Scanned probe microscopy (SPM) probe having angled tip
A method of creating a probe for scanned probe microscopy is disclosed. The method includes providing a wafer having a support wafer layer and a device layer. The method includes masking the wafer with a masking layer. The method includes removing a portion of the masking layer at the device layer. The method includes etching the wafer along the portion of the masking layer that has been removed to create a crystal facet surface that is oriented at a tilt angle. The method includes epitaxially growing a tip along the crystal facet surface.
An apparatus with at least one secure memory area comprising a plurality of pre-installed public keys for verifying software authenticity. The apparatus is caused to receive an indication that a software package signed with a private key according to public key infrastructure has been received; check from the secure memory area, whether a public key associated with the private key with which the software package has been signed, is disabled; and if the public key associated with the private key is disabled, prevent execution of the received software package, and otherwise, proceed to verify authenticity of the received software package using the public key associated with the private key.
Device managing apparatus, device managing system, and recording medium storing a software management program
A device managing apparatus for managing software installed in at least one device includes a determination unit configured to determine whether a software item to be installed in the device requires license validation; a validation unit configured to perform a license validation operation on the software item for which the determination unit determines that license validation is required, depending on an available license for the software item; and a setting unit configured to set a license issued by the validation unit in the device in which the software item is installed.
Integrity checking at high data rates
A method and apparatus for receiving a group of data messages via a network is provided. A data message is received via the network (402, 602). A determination is made regarding whether the data message has an associated valid integrity check value (404, 604). When the data message is determined to have the associated valid integrity check value, a determination is made regarding whether a specific number of data messages has been received with associated valid integrity check values (418, 616). When the specific number of the data messages is determined to have been received with associated valid integrity check values, the data message is accepted (422, 618).
Data processing system, and data processing apparatus and user terminal equipment therefor, and computer-readable storage medium and data processing method thereof
User activity data to be provided to a predetermined data service system is generated reflecting a current status of a general user, and the generated current user activity data is acquired. The current user activity data is stored and then provided to the data service system. Here, it is judged whether to keep the to-be-provided current user activity data confidential, in accordance with a predetermined condition. Upon judgment to keep the current user activity data confidential, pseudo activity data different from but not contradictory with the current user activity data to be stored is generated from the stored past user activity data. The generated pseudo activity data is added to the current user activity data to be stored. Thus, a data processing system is provided that allows the user activity data of the general user to be kept confidential if necessary, for protection of privacy.
Password protection using personal information
Provided personal information from a user may be determined, the provided personal information being associated with network publication thereof. A comparison of the provided personal information with password-related information may be performed. Based on the comparison, it may be determined that a risk level associated with the network publication relative to password security of at least one password associated with the password-related information exceeds a predetermined risk level. The user may be notified that the network publication of the provided personal information is associated with potential compromise of the password security of the at least one password.
Detection of customizations of application elements
Systems, methods and computer readable media for detecting customization of an application running on a customer's environment are described. An application's original source can maintain a master hash registry for an application. The master hash registry includes valid and invalid hash codes for all objects in the application across all versions of the application. This master hash registry may be provided to the customer. A customization detection system loads a master hash registry to memory. The customization detection system may then retrieve an application object from the application, generate hash values for the object and compare these values with the object's master hash registry values to determine whether the application object is new or whether it has been customized in a supportable or unsupportable manner. The customization detection system may then set the object's customization status based on the results of the comparison.
Security within integrated circuits
A method for hindering detection of information unintentionally leaked from a secret held in a memory unit is described, the method including receiving a triggering event waiting for at least a first amount of time to pass after the receipt of the triggering event, the memory unit being in a non-operational state during the at least a first amount of time after the at least a first amount of time has passed, changing at least one first condition under which the memory unit operates, thereby causing the memory unit to enter an operational state, waiting for a second amount of time to pass after the changing at least one first condition, and changing, after the second amount of time, at least one second condition under which the memory unit operates, thereby causing the memory unit to enter the non-operational state, wherein access to the secret information is enabled only during the second amount of time, and detection of secret information unintentionally leaked is limited during the first amount of time. Related apparatus and methods are also described.
Apparatus and method for managing identity information
Provided are an apparatus and method for managing identity information. The apparatus includes a contract detail manager managing details of an identity information sharing contract made between a user and an identity provider (IdP) wanting to provide identity information about the user, and details of an identity information sharing contract made between the user and an identity consumer (IdC) wanting to be provided with the identity information about the user, an IdP selector selecting an IdP capable of providing the identity information about the user based on the details of the sharing contract when a request for the identity information about the user is input from the IdC, and an information provider obtaining information according to the identity information request from the selected IdP, and providing the obtained information to the IdC. The apparatus and method can solve a problem that all of a user's identity information is provided to an IdC according to the user's comprehensive agreement.
Extraction of code level security specification
A method comprising, receiving a source code, identifying a data structure access in the source code, determining whether the data structure access is associated with a security check function, defining the data structure access as a security sensitive operation responsive to determining that the data structure access is associated with the security check function, and defining a security specification to include the security check function and the security sensitive operation.
Method and apparatus of encrypting content delivery
A method for delivering a data stream to a plurality of clients in a network. The method involves receiving the data stream from a media server, where the data stream includes a plurality of data packets and a data stream identifier associated with at least one of the plurality of data packets, securing the data stream received from the media server by applying a filter to the data stream to obtain a filtered data packet from the plurality of data packets based on the data stream identifier, encrypting the filtered data packet using an encryption scheme to obtain a encrypted media content, and distributing the encrypted media content to at least one of the plurality of clients in the network.
Document management system, management device, recording medium storing document management program, document management method and data signal
A document management system, which includes a management section that manages identification information corresponding to a component included in a document; a setting section that sets the identification information managed by the management section to the component included in the document; and a history management section that manages history information of the component corresponding to the identification information that is set to the component by the setting section.
Protecting electronic devices from extended unauthorized use
When unauthorized use of a device is suspected, a recharging mechanism (e.g., recharge-circuit) of the device is disabled in order to guard against extended unauthorized use of the device. The recharging mechanism normally recharges the rechargeable-power-supply that powers the device. Consequently, normal use and enjoyment of the device can be significantly reduced by disabling the rechager. Moreover, for devices that are mainly powered by a rechargeable-power-supply (e.g., music-players, phones, Personal Digital Assistants), disabling the recharger effectively renders the device inoperable when the power of the main power-supply has run out. As such, disabling the recharger should serve as a deterrent to theft.
Adaptive configuration management system
An automated configuration management system (ACMS) oversees resources of a virtualized ecosystem by establishing a baseline configuration (including, e.g., security controls) for the resources; and, repeatedly, monitoring and collecting data from the resources, analyzing the data collected, making recommendations concerning configuration changes for the resources of the virtualized ecosystem based on the analysis, and either adopting and implementing the recommendations or not, wherein new states of the virtualized ecosystem and reactions to recommended changes are observed and applied in the form of new recommendations, and/or as adjustments to the baseline. The recommendations may be implemented automatically or only upon review by an administrator before being implemented or not. The various data may be analyzed according to benchmarks established for security and compliance criteria of the resources of the virtualized ecosystem, for example static/pre-defined or dynamically derived benchmarks/best practices.
Apparatus and method for selecting measure by evaluating recovery time
A measure selecting apparatus determines whether a vulnerability of a resource employed in a predetermined task has been addressed or not based on information stored in a memory. When the vulnerability of the resource is determined not to have been addressed and when a recovery time defined in the memory corresponding to the resource is longer than a predetermined time, the measure selecting apparatus evaluates measures defined in the memory corresponding to the vulnerability determined not to have been addressed, and calculates an evaluation value of each measure. The measure selecting apparatus selects a measure with a high evaluation value.
Systematic approach to uncover visual ambiguity vulnerabilities
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic flaws in GUI implementation. The invention described here is a technology for uncovering these flaws using a systematic reasoning approach. Major steps in the technology include: (1) mapping a visual invariant to a program invariant; (2) formally modeling the program logic, the user actions and the execution context, and systematically exploring the possibilities of violations of the program invariant; (3) finding real spoofing attacks based on the exploration.
Rootkit monitoring agent built into an operating system kernel
A rootkit monitoring agent (RMA) built into an operating system (OS) kernel for detecting a kernel-based rootkit and preventing subsequent effects of the rootkit. The RMA is activated as a kernel process subsequent to the OS initialization and stores a good state of OS kernel data structures including the System Service Descriptor Table (SSDT) and Interrupt Descriptor Table (IDT). The RMA monitors the SSDT and IDT and detects that a hook previously stored in the good state is changed by an installation of suspect software. The RMA determines the suspect software is a kernel-based rootkit by determining a whitelist does not indicate the changed hook. The RMA restores the changed hook to its good state. The RMA updates a blacklist to reference the changed hook.
Efficient distribution of a malware countermeasure
Embodiments include a system, an apparatus, a device, computer-program product, and a method. An embodiment provides a network device. The network device includes an information store operable to save a countermeasure useable in at least substantially reducing a harm caused by a malware (hereafter the “malware countermeasure”). The network device also includes a transmission circuit for sending a packet to at least one node of a plurality of networked nodes. The network device further includes a protection circuit for implementing the malware countermeasure in the network device.
System and method for fast flux detection
A system and method is disclosed herein for detecting fast flux networks. In one embodiment, the method comprises querying a domain name system (DNS) for DNS records associated with a domain. The method further comprises determining whether the domain name is part of a fast flux network of computers from results of the query. The method may further comprise determining the type of fast flux network as one of a single flux network, a double flux network, a top-tier flux network, or a lower-tier flux network.
System and method for secure usage of peripheral devices using shared secrets
A system, method, and program product is provided that establishes a shared secret between a computer system and a peripheral device such as a removable nonvolatile storage device or a printer. After establishing the shared secret, the peripheral device is locked. After the peripheral device is locked, an unlock request is received and the shared secret is sent to the peripheral device. The peripheral device then attempts to verify the shared secret. If the shared secret is successfully verified, then the peripheral device is unlocked allowing use of the device by using an encryption key that is made available by the verified shared secret. On the other hand, if the shared secret is not verified, then the peripheral device remains locked and use of the device is prevented.
Method for managing a virtual machine
Methods for managing a virtual machine wherein an administration console (AC) (1104) transmits a query to a virtualization server (1116). The virtualization server 1116 includes at least one virtual machine (VM) (1124). AC (1104) receives, in response to the query, identification of a VM (1124) and establishes an authenticated communications link with a proxy machine (1108) adapted for communicating with the VM (1124). AC (1104) transmits over the authenticated communications link to proxy machine (1108) the identification of the VM (1124) and performs a management function with respect to the VM (1124).
Multi-tiered authentication methods for facilitating communications amongst smart home devices and cloud-based servers
Apparatus, systems, methods, and related computer program products for synchronizing distributed states amongst a plurality of entities and authenticating devices to access information and/or services provided by a remote server. Synchronization techniques include client devices and remote servers storing buckets of information. The client device sends a subscription request to the remote serve identifying a bucket of information and, when that bucket changes, the remote server sends the change to the client device. Authentication techniques include client devices including unique default credentials that, when presented to a remote server, provide limited access to the server. The client device may obtain assigned credentials that, when presented to the remote server, provide less limited access to the server.
Load balancing in server computer systems
Systems and methods to implement load balancing of connections to a server computer in a server collection are described. The server collection receives connection requests from remote clients over a network. A session broker evaluates one or more load parameters of the server computers in the server collection and, based on those load parameters, determines load associated with each server computer. The session broker redirects the connection requests to the server computer which has a lesser load.
Non-obtrusive security system for devices
A security system is provided including providing a device including: storing a security rule for operation of the device when an event occurs; and implementing the security rule upon the occurrence of the event to allow non-obtrusive user access to the device.
Automated management of system credentials
One disclosed aspect of the present invention includes authentication and user account automation within a compute cluster for each cluster node that requires password or other credential administration. For example, a storage appliance computing system may rely on a plurality of subsystems (such as databases, storage management software, and application servers) that each have internal user accounts with associated passwords and credential keys that need to be changed at frequent intervals. Rather than requiring an administrator to manually manage all of these accounts, the presently described invention includes techniques and an authentication manager component to automatically manage, update, and refresh authentication information as required. Further, the authentication manager component may be used to perform and propagate automatic credential changes such as new sets of SSH keys or updated passwords as required within a computing system, and respond to new nodes or out-of-sync credentialing scenarios.
System for using an authorization token to separate authentication and authorization services
A novel system for utilizing an authorization token to separate authentication and authorization services. The system authenticates a client to an authenticating server; generates an authorization token with the authenticating server and the client; and authorizes services for the client using the generated authorization token.
System and method for controlling access to a privileged permission level of a server computer
A system for controlling access to a server computer comprising a server computer with a memory; an application residing in the memory of the server computer that, when executed by the computer, provides a first user with access to a primary-level session of the server computer, based on a first access key; provides the first user with a root-level session of the server computer, based on a second access key; prevents a second user from accessing the root from the primary level, while the root-level session of the first user is active; provides the second user with real-time observation of the actions taking place in the session of the first user; permits the first user and the second user to communicate with one another in real-time, during the root-level session; and logs the activity of root-level session.
