Two-part electrotransport device
A switch operated therapeutic agent delivery device is described. The device comprises two parts, which are assembled by a user prior to use. A first part contains a power supply and circuitry for the device; and a second part comprises electrodes and reservoirs containing the therapeutic agent to be delivered. The action of combining the two parts of the device causes the two parts to be irreversibly coupled together, completes an electrical connection between the two parts, and closes one or more switches, thereby connecting a power source, such as a battery, into the device's circuitry, thereby powering the device on so that it is ready for use. The device can then be attached to a patient, who can operate the device by pressing a button in a proper sequence.
Alarm testing and backup for implanted medical devices with vibration alerts
Alarm tests are disclosed which use alarm test signals to assess alarms provided by medical devices. Especially relevant are implanted devices that monitor cardiac activity and provide notification in response to medically relevant events. Alarm tests can occur periodically, or in response to a patient, doctor, or remote party initiating the alarm test. Alarm tests can also occur during the actual alarms issued to detected medical events. Alarm tests lead to pass or fail results, which in turn may cause operations to contingently occur. Alarm test failure in the auditory, visual, or tactile modality, may cause an alternatively defined alarm signal to be used as back-up. Alarm test logs can store alarm test results, including quantification of the measured alarm signal. Rapid alarm tests are described, as are various methods of accurately measuring characteristics of the test signal in ambulatory patients, which are especially relevant to a vibration alarm.
Real time radiation treatment planning system
The invention relates to a real time radiation treatment planning system for use in effecting radiation therapy of a pre-selected anatomical portion of an animal body using hollow needles. According to embodiments of the invention, the system may include a processing means processing means-configured to perform a three-dimensional imaging algorithm and a three-dimensional image segmentation algorithm, with respect to one or more specific organs within the pre-selected anatomical portion and with respect to the needles, for converting the image data obtained with an imaging means into a three-dimensional image of the anatomical portion, using at least one single or multi-objective anatomy-based genetic optimization algorithm. For pre-planning or virtual simulation purposes, the processing means is arranged to determine in real time the optimal number and position of at least one of the needles, positions of energy emitting sources within the needles, and the dwell times of the energy emitting sources at the positions. For post-planning purposes, the processing means is arranged to determine, based on three-dimensional image information, in real time the real needle positions and the dwell times of the energy emitting sources for the positions.
Tissue marking system and method
A tissue marking system is configured to mark a tissue sample. The tissue marking system includes an actuator portion movable between an actuated position and a non-actuated position and a jaw portion coupled to the actuator portion and movable between an open position and a closed position in response to movement of the actuator portion from the actuated position to the non-actuated position. The jaw portion includes a first tooth and a second tooth configured to engage the tissue sample when the jaw portion moves from the open position to the closed position.
Device for measuring biomedical data of a test subject and method for stimulating the test subject using data processed in real time
Provided is a device for measuring biomedical data from a testee, with a recording system for taking the data and a first hardware component for displaying the data. A device for electrical separation of the data is arranged in a connector line for transmitting the data from the recording system to the first hardware component for displaying the data. At least a duplication of the data for data processing purposes is thus guaranteed. The data processed in said manner are used for a method for real-time stimulation of a testee.
Apparatus and method for monitoring the position of an orthopaedic prosthesis
A system, apparatus, and method for determining a position of an orthopedic prosthesis includes a patient support platform, a sensor array coupled to the patient support platform, and a controller electrically coupled to the sensor array. The sensor array is configured to generate data signals in response to an output signal of a signal source(s) coupled to the orthopedic prosthesis and/or a bone of the patient. The controller is configured to determine a position of the orthopedic prosthesis and/or the bone of the patient based on the data signals.
Method and apparatus for quantification of optical properties of superficial volumes using small source-to-detector separations
A probe for obtaining quantitative optical properties and chromophore concentrations of tissue components in tissue in-vivo at superficial depths and at source-detector separations of 5 mm or less includes a source fiber providing light to expose the tissue, a diffuser layer into which light from the source fiber is directed and then from the diffuser layer to and/or into the tissue, and a detector fiber arranged relative to the diffuser layer for detecting backscattered and/or reflected light returned from the tissue without transmission through the diffuser layer.
Electronic device including a waterproof sheet member
An electronic device includes an outer case having a sound hole, an acoustic unit included in the outer case in a position corresponding to a position of the sound hole, a sheet member provided between the acoustic unit and the outer case in a position corresponding to the position of the sound hole, and placed over the acoustic unit to cover an outside of an outer edge of the acoustic unit, a mounting portion circumferentially provided on an outer peripheral portion of the sheet member and mounted to the outer case, and an extension portion that extends the mounting portion toward an inner periphery thereof on a side of the sheet member facing the acoustic unit and to which the acoustic unit is mounted.
Portable wireless apparatus and antenna structure
A portable wireless apparatus includes a casing, an antenna and another electronic component. The antenna is contained in an end portion of the casing. The antenna includes a first and second antenna element, an antenna board and a antenna connector. The antenna board has a mounting face on which the first and second antenna elements are mounted. The antenna connector is formed on the antenna board and connects the first antenna element to the second antenna element. A predetermined space is provided between the first and second antenna elements. The other electronic component is disposed so as not to overlap the antenna connector in a direction orthogonal to the mounting face of the antenna board, and at least part of the other electronic component is disposed in the predetermined space.
Receiver and receiving method of the receiver
The receiver includes a low noise amplifier, a local signal generator, a first mixer, a second mixer, a first amplifier, a second amplifier, a first A/D converter, a second A/D converter, and a signal level detection unit. A detection signal from at least one terminal of the first A/D converter is supplied to an input terminal of the signal level detection unit, thereby generating a reception start signal from the output terminal. Before an RF reception signal is received, a first signal processing unit containing the first mixer, the first amplifier, and the first A/D converter is controlled to an active state, and a second signal processing unit containing the second mixer, the second amplifier, and the second A/D converter is controlled to a low power consumption state. After the RF reception signal is received, the second signal processing unit is controlled to the active state.
Terminal with display function
[Object]To provide a terminal with a display function such as a mobile phone that allows a user to select easily desired image information from stored image information.[Constitution]When a user selects one file from a list screen of reduced images M5 in a first display state and then performs a switching operation to move to a second display state, a display control section 110 enables a comparison screen mode. Specifically, the display control section 110 sends out image signals for intermediate images M7, M8, and M9 corresponding to the selected file and anterior and posterior to the selected file to a liquid crystal display device 500, thereby to display the intermediate images M7, M8, and M9 on a second display surface 21. The three intermediate images M7, M8, and M9 are shown in maximum sizes within the second display surface 21.
Portable wireless device
A portable wireless device having a plurality of wireless sections capable of diversity operation which can reduce the size, thickness, weight and manufacturing cost by reducing the number of antennas. The portable wireless device (100) comprises first through third main antenna devices (101-103), first through third wireless sections (111-113) connected, respectively, with the first through third main antenna devices (101-103) and capable of diversity operation, a sub-antenna device (121) for diversity operation connected with any one of the first through third wireless sections (111-113) at the time of diversity operation, and a section (120) for switching connection of the sub-antenna device (121) with any one of the first through third wireless sections (111-113) at the time of diversity operation.
Electronic devices including substrate mounted acoustic actuators and related methods and mobile radiotelephones
An electronic device may include a substrate and an acoustic actuator mounted on a surface of the substrate. More particularly, the acoustic actuator may be configured to generate displacements along a direction parallel with respect to the surface of the substrate in response to an electrical signal applied thereto. A speaker box may define an acoustic volume, and the speaker box may include a speaker box wall with a speaker box opening therethrough adjacent the acoustic actuator. A speaker membrane may be provided across the speaker box opening adjacent the acoustic actuator, and the speaker membrane may be mechanically coupled to the acoustic actuator so that the speaker membrane is configured to deflect responsive to displacements generated by the acoustic actuator. Related methods are also discussed.
Methods and apparatus for recovering video information in a mobile communication system
Provided are an apparatus and methods for recovering video information when operating in an area that impairs an electromagnetic field of a transmit/receive signal during a video telephony of a portable terminal. A method of which includes determining a number of buffers for storing intra coded (I) frames to be received, transmitting the number of the buffers to a counterpart terminal together with a VFU signal, acquiring video information by storing I frames received from the counterpart terminal, and generating video frames using the acquired video information.
Coordination method and communication terminal
Whenever, there occurs a predetermined event which occurs periodically, a host section which includes a host processor 31, makes a judgment of whether or not it is an engine-mode state in which an engine section 40 is executing an engine application, and whether or not it is estimated that the engine-mode state will be continued. When this judgment result is affirmative, the host section notifies to the engine section 40, information which the host section has collected after the previous notification, and which is to be notified periodically to the engine section. As a result of this, at a periodic timing called as an occurrence of a predetermined event, periodic notification data is notified from the host section to the engine section 40. Therefore, in a configuration which includes a host section including a host processor, and an engine section including an engine processor, which executes a predetermined function under a control of the host section, an increase in a load on the engine section 40 is suppressed.
A basestation for a cellular communication system has an interface, for connection to a computer network, and also includes an oscillator, for generating wireless transmit and receive frequencies. A controller receives timestamped response messages from a time server over the computer network, each response message being subject to a network propagation delay, which is a sum of a minimum network propagation delay and a jitter component. For each received response message an apparent network propagation delay is determined as a function of a difference between a first timestamp applied by the time server and a second timestamp based on a clock derived from said oscillator. A subset of the received response messages are selected, whose network propagation delays include minimal jitter components. The frequency accuracy of the oscillator is then determined based on changes over time in the apparent network propagation delays of the selected received response messages. The oscillator can then be adjusted based on this frequency accuracy.
Extended handset service in locations served by femtocell devices
Femtocell radio access network (RAN) devices are typically small, low-cost base stations that may be deployed in areas, for example, where macro-cellular RAN coverage is poor or congested. Thus, wireless communication devices (WCDs) using femtocell devices may benefit from improved wireless coverage, while traffic is offloaded from the macro-cellular RAN. As the use of femtocell devices in residences and businesses continues to grow, it may be advantageous to allow WCD users to use telephony devices coupled to the femtocell device to answer incoming calls for their WCDs. For example, a femtocell device may receive an incoming call request for a WCD, determine that the WCD is eligible for an extended handset service, and then cause a telephony device to alert for the incoming call request.
Mobile terminal and method for displaying location information therein
A mobile communication terminal is disclosed. The mobile communication terminal includes a wireless communication unit receiving another user's image for video communication and real-time location information of the other user; a display displaying the received other user's image and the real-time location information of the other user; and a controller controlling the wireless communication unit and display such that both the real-time location information and the other user's image are displayed together.
Apparatus for wireless connection to a mobile phone and possible applications of the apparatus
There is provided an apparatus that is connectable wirelessly with a mobile phone. The apparatus includes a casing for encasing components of the apparatus. A display unit is mounted within the casing for the display of content to a user. There is a processor coupled with the display unit to control the content displayed in the display unit. There is also a transceiver coupled to the processor within the casing to enable the wireless connection between the apparatus and the mobile phone. A memory module is coupled to the processor, the memory module being for storage of data and applications. There may be a positioning module coupled to the processor, the positioning module being for provision of a location of the apparatus to the mobile phone. It is preferable that a set of controls is coupled to the processor for controlling the apparatus, and the set of controls may be controllable by the user either via touch or voice. It is advantageous that the apparatus is used for applications selected from the group consisting of: making and receiving telephone calls using a wide area connection of the mobile phone, composing and receiving messages using the wide area connection of the mobile phone, accessing the internet using the wide area connection of the mobile phone, and playing back media content on the apparatus.