Disabling administrative access to computing resources
Disclosed are various embodiments for disabling administrative access to computing resources. A customer request is obtained to disable administrative access of a provider to one or more computing devices. The provider supplies computing resources of the at least one computing device to the customer. The administrative access of the provider to the computing devices is disabled in response to the request. The administrative access of the provider remains disabled until a reset of the computing devices is performed.
Method and apparatus for authorization-dependent access to multimedia contents, and a system having the apparatus
A method, an apparatus and a system for authorization-dependent access to multimedia contents. A first terminal produces a first request for a multimedia content for an output of the multimedia content via the first terminal. A first authorization information item is used to check that the output of the multimedia content is authorized. The first terminal produces a second request for an output of the multimedia content via a second terminal. A check is carried out to determine whether to output a first security note via the first terminal. The output of the multimedia content takes place via the second terminal if the first security note is not to be output, or an input of a confirming acknowledgement for the first security note is identified by the first terminal.
Trusted virtual machine as a client
The embodiments provide generating a dedicated virtual machine image (DVMI) including functionality for a target service provider and launching the DVMI in the host device as a dedicated virtual machine (DVM). A measurement of the DVMI and/or the launched DVM, as a Trusted Dedicated Virtual Machine (TDVM), is transmitted to the target service provider server. The target service provider determines a trust level for the TDVM, based upon the measurement and provides a level of service by the target service provider server to the TDVM, according to the trust level of the TDVM.
Method of optimizing policy conformance check for a device with a large set of posture attribute combinations
A method, apparatus, and electronic device for conforming integrity of a client device 106 are disclosed. A memory 1100 may store a policy tag 404 associated with a subgroup of a group of policies 1102 and having a tag timestamp. A network interface 1060 may receive the certificate of health 300 from the client device 106. A processor 1010 may extract from the certificate of health a certificate timestamp 302 and a policy tag 304. The processor 1010 may access the tag timestamp. The processor 1010 may execute a comparison of the certificate timestamp 302 with the tag timestamp. The network interface 1060 may grant access to a network 104 based in part upon the comparison.
Remote control device and remote control method using the same
A remote control device and method is provided. The remote control device and method provide a more intuitive and convenient user interface to a user. The remote control device and method allow a user to browse a plurality of contents provided by a target device and execute desired contents in the target device more intuitively and conveniently. The remote control device and method also allow a user to select an external device connected to a target device and execute contents, provided by the external device, in the target device more intuitively and conveniently.
Fragmentation of a file for instant access
Techniques for fragmenting a file or a collection of media data are disclosed. According one aspect of the techniques, a file pertaining to a title is fragmented into a header and several tails or segments. The header is a continuous portion of the file while the segments are respective parts of the remaining portion of the file. The header is seeded substantially in all boxes, and none, one or more of the segments are distributed in each of the boxes in service. When a title is ordered, the header is instantly played back while the segments, if not locally available, are continuously fetched respectively from other boxes that have the segments.
Methods and apparatus for supporting VOD requests in a system with hierarchical content stores
Methods and apparatus for supporting video on demand requests in a system supporting hierarchical content stores, e.g., program caches, is described. Requested content is requested by a local streaming device from a remote cache when it is not available in a local cache. Content, e.g., I, P and B frames, supplied by the remote cache is tracked and content delivery is initiated prior to receipt of the full program from the remote content store. Trick play content is requested as needed from the remote content store to respond to trick play commands. Frames which are received as part of the trick play content stream are tracked and not included in normal play data subsequently obtained from the remote cache. The storage of the trick play data along with subsequent normal play data results in a full set of the program content being received and stored in a local cache for streaming in response to a VOD request.
Interest messaging entertainment system
In some implementations, closed captioning streams of textual data are extracted from video signals received by a client device. The closed captioning streams may be searched for occurrences of textual data in the closed captioning streams that match one or more search terms. When the number of matches between the search terms and a particular closed captioning stream exceeds a threshold number, a notification may be sent indicating that content programming determined to be of interest to a viewer has been located and/or the content programming may be recorded.
Method and apparatus in a media player
A method and arrangement for switching between a common media stream and a selective media stream of a media session received in a media player including a media buffer entity. Media frames of either a common media stream or a selective media stream are received and buffered in the media buffer entity. A switch at the media buffer entity is then controlled so that the output of the media buffer entity is changed from delivering common media frames to delivering selective media frames, or vice versa, upon detecting a stream switching trigger frame in the received media frames.
Digital broadcasting system and method of processing data in digital broadcasting system
A digital broadcasting system and a method for processing data in the same are disclosed. A method for controlling a digital television (DTV) located in one independent space among a plurality of independent spaces physically separated from one another is disclosed. The DTV includes an access point (AP) card. The method includes receiving emergency alert information and independent space identification (ID) information from a management server, comparing independent space ID information pre-stored in the DTV with the received independent space ID information, parsing the emergency alert information when the pre-stored independent space ID information is identical to the received independent space ID information, and switching an operation mode of the DTV from a power-off mode to a wake mode on the basis of the parsed emergency alert information, and displaying the emergency alert message.
System and method for delivering content to mobile devices
A system for generating an optimized video including in-stream events for video content and advertising content selected at the time of playback is disclosed. The system includes a manifest generating module configured to retrieve video content from a content repository for listing in a content manifest in response to a received request from a mobile device, the content manifest including at least one advertisement insertion point. The system further includes an advertising event correlation module configured to retrieve one or more advertisements based on a correlation between advertisement properties and playback properties and an advertisement serving module configured to provide the retrieved one or more advertisement for insertion into the at least one advertisement event insertion point.
Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same
A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel.
Electronic device having locking mechanism
An electronic device includes a body, a disc lid rotatably mounted to the body and including two hooks, and a locking mechanism secured to the body and for locking the disc lid to and unlocking the disc lid from the body. The locking mechanism includes a sliding bar slidable relative to the body, and at least one resisting member secured to the body. The sliding bar is slidable between a locking position for locking the disc lid and an unlocking position for unlocking the disc lid. The sliding bar defines at least one sliding slot, and includes two latching members for respectively hooking the hooks when in the locked position and releasing the hooks when in the unlocked position. The at least one resisting member is slidably received in the sliding slot, and resists the sliding bar against the body to prevent the sliding bar from deforming.
System and method for enabling interoperability between application programming interfaces
One embodiment of the present invention sets forth a method for sharing graphics objects between a compute unified device architecture (CUDA) application programming interface (API) and a graphics API. The CUDA API includes calls used to alias graphics objects allocated by the graphics API and, subsequently, synchronize accesses to the graphics objects. When an application program emits a “register” call that targets a particular graphics object, the CUDA API ensures that the graphics object is in the device memory, and maps the graphics object into the CUDA address space. Subsequently, when the application program emits “map” and “unmap” calls, the CUDA API respectively enables and disables accesses to the graphics object through the CUDA API. Further, the CUDA API uses semaphores to synchronize accesses to the shared graphics object. Finally, when the application program emits an “unregister” call, the CUDA API configures the computing system to disregard interoperability constraints.
Dynamic injection of code into running process
Techniques are described herein that are capable of dynamically injecting code into a running process. For instance, the techniques are capable of causing arbitrary code to be activated in the process while the process is running in response to receipt of a request for dynamic execution of the arbitrary code from outside the process while the process is running.
Managing access to a shared resource in a data processing system
Processes requiring access to shared resources are adapted to issue a reservation request, such that a place in a resource access queue, such as one administered by means of a semaphore system, can be reserved for the process. The reservation is issued by a Reservation Management module at a time calculated to ensure that the reservation reaches the head of the queue as closely as possible to the moment at which the process actually needs access to the resource. The calculation may be made on the basis of priority information concerning the process itself, and statistical information gathered concerning historical performance of the queue.
Efficient partial execution for the parallelization of software analysis in a distributed computing environment
An electronic device includes a memory, a processor coupled to the memory, and one or more policies stored in the memory. The policies include a resource availability policy determining whether the processor should continue evaluating the software, and a job availability policy determining whether new jobs will be created for unexplored branches. The processor is configured to receive a job to be executed, evaluate the software, select a branch to explore and store an initialization sequence of one or more unexplored branches if a branch in the software is encountered, evaluate the job availability policy, decide whether to create a job for each of the unexplored branches based on the job availability policy, evaluate the resource availability policy, and decide whether to continue evaluating the software at the branch selected to explore based on the resource availability policy. The job indicates of a portion of software to be evaluated.
Interprocess resource-based dynamic scheduling system and method
A method and system for scheduling tasks in a processing system. In one embodiment, the method comprises processing tasks from a primary work queue, wherein the tasks consume resources that are operable to be released. Whenever the volume of resources that have been consumed exceeds a threshold, the processor executes tasks from a secondary work queue for a period of time. The secondary work queue is comprised of tasks from the primary work queue that can release the resources; the secondary work queue can be sorted according to the volume of resources that can be released.
Recording medium storing therein a dynamic job scheduling program, job scheduling apparatus, and job scheduling method
A job scheduling apparatus determines an assignment order, which is the order in which jobs are assigned to a computational resource, on the basis of priority levels and being associated with the assignment order. The apparatus assigns the jobs to the computational resource on the basis of the assignment order. The apparatus reduces the priority levels for the jobs that have been assigned to the computational resource. The apparatus increases the priority levels with time. Regarding a priority level among the priority levels, if, at a future time, which is a fixed time period from the start of execution of the jobs, an amount of an increase in the priority level is expected to be equal to or larger than an amount of a reduction in the priority level for a job, assignment of the job to the computational resource is executed.
Configurable prioritization and aging of queued tasks
Determining a priority for a task in a queue is disclosed. A task is received at a queue. And, an initial priority is assigned to the received task, using a processor, determined based at least in part by a priority assignment rule associated with the queue. A task performer removes the task from the queue based at least in part on a priority. The priority is based at least in part on the initial priority. The task performer is assigned to complete the task.
Thread scheduling in chip multithreading processors
A thread scheduling technique for assigning multiple threads on a single integrated circuit is dependent on the CPIs of the threads. The technique attempts to balance, to the extent possible, the loads among the processing cores by assigning threads of relatively long-latency (low CPIs) with threads of relatively short-latency (high CPIs) to the same processing core.
System and method for providing dynamic transaction optimizations
A system and method for providing dynamic transaction optimizations, such as dynamic XA transaction optimizations. In accordance with an embodiment, the system enables monitoring of transactional behavior in an application during runtime, in order to provide a feedback loop. The application/transaction information in the feedback loop can be analyzed by a transaction manager to determine an indication as to whether a particular optimization, such as an isSameRM optimization, will provide a benefit or not. The optimization can then be applied accordingly. In accordance with various embodiments, such determination can be made transparently, so that its enablement is not detectable to, e.g., an end-application, or a system administrator, even though the distribution and type of XA calls may be detected through system monitoring. The feature can be used to improve the performance of transaction processing in a transaction-based system.
System and method for application isolation with live migration
A system, method, computer program, and/or computer readable medium for providing application isolation and live migration to one or more applications and their associated resources. The computer readable medium includes computer-executable instructions for execution by a processing system. The computer-executable instructions may be for creating a new isolated environment, for creating a copy of an isolated environment, live migrating applications within and between isolated environments, and for deploying an isolated environment Further, the instructions may be for launching one or more applications within one or more isolated environment, for terminating one or more applications within one or more isolated environments, for configuring resource mappings, exceptions and policies, for triggering a live migrate, and for delivery of one or more applications within isolated environments over the network.
Automatically generating compound commands in a computer system
A computer system provides a way to automatically generate compound commands that perform tasks made up of multiple simple commands. A compound command generation mechanism monitors consecutive user commands and compares the consecutive commands a user has taken to a command sequence identification policy. If the user's consecutive commands satisfy the command sequence identification policy the user's consecutive commands become a command sequence. If the command sequence satisfies the compound command policy, the compound generation mechanism can generate a compound command for the command sequence automatically or prompt an administrator to allow the compound command to be generated. Generating a compound command can be done on a user by user basis or on a system wide basis. The compound command can then be displayed to the user to execute so that the command sequence is performed by the user selecting the compound command for execution.
Transactional block conflict resolution based on the determination of executing threads in parallel or in serial mode
Mechanisms are provided for handling conflicts in a transactional memory system. The mechanisms execute threads in a data processing system in a first conflict resolution mode of operation in which threads execute conflicting transactional blocks speculatively. The mechanisms determine, for a transactional block, if the first conflict resolution mode of operation is to be transitioned to a second conflict resolution mode of operation in which threads accessing conflicting transactional blocks are executed serially and non-speculatively. Moreover, the mechanisms execute a thread that accesses the transactional block using the second conflict resolution mode of operation in response to the determination indicating that the first conflict resolution mode of operation is to be transitioned to the second conflict resolution mode of operation.
API backward compatibility checking
A system and method for automatically determining whether a newer version of an application programming interface (API) is backwards compatible with an older version is disclosed. The method includes comparing the two versions of the API to determine a set of atomic differences between the two versions and applying a set of backwards compatibility rules to the set of atomic differences. For each atomic difference, applying the rules includes analyzing the atomic difference to determine any applicable backwards compatibility rules and evaluating each applicable rule for the atomic difference to determine whether the atomic difference represents a violation. The method also includes storing an indication of any backwards compatibility violations from the evaluation.
Method and system of updating shared memory
A method and system is disclosed for updating a shared memory or other memory location where multiple entities rely on code stored to the same memory to support one or more operation functions. The shared memory may be updated such that the code intended to the replace the currently stored code may be relied upon prior to replacement of the code currently written to the shared memory.
Updating firmware of an electronic device
Disclosed is a method for updating software of an electronic device from a current to an updated version. A first set of load modules of the software is required for operating the electronic device in an update mode. The method comprises: receiving and storing incremental update instructions, executing a first set of update instructions so as to update the stored current version of the first set of load modules with the generated updated version of the first set of load modules; booting the electronic device in said update mode in which only the updated version of the first set of load modules is executed; and executing a stored second set of update instructions so as to perform an in-place update of the rest of the load modules.
Apparatus and method for updating the function of monitor
The present invention provides an apparatus for updating the function of a monitor and the method thereof. The method comprises: coupling a scale controller and a memory device of at least a monitor to a microcontroller; controlling the microcontroller to send a programming activation signal in a first signal format to the scale controller such that the scale controller enters a state of updating program; and controlling the microcontroller to access the memory device through a signal in a second signal format to update the program codes stored in the memory device, so as to update the function of the monitor.
Method and data processing system for solving resource conflicts in assembler programs
Embodiments relate to solving conflicts in assembler programs. An aspect includes generating an internal representation of the control flow of the source code of the assembler program, the internal representation including nodes for every instruction and a directed edge for every possible flow of control between nodes. Data attributes are attributed to the nodes and/or the edges to store the information about whether the resource used by an instruction is available or for which amount of time is unavailable. A data-flow analysis is the applied to the internal representation of the control flow of the source code to determine whether the resource used by an instruction of the assembler program is available or for which amount of time is unavailable. Each node is checked for whether the instruction accesses a resource which is unavailable. An appropriate action is then taken to overcome the resource conflict.
Method for identifying memory of virtual machine and computer system thereof
A method for identifying memories of virtual machines is provided. The method is adapted to a computer system executing at least one virtual machine, and an operating system is executed on the virtual machine. The method includes the following steps. A kernel file of the operating system is obtained, and the kernel file includes version information of the operation system. A source code and a configuration file of the operating system are obtained according to the version information, and the versions of the source code and the configuration file are complied with the version of the operating system. An object file is generated by compiling a fixed interface function with the source code according to the configuration file. Memory pages of the virtual machine are identified according to the object file. Furthermore, a computer system using the foregoing method is also provided.
Code obfuscation and controlling a processor by emulation
An individual security program is randomly chosen by way of a respective key and is then packaged with a games program to provide an executable program file which is applied to a storage media, such as an optical disc. Whenever the security program is running, the object code it produces is obfuscated to make it difficult to overcome the protection by identifying and removing the security program. The obfuscated object code is produced by substituting a variable in source code with a function of the variable. When the source code is compiled to produce the object code, the function causes the variable to be presented in the compiled object code as a series of operations.
Transforming addressing alignment during code generation
The present invention extends to methods, systems, and computer program products for changing addressing mode during code generation. Generally, embodiments of the invention use a compiler transformation to transform lower level code from one address alignment to another address alignment. The transformation can be based upon assumptions of a source programming language. Based on the assumptions, the transformation can eliminate arithmetic operations that compensate for different addressing alignment, resulting in more efficient code. Some particular embodiments use a compiler transformation to transform an Intermediate Representation (“IR”) from one-byte addressing alignment into multi-byte (e.g., four-byte) addressing alignment.
Automatic conversion of MPI source code programs into MPI thread-based programs
A method, system, and computer program product containing instructions for automatically converting an MPI source code program into an MPI thread-based program. In response to inputs in the form of an MPI source code program and a command, a converter declares a global variable of the MPI source code program as a thread private variable to create a first private variable for a first thread and a second private variable for a second thread. A library is identified to support converting processes to threads during execution of the MPI thread-based program, and the identified library is used to build an executable version of the MPI thread-based program. The identified library may include code to identify instantiation of a new process when the MPI thread-based program is executing, and in response, to cause a corresponding thread for the MPI thread-based program to be instantiated.
Systems and methods for model checking the precision of programs employing floating-point operations
Methods and systems for verifying the precision of a program that utilizes floating point operations are disclosed. Interval and affine arithmetic can be employed to build a model of the program including floating point operations and variables that are expressed as reals and integers, thereby permitting accurate determination of precision loss using a model checker. Abstract interpretation can be also employed to simplify the model. In addition, counterexample-guided abstraction refinement can be used to refine the values of parametric error constants introduced in the model.
Fast and accurate data race detection for concurrent programs with asynchronous calls
A system and method for analyzing a concurrent program employ asynchronous function calls for communication and recursion. A control flow graph is constructed based on a context-sensitive pointer analysis, whereupon encountering a function pointer, a points-to set of the function pointer is computed in a context-sensitive fashion to determine a set of potential function calls. The context-sensitive pointer analysis is terminated when no new potential function calls are encountered and where the potential function calls may contribute new data races other than those that exist in the contexts traversed thus far. To decide this, a characterization of pointer aliasing based upon complete update sequences is employed. A set of contexts that may contribute to different data races are enumerated by tracking update sequences for function and lock pointers and pointers that are shared or point to shared memory locations. Data race detection is carried out on the control flow graph.
System and method for automatically testing a program for safety-related automation systems
A method and system are provided for automatically testing a program for automation systems (e.g., programmable logic controllers) with regard to maintaining programming guidelines for program design for automation systems. A copy of at least part of a safety-related program is obtained from a development system for automation systems as a copy to be tested. The program copy to be tested is loaded into a test device for testing programs. The test device has access to programming guidelines for program testing. The test device automatically performs the program test with regard to maintaining programming guidelines, and outputs the test result.
Edit time analyzer in a loosely typed textual language
Analyzing code written in a loosely typed language. User input specifying code for a script may be received. The specified code may be analyzed. More specifically, one or more code portions referenced by the specified code may be determined. Properties of symbols of the specified code and the one or more code portions may also be determined. Additionally, the specified code may be analyzed using the determined properties to determine errors in the specified code. Accordingly, one or more errors may be graphically indicated based on said analyzing. Receiving the user input, analyzing the specified code, and graphically indicating the one or more errors may be performed at edit time.
Method and system for specifying and developing application systems with dynamic behavior
A method derives a composite activity that specifies a behavior of a first system that interacts with a second system. The method specifies the composite activity containing a set of first simple activities in which each first simple activity is a basic activity specifying a message that is either sent from the first system to the second system or sent from the second system to the first system. Then, each first simple activity that specifies a message sent from the second system to the first system is replaced by a second activity for the first system to receive the message followed by an unspecified activity that is to be specified by a user to define an internal action the first system is to take. Also, each first simple activity that specifies a message sent from the first system to the second system is replaced by an unspecified activity that is to be specified by a user to define an internal action the first system is to take followed by a second activity for the first system to send out the message.
System and method for efficient creation and reconciliation of macro and micro level test plans
A method includes creating a macro plan for a test project, creating a micro plan for the test project, wherein the micro plan and the macro plan are based on at least one common parameter, and reconciling the macro plan and the micro plan by identifying deviations between the macro plan and the micro plan based on the at least one common parameter.
System and method for rule-based distributed engineering
The invention relates to a system and a method for providing specifications for a project, in particular for an engineering project for creating an automation solution. The system comprises first means for creating a file containing the specifications and at least one project planning environment for creating a solution on the basis of the specifications, with the file containing the specifications being imported into the at least one project planning environment as meta knowledge. A simple provision of specifications to be used for a project is hereby enabled.
Method and system for remote software testing
Systems and methods for testing a computer program executing on a remote computer physically distant from a local computer are provided. The remote computer includes a redirection device operative to transmit the video output of the remote computer to the local computer via a network connection. The redirection device may also receive user input commands generated at the local computer and provide the input commands to the remote computer as if the input commands were physically generated by a user at the remote computer. The remote computer also includes a software program to be tested. The local computer includes a remote control software application operative to receive and display the video output transmitted from the remote computer. The remote control application also receives user input commands generated at the local computer by an automated testing application and transmits the commands to the redirection device.
Method and apparatus for self-annealing multi-die interconnect redundancy control
An apparatus for interconnecting a first die and a second die of a multi-die device includes a master circuit block that interfaces with the first die of the multi-die device, a slave circuit block that interfaces with the second die of the multi-die device, a first memory in the slave circuit block, a second memory in the master circuit block, and a plurality of μbumps between the first die and the second die, wherein the master circuit block and the slave circuit block are configured to identify one of the μbumps as a faulty μbump, and store a first value that corresponds with the identified faulty μbump in the first memory.
Reconfigurable circuit, its design method, and design apparatus
A reconfigurable circuit design method includes an input step of inputting design data of a default configuration of a reconfigurable circuit including a plurality of processor elements which perform processing and a first generation step of generating design data obtained by modifying at least one of the processor elements in the reconfigurable circuit with the default configuration.
Automatic asynchronous signal pipelining
An electronic design automation (EDA) tool alters a user's netlist to provide timing success for distribution of asynchronous signals. Distribution networks are used with the addition of pipeline registers before and/or after the distribution buffer. Or, a tree of pipeline registers is inserted between the asynchronous source and the destination registers. Or, any number of distribution networks are stitched together and pipeline stages may be inserted before and/or after each distribution buffer. Or, beneficial skew is utilized by introducing a delay component that skews a clock signal. The skewed clock signal drives a pipeline register that is inserted before a distribution buffer in order to improve timing margin. Any of various compilation techniques may be used within the EDA tool to solve the problem of distributing high-speed, high-fanout asynchronous signals. The technique has utility for high-performance FPGAs and structured ASIC families, as well as for low-cost FPGAs and other types of logic devices.
Multiple derating factor sets for delay calculation and library generation in multi-corner STA sign-off flow
An apparatus and method to characterize a new process using an improved delay calculation. Multiple derating factors are used for different STA sign off corners that have a base corner with two pairs of off-corners. The approach of the present invention does not add any extra work in cell library characterization, while in the mean it increases the accuracy of the delay calculation and the library generation at corners other than standard corners.
Simultaneous development of complementary IC families
Two (or more) different, but complementary, families of integrated circuits having the same layout are developed simultaneously where the different families are achieved by changing one or more design parameters of transistors used to implement the integrated circuits. For example, a low-power (but low-speed) family of one or more ICs (e.g., for handheld applications) can be achieved by designing at least some transistors with relatively high threshold-voltage (Vt) levels, while a different, but complementary, high-speed (but high-power) family of one or more ICs (e.g., for server applications) can be achieved by designing corresponding transistors with relatively low Vt levels. In this way, the two families can share in common all but a very few masks used to fabricate the ICs of the different families.
Method for thermal simulation
The invention of novel methods is described for efficient and accurate thermal simulation of a structure that can be primarily constructed using building blocks. These structures may include, but not limited to, semiconductor chips, photovoltaic/solar panels, battery packs, etc. The methods are formulated in hierarchical function spaces, rather than the physical space and provide three-dimensional (3D) steady-state and transient temperature profiles of the structure, which are as detailed as full-scale numerical simulation, using substantially less computational degrees-of-freedom (DOF). The number of DOF required is comparable to that of lumped thermal models, yet no ad-hoc modeling assumptions related to geometry, dimensions, temperature profiles, or heat flow paths are required. The methods can be applied to evaluate temperature profiles at different levels of granularity. The methods can also be implemented in various computer-aided-design (CAD) or electronic-design-automation (EDA) tools for different technologies to perform electro-thermal simulations.
Intelligent timing analysis and constraint generation GUI
A system generally including a clock structure analysis tool, a static timing analysis tool and a waveform tool is disclosed. The clock structure analysis tool may be configured to generate a simplified clock structure for a clock signal in a complex clock structure in a design of a circuit. The static timing analysis tool may be configured to generate a plurality of results for a plurality of intermediate signals in the simplified clock structure in response to a static timing analysis of the design. The waveform tool may be configured to generate a first representation in a graphical user interface format of the intermediate signals and the results.
Model for a hardware device-independent method of defining embedded firmware for programmable systems
A processing device programming system automatically provides a user interface comprising a selectable list of one or more processing devices based on a system level solution, automatically generates an embedded programmable system solution from the system level solution and a processing device selected from the selectable list of one or more processing devices, and automatically programs the processing device according to the embedded programmable system solution.
Superscalar register-renaming for a stack-addressed architecture
A system and method for increasing processor throughput by decreasing a loop critical path. In one embodiment, a table comprises multiple stack entries, each comprising an x87 floating-point (FP) stack specifier. The combinatorial logic for operand translation of N FP instructions per clock cycle may require N instantiated copies of a combinatorial logic block. Each instantiated copy may determine a new ordering of the stack entries. Control logic may receive necessary information from the corresponding N FP instructions and determine a corresponding combined computational effect, or stack reordering, on entries within the table based on two or more instructions. Resulting control signals are conveyed to the N instantiated copies. A resulting accumulative delay from an input of the first copy to the output of the Nth copy may be less than or equal to (N−1)*time_delay versus a longer N*time_delay.