System and method for providing time zone as instant messaging presence
A system and method are provided to obtain and use time zone information as presence in instant messaging. The time zone information is obtained by a user's mobile device and is sent to other mobile devices corresponding to the user's contacts. The time zone information of a contact may be displayed on the user's IM application, including the contact list and instant messaging conversation window. The location of the mobile device may also be provided. The user uses the time zone and location information to discern the status of a contact. Rule-based decisions that rely on the time zone information are also used to affect the operation of the instant messaging application.
Devices and methods for selectively filtering message content
Methods for selectively filtering message content received at a mobile device based upon a current location of the mobile device and/or a user's presence status and devices configured to selectively filter message content based upon a location of the mobile device and/or a user's presence status.
Global positioning system (GPS) instant friend-making and cash flow services system
A global positioning system (GPS) instant friend-making and cash flow services system includes a mobile device connected to a mobile network through a mobile base station, and then connected to a main server, a telecommunication server and a short message server, and provided for at least one user to carry out related operations of a GPS instant friend-making and cash flow services program, a certification program and a short message program, such that a global positioning satellite is used for a GPS instant friend-making service. In addition, at least one mobile device is connected to a financial server through the mobile base station for outputting at least one user's personal datum and at least one financial datum to perform a cash flow certification before initializing a cash flow service.
System and method for SUPL roaming using a held client
A system and method for assisting the H-SLP is selecting a V-SLP using the HELD client of a SET. The SET receives identity information from an access network regarding associated LIS. The SET relays this information as well as measurements taken of the wireless network to the H-SLP. If the H-SLP does not contain enough information to determine a location estimate, the H-SLP uses the identity information from the access network to find an associated SLP that may serve as a V-SLP. A request using roaming location protocol may then be transmitted from the H-SLP to the V-SLP for location assistance.
Displaying network objects in mobile devices based on geolocation
Displaying network content searches on mobile devices involves obtaining results of a network content request via a mobile device. A geolocation of at least one object associated with the results of the network content request is also obtained. A scene is viewed in a camera view of the mobile device. A virtual location is determined in the camera view. The virtual location represents the actual location of the object relative to the scene contained in the camera view. A graphic representing the object is then displayed at the virtual location in the camera view.
Method, system and device for reducing data in a mobile communications network
A method, system and device for reducing volume of data transmitted between a base station and a control unit in a mobile communications network in which there is inserted into a communication channel between the base station and the control unit a device are provided. Voice data transmitted in each communication channel and associated with a plurality of connections is analyzed. Each connection also includes signaling data a signaling channel, and the connections originating from a base station and terminated in the same or a different base station connected to the device are identified and interconnected, and following the interconnection of the voice channels the transmission of the associated voice data to the control unit is prevented. Thereby, the data volumes transmitted on the voice channels are no longer forwarded to the rest of the mobile communications system and consequently the data volumes transmitted are reduced.
Load balancing for capacity improvement in mobile wireless communication networks
Technologies for load balancing among neighboring cells of a mobile wireless communication network can reduce traffic congestion and improve network system capacity. Load balancing can be accomplished by adjusting various radio access network parameters. Such adjustments may be made at the cell level or at the neighboring cell level. The adjustments can be applied iteratively in response to various collected operational statistics. The adjustments can adapt cell size and cell shape as well as adapt handover to maximize system resource and hardware utilization. An iterative process of optimization can periodically collect performance statistics and network configuration from a mobile wireless network. The collected information can be periodically analyzed to determine parameter adjustments. Configuring additional capacity from the communication network can prevent or substantially delay the acquisition of additional hardware resources to mitigate system capacity issues.
Automatic profile updating for a wireless communication device
A profile audit system in a wireless network comprises a communication interface and a processing system. The communication interface is configured to receive a notification of a failed attempt by a first wireless communication device operated by a user to register with the wireless network using invalid registration data, and receive a user profile associated with the user. The processing system is configured to process the user profile and the invalid registration data to determine if a credential error has occurred, and if the credential error has occurred, process the user profile to determine if a second wireless communication device is associated with the user, and if the second wireless communication device is associated with the user, direct the communication interface to transfer an updated user profile for wireless delivery to the second wireless communication device, wherein the updated user profile includes valid registration data.
Femtocell configuration using spectrum sensing
An embodiment of the present invention provides for the ad-hoc configuration of femtocells using spectrum sensing for the selection of spectrum channels. One or more embodiments of the invention determine frequency bands that are not reserved by macrocells in a location, and perform spectrum sensing to determine communication channels in unreserved frequency bands that are being used by other femtocells in range. In this manner, femtocells can be deployed and configured in an ad-hoc manner without external coordination or control between deployed femtocells.
Apparatus, and associated method, for facilitating network selection by a roaming mobile node
Apparatus, and an associated method, by which to facilitate operation of a roaming mobile node to perform a packet communication service. When the mobile node roams beyond its home network, detection is made of the available networks in whose coverage area that the mobile node roams together with the communication capabilities of the available networks. A preferred listing stored at a storage element of the mobile node is accessed to determine if any of the available and compatible networks are listed on the preferred listing. If so, selection is made of one of the available and preferred networks. Otherwise, a network not contained in the preferred listing is selected through which to communicate.
Method, device and system for displaying caller identification information
Provided are a method, a device, and a system for displaying at least one character for identifying a caller, together with the caller's phone number, on a recipient's mobile phone when an incoming call is received. The system includes a caller's mobile phone for allowing the caller to input a recipient's phone number and at least one character desired to be added after the phone number, generating an outgoing call message including the caller's phone number, recipient's phone number and input word or phrase for an outgoing call, and sending the generated message; a base station for receiving the outgoing call message, and changing the outgoing call message to an incoming call message which will be sent to the recipient's mobile phone; and the recipient's mobile phone for receiving the incoming call message and outputting any word or phrase included in the incoming call message.
Information processing apparatus and method and program
An information processing apparatus for communicating with a different information processing apparatus, includes: a first connection establishment block configured to control a first communication section, which carries out nearby wireless communication for delivering and accepting information to and from the different information processing apparatus positioned near to the information processing apparatus, to establish a connection for the nearby wireless communication; an acquisition block configured to acquire setting information for short range wireless communication which exhibits a wire communication range than the nearby wireless communication and capability information regarding the capacity of the different information processing apparatus from the different information processing apparatus through the nearby wireless communication; and a second connection establishment block configured to control a second communication section, which carries out the short range wireless communication, based on the setting information and the capability information to establish a connection for the short range wireless communication.
Method of exchanging voice messages between the driver and user of the vehicle
The invention relates to means of communication between drivers and vehicle users, namely, to establishing connection between drivers and users going in the same direction.The objective of the invention is to establish a voice connection between the driver and vehicle user, taking into account their relative position, relative routes, as well as other reasons for the driver and the user to share additional information with the aim of jointly going along the route.The goal is reached in the following way: the driver's coordinates are registered, messages from users are received; together with receiving and recording the user's message the coordinates of the user are recorded; the driver individually receives messages from the list prepared for them, with the list of messages broadcasted to the driver being formed using the driver and the user's location coordinates and the voice communication is established between the driver and the user selected by the driver from the broadcast list. There are other differences from the prototype. The method allows receiving, storing and sending voice messages based on an individual list. The method allows to automatically establish a selective connection between the driver and the user, located within the reach area. The method saves both the user's and the driver's time, also it reduces the costs of transportation for the users.
Method and apparatus for validating integrity of a mobile communication device
A method for validating integrity of a mobile communication device includes installing an integrity verification application on the mobile communication device. The method also includes establishing a first pass indicator and a second pass indicator including receiving a first instance of the first pass indicator. The method also includes receiving a second instance of the first pass indicator as a challenge for verification. In response to receiving the second instance of the first pass indicator, the second pass indicator may be displayed as an indication of the integrity.
User equipment, authentication system, authentication method, authentication program and recording medium
Spoofing is prevented in an authentication technique using a portable terminal and the like. A portable telephone includes an authentication unit for performing personal authentication of the user, a moving distance calculating unit for calculating a linear moving distance the portable telephone has moved from a position of the portable telephone at the time the authentication unit succeeds in the personal authentication of the user; and a post-authentication communication control unit for disabling the settlement process communication if the linear moving distance calculated by the moving distance calculating unit exceeds a predetermined distance.
Method for inverse port-based authentication
A service node authenticates a service provider network to which it is connected. When the service node is connected between subscriber devices and a network node of the service provider network, the service node issues an authentication request to the network node. The network node responds to the authentication request by transmitting a reply. The service node receives the reply and determines if it indicates the service provider network to which the service node is connected is authentic. These authentication communications can conform to a standard authentication protocol, such as Extensible Authentication Protocol (EAP). If the reply indicates the service provider network is authentic, the service node permits communication between the subscriber devices and the service provider network. If the reply indicates the service provider network is not authentic, the service node blocks such communication.
Offline charging for sessions over a 3GPP network and a WLAN access network
Communication networks and methods are disclosed for providing offline charging in a 3GPP network for sessions over a wireless local area network (WLAN) access network. A AAA server in the 3GPP network provides offline charging messages for a session to an offline charging system. If a data flow is established during the session, such as streaming video, then a packet data network gateway provides offline charging messages for the data flow to the offline charging system. The AAA server and the packet data network gateway share charging identifiers so that one or both are able to include the charging identifier for the session and the charging identifier for the data flow in an offline charging message. This allows the offline charging system to effectively correlate CDRs for the session with CDRs for the data flow occurring during the session.
System and method for determining the routing of 911 calls
A system and method for determining the historical density of 911 calls from wireless devices. This determination is made over a certain geographical area for a statistically significant amount of time. Once the historical density of these wireless 911 calls has been determined, further determining the most efficient routing of future 911 calls in order to improve the delivery of the wireless 911 call to the responding emergency service provider. The system and the method further provides a method for use by public safety officials, communication providers and other governmental or private entities to manage and control approval and actual changes to the routing of wireless 911 calls.
Safety control system for vehicles
According to one aspect of one embodiment of the present invention, a safety control system for vehicles, includes, a communication device having at least one of an input accessible from within the vehicle and an output communicated within the vehicle, at least one sensor operable to sense at least one condition related to vehicle operation, and a controller communicated with the sensor and the communication device to selectively suppress at least one of said input and said output in response to a sensed parameter of said at least one condition being outside of a threshold. When an input is suppressed, the driver is prevented from accessing or inputting information into the communication device. When an output is suppressed, communication between the device and the driver of a vehicle is suppressed to, among other things, avoid distracting the driver during certain driving situations or conditions relating to the driver, vehicle and/or environment.