Method and apparatus for minimizing overlay errors in lithography
A method for minimizing errors of a plurality of photolithographic masks that serve for successively processing a substrate is provided. The method includes determining a reference displacement vector field, in which the reference displacement vector field correlates displacement vectors of the errors of the plurality of photolithographic masks. The method includes determining for each of the photolithographic mask a difference displacement vector field as a difference between the reference displacement vector field and the displacement vectors of the errors of the respective photolithographic mask, and correcting the errors for each of the photolithographic masks using the respective difference displacement vector field.
Edge fragment correlation determination for optical proximity correction
Aspects of the invention relate to techniques for determining edge fragment correlation information. With various implementations of the invention, image intensity slope information for edge fragments in a layout design is determined. The image intensity slope information comprises information describing how image intensity for each of the edge fragments changes with its position. Image amplitude sensitivity information for the edge fragments is also determined. The image amplitude sensitivity information comprises information describing how image amplitude for each of the edge fragments changes with positions of neighboring edge fragments. Based on the image intensity slope information and the image amplitude sensitivity information, edge fragment correlation information for the edge fragments is determined. Using the edge fragment correlation information, the layout design may be processed by using, for example, OPC techniques. This OPC process may be performed on the whole layout design or problematic layout regions identified by a conventional OPC process.
Correlation of device manufacturing defect data with device electrical test data
Various embodiments related to correlating a location of a defect on a substrate for a semiconductor device to an electrical significance of a device structure at that location are disclosed. For example, one embodiment includes receiving a defect location for the location on the substrate where the defect was detected; receiving a physical representation of the semiconductor device for the defect location; generating a significance determination indicating whether the defect is located in an electrically significant region by correlating the defect location to logical and physical layout information included in the physical representation; and displaying the significance determination.
Using beat combinations for controlling electronic devices
Beat combinations may be used in controlling operations or functions of a handheld electronic device. The beat combinations may be applied via a presence-sensitive interface in the handheld electronic device. The presence-sensitive interface may be implemented using a display or screen of the handheld electronic device. The beat combinations may comprise a series of tap steps, with each tap step comprising an arbitrary tap location, and having specific tap criteria (e.g., number of taps and/or duration of each of the taps.). The beat combinations may also comprise tap-and-slide combinations, involving an initial tap location, which may be an arbitrary location in the presence-sensitive interface, followed by a sequence of preconfigured slides, having preconfigured slide movements, to other tapping locations. The beat combinations may allow for acceptable tolerances associated with each of tap steps (e.g., allowing for acceptable variation of location, tap criteria, and/or slide movements).
Processing for distinguishing pen gestures and dynamic self-calibration of pen-based computing systems
Systems, methods, and computer-readable media process and distinguish user input device gestures, such as gestures input via a pen in a pen-based computing system, e.g., to quickly and reliably distinguish between electronic ink entry, single taps, double taps, press-and-hold actions, dragging operations, and the like. Systems, methods, and computer-readable media also are provided for dynamically calibrating a computer system, e.g., calibrating a displayed input panel view based on input data recognized and received by a digitizer. Such systems and methods may operate without entering a dedicated or special calibration application, program, or routine.
Preventing unintentional activation and/or input in an electronic device
A system and method for preventing unintentional activation and/or input in an electronic device are provided. A movable on-screen user interface object is provided as an unlocking mechanism in a device having a touch-sensitive surface. The user moves the object in any desired direction from a starting point (or origin); if the object is moved a sufficient distance away from the starting point, the device is unlocked. The required amount of movement may be defined by a threshold which may or may not be made visible to the user. In various embodiments, the threshold may be defined by an arc, a circle, or by a straight line, or in some other arbitrary manner. In various embodiments, user authentication can be required before unlocking takes effect. In various embodiments, certain alerts can be displayed while the device is locked.
Intuitive tools for manipulating objects in a display
A method and system for providing a user with user-friendly handles for manipulating graphics and other displayed objects using a pointer. An initial toolset of handles can evolve into a toolset with enhanced functionality. Selecting an object can invoke a first toolset. Pausing the pointer over an object for a preset length of time can invoke a second toolset with additional functionality. Continuing to maintain the pointer's stationary position over the object can invoke a third toolset. A rotation tool handle can rotate an object about an axis of rotation in response to pointer-based input. Moving a pointer over a rotation tool handles can invoke an axis-of-rotation tool for repositioning the axis of rotation using the pointer.
Integration of location logs, GPS signals, and spatial resources for identifying user activities, goals, and context
Described are methods that utilize a geographic location technology (e.g., GPS) to determine user location data, and existing network-based websites (e.g., Internet websites) for searching and accessing data related to the location data such that the user context can be developed and stored. A location component is provided that determines location data of a wireless communications device of a user. A context component is provided that accesses context data based on the location data to define a context in which the device is located. Activities, goals, and overall context of a user can be inferred through statistical fusion of multiple sources of evidence. The context data is presented to the user via the wireless device such that the user can make decisions as to where to go, for example. User preferences can be accessed and applied to filter context data according to what the user desires to see and access.
System and method for generating presentations
A system and method allows a user to specify a presentation by arranging content into a hierarchical arrangement. A described method includes providing a hierarchy manager to manage a hierarchy of a plurality of content to be used in a presentation, providing an interface to receive a script and associate the script with at least a portion of the content, and digitally generating a file responsive to the content, the hierarchy, and the script, where the file represents the presentation. The script can control one or more behaviors of the presentation during a display of the presentation. Generating the file can include inserting the script into the file to cause an execution of the script during the display of the presentation.
Method, computer program and data processing system for navigating in a flow diagram
A method of navigating in a flow diagram is disclosed. The flow diagram is displayed in a graphical user interface (GUI) and the flow diagram comprises a set of task elements and a set of connectors. A set of navigation commands is provided. The set of navigation commands comprises a first navigation command and a second navigation command. A selector is moved from a first task element of the set of task elements to a first connector of the set of connectors in response to the reception of the first navigation command, wherein the first connector immediately succeeds the first task element in the flow diagram. Furthermore, the selector is moved from the first connector to the first task element in response to the reception of the second navigation command.
Image capture and manipulation
The present disclosure includes, among other things, systems, methods and program products for image capture and manipulation.
Method and apparatus for providing a user interface on a device enabling selection of operations to be performed in relation to content
A computer-implemented method, at an electronic device having a display and means for receiving user input, said method comprises, in response to receipt of a user input performed in relation to one or more selectable items displayed in a graphical user interface on the display: displaying on the display a menu adjacent an edge of the display, while maintaining at least a portion of the graphical user interface on the display, the menu containing one or more icons, each icon representing a function and being selectable by a user to cause the function to be performed in relation to the one or more items; and maintaining responsiveness to user input performed in relation in the graphical user interface, while the menu is displayed on the display.
Formatting ticker content in a handheld wireless telecommunication device
Tickers are populated with location-based information that is selected according to the geographic location of communication devices. The location of a communication device is identified based on a GPS system, proximity to transmitters in a wireless network, user input, or using other techniques. Location-appropriate content is obtained either in real-time from the network or from a local data store at the communication device. In general location-based, context-aware content can be displayed on tickers associated with a variety of communication devices, including mobile communication devices and “immobile” or stationary personal computers.
Systems and methods for an interactive graphical user interface for depicting status of a claim
Systems and methods for an interactive graphical user interface for depicting the status of a claim are provided. The system includes a database for storing claim data and a server in communication with the database. The stored claim data includes a claim workflow associated the claim. The workflow defines the processing steps associated with processing the claim. The server receives a user request to check the status of the claim. The server determines status data of the claim based on stored claim data and outputs the status data to a graphical user interface for depicting a graphical representation of the status data. The graphical representation includes a timeline corresponding to the workflow of the claim and a progress bar indicative of the status of the claim.
Representing an interest priority of an object to a user based on personal histories or social context
A method and apparatus assigns a quantative variable to each object (or set of objects) in a collection available to a user. The quantative variable is referred to as the Interest Priority Value (IPV). The IPV defines a range of states of the object, between ‘accessed’ and ‘unaccessed’, and is calculated based on one or more attributes of the object. A object with the highest IPV is the most ‘unaccessed,’ and the object with the lowest IPV is the least ‘unaccessed.’ The IPV may be used in a visual representation of the collection of objects, thereby permitting a user to readily identify and obtain those objects of greatest interest to the particular user.
User-configured management of IM availability status
A method includes associating a user-defined shortcut command with at least two different user-drafted status responses. In response to a user receiving a first instant message from a first sender at an inopportune time and the user then inputting the user-defined shortcut command, the method includes automatically transmitting a first user-draft status response to the first sender of the first instant message that was received at the inopportune time. In response to the user receiving a second message from a second sender at the inopportune time and the user then inputting the user-defined shortcut command, the method includes automatically transmitting a second user-draft status response to the second sender of the instant message that was received at the inopportune time. A relationship between the first sender and the user is different than a relationship between the second sender and the user.
Management of data on related websites
A computer-implemented method, system and computer program product of managing and sharing entries into a webpage are presented. The computer-implemented method receives an input to an input box located in a first webpage on a first network. This input is analyzed to determine its subject matter, and is then migrated into an appropriate subject box on the webpage. In one embodiment, the input is then shared with another webpage, for the same user, which is on a second network.
Image forming apparatus, authority management method of image forming apparatus, and authority management system of image forming apparatus
There is provided an image forming apparatus which can simply create a role that is an assembly of the authorities for using each function of the image forming apparatus.The image forming apparatus includes an operation input unit receiving an input of operation performed by a user; a selection information obtaining unit obtaining role selection information indicating a role selected by the input of the operation performed in the operation input unit from at least one role out of roles having at least one authority per role and registered in advance; an authority information obtaining unit obtaining information indicating the authority of the selected role; a display control unit displaying a role creation screen in which the authority that can be provided to the role to be newly created can be selected and displaying a state where the authority of the selected role is selected as an authority to be provided to the role to be created in the role creation screen based on the information indicating the authority obtained by the authority information obtaining unit; a selected authority information obtaining unit obtaining the information indicating the authority that is selected when an input for completing selection of authority is performed, in the case the input for completing the selection of authority is performed in the role creation screen by the operation input unit; and a storage control unit storing the authority obtained by the selected authority information obtaining unit in a storage area in association with the information indicating the created role.
Tabs for managing content
A computer-implemented method for interacting with a file stored on a computing device that includes a display. The method includes causing a first user interface element to be displayed; receiving user input; determining that the user input is received for a duration of time greater than a threshold value; and, in response to determining, causing a first full tab to be displayed on a first side of the first user interface element, where the first full tab is associated with a first function for manipulating the file.
Methods and systems for splitting a chinese character sequence into word segments
Systems, methods and machine readable medium including machine readable code for splitting a Chinese character sequence into word segments are disclosed. A synchronization list including a plurality of Chinese words is provided. An input data string including a Chinese character sequence is received and one of the plurality of Chinese words from the synchronization list is identified in the Chinese character sequence. The identified Chinese word is defined as a word segment in the Chinese character sequence. An undefined character sequence is identified in the Chinese character sequence. The undefined character sequence is segmented into at least one word segment.
Time sequencing of editing steps in a two-dimensional digital document
What is provided is a system and method for time sequencing editing steps for allowing users to visualize and modify the editing history of a two-dimensional digital document. A three-dimensional image of the document is presented to the user with time of editing being represented as a third dimension. This three-dimensional presentation of editing operations provides the user with an “omniscient” perspective of the document where part of all of a document's editing history is represented. The document state at any point in its life, as affected by various previously preformed editing operations, is given by a corresponding slice through the three-dimensional object. The user is provided with an ability to manipulate the three-dimensional representation to not only undo prior operations but also to perform different editing operations at anytime in the editing history of the document, and thereby change the editing history of the document. Various embodiments are disclosed.
Paper-based interface for multimedia information stored by multiple multimedia documents
The present invention provides techniques for generating a printable representation of multimedia information that can be printed on a paper medium to provide a paper-based interface for the multimedia information. According to an embodiment of the present invention, the present invention provides techniques for generating a single printable representation that includes multimedia information extracted from a plurality of different multimedia documents or multimedia sources. The single printable representation includes multimedia information selected from the plurality of multimedia documents based upon selection criteria.
Electronic document reader
We describe a method of displaying a document page with a predetermined size using a display device having edges defining lateral dimensions not substantially larger than said predetermined size and having a central re-writable display portion and a non-re-writable border, said document page comprising a central, foreground portion bearing one or both of text and graphics, a background having a background color and at least one margin having said background color, the method comprising: inputting page data defining a page for display; processing said page data to crop margins of said page such that, when displayed on said re-writable display portion, said non-re-writable border gives the appearance of said cropped margins, said processing generating cropped page data; and outputting said cropped page data for display on said re-writable display portion of said display.