System and method for digital interference cancellation
A system and method for receiving a signal, comprising an input adapted to receive a radio frequency signal having a strong interferer; a signal generator, adapted to produce a representation of the interferer as an analog signal generated based on an oversampled digital representation thereof; and a component adapted to cancel the strong interferer from radio frequency signal based on the generated analog signal to produce a modified radio frequency signal substantially absent the interferer. The system typically has a nonlinear component that either saturates or produces distortion from the strong interferer, which is thereby reduced. The system preferably employs high speed circuits which digitize and process radio frequency signals without analog mixers.
Receiver with improved flicker noise performance
A method for demodulating an RF input signal using an envelope detector and synchronous switching of the input signal before entering and after leaving the envelope detector, the envelope detector having a non-linear transfer function acting essentially as a squaring function.The invention also relates to an electronic receiver circuit performing such a method, and to an RF receiver comprising such an electronic receiver, and to an electronic device comprising such an RF receiver, and to the use of such an RF receiver as a wake-up receiver.
Correcting quadrature crosstalk contamination in receivers
An apparatus, a method and a system for correcting a phase imbalance are described. Embodiments may measure the phase imbalance inherent in a tuner and use the imbalance measure to correct the output of the tuner. Embodiments may include a tone generator to produce a single frequency tone and a tuner to receive the single frequency tone and output an intermediate frequency. The intermediate frequency may be corrected by a correction loop. Other embodiments are described and claimed.
Frequency translated filter
Embodiments of a frequency translated filter (FTF) are presented. An FTF includes a passive mixer and a baseband impedance. The baseband impedance includes a network of one or more passive components (e.g., resistors, inductors, and capacitors) that form a low-Q filter. The passive mixer is configured to translate the baseband impedance to a higher frequency. The translated baseband impedance forms a high-Q filter and is presented at the input of the FTF. The FTF can be fully integrated in CMOS IC technology (or others, e.g., Bipolar, BiCMOS, and SiGe) and applied in wireless receiver systems including GSM, Wideband Code Division Multiple Access (WCDMA), Bluetooth, and wireless LANs (e.g., IEEE 802.11).
System and transceiver clocking to minimize required number of reference sources in multi-function cellular applications including GPS
A system comprises a first clock module configured to generate a first clock reference that is not corrected using automatic frequency correction (AFC). A global position system (GPS) module is configured to receive the first clock reference. An integrated circuit for a cellular transceiver includes a system phase lock loop configured to receive the first clock reference, to perform AFC, and to generate a second clock reference that is AFC corrected.
Method and system for low noise amplifier (LNA) gain adjustment through narrowband received signal strength indicator (NRSSI)
A method for processing a plurality of signals may include amplifying an input signal and generating a wideband signal from the amplified input signal. The method may further include bandpass filtering the generated wideband signal to generate a narrowband signal, and adjusting amplification of the input signal based on a narrowband received signal strength indication of the generated narrowband signal, and/or a wideband received signal strength indication of the generated wideband signal. The amplified input signal may be downconverted to generate the wideband signal. The amplified input signal may be downconverted to an intermediate frequency (IF) and/or to a baseband signal to generate the wideband signal. At least one blocker signal may be bandpass filtered from the amplified input signal.
Automatic gain control method and apparatus
Automatic gain control method and apparatus control a gain of a received signal. While the gain is adjusted and thus converges, a finding mode is entered to additionally change the gain at least once according to at least one characteristic value obtained from a relationship between the gain and time, such that the gain approaches a target level. In other embodiments, a tracking mode is further entered to periodically adjust the gain at a period greater than that before when signal strength is being tracked to reduce noise energy introduced. Hence, the embodiments can improve a gain converging speed and reduce the influence of the noise on the communication system in a dynamic receiving environment, and thus enhance the signal receiving performance.
Method for single stream beamforming with mixed power constraints
System and method for calculating a transmitter beamforming vector related to a channel vector h under per-antenna power constraints combined with total power constraint, under per-antenna power constraints combined with overall line of site (LOS) effective isotropic radiated power (EIRP) and under all three constraints. Calculating a transmitter beamforming vector may be done in the transmitter, in the receiver and feedback to the transmitter or in both. The method may be adapted to perform with a multi-antenna receiver and with multi-carrier systems.
Polar modulation transmitter with envelope modulator path switching
Methods and apparatus for controlling power in a polar modulation transmitter. An exemplary polar modulation transmitter includes a radio frequency power amplifier (RF PA), a phase path having circuitry operable to generate a constant amplitude phase modulated signal, and an amplitude path including an envelope modulator circuit having first and second envelope modulation paths. The RF phase modulated signal is applied to an RF input of the RF PA, while an envelope modulated power supply signal generated by a selected one of the first and second envelope modulation paths is coupled to a power supply input of the RF PA. The second envelope modulation path is selected during times when the power required by the RF PA is below some predetermined power level. During times when the RF PA requires power above the predetermined power level, the first envelope modulation path is selected.
Mobile station and method to select an amplifying path thereof
A mobile station communicates with an access point (AP). The mobile station includes a low noise amplifier (LNA) path, a power amplifier (PA) path, a switch to select the LNA path or the PA path, and a controller directing the switch. The controller estimates amplifying power of the LNA, transmitting power and a sensitivity threshold of the PA. The controller receives a current received signal strength indication (RSSI) value of the AP. The controller determines whether amplifying power of the LNA path exceeds the PA sensitivity threshold. The controller transmits a selection signal directing the switch to select the LNA path if the amplifying power of the LNA path exceeds the sensitivity threshold of the PA.
LPRF device wake up using wireless tag
A wireless transceiver includes: (a) a low power radio frequency (LPRF) communications component capable of powering down to conserve energy and capable of powering up in response to an electronic signal, the LPRF communications component including a transmitter and a first receiver; and (b) a second receiver that is configured to screen a radio frequency broadcast and provide, on the basis of specific data identified therein, the electronic signal to the LPRF communications component in order to power up the LPRF communications component. The second receiver is adapted to draw less current than the LPRF communications component while awaiting receipt of and listening for a radio frequency broadcast.
Adaptive inductive power supply with communication
An adaptive inductive ballast is provided with the capability to communicate with a remote device powered by the ballast. To improve the operation of the ballast, the ballast changes its operating characteristics based upon information received from the remote device. Further, the ballast may provide a path for the remote device to communicate with device other than the adaptive inductive ballast.
Forwarding schemes for cooperative relay groups
A method for communicating data from a source to a destination using a plurality of relay stations in a wireless communication system is provided. The method comprises grouping the plurality of relay stations into at least one relay station group; receiving in a relay station group a subset of data transmitted from the source; sharing information between relay stations in the relay station group for forwarding to the destination the received subset of data transmitted from the source; determining a forwarding scheme for transmitting the received subset of data; and transmitting the received subset of data to the destination using the forwarding scheme.
Antenna network for passive and active signal enhancement
The Present Invention Provides an Antenna Network for Passively or Actively enhancing signal transmission or reception of one or more portable transceiver devices. The antenna network includes one or more antennas, each having a coupling portion and a radiating portion, the coupling portion being distributed across a coupling area and the radiating portion being located away from the coupling area, whereby signal transmission or reception of the one or more portable transceiver devices can occur through the radiating portion when the one or more portable transceiver devices are located within the coupling area.
Tactical radio and radio network with electronic countermeasures
A tactical radio includes a radio frequency (RF) processing module having a receiving component path and a transmitting component path. A signal processing module coupled to the RF processing module includes a jammer detection stage for identifying a type of jamming signal on a channel over which communications signals are received simultaneously. A jammer model stage in the signal processing module produces a waveform model for the jamming signal, and a channel model stage replicates propagation conditions on the channel and produces a corresponding cancellation signal. The cancellation signal is coupled at such a level into the receiving component path so as to cancel the jamming signal from received communications signals at the front end of the radio. Any residual jamming signals may then be removed by a secondary jamming cancellation stage operating at baseband.
Image heating apparatus
An image forming apparatus includes: a heating rotatable member for heating a toner image on a recording material in a heating nip; a pressing rotatable member for forming the heating nip in contact with the heating rotatable member; a first external heater contacting an outer peripheral surface of the heating rotatable member having passed through the heating nip, for heating the outer peripheral surface, the first external heater including a parting layer; and a second external heater for heating the outer peripheral surface heated by the first external heating heater. The second external heater includes a surface parting layer containing an electroconductive agent. The contact angle of the parting layer of the first external heater with respect to water is larger than that of the parting layer of the second external heater, and the surface resistance of the second external heater is lower than that of the first external heater.
Image forming apparatus including pressers configured to press a receptor to image bearers downward in the vertical direction
An image forming apparatus, including: a plural image bearers bearing toner images including a black toner image, which are developed with a two-component developer including a carrier and a toner comprising a binder resin and an additive; a receptor receiving the toner images; plural pressers each pressing the receptor to each of the plural image bearers at a predetermined pressure, wherein the additive has a burial rate X indicated by the following formula not less than 40%: X=(A−B)/A×100 wherein A represents a BET specific surface area (cm2/g) of the toner; and B represents a BET specific surface area (cm2/g) of the toner after buried, and wherein one of the pressers pressing the receptor to the image bearer bearing the black toner image presses the receptor thereto at a pressure lower than those of the other pressers.
Method and apparatus for aligning coupled digital print engines
The adjustment method aligns printing engines in a print assembly that is capable of printing on a receiver to form one or more final prints and includes corrections for cross-track misregistration. These adjustments are made in one embodiment by aligning two or more printing engines in an x and y direction relative to a paper path cross track reference and then aligning each printing engines in a cross track direction (z direction) relative to the paper path cross track reference based on measurements in the cross track direction (z direction) relative to the paper path cross track reference.
Image forming apparatus with a belt unit and a mark sensor
An image forming apparatus with a detachable belt unit and supporting frame are described. The detachable belt unit is positioned in the supporting frame. One or more mark sensors are positioned on the supporting frame and are configured to detect alignment marks deposited on an endless belt of the belt unit.
Developing unit and image forming apparatus having the same
A developing unit and an image forming apparatus having the same. The developing unit includes a controlling unit to restrict a contact position between the charging roller and a photosensitive body, thereby preventing deformation of the charging roller caused when the developing unit is not used for a long period of time.
Process cartridge and image forming apparatus
A process cartridge detachably is mountable to a main assembly of the apparatus of an image forming apparatus including an urging member and a positioning portion. The cartridge includes a photosensitive drum; a positionable portion positioning the cartridge by engaging the positioning portion when the cartridge is mounted to the apparatus; first and second urgable portions being urged respectively, by first and second urging portions of the urging member to urge the positionable portion to the positioning portion during cartridge mounting; and an electrical contact, provided between the first and second urgable portions with respect to a horizontal direction crossing an axis of the drum, for connecting electrically to an electrical contact portion in the urging member, when the cartridge is mounted to the apparatus.
Image forming apparatus and image forming system
An image forming apparatus having a fixing unit fixing a developer image formed based on image data received onto a medium includes a target fixing temperature determination unit, a fixable temperature range computing unit, and a fixing temperature control unit. The target fixing temperature determination unit determines fixing temperature arranged based on the medium as target fixing temperature. The fixable temperature range computing unit computes a fixing temperature range fixable the developer image on the medium by using medium information of the medium while using the target fixing temperature as reference temperature. The fixing temperature control unit controls the fixing unit based on the fixable temperature range computed by the fixable temperature range computing unit.