Method to serve real-time data in embedded web server
The present technique serves Web pages that are mixed with dynamic data from an embedded system using object files to access the dynamic data. The technique constructs the object files in the embedded system in real-time separate from the Web pages. The technique then merges the dynamic data with the Web pages and displays the data-populated Web pages via a Web browser. The data/page merging process may be performed at either the server side or the client side.
Synthetic navigation elements for electronic documents
A computer-implemented method for managing the display of items in a web-based document application includes providing an electronic document that includes a plurality of content items, anchoring a plurality of base layers to different discrete positions of the electronic document, and anchoring ones of the plurality of content items to particular ones of the base layers so that when the spreadsheet is scrolled on a computer display, the content items move with the spreadsheet by virtue of the anchoring of the content items to the base layers and the anchoring of the base layers to the spreadsheet.
Entering data into a webpage
Methods, systems, and computer program products for entering data into a web page by means of a data processing system. The method includes detecting a wireless device and forming a communication link between the data processing system and the wireless device. The method also includes retrieving data from the wireless device. The method also includes populating fields in the web-page with the retrieved data.
Editable bookmarks shared via a social network
Editable bookmarks shared via a social network are described. In embodiments, a bookmark is received from a client device at a media content service. The bookmark corresponds to a media asset and includes an identifier of the media asset. Metadata associated with the media asset is added to the bookmark to generate an editable bookmark. A bookmark invitation is also received from the client device, and the bookmark invitation is directed to social network contacts of a user of the client device. The editable bookmark can then be communicated to receiving client devices of the respective social network contacts identified by the bookmark invitation, and a receiving client device can initiate playback of the media asset that corresponds to the editable bookmark. Further, the editable bookmark can be updated when additional data associated with the media asset is received from a social network contact via a respective client device.
Method and implementation of cyclic redundancy check for wide databus
A method for computing a X-bit cyclical redundancy check (CRC-X) frame value for a data frame transmitted over a N-bit databus is provided. The method includes receiving a N-bit data input with an end-of-frame for the data frame at bit position M on the N-bit databus, performing a bitwise XOR on X most significant bits of the N-bit data input with a CRC-X feedback value to form a first N-bit intermediate data. The method also includes shifting the first N-bit intermediate data by M bit positions to align the end-of-frame of the data frame with a least significant bit (LSB), and padding M number of zero bits to a most significant bit (MSB) of the first N-bit intermediate data to form a second N-bit intermediate data.
A processing unit includes: a cache memory including a plurality of memory elements; an error detection circuit configured to detect an error when a first timing for reading data from the cache memory is behind a threshold; a latch circuit configured to set a second timing for latching the data based on an output from the error detection circuit and to latch the data at the second timing; and a processing unit core to process the data latched by the latch circuit.
Device and method for the fine synchronisation of different versions of a received data stream
The Invention pertains to the field of broadcasting digital services to terminals for transmitting said services, and concerns the problem of the smooth transfer between two versions of a same stream upstream from a transmitter within transmission networks on a single modulation frequency. The invention relates to a device for the fine synchronization of different versions of a data stream received with a certain offset or various jitters. In order to do so, the device includes different paths for detecting errors (ETR) and synchronizing the stream (SNF).
Providing capacity optimized streaming data with forward error correction
In an example embodiment, there is described herein a methodology were the Forward Error Correction (FEC) data for a data stream is distributed into a plurality of FEC sub-streams. Subscribers to the data stream indicate which of the plurality of FEC sub-streams should be provided to them. The distribution of FEC sub-streams are limited to subscribed FEC sub-streams. FEC sub-streams with no subscribers are not forwarded beyond a distribution point such as an access point (AP).
Power and pin efficient chip-to-chip communications with common-mode rejection and SSO resilience
In bus communications methods and apparatus, a first set of physical signals representing the information to be conveyed over the bus is provided, and mapped to a codeword of a spherical code, wherein a codeword is representable as a vector of a plurality of components and the bus uses at least as many signal lines as components of the vector that are used, mapping the codeword to a second set of physical signals, wherein components of the second set of physical signals can have values from a set of component values having at least three distinct values for at least one component, and providing the second set of physical signals for transmission over the data bus in a physical form.
Method and device for synchronizing reception of data packets
In order in particular to allow a synchronization on data packets, the method comprises: a first check that a data set which would be protected by an error detection code, does not comprise any error, the frame comprising the data set; a synchronization on one of the packets comprising the set if the check indicates that the data set does not comprise any error. The invention also relates to a corresponding synchronization module and an apparatus implementing this module.
Semiconductor storage device, nonvolatile semiconductor memory test method, and medium
According to one embodiment, a semiconductor storage device includes a nonvolatile semiconductor memory and a controller. The nonvolatile semiconductor memory includes a firmware area capable of storing firmware used to execute either a normal mode or an autorun test mode and a user area capable of storing user data. The controller reads the firmware from the nonvolatile semiconductor memory and determines whether the firmware has been set in either the normal mode or the autorun test mode. The controller repeats erasing, writing, and reading in each block in the user area using a cell applied voltage higher than a voltage used in a normal mode, and enters a block where an error has occurred as a bad block.
System and method for data recovery in multi-level cell memories
A system and method are provided for data recovery in a multi-level cell memory device. One or more bits may be programmed sequentially in one or more respective levels of multi-level cells in the memory device. An interruption of programming a subsequent bit in a subsequent second or greater level of the multi-level cells may be detected. Data may be recovered from the multi-level cells defining the one or more bits programmed preceding the programming interruption of the second or greater level.
Error detecting/correcting code generating circuit and method of controlling the same
An error detecting/correcting code generating circuit includes a first exclusive OR operation circuit that generates log2(n+1) bits of one portion of a redundant portion of error detecting/correcting-code-attached data by rounding up the numbers to the right of the decimal point of log2(n+1) in response to the input of m bytes of an information portion included in error-detection-bit-attached data. The error-detection-bit-attached data includes a redundant portion of m bits of error detection bits allocated to the m bytes of the information portion, the byte having n bits. The circuit also includes a second exclusive OR operation circuit that generates m bits of another portion of the redundant portion of the error detecting/correcting-code-attached data in response to the input of the one portion and the error detection bits.
Determining whether a wireless access node should retransmit data packets based on the condition of a reverse wireless link
Embodiments disclosed herein provide systems and methods for determining whether a wireless device should retransmit data packets based on the condition of a reverse wireless link. In a particular embodiment, a method provides exchanging wireless data packet communications between a wireless device and an access node on a wireless network. The method further provides transmitting a first packet set from the access node to the wireless device on a forward wireless link. The method further provides determining a reverse noise ratio, signal interference noise ratio, and packet error rate on a reverse wireless link and generating a confidence level indicator based on the reverse noise ratio, signal interference noise ratio, and packet error rate. The method further provides determining whether to retransmit the first packet set from the access node to the wireless device based on the confidence level indicator.
Executing TAP instructions in IP core with ERP lead
An integrated circuit carries an intellectual property core. The intellectual property core includes a test access port 39 with test data input leads 15, test data output leads 13, control leads 17 and an external register present, ERP lead 37. A scan register 25 encompasses the intellectual property core and ERP lead 37 carries a signal indicating the presence of the scan register.
Decode logic driving segmented scan cells with clocks and enables
Scan architectures are commonly used to test digital circuitry in integrated circuits. The present invention describes a method of adapting conventional scan architectures into a low power scan architecture. The low power scan architecture maintains the test time of conventional scan architectures, while requiring significantly less operational power than conventional scan architectures. The low power scan architecture is advantageous to IC/die manufacturers since it allows a larger number of circuits (such as DSP or CPU core circuits) embedded in an IC/die to be tested in parallel without consuming too much power within the IC/die. Since the low power scan architecture reduces test power consumption, it is possible to simultaneously test more die on a wafer than previously possible using conventional scan architectures. This allows wafer test times to be reduced which reduces the manufacturing cost of each die on the wafer.
Integrated circuit for compression mode scan test
An integrated circuit for performing a design for testability (DFT) scan test is provided. The integrated circuit includes at least one scan chain including a plurality of flip-flops, at least one interface scan chain including a plurality of flip-flops, a decompressor configured to be connected with an input terminal of the at least one interface scan chain and to decompress a first input signal and then transmit it to the at least one scan chain, a compressor configured to be connected with an output terminal of the at least one scan chain and to compress an output signal of the at least one scan chain, and at least one multiplexer configured to be connected with the decompressor and to selectively output an output signal of the decompressor or a second input signal in response to a control signal.
Isolation logic between non-volatile memory and test and wrapper controllers
An integrated circuit is described that has a substrate with a memory array with dedicated support hardware formed on the substrate. An access wrapper circuit is coupled to address and data lines of the memory array and to control lines of the dedicated support hardware. The wrapper circuit is configured to provide an access port to the memory array. A test controller is formed on the substrate and coupled in parallel with the access wrapper circuit to the address and data lines of the memory array and to the control lines of the dedicated support hardware, wherein the test controller is operable to perform a test of the memory array by manipulating control signals to the support hardware in addition to those required to write data patterns into the memory array and to read the contents of the memory array.
Memory testing system and method of computing device
In a memory testing method for testing a memory module of a computing device, an operating voltage of the memory module is adjusted to a first voltage or a second voltage. A predetermined data set is written into the memory module after the operating voltage of the memory module is adjusted, and the written data set is read out from the memory module, to accomplish a data writing and reading process of the memory module. A register value that presents how many memory errors have occurred during the data writing and reading process is acquired from an ECC register of the memory module, to determine whether the memory module is stable during the adjusting of the operating voltage according to the register value.
Data storage with snapshot-to-snapshot recovery
Embodiments of the present invention provide methods, apparatuses, systems, and computer software products for data storage. A corrupted node under a first meta-volume node in a hierarchical tree structure is deleted. The hierarchical tree structure further includes a source node under the first meta-volume node. The corrupted node and the source node each include a respective set of local pointers. The corrupted node and the source node represent respective copies of a logical volume. The source node is reconfigured to become a second meta-volume node having the same set of local pointers as the source node. A first new node is created under the second meta-volume node in the hierarchical tree structure to represent the corrupted node. A second new node is created under the second meta-volume node to represent the source node. The first and second new nodes are configured to have no local pointers.
Recovering from lost resources in a distributed server environment
An apparatus, method, and computer readable storage medium are disclosed to recover from lost resources in a distributed server environment. A status monitor module receives, at a first computer, periodic status messages from a peer computer. Each periodic status message indicates that the peer computer is providing a service for which the first computer serves as a backup service provider. A failure detection module determines, based on the periodic status messages, that the peer computer has stopped providing the service. An advancement module provides the service, at the first computer, in response to determining that the peer computer has stopped providing the service.
Apparatus and method for controlling current consumption in a multi modem system
An apparatus and a method for controlling power consumption in a system having a plurality of modems are provided. In the method, whether an interrupt is generated in each modem is detected. An amount of current consumption of the system at a processing point of the generated interrupt is determined. The amount of current consumption of the system is compared with a threshold, so that the processing point of the generated interrupt is controlled.
Image forming apparatus and power management method thereof
A power management method of an image forming apparatus which communicates with at least one terminal device supporting a universal plug and play (UPnP) protocol, including: setting power save mode information which includes a plurality of levels corresponding to the UPnP protocol to the image forming apparatus; storing the set power save mode information; receiving a command to enter a first power save mode among the plurality of levels from the terminal device; comparing the received command to enter the first power save mode with the stored power save mode information; and entering a power save mode by the image forming apparatus corresponding to the received command to enter the first power save mode. With this configuration, the image forming apparatus supporting a UPnP protocol categorizes power save modes by using a low power protocol of the UPnP protocol, and can reduce unnecessary power consumption and improves usability.
Power protection system for power supply
A power protection system for a power supply includes a power unit, a microcontroller, a connector, a current sensing resistor, a hot-swap controller, and an electronic switch having first to third terminals. The first terminal is connected to the connector through the current sensing resistor. The second terminal is connected to the power unit. The third terminal is connected to a control pin of the hot-swap controller. First and second sensing pins of the hot-swap controller are respectively connected to two ends of the current sensing resistor. A monitoring pin of the hot-swap controller is connected to the second terminal. A clock pin and a data pin of the hot-swap controller are connected to two terminals of the microcontroller.
Power booting sequence control system and control method thereof
The present invention discloses a power booting sequence control system and the control method thereof, which optimizes a power booting sequence of a plurality of power switches in an integrated circuit. An initial module initializes a target charge value, a preset current budget and a plurality of time intervals. A current lookup module obtains a booting current across a power switch from a built-in current lookup table. A first computing unit and a second computing unit compute a first and a second power switch numbers respectively. A processing module selects the small number of the first and the second power switch number to get a maximum number of power booting switches under the time intervals, and opens the maximum number of the power booting switches. Therefore, the system keeps the in-rush current value under the preset current budget and speeds up the ramp-up time in a power booting state.