Image forming apparatus and image forming method
An image forming apparatus includes: an image carrier; a developer carrier configured to supply developer to the image carrier; a power supply unit configured to apply a voltage to the developer carrier; a drive unit configured to rotationally drive the image carrier and developer carrier; a rotation amount determiner configured to determine the amount of rotation of the image carrier or the developer carrier in a predetermined time period; and a drive control unit configured to instruct the drive unit to rotate the image carrier and the developer carrier in a non-printing state, when it is determined that the rotation amount in a printing operation in the predetermined time period was equal to or greater than a threshold.
Power off sequence of image forming apparatus
A first power source unit supplies power to a first control unit accessing a storage unit. An image forming unit controlled by a second control unit is provided with a load for forming an image. A second power source unit supplies power to the load and the storage unit. A switch unit is operated to power on or off an image forming apparatus. The first control unit, upon receiving the status signal instructing power-off, causes the storage unit to shut down and transmits an instruction to cause the load to shut down to the second control unit. The second control unit, if a shutdown instruction is not received even when the status signal instructing power-off has been detected, performs control to stop the load and then stop the supply of power from the second power source unit.
Optical transmission system using raman optical amplification
An optical transmission system using Raman optical amplification, which is configured in a WDM-PON topology where a signal light between an optical line terminal and each of optical network units is multi/demultiplexed at a WDM. The optical line terminal supplies continuous lights having wavelengths to the optical network units through an optical fiber from the optical line terminal. The continuous lights are used for an uplink signal. In addition, the optical line terminal outputs a pumping light having a wavelength which is used to excite lights of the continuous lights, to the optical fiber from the optical line terminal.
Electronic circuit and communication system
An electronic circuit includes: a differential amplifier circuit into which a digital input signal and a reference signal are fed; a feedback circuit outputting an average of amplitude of the input signal; and a peak holding circuit outputting a signal held based on an output signal of the feedback circuit as the reference signal.
High-speed adaptive decision feedback equalizer
A decision-feedback equalizer (DFE) can be operated at higher frequencies when parallelization and pre-computation techniques are employed. Disclosed herein is a DFE design that operates at frequencies above 10 GHz, making it feasible to employ decision feedback equalization in optical transceiver modules. An adaptation technique is also disclosed to maximize communications reliability. The adaptation module can be treated as a straightforward extension of the pre-computation unit. At least some method embodiments include, in each time interval: sampling a signal that is partially compensated by a feedback signal; comparing the sampled signal to a set of thresholds to determine multiple speculative decisions; selecting and outputting one of the speculative decisions based on preceding decisions; and updating a counter if the sampled signal falls within a window proximate to a given threshold. Once a predetermined interval has elapsed, the value accumulated by the counter is used to adjust the given threshold.
Optical communication apparatus, control apparatus, and method for controlling optical output
An optical communication apparatus includes an optical signal transmitter for outputting an optical signal, an optical switch device for switching a route of the optical signal, a drive controller for supplying a drive current for controlling a route switching to the optical switch device, a cooling device for cooling the optical switch device on the basis of a control signal, a temperature controller for transmitting the control signal to the cooling device in order to keep a measured temperature at a specific temperature, where the measured temperature is related to a temperature of the optical switch device.
Optical modulation device
The present invention discloses an optical modulation device, which comprises an electric signal generator generating an electric signal carrying a data signal; a first sinusoidal signal generator generating a first sinusoidal signal; an optical signal generator generating an input source optical signal; and an optoelectronic modulator (Mach-Zehnder modulator) receiving the input source optical signal, the electric signal and the first sinusoidal signal, biased to modify a transmission performance of the input source optical signal, modulating the input source optical signal with the electric signal and the first sinusoidal signal, and then sending out an output source optical signal carrying the electric signal and the first sinusoidal signal. The present invention realizes frequency multiplication, enables an optical signal to carry vector signals, and promotes the efficiency of broadband systems.
LD driver with an improved falling edge of driving signal and optical transmitter providing the same
An LD driver to generate an asymmetrical driving current with a relatively faster falling edge and an optical transmitter having the LD driver are disclosed. The LD driver includes a primary driver and the sub-driver connected in parallel to the primary driver. The primary driver converts the input signal or the delayed signal delayed from the input signal into the primary current. The sub-driver generates a symmetrical current tracing the input or the delayed signal, and an asymmetrical current formed by the OR operation between the input and delayed signals. The driving current is formed by adding the primary current, the symmetrical current and the asymmetrical current.
Agile-beam laser array transmitter
An Agile-Beam Laser Array Transmitter (ABLAT) uses an array of emitters and an array of lenses to project electromagnetic beams over a wide angular coverage area in the far field. Differences in the separation pitches of the two arrays allows the ABLAT to project beams to contiguous and/or overlapping positions, depending on the ratio of the separation pitches and the lens focal length. Compared to other beam steering technology, the ABLAT is a smaller, lighter, and more efficient means of projecting beams over wider angular coverage areas. Various embodiments can be used in any beam steering application, including, but not limited to: free-space optical communications; light detection and ranging (lidar); optical scanning (e.g., retinal or bar-code scanning); display projection; image capture; optical character recognition; scanning laser microscopy; non-destructive testing; printing; facsimiles; map making; web inspection; color print processing; phototypesetting and platemaking; laser marking; material processing; DNA analysis; and drug discovery.
Image capture device with booth
A system for capturing images of an object includes an image capture booth, one or more lights coupled to the image capture booth, a platter coupled to the image capture booth, and a hanger coupled to the image capture booth. The image capture booth includes panels that enclose a space for imaging objects. The lights illuminate at least a portion of the space. The platter and the hanger each support objects for imaging of the objects in the image capture booth.
Heating device for fuel
The present invention relates to a heating device (1) for fuel with at least one PTC heating element (5) and a heat transfer device (6) in thermal contact with the latter, which exhibits two heat transfer elements (7, 7′), and with a tubular casing (2) made of plastic that envelop the heat transfer device (6) and the a least one PTC heating element (5), wherein the diesel fuel to be heated flows through the casing (2) and around the heat transfer device (6) during operation of the heating device (1). Provided on the interior side of the tubular casing (2) is a guiding device that interacts with the at least one PTC heating element (5) and/or the heat transfer device (6) in such a way that at least one PTC heating element (5) and the heat transfer device (6) can be axially inserted into the casing (2) for assembling the heating device (1). Of significance relative to the invention in this case is that a spring system (8, 18) separate from the heat transfer device (6) is provided, which tensions the heat transfer device (6) against the guiding device so as to fix it in place.
Tank withdrawal system with electric and fluidic heating device
The invention relates to a tank withdrawal system for a vehicle tank filled with a frozen liquid. The tank withdrawal system comprises a heating system comprising at least one electric heating element as primary heating device and a conduit system provided with at least one withdrawal conduit with a withdrawal opening arranged in the vehicle tank. The cold start volume of the frozen liquid extending around the withdrawal opening can be melted by the primary heating device. To quickly melt a cold start volume while melting off the remaining frozen liquid consuming as minimal amount of energy, the heating system comprises a secondary heating device supplied with a heating fluid and the conduit system comprises at least one heating conduit through which the heating fluid can flow and which is arranged in the liquid in the vehicle tank.
Recording control apparatus, recording control method, and program
A recording control apparatus for recording new data on a recording medium on which data forming an edit result is recorded for each file. The recording control apparatus includes: a specification section specifying an insert section into which the new data is inserted in the edit result; and when a part of or all of a plurality of the files are included in the insert section, a recording control section recording data out of the new data, as first additional data, corresponding to a section other than a section from a start position of the insert section to the end of a start file being a file including data of the start position into an unrecorded area in which the files are not recorded and recording data other than the first additional data, out of the new data, into a predetermined area of the recording medium.
Signal recording/reproducing method and apparatus, signal record medium and signal transmission/reception method and apparatus
A signal recording/reproducing method and apparatus, signal record medium and signal transmission/reception method and apparatus, whereby a signal recorded on a signal record medium can be identified as being an original signal or a copied signal. A CPU 11 generates, at a pre-set time interval, an identification signal having a meaning at a pre-set time interval, and an identification signal addition circuit 3 adds the identification signal to the video signals and/or the audio signals. A sector forming circuit 5 and circuit components up to a recording/reproducing head 14 record the video signals and/or the audio signals and the ancillary identification signal on an optical disc 12.
Image reproducing apparatus for reproducing images recorded in accordance with different rules and control method therefor
An image reproducing apparatus which reproduces image files stored in a recording medium, comprising: a retrieving unit adapted to separately retrieve for a first image group recorded in accordance with a first file rule and a second image group nonconforming to the first file rule; a determination unit adapted to determine a reproducing order for an image group which has been completely retrieved by the retrieving unit upon discriminating the first image group and the second image group; and a reproducing unit adapted to reproduce an image group for which the reproducing order is determined, wherein the retrieving unit starts retrieving for the second image group when finishing retrieving for the first image group, and the reproducing unit reproduces an image group, which has completely been retrieved by the retrieving unit, in a reproducing order determined by the determination unit.
Optical recording apparatus, optical recording method, and digital still camera
A digital still camera includes a vibration detector for detecting vibrations. In accordance with certain conditions, a control unit controls finalization (session closing) which enables a CD-ROM drive to read data recorded on a recording medium. The control of session closing includes starting session closing after a predetermined period of time elapses since the selection of the execution of session closing. The countdown id displayed to indicate the time remaining before the start of session closing. After the countdown is completed, or when the vibration detector detects vibrations during the countdown until the start of session closing, session closing is not started.
Video and audio processing system, video processing apparatus, audio processing apparatus, output apparatus, and method of controlling the system
A video and audio processing system includes an output apparatus that outputs video data and audio data to be synchronized and reproduced; an audio processing apparatus that receives the video data and the audio data from the output apparatus, supplies at least the video data to a downstream apparatus, and processes the audio data to generate an audio signal to be supplied to a speaker; and a video processing apparatus that receives the video data output from the audio processing apparatus and generates a video signal used for displaying video. The video processing apparatus includes video signal processing means, control means, and determining means for determining a processing time. The video and audio processing system delays the audio signal to be supplied to the speaker so as to be synchronized with the displayed video on the basis of the determination result of the processing time.
Image displaying apparatus, image editing apparatus, image editing system, and method for displaying and editing image using the same
An image displaying apparatus, an image editing apparatus, an image editing system, an image displaying method and an image editing method are disclosed. The image displaying apparatus includes an image processing unit which captures a still image, a communication module which communicates with an external device, and a control unit which controls an edited image to be displayed.
Termination of fiber optic cable
Apparatus and methods provide for cables with secured terminations. For some embodiments, a cable includes an inner tube surrounding an optical fiber, an aluminum tube surrounding the inner tube, and armor tubing surrounding the aluminum tube. The aluminum tube resists collapse of the inner tube at bends in the cable, inhibits or prevents hydrogen from reaching the fiber, and facilitates termination of the cable. For example, terminating the cable may include crimping the armor tubing to deform the aluminum tube into gripping engagement with an outside of the inner tube and an inside of the armor tubing. In some embodiments, a retention assembly secures the fiber relative to the inner tube and includes a retention tube secured to the inner tube and a packing sleeve squeezed into gripping engagement with the fiber by radial inward deformation of the retention tube where the packing sleeve is disposed in the retention tube.
Cable network interconnection system with connector package and cable package
A fiber optic cable network interconnection system for installation in an interconnection apparatus. The system includes a connector package having at least one connector adapter and configured to support a portion of a connectorized cable. The system also includes at least one cable package that includes at least one length of cable and that is configured for storing a portion of the cable on substantially the exterior of the connector package. The cable package is sized to pass through the interconnection apparatus interior from the front opening to the rear opening as the connector package is inserted in the interconnection apparatus. Methods of installing the system in the interconnection apparatus are also disclosed.
Reducing optical loss in reflective optical gratings
An optical device includes a light-transmitting medium on a base. The light-transmitting medium at least partially defines a free propagation region through which light signals travel. A reflective grating is positioned such that light signals can travel through the free propagation region and be received by the optical grating. The optical grating is configured to reflect the received light signal back into the free propagation region. The optical grating reflects the light signals such that light signals associated with different wavelengths separate as the light signals travel through the free propagation region. The portion of the light-transmitting medium that defines the free propagation region has a facet through with the light signals are transmitted. The grating includes a buffer layer between the facet and a reflecting layer that is configured to reflect the light signals received by the grating.
Optical modulator having Mach-Zender arrangement and method to generate modulated optical signal using the same
A semiconductor optical modulator with the Mach-Zender type is disclosed. The optical modulator of the invention cab driven by a single phase signal and reduce the chirping of the modulated light. Two waveguides of the Mach-Zender modulator each including an active layer showing the exciton resonance in the refractive index are connected with a resistor. The driving signal is applied to one of the waveguides, while, the signal is applied to the other waveguide through the resistor where the other waveguide is grounded through a resistor. Adjusting the resistance of two resistors and the amplitude of the applied signal, the Mach-Zender modulator shows a substantial modulation degree with substantially no chirping characteristic.
Image processing device and storage medium storing image processing program
A storage unit stores a plurality of pieces of image information and a plurality of pieces of position information corresponding to respective ones of the plurality of images individually. The storage unit correlates the plurality of pieces of image information with respective ones of the plurality of pieces of position information individually. The plurality of images is displayed on the display based on the plurality of pieces of image information and the plurality of pieces of position information, respectively. An image selection unit selects at least a first image and a second image from the plurality of images. An information interchange unit interchanges first image information of the first image with second image information of the second image, or interchanges first position information of the first image with second position information of the second image. The storage unit stores and correlates the first image information and the second position information, and stores and correlates the second image information and the first position information. A display controlling unit controls the display to display one image based on the first image information and the second position information, and another image based on the second image information and the first position information.
Image measurement apparatus for creating a panoramic image
A measurement processing block obtains a plurality of first images of the object to be measured, taken with very small movements in the imaging area. A feature extraction processing block extracts an approximate feature portion of the object from the first images obtained by the measurement processing block. A partial-image creation processing block creates a plurality of first partial images by grouping the plurality of first images obtained by the measurement processing block in the vicinity of the approximate feature portion extracted by the feature extraction processing block. A super-resolution-image creation processing block creates a super-resolution image from the plurality of first partial images created by the partial-image creation processing block. Thus, detailed features of the object are measured precisely and easily even when the object is located far away.
Image-registration method, medium, and apparatus
An image-registration method, medium, and apparatus obtaining first and second images, generating first and second image pyramids based on the first and second images, respectively, by performing sub-sampling which reduces the length and width of each of the first and second images by half, and determining one of five directions as an optimal movement direction for a current level of the first and second image pyramids based on two images belonging to a corresponding level, updating a motion vector for the current level based on the optimal movement direction for the current level and updating a first image belonging to a level directly below the current level based on the updated motion vector for the current level, wherein the updating comprises updating a motion vector for each of a plurality of levels of the first and second image pyramids in an order from an uppermost level to a lowermost level.
Method of determining the position of a drill hole to be drilled on an ophthalmic lens
Method of determining the position of a target drill hole to be drilled in a target corrective lens having an expected target outline after shaping, the position being determined from a reference lens having a reference outline and at least one reference drill hole, the method includes: acquiring an image and at least one characteristic of the curvature of the reference lens; determining, in the acquisition plane, the reference distance in projection between the projection of a reference anchor point of the associated reference lens and the reference lens and the projection of a reference drilling point of the reference drill hole calculating the three-dimensional reference distance between the reference anchor point and the reference drilling point as a function of the characteristic of the curvature of the reference lens (100) and of the determined reference distance; and determining the position of the target drilling point for the target drill hole of the target corrective lens as a function of the calculated three-dimensional reference distance (R2; R5).
Information processing apparatus, information processing method and information processing program
Disclosed herein is an information processing apparatus for carrying out an information registration process to register preference information of a user for an item determined in advance. The information processing apparatus including: image feature quantity extraction means; an object image feature quantity database; an object image preference information database; matching image detection means; and preference information acquisition means.
Pre-filter for object detection
A method of pre-processing an image to identify processes for subsequent processing of the image, comprising the steps of: a) investigating portions of the image using a spatial filter; b) calculating for a first plurality of regions within a portion of the image under investigation respective metrics as a function of intensity within those regions; c) selecting combinations of regions within the portion of the image under investigation and processing them to obtain a second plurality of filter values, where the second plurality is greater than the first plurality; and d) comparing the filter values with process thresholds for subsequent processes so as to identify subsequent processes that can be skipped.
Electronic apparatus, blur image sorting method, and program
An electronic apparatus includes: an extraction section extracting a subject area having a predetermined feature in an image; a first calculation section calculating a first blur degree indicating a blur degree of the extracted subject area; a second calculation section calculating, when the number of subject areas from which the first blur degree is calculated is one, a second blur degree indicating a blur degree of the entire image based on the first blur degree, and calculating, when the number of subject areas from which the first blur degree is calculated is plural, the second blur degree based on a value obtained by performing weighted averaging on the plural first blur degrees in accordance with dimensions of the plural subject areas; and a sorting section sorting an image having the calculated second blur degree equal to or larger than a predetermined threshold value, as a blur image, from plural images.
Method for video enhancement and computer device using the method
A video enhancement method is disclosed. An input image is retrieved and it is determined whether an enhancement mode is implemented to the input image. If so, motion detection is implemented to the input image that only enhancement coefficients of varied pixels of the input image are recalculated and the enhancement coefficients are updated to an enhancement coefficient table. Based on the enhancement coefficient table, pixel colors of the input image are adjusted and the adjusted image is output.
Image processing apparatus and method, and program
An edge map creation unit detects an edge intensity of an input image in units of three types of blocks having different sizes. An operation parameter adjustment unit sets initial values of an edge reference value and an extraction reference value on the basis of a dynamic range which is a difference between the maximum and minimum values of the edge intensity. An edge point extraction unit extracts an edge point from the input image on the basis of the edge reference value. Until an extraction amount determination unit determines that the edge point extraction amount is appropriate on the basis of the extraction reference value, the operation parameter adjustment unit repeatedly performs a processing of adjusting the edge reference value, and the edge point extraction unit repeatedly performs a processing of extracting the edge point from the input image on the basis of the adjusted edge reference value.
Image signal encoding method and decoding method, information source encoding method and decoding method, apparatuses therefor, programs therefor, and storage media which store the programs to process gaussian integer signal
An information source encoding method for encoding a Gaussian integer signal includes the steps of: inputting a signal value sequence of a Gaussian integer signal as an encoding target; transforming signal values included in the input signal value sequence into integer pairs, each having two integers, arranged in the input order; regarding each of the integer pairs as a lattice point on two-dimensional coordinates, and obtaining integer values greater than or equal to zero by performing a two-dimensional-to-one-dimensional mapping in which the shorter the distance from each lattice point to the origin, the smaller the value assigned to the lattice point by the mapping; and encoding the integer values using codes which are used for encoding an information source that follows an exponential distribution.
Methods and apparatus to perform multi-focal plane image acquisition and compression
Example methods and apparatus to perform multi-focal plane image acquisition and compression are disclosed. A disclosed example method includes capturing a first image of a portion of an object at a first focal plane and at a first resolution, computing a contrast metric for the captured first image, comparing the contrast metric to a threshold to determine whether to capture a second image of the portion of the object at the first focal plane and at a second resolution, wherein the second resolution is different from the first resolution, capturing the second image of the portion of the object at the first focal plane and at the second resolution, and storing a first representation of the second image in a file, the file containing a second representation of the portion of the object at a second focal plane, wherein the second representation is at the first resolution.
Method and system for low complexity transcoding of images with near optimal quality
Method and system for low complexity transcoding of images with near optimal quality for display on a terminal are presented. Generating effective transcoding parameters prior to transcoding and retrieving the transcoding parameters based on the features of the input image and the characteristics of the terminal, an output image quality close to that produced by optimal quality transcoding is achieved. The processing time is much smaller in comparison to that required for optimal quality transcoding.
Image processing apparatus, control method for image processing apparatus, program, and storage medium
When an original image containing a code image is lossy-compressed, the image quality of the code image is deteriorated. Thus, due to the deterioration of the image quality of the code image, information contained in the code image cannot be acquired. Thus, a portion corresponding to the code image is not lossy compressed, and the portion corresponding to the code image, which has not been subjected to lossy compression, is stored in a storage unit.
Image processing device and image processing method in image processing device for identifying features in an image
A plurality of images inputted in an image signal input portion are divided into a plurality of regions by an image dividing portion, and a feature value in each of the plurality of regions is calculated by a feature value calculation portion and divided into a plurality of subsets by a subset generation portion. On the other hand, a cluster classifying portion classifies a plurality of clusters generated in a feature space into any one of a plurality of classes on the basis of the feature value and occurrence frequency of the feature value. And a classification criterion calculation portion calculates a criterion of classification for classifying images included in one subset on the basis of a distribution state of the feature value in the feature space of each of the images included in the one subset.
Information processing apparatus and method, and program
An information processing apparatus includes a first classification unit configured to set each of pixels forming a first image as a pixel of interest and classify the pixels of interest into one of a plurality of provided classes of a first type in accordance with a predetermined rule; a feature amount generation unit configured to generate a shifted waveform whose phase is shifted with respect to a waveform of the first image containing the pixels of interest and configured to generate a feature amount; a second classification unit configured to be provided with a plurality of classes of a second type in accordance with the feature amount for each of the plurality of classes of the first type and configured to classify the pixels of interest; and a prediction calculation unit configured to predictively calculate pixels forming a second image.
Categorization of digital media based on media characteristics
Digital media categorization can include receiving information including a plurality of media objects and a metadata tag descriptive of at least a first media object; comparing the first media object with a second media object; and selectively associating the first media object's metadata tag with the second media object based on a result of the comparison. Each media object can include a digital image.