Method and apparatus for indicating power level over a communication interface
A method of classification of power requirements in a power over Ethernet system, the method comprising: providing a first classification voltage for a first classification cycle time, the provided first classification voltage being within a classification voltage range defined by a lower classification voltage limit and upper classification voltage limit; measuring a first current flow responsive to the provided first classification voltage; subsequent to the first classification cycle time, providing a voltage outside of the classification voltage range for a classification indexing time; subsequent to the classification indexing time, providing a second classification voltage for a second classification cycle time, the provided second classification voltage being within the classification voltage range; measuring a second current flow responsive to the provided second classification voltage; determining a classification responsive to the measured first current flow and the measured second current flow; and allocating power responsive to the determined classification.
Mobile electronic device having content transmission interface
The mobile electronic device for reproducing digital content includes a body and a content transmission interface connector. The body is configured to store and process the digital content, where the digital content includes high-quality uncompressed video data. The content transmission interface connector includes a male connector configured to be connected directly to an external display device and configured to output the digital content to the external display device.
Method and integrated circuit for protecting against differential power analysis attacks
In one embodiment of the invention, a method is provided for protecting against attacks on security of a programmable integrated circuit (IC). At least a portion of an encrypted bitstream input to the programmable IC is decrypted with a cryptographic key stored in the programmable IC. A number of failures to decrypt the encrypted bitstream is tracked. The tracked number is stored in a memory of the programmable IC that retains the number across on-off power cycles of the programmable IC. In response to the number of failures exceeding a threshold, data that prevents the decryption key from being used for a subsequent decryption of a bitstream is stored in the programmable IC.
Secure, two-stage storage system
A two-stage storage security system comprising an address translator and a cryptographic engine for a mobile computing platform is provided. In response to a write operation, the address translator receives unencrypted data blocks, from an initiator, and associates the blocks with corresponding scrambled data storage addresses. The cryptographic engine encrypts the unencrypted data blocks to be stored on the platform storage component at the corresponding scrambled data storage addresses. The address translator applies a predetermined reversible translation function to reversibly remap addresses, and the cryptographic engine applies a predetermined cryptographic technique to encrypt and decrypt the data blocks. In a read operation, encrypted data blocks retrieved from the storage component are decrypted and restored to an original logical order. Decryption of storage component data is allowed when storage component is coupled to the corresponding platform.
System and method for security authentication using biometric authentication technique
A system and a method for security authentication, in which a biometric authentication subsystem in the security authentication system receives a biometric certificate held by the user and the user's biometric information from a user terminal; the biometric certificate contains the user's biometric template or the storage address of the biometric template; next, the biometric authentication subsystem authenticates the biometric certificate, performs matching between the biometric information and the biometric template, and generates the identity authentication result. The invention can also combine biometric authentication with PMI privilege authentication, so as to enhance security of identity authentication in PMI and widen applicability of biometric authentication.
A method is disclosed for password checking. After input is received, a proposed password included in the input is parsed into symbols. At least one of the symbols includes two or more characters. A probably metric is determined based on a sequence of symbols. The probability metric is used to determine whether or not the password is secure.
Methods and systems for playing media
A scalable architecture is disclosed for delivery of real-time information over a communications network. Embedded into the architecture is a control mechanism that provides for the management and administration of users who are to receive the real-time information. In the preferred embodiment, the information being delivered is high-quality audio. However, it could also be video, graphics, text or any other type of information that can be transmitted over a digital network. Preferably, there are multiple channels of information available simultaneously to be delivered to users, each channel consisting of an independent stream of information. A user chooses to tune in or tune out a particular channel, but does not choose the time at which the channel distributes its information. Advantageously, interactive (two-way) information can be incorporated into the system, multiple streams of information can be integrated for delivery to a user, and certain portions of the information being delivered can be tailored to the individual user.
Re-authentication apparatus and method in downloadable conditional access system
Provided is a re-authentication apparatus in a Downloadable Conditional Access System (DCAS), the re-authentication apparatus includes: a receiving unit to receive a key request message from a Secure Micro (SM); a determination unit to determine whether to perform re-authentication depending on downloading of SM client image; an identification unit to identify an SM identifier using the key request message, when the re-authentication is performed as a result of the determination; an extraction unit to retrieve previous session information corresponding to the SM identifier and to extract keying information about the previous session information; and an encryption unit to control an encryption key about the SM client image to be reused, the SM client image being encrypted in a previous session based on the previous session information using the keying information.
Secure client-side communication between multiple domains
Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication latency particularly effective for dynamic multi-domain and/or multi-tenant environments while allowing for granular security or specific security of messages and operations with regard to users, user sessions, groups, organizations, permissions sets, applications, or any other logical delineation. Such methods and systems may involve a variety of security components, for example, at least one set of instructions including a plurality of defined instruction to be utilized by users of the set of instructions to communicate, and cryptographic construct data in order to verify the data integrity and the authenticity of messages sent and received using the secure client-side communication between multiple domains.
Information terminal apparatus, information processing apparatus and information communication system
When transmitting position/time information calculated by means of a GPS function to a server apparatus, authentication is carried out with the server apparatus. The position/time information may be certified as legitimate measured by a portable apparatus with a GPS reception function employed by a user. When transmitting information related to the position and the time acquired from a portable phone terminal having the GPS function and a network function by means of the GPS function to the server apparatus, authentication is carried out between the portable phone terminal and the server apparatus. The position/time information is transmitted to the server apparatus, only if the server apparatus is authenticated as a legitimate counterpart for connection. A secret key holding section is provided for holding different secret keys for different apparatuses. The position/time information measured based on an electromagnetic wave received from a positioning satellite is digitally signed by means of the secret key. The identification information and the position/time information having the digital signature are then transmitted to a counterpart.
Information processing apparatus, computer-readable recording medium configured to store command execution determination program, and command execution determination method
An information processing apparatus includes a memory that stores command execution right information including execution right information indicating whether a command is executable, and a command determination unit that determines whether an entered command is a target of a command execution determination where it is determined that whether a command is executable based on whether the entered command is invoked by a user command or a system command, and determines whether the entered command is executable with reference to the command execution right information stored in the memory when the entered command is determined as the target of the command execution determination.
Digital broadcasting receiving apparatus and scramble channel deciding method capable of shortening time required for scramble decision
In a digital broadcast receiving apparatus, a receiver receives video packets or audio packets configuring a program of digital broadcast. A selector selects a part of the video packets or the audio packets of each channel received by the receiver. A determination unit determines whether or not decoding of the part of the packets selected by the selector has been completed normally. A decision unit decides requirement for descramble processing of each channel based on the determination result of the determination unit.
Obscuring form data through obfuscation
Obscuring form data to be passed in forms that are sent in messages over a communications network. The form data to be obscured is removed from a form and inserted as a portion of a Uniform Resource Location (“URL”) string. The obscured form data may comprise hidden fields and/or links. An obfuscation is then applied to the portion of the URL string, thereby obscuring the information for sending on an outbound message. The original information is recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. In one aspect, the obfuscation comprises encryption. In another aspect, the obfuscation comprises creating a tiny URL that replaces the portion of the URL string.
Method and system for identifying an application type of encrypted traffic
The present relates to a method and a system for identifying an application type from encrypted traffic transported over an IP network. The method and system extract at least a portion of IP flow parameters from the encrypted traffic using at least one of specific target encryption types. Then, the method and system transmit the extracted IP flow parameters to a learning-based classification engine. The learning-based classification engine has been trained with unencrypted traffic. Then, the method and system infer at least one corresponding application type for the extracted IP flow parameters.
Information access apparatus, program storage medium and method
An information access apparatus has an activation state permitting an information access to a recording medium, and a non-activation state permitting a change to the activation state. The apparatus comprises: a medium access section that permits, in the activation state, information access and ejection of the recording medium out of the information access apparatus; an instruction operating section that receives instruction operation for instructing the ejection of the recording medium; and an activation control section that controls change from the non-activation state to the activation state of the information access apparatus in such a manner that when the recording medium is loaded, change from the non-activation state to the activation state is permitted in response to reception of the instruction operation by the instruction operating section, and when the recording medium is not loaded, change from the non-activation state to the activation state is inhibited.
Manageability extension mechanism for system firmware
A method and system to manage an extension mechanism for firmware is described. A firmware binary file is stored in an extension area of a storage device of a computer system. The Basic Input/Output System (BIOS) of the computer system is modified to access the stored firmware binary file stored in the extension area. In one embodiment, the computer system is Extensible Firmware Interface (EFI) compliant.
Determinative branch prediction indexing
Systems, apparatuses, and methods for determinative branch prediction indexing are described herein. The determinative branch prediction indexing method includes receiving a program counter address for a branch instruction, dynamically selecting a branch indexing scheme from a plurality of branch indexing schemes, and generating a branch prediction index based at least in part on selected branch indexing scheme and the program counter address. Other embodiments may be described and claimed.
Allocating registers for loop variables in a multi-threaded processor
A multi-threaded processor comprises a processing unit (PU) for concurrently processing multiple threads. A register file means (RF) is provided having a plurality of registers, wherein a first register (LI) is used for storing loop invariant values and N second registers (LVI-LVN) are each used for storing loop variant values. Furthermore N program counters (PCI-PCN) are provided each being associated to one of the multiple threads, wherein N being the number of threads being processed.
Context switching with automatic saving of special function registers memory-mapped to all banks
A microcontroller device has a central processing unit (CPU); a data memory coupled with the CPU divided into a plurality of memory banks, a plurality of special function registers and general purpose registers which may be memory-mapped, wherein at least the following special function registers are memory-mapped to all memory banks: a status register, a bank select register, a plurality of indirect memory address registers, a working register, and a program counter high latch; and wherein upon occurrence of a context switch, the CPU is operable to automatically save the content of the status register, the bank select register, the plurality of indirect memory address registers, the working register, and the program counter high latch, and upon return from the context switch restores the content of the status register, the bank select register, the plurality of indirect memory address registers, the working register, and the program counter high latch.
Register file having multiple windows and a current window pointer
In an arithmetic processing unit adopting register windows, a configuration is made such that the reading process of a register file is controlled by two stages of a current window selection and a register selection, and the register selected at a plurality of reading ports of the register is set to each port in advance such that it will be out-of-order executable. Accordingly, the process of reading the data into an arithmetic section is possible without having a temporary memory, and an instruction subsequent to a window switching instruction is also out-of-order executable.
Lattice-based computations on a parallel processor
Circuits, methods, and apparatus that reduce the amount of data read from an external memory by a processor when performing calculations on data sets such as matrices or lattices. In one example, a computation algorithm is executed by threads running on a parallel processor such as a single-instruction, multiple-data processor, which stores computational data in on chip memories. Data to be processed by a group of threads is read from the external memory and stored in a first on-chip memory, while a copy of data to be processed at a later time by the group of threads is stored in a second on-chip memory. Data in the first on-chip memory is processed multiple times before being written to the external memory. Processing data multiple times and keeping a copy of data for later use reduces the amount of data to be retrieved from memory, thereby improving computational efficiency.
Transposing array data on SIMD multi-core processor architectures
Systems, methods and articles of manufacture are disclosed for transposing array data on a SIMD multi-core processor architecture. A matrix in a SIMD format may be received. The matrix may comprise a SIMD conversion of a matrix M in a conventional data format. A mapping may be defined from each element of the matrix to an element of a SIMD conversion of a transpose of matrix M. A SIMD-transposed matrix T may be generated based on matrix M and the defined mapping. A row-wise algorithm may be applied to T, without modification, to operate on columns of matrix M.
Memory management system
This memory management system has: (a) a logical partition management unit that manages allocation and release of a virtual memory used by an application in a logical address space; (b) a physical partition management unit that manages allocation and release of small size parts into which a physical memory is divided in a physical address space; and (c) a converter unit that converts an address between the logical address space and the physical address space.
Load rebalancing for shared resource
Various aspects of a data volume or other shared resource are determined and updated dynamically for purposes such as to provide guaranteed qualities of service. For example, the number of partitions in a data volume and/or the way in which data is stored across those partitions can be updated dynamically without significantly impacting the customer using the volume. The data stored to the volume can be striped or otherwise distributed across a number of logical areas, which then can be distributed across the partitions. Separate mappings can be used for the data in each logical area, and the logical areas in each partition, such that when moving a logical area only a single mapping has to be updated, regardless of the amount of data in that logical area. Further, logical areas can be moved between partitions without the need to repartition or redistributed the data in the data volume.
Virtualized storage system and method of operating thereof
A storage system and method is provided including physical storage devices controlled by storage control devices constituting a storage control layer operatively coupled to the physical storage devices and hosts. The storage control layer includes a first virtual layer interfacing with the hosts, operable to represent a logical address space available to said hosts and characterized by an Internal Virtual Address Space (IVAS); a second virtual layer characterized by a Physical Virtual Address Space (PVAS), interfacing with the physical storage devices, and operable to represent an available storage space; and an allocation module operatively coupled to the first and second virtual layers and providing mapping between IVAP and PVAS. Each address in PVAS is configured to have a corresponding address in IVAS. The allocation module facilitates management of IVAS and PVAS, enabling separation of a process of deleting certain logical object into processes performing changes in IVAS and PVAS, respectively.