De-ringing operation for image processing
De-ringing operation for image processing. A selective image processing means is presented herein by which high frequency content is preserved while also eliminating ringing within digital images, and this is achieved without introducing aliasing. Based on the analysis of neighboring pixels, one or more of multiple filter modules and/or multiple image filtering/rocessing means is/are selectively applied to generate an output sample for a given pixel location. Two measures (e.g., local activity (LA) and edge strength (ES)) are calculated based on processing at least two different groups of pixels near a desired output sample. One of these groups of pixels may be a subset of another of the groups of pixels. By analyzing these two measures (e.g., LA and ES), selective processing of pixels near the desired output location ensures that high frequency content within the digital image is preserved with substantially reduced and/or eliminated ringing therein.
Image processing apparatus, image processing method, and computer program
An input image is divided into a plurality of regions, and it is determined whether each of the divided regions is suitable for thinning processing. In accordance with a result of the determination, an outlining processing is selected to generate outline data (vector data) for each of the regions. The generated outline data is output. For example, a character region and a drawing region are discriminated from each other and outline data having a format suitable for a discriminated type of region is generated. In addition, generation of outline data (vector data) which pass through a center line of the line drawing or generation of outline data (vector data) indicating a contour of a drawing is automatically selected. Furthermore, in accordance with the size of a character, function-approximation processing may be selected.
Methods and systems for connected-component labeling
Aspects of the present invention are related to systems and methods for connected-component labeling.
Information storage medium storing graphic data and apparatus and method of processing the graphic data
An information storage medium including graphic data and presentation information, and an apparatus and method of processing the graphic data are provided. The information storage medium includes the graphic data, page composition information which defines page composition of the graphic data, and the presentation information indicating when graphic screen data, which is composed with reference to the page composition information of the graphic data, is output to a display screen. Therefore, a graphic object is reusable in graphic data processing, and accordingly, a time taken to process the graphic data is reducible and memory area may be saved.
Image processing method, image processing apparatus, and program
Every time clustering processing for a predetermined number of pixels is complete, a small cluster having the number of allocated pixels, which is equal to or smaller than a pixel count threshold, is discriminated. The small cluster, which is discriminated to have the number of allocated pixels equal to or smaller than the pixel count threshold, is merged to a cluster having the nearest representative feature vector. With this arrangement, the number of clusters which are to undergo distance calculations of feature vectors is reduced. According to this arrangement, region segmentation of an image can be executed faster by the clustering processing.
Methods for segmenting objects in images
A method for segmenting a digital image into a plurality of target objects, comprising, generating a plurality of probability maps of the image, wherein each probability map is derived from a different segmentation classifier; generating a combined probability map based on the plurality of probability maps; mapping a plurality of image points based on one or more local object maxima; applying one or more object constraints based at least in part on the mapped points to identify local object information; applying one or more regional thresholds to the combined probability map, given the local object information and a background mask, to segment the image into regions; creating a segmented image at least in part by merging the segmented regions with corresponding local object maxima; and at least temporarily storing or displaying the segmented image on a digital device.
System and method of generating color correction matrix for an image sensor
A system and method of generating a color correction matrix (CCM) for an image sensor are disclosed. Quantum efficiency (QE) spectra of pixels of the image sensor illuminated by a physical light source are measured. Subsequently, color values of the image sensor and color values in a predetermined color space are determined according to the QE spectra and predetermined reference data essential for deriving the color values. Finally, the CCM for the image sensor is generated by applying a fitting algorithm on the color values of the image sensor and the color values in the predetermined color space.
Non-linear tone mapping apparatus and method and computer readable medium stored thereon computer executable instructions for performing the method
The present invention provides non-linear tone mapping apparatus and method and a computer readable medium stored thereon computer executable instructions for performing the method. The non-linear tone mapping apparatus according to the present invention comprises a luminance value computing unit for computing a luminance value of each pixel of an object image using an image information of each pixel; a computing unit for computing a light adaptive value of each pixel using the image information and luminance value of each pixel, the light adaptive value representing the degree of response to brightness of the image in the image information of each pixel; and a converting unit for converting the image information of each pixel of the object image using a ratio of the image information of each pixel to the light adaptive value.
Method for statistical analysis of images for automatic white balance of color channel gains for image sensors
A process for performing white balancing of an image is performed by subdividing an image into a plurality of subframes, and then analyzing each subframe to determine if that subframe is predominantly monochromatic other than gray. If so, that subframe is excluded from the computation of the gain adjustments in the white balancing operation. As a result, the white balance process is performed using only the multicolored and/or gray subframes, thus allowing the overall white-balance of the image to be shifted only when a change in the color average is due to a change in the spectra of illumination, and not a presence of large monochromatic areas in the image.
Automatic red-eye object classification in digital photographic images
Automatic red-eye object classification in digital photographic images. A method for classifying a candidate red-eye object in a digital photographic image includes several acts. First, a candidate red-eye object in a digital photographic image is selected. Next, RGB pixels of the candidate red-eye object are converted into YUV pixels. Then, the YUV pixels satisfying a constraint that is a function of the YUV pixels are summed. Next, the sum is determined to be greater than or equal to a scaled version of the total number of YUV pixels in the candidate red-eye object. Finally, the candidate red-eye object is transformed into a true red-eye object.
Tracker component for behavioral recognition system
A tracker component for a computer vision engine of a machine-learning based behavior-recognition system is disclosed. The behavior-recognition system may be configured to learn, identify, and recognize patterns of behavior by observing a video stream (i.e., a sequence of individual video frames). The tracker component may be configured to track objects depicted in the sequence of video frames and to generate, search, match, and update computational models of such objects.
Process control method, data registration program, and method for manufacturing electronic device
A process control method and data registration program for a surface mount line includes retrieving printing quality data, mounting quality data, and soldering pass/fail data from a primary recorder, recording the printing quality data, the mounting quality data, and the soldering pass/fail data for each of the components in a secondary recorder, and determining whether the solder printer and the mounter need adjustment by using the data of the components which are associated with the soldering pass/fail data recorded in the secondary recorder by a computer.
Couch positioning system for radiotherapy, treatment plan unit, and couch positioning unit
An object of the present invention is to easily maintain the couch positioning accuracy and reduce the couch positioning time while resolving the complexity of input operations by the operator at the time of couch positioning. To accomplish the above object, calculation points are set to a CT image at the time of treatment planning, and the 3D coordinates of the set calculation point are set to a DRR image. When a couch positioning unit 115 loads the DRR image from an image server 109, it reads the coordinates of calculation points set to the DRR image and displays them on the monitor 116 together with the DRR image. Further, when DR image data is loaded into the couch positioning unit 115, the DR image is displayed on the monitor 116 and calculation points set to the DRR image are set also to the DR image.
Adaptive image processing and display for digital and computed radiography images
The presently described technology provides a method for adaptive image processing. The image processing method includes determining an entrance exposure of an object, determining an exit exposure of the object, and determining one or more image processing parameters based at least in part on the entrance and exit exposures. The presently described technology also provides a method for adaptive image display. The image display method includes determining an entrance exposure of an object, determining an exit exposure of the object, and displaying an attenuation map based at least in part on the entrance and exit exposures.
Method and device for determining a similarity value between minutiae templates
Embodiment of the invention provide a method and a device for determining a similarity value between a first template and a second template. A first cluster characteristic for each first cluster of a plurality of first clusters is determined, wherein each first cluster includes a plurality of first minutiae comprised in the first minutiae template. A second cluster characteristic for each second cluster of a plurality of second clusters is determined, wherein each second cluster includes a plurality of second minutiae comprised in the second minutiae template. The similarity value between the first minutiae template and the second minutiae template is determined based on the first cluster characteristics and the second cluster characteristics.
Apparatus for distinguishing forged fingerprint and method thereof
An apparatus for distinguishing forged fingerprint and a method thereof are disclosed. A different threshold angle for total reflection is applied when forged fingerprint is touched on a fingerprint input surface of a prism, and the forged fingerprint distinguishing apparatus and method use the above fact. Accordingly, using a separate light source, from which a ray of light is emitted with a light axis at a predetermined range of incident angle, acquired fingerprint image is compared and it is determined whether the fingerprint image corresponds to authentic fingerprint or forged one.
Image processing apparatus
According to an image processing apparatus of an aspect of the present invention, when an image is transmitted, a face image of a person whose privacy is guarded is automatically masked, or information of an area to be masked is transferred to an external device with an image, so that an image in which the privacy is guarded without a user operation can be transmitted to an external device.
Real-time face recognition-based selective recording apparatus and method
Provided are a real-time face recognition-based selective recording apparatus and method. The apparatus includes a face recognition unit which recognizes a face of a person in a decompressed input image frame; a recording position setting unit which sets one of an image frame in which the person appears and a scene change start frame including the image frame as a valid recording point if the recognized face is detected for a predetermined period of time or detected a predetermined number of times, and identifies a position, which corresponds to a set image frame, in an image compression stream; and a recording unit which records the image compression stream from the identified position and storing the recorded image compression stream in real time.
Personal authentication apparatus and method
There is provided a finger-vein authentication apparatus including a light source for illuminating one surface of both side-surfaces of a fingertip of a finger with light, and an image sensor for imaging the other surface of the fingertip, the light source and the image sensor being positioned at both sides of a nail of the fingertip with the nail sandwiched therebetween, wherein a fingertip guidance jig for supporting the fingertip and a finger-root guidance jig for supporting a finger-root of the finger are disposed between the light source and the image sensor, a light-shielding unit being disposed on the light-source side, the light-shielding unit being used for shielding the illumination light such that the illumination light will not travel to a ball side of the finger.
Remote sensing and probabilistic sampling based forest inventory method
A remote sensing and probabilistic sampling based forest inventory method can correlate aerial data, such as LiDAR, CIR, and/or Hyperspectral data with actual sampled and measured ground data to facilitate obtainment, e.g., prediction, of a more accurate forest inventory. The resulting inventory can represent an empirical description of the height, DBH and species of every tree within the sample area. The use of probabilistic sampling methods can greatly improve the accuracy and reliability of the forest inventory.
Method for decomposition and rendering of video content and user interface for operating the method thereof
A method for decomposition and rendering of video content and user interface for operating the method thereof is disclosed. First, a plurality of target shots are recognized from a video, the video is decomposed into a plurality of video units based on the playtime of each target shot. Then, the video frame of target shot is decomposed into a background scene and at least one foreground object. The editing process is performed on the background to generate the plentiful visual effect. The video content of each video unit is known by analyzing the information of the foreground object, and therefore each video unit can be annotated. Furthermore, the user interface reintegrates the foreground object in the background scene and generates the customized video content according to users' request, so that viewers may get more enjoyment on game watching.
Person/object image and screening
A first set of unknown pixels is determined for which being located in the foreground portion does not in-and-of-itself determine the pixel to be part of the foreground. A second set of unknown pixels is determined for which being in a current background portion does not in-and-of-itself determine the pixel to be part of the background. A determination is made for the first and second set of unknown pixels whether the pixel is part of the background or foreground based on temporal data. Extracting an image of the foreground that does not include the current background based on the determination of whether the pixel is part of the foreground, the current background, and temporal data. In an embodiment, the system can use multiple types of sensors to determine whether an entity is a likely security risk.
Data adaptive message embedding for visible watermarking
A watermarking system uses distinct bit patterns to identify a logic 0, a logic 1, and a marker bit, which demarcates segments of logic bit information. Marker bits, which are printed on both foreground and background areas of an image, outline message blocks. In message extraction, a preprocessing step removes any white boarders, identifies the best defined corner of a message block, crops the image, and rotates the image to place the identified corner at the top-left corner. Message extraction scans the rotated image in window segments of increasing size during multiple cycles. During each cycle, if a bit pattern cannot be identified as a data bit, then the size of the examined bit area is increased and rechecked to see it specifically is a marker bit. If no bit information can be definitively identified, then it is assigned a logic bit value based on a 50% random assignment.
System and method for temperature data acquisition
A system and method is disclosed for acquiring temperature data from a plurality of features in a chamber including capturing a first image of an interior area of the chamber, capturing a second image of the interior area of the chamber, identifying a plurality of features within the data for the first image and the data for the second image, generating an interior area representation based on the first image data, the second image data, and the identification of each feature of the plurality of features in the interior area, and correlating the interior area representation to temperature information related to the interior area.
Apparatus and method of suppressing deterioration of document having encoded data
An image processing apparatus includes an arrangement unit and a restriction unit. The arrangement unit puts images representing codes of an object code string in areas of an object image. The areas correspond to positions of the codes in the object code string. If a first code string and a second code string associated with the first code string are present in the object code string in a certain positional relationship and if satisfied is a condition regarding whether or not codes of the first code string are decodable by a decoder from an image obtained by putting the code images representing the codes of the first code string, which is present in the object code string, the restriction unit restricts the arrangement unit from putting images representing respective codes of the second code string, which is present in the object code string, in the object image.
Blind wavelet-based watermarking method
A blind wavelet-based watermarking method is provided to extract one or more embedded watermarks form one or more high subbands of a watermarked image generated by 1-level or 2 level wavelet transform. One or more least-mean-square (LMS) filters are trained to predict the data sets in the high subbands of an original image by converting a low subband of the watermarked image. Therefore, the one or more embedded watermarks could be extracted by comparing the predicted data sets in the high subbands with data sets in corresponding subbands of the watermarked image.
Micro-speaker and method for manufacturing same
A method of soldering terminals of a micro-speaker on a circuit board comprises the following steps. Firstly, providing a circuit board having a pair of through holes passing therethrough, and two soldering sections defined surrounding the pair of through holes. Secondly, the soldering sections are plated with soldering tin. Thirdly, providing a pair of columned terminals, the terminal includes an upper portion, a low portion and a body connecting between the upper portion and the low portion. Fourthly, the low portion of the terminal is inserted into the corresponding through hole and the body is resisted on the soldering section. Fifthly, the soldering tin is heated to solder the body on the soldering tin. Finally, the upper portion of the terminal is soldered onto the corresponding end of the voice coil. As a result, soldering defective can be reduced.
Speaker diaphragm and speaker including the same
A speaker diaphragm includes a thermoplastic resin having a three-layer structure. The three-layer structure includes a polyester film as a base material of the three-layer structure, a polyimide-based resin layer as a top layer of the three-layer structure, and another polyimide-based resin layer as a bottom layer of the three-layer structure.
Low profile greeting card speaker
A low profile miniature speaker configured for use in greeting cards such as sound generating greeting cards and other novelties. The thickness of the speaker is minimized while maintaining the sound quality and increasing strength. The speaker magnet is counter-sunk into the housing of the speaker, thereby decreasing overall thickness. The speaker is configured with concentric ribs that radiate outward from the center of the circular speaker. The ribs reinforce the plastic housing and increase the structural strength of the speaker.
Fabric bag including control device
A fabric bag for holding an audio playback device. The fabric bag includes a control device constructed substantially in fabric for controlling an audio playback device. The control device comprises a control portion having indicated regions thereon. The indicated regions are responsive to individually applied manual presses so as to control discrete operations of said audio playback device, and the control portion, including the indicated regions, is responsive to manually applied strokes or gestures so as to control variable operations of the audio playback device.
System and method for enhancing the inductive coupling between a hearing aid operating in telecoil mode and a communication device
A method and system to optimize the relative position of an inductive field of a hearing aid compatible device and a telecoil of a hearing assistive device, are provided. A Steerable Hearing Aid Compatible Device (SHAD) has a steerable inductive field for locating an inductive field in accordance with the location of a telecoil in the hearing assistive device. A Telecoil Hearing Assistive Device (THAD) has a telecoil and telecoil orientation tag. The location of the telecoil of the THAD is determined with respect to a reference system and this telecoil location information is stored on the telecoil orientation tag as Telecoil Location Information (TLI) and provided to the SHAD. In an exemplary embodiment the telecoil orientation tag may be an RFID tag that is read by a tag reader of the SHAD. The SHAD receives the TLI and generates an inductive field in accordance with the TLI, such as a position that is parallel to the telecoil of the THAD.
Hearing aid system with a low power wireless link between a hearing instrument and a telephone
The invention relates to wireless communication between listening devices, in particular to a hearing aid system comprising a hearing instrument and a telephone apparatus. The invention further relates to a method of receiving a telephone call and to the use of a hearing aid system. The object of the present invention is to provide a relatively simple, reliable scheme for receiving a telephone call in a hearing instrument. The problem is solved in that the telephone apparatus comprises a transmitter for establishing a short range digital, low-power link to a hearing instrument comprising a corresponding receiver. This has the advantage of providing a relatively simple and low power solution, where at least the incoming part of a telephone conversation is wirelessly transmitted via a low-power link. The invention may e.g. be used for the communication between a hearing instrument and a telephone, where a standard wireless interface for local connectivity, such as a Bluetooth interface, is not technically feasible or not available for other reasons.
Hearing device and method for a wireless receiving and/or sending of data
The present invention is related in particular to means for a wireless communication to and from a hearing device (10) comprising a first portion (12) adapted for being arranged at a user and for providing a signal, an output transducer (18) for converting said signal to an acoustic output and a second portion (14) adapted for being arranged in an ear canal of said user and for providing said acoustic output to said user and further related to a method for a wireless receiving and/or sending of data in a hearing device (10). In order to provide such a hearing device (10) with sufficient characteristics regarding the ability to send and/or receive data in a wireless manner using desired frequencies without a need for additional external antenna solutions or for a size not meeting the current requirements of smallness for hearing devices a hearing device (10) it is proposed, further comprising a coupling element (16) coupling said first portion (12) and said second portion (14), an antenna, and a wireless interface (22) for receiving and/or sending data by means of said antenna, wherein said coupling element (16) comprises an electrically conducting element (24) coupled to said wireless interface (22), wherein said electrically conducting element (24) is at least a part of said antenna. A corresponding method and use of a hearing device is also proposed.
A thermoacoustic device includes a first electrode, a second electrode and a sound wave generator. The first electrode includes a first electrical conductor and a first conductive adhesive layer located on the first electrical conductor. The second electrode includes a second electrical conductor and a second conductive adhesive layer located on the second electrical conductor. The sound wave generator includes a carbon nanotube structure, and the sound wave generator is electrically connected to the first electrical conductor and the second electrical conductor via the first and second conductive adhesive layers. The adhesive layers permeate into the carbon nanotube structure.
Perceptually weighted digital audio level compression
The level of an audio signal can be compressed by receiving an input audio signal, determining a measure of loudness of the signal using a perceptually derived filter, determining a target gain amount, determining a current gain amount using piecewise linear attack/release logic, and producing an output audio signal by adjusting the input audio signal by the current gain amount. An audio compression filter for compressing the level of audio can comprise a loudness measuring module configured to determine a measure of loudness using a perceptually derived filter, and a compression module configured to determine a target gain amount, determine a current gain amount using piecewise linear attack/release logic, and adjust an input audio signal by the current gain amount. Audio level compression can be implemented using integer calculations.
De-pop circuit and an associated audio system
A de-pop circuit adaptable to an audio circuit is disclosed. A high-pass filter generates a high-pass output signal according to an output signal of the audio circuit. A blockage circuit receives the high-pass output signal and a control signal, and generates an enable signal to activate the audio circuit according to the control signal and the high-pass output signal.
Audible feedback of machine load
A sensor is provided in a machine having a continuously variable transmission, for example, and the amount of force exerted by the machine against a load is sensed. Based on the sensed power, an appropriate audio signal is generated which simulates the sounds an operator would expect to hear when such force is applied with a machine having a conventional geared transmission. The sounds can include engine noises, as well as sounds associated with the flow of oil or other hydraulic fluids. In addition, the sounds can be generated from digitally pre-recorded audible data, or can be output based on calculated audible data. User controls are also provided to adjust the volume and frequency or pitch of the generated sounds.
Techniques for presenting sound effects on a portable media player
Improved techniques for presenting sound effects at a portable media device are disclosed. The sound effects can be output as audio sounds to an internal speaker, an external speaker, or both. In addition, the audio sounds for the sound effects can be output together with other audio sounds pertaining to media assets (e.g., audio tracks being played). In one embodiment, the sound effects can serve to provide auditory feedback to a user of the portable media device. A user interface can facilitate a user's selection of sound effect usages, types or characteristics.
Method and apparatus for determining a modeled room impulse response
A method of modeling a room impulse response according to an embodiment of the invention includes receiving a sound pressure signal that is obtained by a microphone when an impulse-type sound source is excited and detecting a room impulse response; determining boundaries between a plurality of intervals of the room impulse response such that the room impulse response is divided into the plurality of intervals on a time domain; and modeling the room impulse response for each of the plurality of divided intervals using at least two different modeling schemes.
Redundant key server encryption environment
Provided are a computer program product, system and method for a redundant key server encryption environment. A key server transmits public keys associated with the key server and at least one device to at least one remote key server. The key server receives from the at least one remote key server public keys associated with the at least one remote key server. The key server receives a request for an encryption key from a requesting device comprising one of the at least one device and generates the encryption key for use by the requesting device to unlock a storage. The key server generates a first wrapped encryption key by encrypting the encryption key with a requesting device public key associated with the requesting device. The key server generates a second wrapped encryption key by encrypting the encryption key with a public key associated with the key server. At least one additional wrapped encryption key is generated for each of the at least one remote key server by encrypting the encryption key with the at least one public key provided by the at least one remote key server. The key server transmits the first, second and the at least one additional wrapped encryption key to the requesting device.
Distributed information generation apparatus, reconstruction apparatus, reconstruction result verification apparatus, and secret information distribution system, method, and program
Disclosed is a distributed information generation apparatus which generates a polynomial F in which secret information s is embedded to output distributed secret information, generates a polynomial G in which an output when a fixed value t is entered into the polynomial F is embedded as the secret information, and generates distributed distributed secret information. The reconstruction apparatus receives k sets of the distributed secret information to generate a polynomial F′, and receives k sets of the distributed distributed secret information to generate a polynomial G′. When a value embedded in the polynomial G′ as the secret information and an output obtained by entering the fixed value into the polynomial F′ is equal, the distributed information generation apparatus outputs the embedded value. When the embedded value is not equal to the output, the distributed information generation apparatus outputs information indicating detection of cheating.