Preemptive in-pipeline store compare resolution
A computer-implemented method that includes receiving a plurality of stores in a store queue, via a processor, comparing a fetch request against the store queue to search for a target store having a same memory address as the fetch request, determining whether the target store is ahead of the fetch request in a same pipeline, and processing the fetch request when it is determined that the target store is ahead of the fetch request.
Water marking in a data interval gap
A storage device in which file data is divided into multiple blocks for storage on a recording medium. The storage device includes an additional data storing section for storing additional data to be recorded on the recording medium in association with the data to be written, a position determining section for determining recording positions on the recording medium where the blocks should be respectively written, based on the additional data, and a block writing section for writing the respective blocks on the recording positions on the recording medium determined by the recording position determining section. The additional data thus defines a gap length between blocks of recorded data. During a read operation, if the gap length does not comport with the additional data, then an error is assumed.
Methods and systems for creating full backups
A computer-implemented method may create a first full backup of a set of data units at a first point in time. The method may create, at a second point in time, a representation of one or more data units in the set of data units that have been modified since the first point in time. The method may determine, based at least in part on the representation of one or more data units that have been modified since the first point in time, a difference between a state of the set of data units at the first point in time and a state of the set of data units at the second point in time. The method may use the difference to update the first full backup to a second full backup that comprises modifications made to the set of data units between the first and second points in time.
Computer system and method for performing remote copy using journal
A computer system for performing a remote copy using a journal so as to maintain conformability of data stored in a secondary storage system even though a time stamp is not granted to write data received by a primary storage system. A storage managing unit issues an ID, such as a time stamp number (TS#) next to an immediately previously issued ID to one or more primary storage systems (PDKCs) at regular or irregular intervals. Upon receiving a write command, each PDKC prepares a journal (JNL) including a replica of write data and the newest ID from the storage managing unit, and transmits the journal to a secondary storage system (SDKC). The SDKC stores a received JNL and reflects up to a particular JNL of non-reflected JNLs in a secondary volume. The particular JNL has an ID older by one than the oldest ID of the newest arrival completion IDs in one or more SDKCs.
Transferring learning metadata between storage servers having clusters via copy services operations on a shared virtual logical unit that stores the learning metadata
A virtual logical unit that stores learning metadata is allocated in a first storage server having a first plurality of clusters, wherein the learning metadata indicates a type of storage device in which selected data of the first plurality of clusters of the first storage server are stored. A copy services command is received to copy the selected data from the first storage server to a second storage server having a second plurality of clusters. The virtual logical unit that stores the learning metadata is copied, from the first storage server to the second storage server, via the copy services command. Selected logical units corresponding to the selected data are copied from the first storage server to the second storage server, and the learning metadata is used to place the selected data in the type of storage device indicated by the learning metadata.
Analysis and timeline visualization of storage channels
The visualization of a storage access on a timeline that represents various disk access events, such as a storage read event, or a storage write event. The storage access timeline may be formulated using event data gathered regarding storage access events, such as storage read requests, or storage write requests. The timeline may be displayed in conjunction with non-storage events, such as thread events, process events, processor events, or such, in order to give a visual indication of what is causing the storage access events. There may even be a control for displaying an identification of the file being accessed for one or more of the storage access events. With a better understanding of correlation between storage access events and application operation, optimization of the application itself may be achieved to more efficiently interface with the storage medium.
This invention makes it possible to use an inexpensive memory as the line memory of a decoding circuit. To do this, a command comparator separates compressed data into a first command that requires memory access and a second command requires no memory access. A decoder requests memory read of decompressed data necessary for decompression of the first command, decodes the first command based on the decompressed data, and requests memory write of decompressed data obtained by decoding. A RAM access controller controls read and write of a RAM cache and a line memory and executes memory read and memory write corresponding to a request from the decoder.
Concurrency control using slotted read-write locks
A system and method for concurrency control may use slotted read-write locks. A slotted read-write lock is a lock data structure associated with a shared memory area, wherein the slotted read-write lock indicates whether any thread has a read-lock and/or a write-lock for the shared memory area. Multiple threads may concurrently have the read-lock but only one thread can have the write-lock at any given time. The slotted read-write lock comprises multiple slots, each associated with a single thread. To acquire the slotted read-write lock for reading, a thread assigned to a slot performs a store operation to the slot and then attempts to determine that no other thread holds the slotted read-write lock for writing. To acquire the slotted read-write lock for writing, a thread assigned to a slot sets its write-bit and then attempts to determine that the write-lock is not held.
Reducing remote reads of memory in a hybrid computing environment by maintaining remote memory values locally
Reducing remote reads of memory in a hybrid computing environment by maintaining remote memory values locally, the hybrid computing environment including a host computer and a plurality of accelerators, the host computer and the accelerators each having local memory shared remotely with the other, including writing to the shared memory of the host computer packets of data representing changes in accelerator memory values, incrementing, in local memory and in remote shared memory on the host computer, a counter value representing the total number of packets written to the host computer, reading by the host computer from the shared memory in the host computer the written data packets, moving the read data to application memory, and incrementing, in both local memory and in remote shared memory on the accelerator, a counter value representing the total number of packets read by the host computer.
Methods for managing ownership of redundant data and systems thereof
A storage system according to one embodiment includes a first storage tier; a second storage tier; logic for storing instances of a file in the first storage tier and the second storage tier; logic for determining an ownership status for each instance of the file in the storage system, wherein the ownership status includes owned and unowned; logic for determining a location of each instance of the file in the storage system; logic for determining whether each instance of the file in the first storage tier is being accessed or not being accessed; logic for assigning each instance of the file to one of a plurality of indices using the determined ownership status, location, and whether the instance is being accessed; logic for receiving a request to access the file or instance thereof from a user; logic for selecting an instance of the file based on an assignment of the instance of the file to one of the indices; and logic for providing the user with access to the selected instance of the file or copy thereof. Additional systems, methods, and computer program products are also presented.
Patterns of access and/or behavior can be analyzed and persisted for use in pre-fetching data from a physical storage device. In at least some embodiments, data can be aggregated across volumes, instances, users, applications, or other such entities, and that data can be analyzed to attempt to determine patterns for any of those entities. The patterns and/or analysis can be persisted such that the information is not lost in the event of a reboot or other such occurrence. Further, aspects such as load and availability across the network can be analyzed to determine where to send and/or store data that is pre-fetched from disk or other such storage in order to reduce latency while preventing bottlenecks or other such issues with resource availability.
Pre-fetching content items based on social distance
Retrieving content items based on a social distance between a user and content providers. The social distance is determined based on, for example, user interaction with the content providers. The content providers are ranked, for the user, based on the determined social distance. Prior to a request from the user, the content items are pre-fetched based on the ranked content providers and constraints such as storage space, bandwidth, and battery power level of a computing device of the user. In some embodiments, additional content items are retrieved, or retrieved content items are deleted, as a variable-size cache on the computing device fills or changes size.
Cache memory structure and method
The invention relates to a cache memory and method for controlling access to data. According to the invention, a control area which is advantageously formed separate from a data area is provided for controlling the access to data stored in the cache and to be read by applicative processes. The control area includes at least one release area with offsets and data version definition sections.Application to shared memories for client server architectures.
Managing home cache assignment
Managing cache memories in a computing system comprising multiple cores includes: assigning home cache locations for portions of data stored among caches in a group of caches of respective cores; accessing a first one of the portions of the cached data by sending an access request to a first home core of that first one of the portions of cached data; tracking a history of access for the first one of the portions of cached data; determining whether the tracked history of access for the first one of the portions of cached data exceeds or meets a predetermined condition, and re-assigning a home cache location of the first one of the portions of cached data from the first home core to a second, different home core when the predetermined condition is met or exceeded.
Methods for managing ownership of redundant data and systems thereof
A storage system according to one embodiment includes a first storage tier; a second storage tier; logic for storing instances of a file in the first storage tier and the second storage tier; logic for determining when to migrate an instance of the file associated with a first user and stored on the first storage tier to the second storage tier; logic for searching for an instance of the file or portion thereof on the second storage tier that is not associated with any user; logic for associating the instance of the file or portion thereof on the second storage tier with the first user; and logic for disassociating the instance of the file on the first storage tier from the first user. Additional systems, methods, and computer program products are also presented.
Memory system topologies including a buffer device and an integrated circuit memory device
Systems, among other embodiments, include topologies (data and/or control/address information) between an integrated circuit buffer device (that may be coupled to a master, such as a memory controller) and a plurality of integrated circuit memory devices. For example, data may be provided between the plurality of integrated circuit memory devices and the integrated circuit buffer device using separate segmented (or point-to-point link) signal paths in response to control/address information provided from the integrated circuit buffer device to the plurality of integrated circuit buffer devices using a single fly-by (or bus) signal path. An integrated circuit buffer device enables configurable effective memory organization of the plurality of integrated circuit memory devices. The memory organization represented by the integrated circuit buffer device to a memory controller may be different than the actual memory organization behind or coupled to the integrated circuit buffer device. The buffer device segments and merges the data transferred between the memory controller that expects a particular memory organization and actual memory organization.
A method is used in improving deduplication efficiency. Metadata of a data object is evaluated for determining write activity of the data object. Based on the write activity, deduplicating technique is applied to the data object.
Storage system comprising nonvolatile semiconductor storage media
Logical-physical translation information comprises information denoting the corresponding relationships between multiple logical pages and multiple logical chunks forming a logical address space of a nonvolatile semiconductor storage medium, and information denoting the corresponding relationships between the multiple logical chunks and multiple physical storage areas. Each logical page is a logical storage area conforming to a logical address range. Each logical chunk is allocated to two or more logical pages of multiple logical pages. Two or more physical storage areas of multiple physical storage areas are allocated to each logical chunk. A controller adjusts the number of physical storage areas to be allocated to each logical chunk.
Managing device wearout using I/O metering
The number of writes to a device (“D1-n”) consisting of n sub-devices (“Da”) is counted: [ W 1 , 1 … W 1 , m - 1 W 1 , m W 2 , 1 … W 2 , m - 1 W 2 , m … … … … W n , 1 … W n , m - 1 W n , m ] where: Wa,b is the number of writes to sub-device Da in time period “b”; n>1; m>1. A write rate is determined for each sub-device Da at the end of time period p (“WRa,p”) using the following equation: WR a , p = ∑ b = 1 p W a , b ∑ b = 1 p t b where: tb is the amount of time in time period “b”; p
PCI express multiplier device
An improved PCI Express multiplier device is disclosed. The PCI Express multiplier device comprises two or more device attachers to attach at least two identical PCI Express devices; a root complex attacher to attach a PCI Express root complex; a copier to copy and forward PCI Express data packets from the root complex to all of the attached identical devices; a collector to collect PCI Express data packets sent from the attached identical devices to the root complex; a selector responsive to the collector to select and forward PCI Express data packets from the collected PCI Express data packets to the root complex.
Method and system for dynamically managing a bus of a portable computing device
A method and system for dynamically managing a bus within a portable computing device (“PCD”) are described. The method and system include monitoring software requests with a bus manager. The bus manager determines if a software request needs to be converted into at least one of an instantaneous bandwidth value and an average bandwidth value. The bus manager then converts the software requests into these two types of values as needed. The bus manager calculates a sum of average bandwidth values across all software requests in the PCD. With these values, the bus manager may dynamically adjust settings of the bus based on instantaneous or near instantaneous demands from the master devices. This dynamic adjustment of the bus settings may afford more power savings for the PCD during low loads or during sleep states.
Root hub virtual transaction translator
Systems and methods of operating root hub host controllers provide for determining, at a protocol engine having a dedicated port, a speed of a device in response to a coupling of the device to the dedicated port. Data transfer can occur at a second speed between software interface logic of the host controller and the protocol engine, and at the first speed between the protocol engine and the device via the dedicated port, wherein the second speed is greater than the first speed. In addition, data may be transferred in unicast transactions in which no split tokens are exchanged.
Virtual channels for effective packet transfer
The invention sets forth a crossbar unit that includes multiple virtual channels, each virtual channel being a logical flow of data within the crossbar unit. Arbitration logic coupled to source client subsystems is configured to select a virtual channel for transmitting a data request or a data packet to a destination client subsystem based on the type of the source client subsystem and/or the type of data request. Higher priority traffic is transmitted over virtual channels that are configured to transmit data without causing deadlocks and/or stalls. Lower priority traffic is transmitted over virtual channels that can be stalled.
Linkup state generating method, information processing apparatus, and linkup state generating program
A linkup state generating method for generating a state in which linkup is completed in first and second information processing apparatuses, the first and second information processing apparatuses each including a linkup function of, with parameter exchange, comparing parameters included in the first and second information processing apparatuses and adjusting specifications of the parameters so that the specifications of the parameters match each other, the linkup state generating method including setting, from the outside, a parameter in the first information processing apparatus so that a specification of the parameter included in the first information processing apparatus matches a specification of a parameter included in the second information processing apparatus, and sending, from the first information processing apparatus, a signal received from the second information processing apparatus to the second information processing apparatus in a manner that the second information processing apparatus recognizes that parameter exchange has been performed.