Method of embedding a digital watermark in a useful signal
Method of embedding a digital watermark in a useful signal, wherein a watermark bit sequence is embedded into the frequency domain of the useful signal using adaptive frequency modulation of two given frequencies by tracking amplitudes of the chosen frequencies of the original signal and modifying them according to the current bit of watermark bit sequence.
Service providing apparatus and server providing method
In service providing apparatus and method, system identification data for specifying a service target device and the user of the device concerned are issued to the device concerned, and authentication processing is carried out on the basis of the system identification data to provide a service to the device concerned.
Information processing unit, terminal unit, information processing method, key generation method and program
There is provided an information processing unit enabling reduction of the number of keys to be held by a terminal unit and the amount of calculations necessary for decryption of encrypted data. The information processing unit configures an entire binary tree made up of n-number of leaf nodes, a root node and a plurality of intermediate nodes different from the root node and the leaf nodes and divides the entire tree into a plurality of base subtrees including n1/y number of leaf nodes to form a y-level (y is a divisor of log(n)) hierarchical structure, such that root nodes of the base subtrees at a lower level coincide with leaf nodes of the base subtree at an upper level. Further, it assigns subsets of the terminal units to nodes of the respective base subtrees and generates directed graphs where directed edges connecting coordinate points on a coordinate axis are set.
Methods of scrambling and descrambling units of data
A method of scrambling a stream of data includes obtaining from the stream a succession of first sequences of blocks of data. The order of the blocks is reversed in each of the first sequences of blocks to form respective second sequences of blocks of data. The blocks in each second sequence of blocks are encrypted using a cipher in block chaining mode, initialized with a respective initialization vector for each second sequence of blocks. For a succession of first sequences of blocks included in a unit of data within the stream, at least one initialization vector for encrypting a second sequence of blocks formed from a first sequence of blocks in the unit is generated in dependence on at least one block in a preceding first sequence of blocks of the unit.
Method and device for processing data
The embodiments provides a method for processing data. According to the invention, an elliptic curve with an order m which corresponds to a product of a first cofactor c and a prime number q is provided, wherein the order (q−1) of the multiplicative group of the prime number q corresponds to a product of a second cofactor I and at least two prime divisors s1, . . . , sk, wherein the at least two prime divisors s1, . . . , sk are each greater than a predetermined bound of 2n; and a chosen method is applied to provided data using the provided elliptic curve for providing cryptographically transformed data. The invention enables cryptographically transformed data to be provided while simultaneously minimizing the probability of a successful attack.
Computing isogenies between genus-2 curves for cryptography
This cryptographic curve generation technique provides a faster way of constructing a genus 2 curve. The technique provides a procedure to compute isogenies between genus 2 curves over finite fields. Instead of looping over possible roots, as is typically done when solving Igusa class polynomials, the technique only finds one root and then applies the isogenies to find the others. The technique computes a set of polynomials that define all isogenies. To do this, for a given root of an Igusa class polynomial over a finite field, the technique computes a value of a small modular function ƒ. To the value of this function ƒ, the technique applies an isogeny to find an isogenous ƒ-value. The technique then transforms the ƒ-value back into an Igusa value. Once the Igusa class polynomials are solved they can be used to generate a genus 2 curve which can be used in cryptographic applications.
AES core with independent inputs and outputs
Encrypting data using the Advanced Encryption Standard (AES) algorithm uses pipelined registers to perform the AES processing. Any number of registers (two or more) each holds a block of plaintext data. A multiplexer accepts one block of data at a time and feeds it into the pipeline processing unit. The processing unit performs a round of encryption upon the block. A key round generator generates a set of round keys for the pipeline processing unit using a cipher key and the set of round keys are stored in parallel in memory devices, each memory device corresponding to one of the registers. The pipeline processing unit receives the correct round key for each round of encryption from the memory device corresponding to the block of data being encrypted by the add round key unit at that time. A read counter (one per register) indexes one of the round keys in the appropriate memory device thus enabling the indexed round key to be input to the pipeline processing unit for the appropriate round and block.
Cooperative MIMO for alien noise cancellation (COMAC) for upstream VDSL systems
Included are embodiments for reducing alien crosstalk. At least one embodiment of a method includes receiving noise data associated with a first user signal on a first tone, receiving noise data associated with a second user signal on the first tone, and receiving at least one alien crosstalk canceller coefficient for the first user on the first tone. Some embodiments include applying the at least one alien crosstalk canceller coefficient to the second user signal to reduce alien crosstalk for the first user signal.
System and method for telephone based noise cancellation
A system and method for enhancing communications through a phone. A voice communication is received from a user of the phone. A secondary signal is received from an environment in proximity to the phone. The secondary signal is processed to determine an inverse signal in response to receiving the secondary signal. The inverse signal is combined with the voice communication and the secondary signal to destructively interfere with the secondary signal for allowing a receiving party to more effectively communicate with the user.
Communication terminal apparatus and image forming apparatus
A communication terminal apparatus capable of registering sender's e-mail addresses upon receiving e-mails including the e-mail address registration instruction information in the subject. The communication terminal apparatus relieves users from the cumbersome task of manually inputting the recipient's e-mail address to the e-mail address storage unit 17 and achieves simple e-mail address registration process in a shorter time. The communication terminal apparatus includes the subject determination unit 16 for detecting the e-mail address registration instruction information from a received e-mail, the e-mail parser 13 for acquiring the sender's e-mail address from the received e-mail, and the sender's e-mail address registration unit 18 for registering the sender's e-mail address of the received e-mail with the e-mail address storage unit 17 where the subject determination unit 16 detects the e-mail address registration instruction information.
Communication control method, communication system and communication controller
The same number is redundantly set as the extension number associated to a fourth telephone number in different data tables associated to different second telephone numbers. For this reason, it is possible to maintain outstanding scalability of the system in a situation where the total number of settable numbers is limited. Further, even if an outgoing call is made to a caller side terminal from a lost receiver side terminal using the call register, the receiver number is recognized to be either an extension number associated to a fourth telephone number or an extension number associated to a fifth telephone number, and an instruction to disconnect a first call is sent to the call controller. As a result, the above-mentioned outgoing call (first call) from the lost receiver side terminal is disconnected, thereby making it possible to fully ensure security when a terminal is lost.
Changing assigned priority of active voice or data session
An active call between two parties can be established as a call having priority over other users in a tiered priority system. Changes to the level of priority are permitted if made by an authorized user in attendance on the active call. The change of call priority can be to either raise or lower the priority based on call circumstances. If approved, the new active call priority level is propagated to other nodes and switches so that system knowledge of the new priority level is consistent. The new priority level is reset to the pre-established call priority level after the active call is completed.
Selective unblocking of caller ID based on security level
A system for selectively blocking and unblocking the sending of outgoing caller ID information from a communication device comprises a communication device, a processor coupled to the communication device and a storage medium coupled to the processor containing a directory of information entries. The information entries include both telephone numbers and associated security levels. When a call is placed to a number using the communication device, the processor seeks the number in the directory of the storage medium. If an entry is found for the number by the processor, caller ID information is prevented from being sent to the number unless a security level associated with the number is at or above a predefined cut-off level.
Method and telecommunications system for transmitting a facsimile message
A method and system for transmitting a facsimile message uses a public-switched telecommunications network, the public-switched telecommunication network having a messaging platform capable of storing a plurality of facsimile messages. The initiation of a telephone call to a destination is detected, the content of the call including the facsimile message. If the destination is available at a first time to receive a telephone call, the facsimile message is transmitted. The facsimile message may be stored on the messaging platform only if the destination is unavailable at the first time, or every time a telephone call is initiated by the originating party. The method also provides for situations where a telephone call is redirected, where an inter-NPA seven digit dialing case has occurred, and where “busy” or “no_answer” triggers are implemented. If the facsimile message was stored, the facsimile message is transmitted at a second time if the destination is available.
Method and apparatus for establishing data link based on audio connection
In a communications system, after parties form a voice telephone connection, the parties respective communications devices automatically create or leverage machine readable features or content of the telephone connection to identify the parties to each other or to a rendezvous server, and thereafter the communications devices and/or the rendezvous server automatically establishes a data link between the parties.
Secure feature access from an off-PBX telephone
A security plan for telephone clients allows the client to authenticate itself by sending a coded sequence of DTMF digits to a PBX at the beginning of each call. When the idle client telephone receives a call, it sends a coded DTMF sequence to the PBX. If the client makes a feature invoking call to the PBX while active on the first call, the client will be prompted for the security sequence. The client must send the same sequence of DTMF digits as for the first call. The first call is authenticated by virtue of being a call from the PBX to the telephone. The second call is authenticated by sending a DTMF sequence that matches the one sent with the first call. A call that fails authentication is dropped. The security plan for clients constrains the client to using a callback to originate a call from an idle telephone.
Call processing in a voicemail system
A system that incorporates teachings of the present disclosure may include, for example, a method that involves receiving an indication that communications with a subscriber have been interrupted while engaged in voicemail processing, and recording a pointer to a last state of voicemail processing. Additional embodiments are disclosed.
Information processing terminal device and method for notifying missed call or unread E-mail
An information processing terminal device includes a state monitoring unit that monitors whether or not there exits an unread e-mail or a missed call, a light order control unit that makes an emitting unit emit a color corresponding to each sender in a given order when the unread e-mail or the missed call is detected, where a light order control unit determines a light order of the colors according to a receiving order of the unread e-mail or an incoming order of the missed call.
Highlighting of voice message transcripts
A computer-implemented voice mail method includes obtaining an electronic audio file of a recorded user message directed to a telephone user, automatically generating a transcript of the recorded user message, and identifying locations in the transcript in coordination with timestamps in the recorded user message so that successive portions of the transcript can be highlighted in coordination with playing of the recorded user message. The method also include identifying one or characteristics of the message using meta data relating to the recorded user message, and storing the recorded user message and information about the identified locations of the recorded user message.
Telephonic recording system and method
A telephonic recording method comprises recording, by an electronic device, a live conversation with at least one participant to form a recorded live conversation. The telephonic recording method further comprises presenting a portion of the recorded live conversation beginning at a segment selected by a user while continuing to record the live conversation.
Method and apparatus for emergency call processing
In one embodiment of the invention, a number of transport protocol streams are established between a signaling session border controller (S-SBC) and a data session border controller (D-SBC). A subset of the number of transport protocol streams are dedicated for carrying messages for emergency calls. Upon receiving an emergency call, the S-SBC transmits an add request message to the D-SBC over one of the streams dedicated for carrying messages for emergency calls. Upon receiving the message over one of the streams dedicated for carrying messages for emergency calls, the D-SBC processes the message with high priority handling.
Liquid metal containment in an x-ray tube
Liquid metal containment in an x-ray tube. In one example embodiment, an x-ray tube anode assembly includes a stationary shaft terminated by a head and an anode connected to an anode hub. The anode hub is at least partially surrounding the head of the stationary shaft. The anode hub defines a hub opening through which the stationary shaft extends. The anode hub is configured to contain a volume of a liquid metal and to rotate around the stationary shaft. The anode hub also defines a catch space within the anode hub that is configured to catch the liquid metal in order to contain the liquid metal within the hub regardless of the orientation of the x-ray tube anode assembly.