Storage integration plugin for virtual servers
A method system and program product to enable a storage device, comprising a storage device meta data device, to communicate with a host comprising a host meta data device, the method comprising inserting meta data into an I/O stream communicated between a host and a storage device and removing meta data inserted into an I/O stream communicated between a host and a storage device, wherein the meta data contains communications between the storage device and the host.
Submodule and method for exchanging peripheral data
A method for exchanging peripheral data and submodule, wherein a transfer means is embedded into an operating system of the submodule for the exchange of the peripheral data with a main module to accelerate a process of copying input/output data from a decentralized peripheral system to a superordinate level.
Device for connecting an electronic unit to screens of different types without distinction, and a corresponding screen
The invention relates to a device for connecting an electronic unit (1) to different types of screen, the device comprising an external connection connector (6) possessing connector elements (10) distributed in a first series for connection to the display members (17, 21) of screens, and a second series for connection to a loudspeaker (18) of a screen of a first type (2) or to the display member (21) of a screen of a second type (3), the device comprising a display line (7) connected to the connector elements of the first series, a sound line (8) connected to a switch member (11) connected to the connector elements of the second series, and a detector element (12) connected to the connector elements of the connector and to the switch member to cause the switch member to take up a connection state when the connected screen is of the first type and a disconnection state when the connected screen is of the second type. The invention also relates to a screen for connection to the device.
State change in systems having devices coupled in a chained configuration
The present disclosure includes methods, devices, and systems for state change in systems having devices coupled in a chained configuration. A number of embodiments include a host and a number of devices coupled to the host in a chained configuration. The chained configuration includes at least one device that is not directly coupled to the host. The at least one device that is not directly coupled to the host is configured to change from a first communication state to a second communication state responsive to receipt of a command from the host.
System and method for dynamically configuring a target device
In accordance with the present disclosure, a method for dynamically configuring a target device comprises receiving by one or more ports of a target device one or more initiator identifiers from one or more initiators. The method further comprises determining whether a plurality of ports received initiator identifiers from a common initiator. The method further comprises configuring the plurality of the ports to operate as a single, logical port if the plurality of ports received initiator identifiers from a common initiator.
Server for aggregating search activity synchronized to time-based media
Where multiple client devices are synchronized to multiple, asynchronous instances of a time-based media presentation such as live and time-shifted views of a television broadcast, interactive content can be delivered to each one of the various devices at a particular time (or “time offset”) within the presentation independent of when each instance of the time-based media presentation is viewed.
System and method for synchronized content rendering in a multi-node network
The trend toward moving to digital content is progressing and expanding every day. With that trend comes the availability of a multitude of content from many content sources. There is a need for this content to be distributed to multiple destinations, and there is a further need to have the content synchronized among those multiple destinations. Embodiments described herein detail a method of synchronizing this content in an asynchronous environment, such as a powerline network, including using a PHY timing flag that is used to compensate for PHY-to-channel-to-PHY delays.
Method, device, and communications system for managing querying mapping information
The present invention discloses a method, a device, and a communications system for managing and querying mapping information. The method for managing mapping information includes: signing a mapping information pair by using a private key of a certificate corresponding to a prefix in the mapping information pair to generate a signed mapping pair; submitting the signed mapping pair to a registration agent (RA) in a transit network; and sharing, by the RA, the signed mapping pair with other RAs through data synchronization. With the mapping information management method, data transmission method, devices and communications system provided by the present invention, the security of mapping information in registration, query, and synchronization operations is guaranteed.
Intelligent message processing
Intelligent message processing is provided for person to person (P2P) messaging by intercepting the message and processing the message before directing the message to the recipient. The messaging system then acts as a person to application (P2A) and application to person (A2P) system, wherein any P2P message can be intercepted and processed as necessary. Such functionality allows any desired processing of the message, such as to allow for transformation, charging, content filtering, screening, parsing, and any other such processing. Further, such an approach allows the message to be received from the sender and directed to the recipient on different channels. A messaging enabler allows the message to be processed using application logic and/or Web services, for example.
Systems and methods for configuring ports of an SAS domain
Systems and methods are provided for automatically configuring ports of devices within an SAS network domain. A domain control element, such as an SAS initiator, is coupled to a plurality of expander devices. The domain control element configures ports of the expander devices by traversing port connections between the expander devices to determine routing attributes of the ports. The domain control element automatically configures the ports to operate according to the routing attributes. In one aspect hereof, an initiator device of the SAS network domain serves as a control element to perform the automated configuration of routing attributes. In another aspect hereof, an expander device serves as a control element to configure routing attributes of the ports.
Video streaming using multiple channels
Systems and methods for streaming video over multiple HTTP channels are provided. The client may have control over the channels, allowing the client to control the amount and source of data received. Data requested by the client may be separated into a set of layers, with each layer being assigned to a separate channel. The client may adjust the number of layers requested based on a variety of factors. Layers may be requested from multiple remote sources, providing the client with additional control over the specific bandwidth profile of received data.
Method and apparatus for waking up a sleeping system
One embodiment of the present invention provides a system that wakes up a sleeping target system located on a target LAN (Local Area Network) from a remote system located on a remote LAN. Because the sleeping target system is in a sleep state, it receives packets of a lower-layer protocol which cannot be used by the remote system to directly send packets to the sleeping target system. During operation, the remote system creates a wake-up packet. The remote system then uses a second protocol to send the wake-up packet to a relay agent located on the target LAN. Upon receiving the first wake-up packet, the relay agent uses the lower-layer protocol to send a second wake-up packet to the sleeping target system, which causes the sleeping target system to wake up.
System and method to define, visualize and manage a composite service group in a high-availability disaster recovery environment
A method for defining and managing a composite service group for a cluster based computer system is disclosed. The method includes instantiating a plurality of application units on a cluster based computer system, wherein the application units implement a business service. The method further includes receiving a composite service group definition, wherein a composite service group enumerates application units, out of the plurality of application units, that implement the business service, and generating a consolidated status of the composite service group. The business service is then started (online)/stopped (offline)/migrated/failed-over/failed-back in accordance with the consolidated status, as a single unit, by using the composite service group.
Networked computer system for communicating and operating in a virtual reality environment
The present invention relates to interactive virtual reality networked computer systems and methods that facilitate communication and operation in a virtual reality environment. The virtual reality networked computer system has an infrastructure that includes a number of users, hosts and servers. The interconnected hosts and servers allow users to effectively locate, activate, access and interact within virtual reality environments in a variety of different ways. For example, users can establish user groups such that interaction within the virtual reality environment occurs between hosts (accessed by users) without the need of a central or dedicated server.
Establishment of a packet communication between a server and a service entity of a radiocommunication network
In order to establish a packet communication between a first server (SS) connected to a packet network (RP) and a service entity (ES) capable of communicating without a subscriber identification module in a radiocommunication network (RR), the service entity transmits an identifier (IdEs) of the service entity (ES) to a second server (SO) that determines an address (Ads) of the first server based on the received service entity identifier. The second server transmits the determined address of the first server to a gateway that interconnects the radiocommunication network and the packet network. The gateway establishes a communication between the service entity and the first server based on the address of the first server.
Intelligent routing of coordinated audio, video, web services and measurement data streams
A system may receive a request from a client station to communicate with any available expert that matches at least one criterion. The system determines an identity of an expert station associated with an expert matching the at least one criterion. The system may then establish a session between the client station and the expert station, where the session includes a first connection and a second connection, the first connection is for transmission of audio/video, and the second connection is for transmission of telemetry data during the transmission of the audio/video. The telemetry data is measured at the client station.
Load distribution apparatus, load distribution method, and storage medium
A load distribution apparatus includes: a control unit that refers to a load information storage unit that stores load values of a plurality of information processing apparatuses, selects an information processing apparatus with the load value smaller than a predetermined threshold from the plurality of information processing apparatuses, and determines the information processing apparatus with the load value smaller than a predetermined threshold as an allocation destination of processing requests until the load value of the information processing apparatus reaches the predetermined threshold; and a transmitting unit that transmits the processing requests to the allocation destination determined by the control unit.
Prioritizing data packets associated with applications running in a networked computing environment
Embodiments of the present invention provide an approach for prioritizing a set of data packets associated with an application running in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, an SLA associated with a particular application and at least one other SLA associated with at least one other application are accessed (e.g., in a database or the like). A proposed modification to a priority of a set of data packets associated with the particular application (e.g., corresponding to a workload being processed via the particular application) is then determined based on a comparison of a current performance (e.g., transmission rate) of the set of data packets versus a specified performance of the set of data packets as set forth in the SLA. Then, an effect of the proposed modification on a capability of the particular application to meet a set of terms of the SLA, and of the at least one other application to meet a set of terms of the at least one other SLA will be evaluated. Based on this evaluation, it will be determined whether to implement the proposed modification. For example, the proposed modification can be implemented if it will not cause any of the SLAs to be unmet.
System and method for a storage area network virtualization optimization
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer.
Detecting online fraud by proxy piercing to identify address of a user device involved in an online transaction
An online machine data collection and archiving process generates a machine data profile of a customer computer accessing a transaction form of a merchant web site and links the machine data profile and a transaction record with customer identifying information using a unique transaction identification string. The process may capture parameters typically communicated as a part of web accesses, such as an IP address, an HTTP header, and cookie information. The process additionally causes the customer computer to process self-identification routines by processing coding within the merchant transaction form, the self-identification routines yielding further profile parameters. The process further includes a routine for bypassing an intervening proxy to the merchant web site to reveal the true IP address of the customer computer. Identifying the customer computer is useful for functions such as fraud detection and marketing.
Method and apparatus for providing access to real time control protocol information for improved media quality control
Various embodiments provide methods and systems operable to provide access to real time control protocol (RTCP) information for improved media quality control. An example embodiment includes a message processor to receive a message, the message including information indicative of an RTP port identifier, and to add to the received message information indicative of an auxiliary RTCP port identifier; and a message communication component to communicate the information indicative of an auxiliary RTCP port identifier to a node.
Method and system for managing network traffic
A system and method for directing network connections. The invention enables a network device to direct subsequent connections from a client to a server for accessing resources. A process extracts a persistence key from a received message, and employs the persistence key to identify the appropriate server. An interface is provided, enabling a user program to direct the process of extracting the persistence key. The invention also provides a way for multiple clients to persist to a common server.
Systems and methods for web service architectures
Web service registry systems and methods, and web service architectures are disclosed. A web service registry system can include a web service registry, a plurality of web services, a plurality of knowledgebase models, and a control system. The plurality of web services can be published to the web service registry for effective dynamic discovery and invocation of the web services. The plurality of knowledgebase models, which can be defined by domain knowledge experts, can be associated with the web service registry. Each of the knowledgebase models can include a semantic specification and a syntactic specification. The control system can periodically filter non-compliant web services from the web service registry, where a non-compliant web service fails to comply with a predetermined knowledgebase model associated with the web service registry. Other embodiments of the web service management systems, architectures, and methods are also disclosed.
System positioning services in data centers
A system and method are disclosed for managing a data center in terms of power and performance. The system includes at least one system positioning application for managing power costs and performance costs at a data center. The at least one system positioning application may determine a status of a data center in terms of power costs and performance costs or generate configurations to automatically implement a desired target state at the data center. A system configuration compiler is configured to receive a request from the system positioning application associated with a data center management task, convert the request into a set of subtasks, and schedule execution of the subtasks to implement the data center management task.
Processing state management device, processing state management method, and program
A processing state management apparatus to be connected to a distribution server that carries out a transaction to register or delete content to be distributed, includes a transmitter which transmits a request requesting the distribution server to carry out the transaction, and a state updater which, after the processing state management apparatus has requested the distribution server to carry out the transaction, holds state information indicative of the state of the transaction in the distribution server as representing processing in progress until the processing state management apparatus receives a notification of completion of the transaction from the distribution server.
Systems and methods for configuring multiple network interfaces
In one embodiment, systems and methods are provided for configuring multiple network interfaces based on a network profile. In one embodiment, a user interface module manages the creation, modification, and deletion of active and inactive profiles, which may be stored to a configuration file accessible to computers with network interfaces belonging to the respective profiles, such as homogeneous or heterogeneous nodes in a clustered network of computers. In one embodiment, a configuration module reads a configuration file with embedded network profiles and builds the appropriate network interfaces according to the interface parameters specified in the network profiles.
Apparatus and method for dynamic host configuration protocol version 6 extensions for configuring hosts with multiple interfaces
An apparatus comprising a plurality of communication interfaces configured to receive a dynamic host configuration protocol (DHCP) reply message comprising routing information for at least one of the plurality of interfaces, and a processor configured to select one of the plurality of interfaces for transmission based upon the routing information. An apparatus comprising at least one processor configured to implement a method comprising receiving a DHCP request message comprising a first multi-homed routing policy entry (MHRPE) option, selecting default route information based upon the first MHRPE option, and transmitting a DHCP reply message comprising a second MHRPE option comprising the default route information. A method comprising receiving a DHCP request message comprising a first MHRPE option, selecting default route information based upon the first MHRPE option, and transmitting a DHCP reply message comprising a second MHRPE option comprising the default route information.
Method for distributing update modules for computer software over a network
A method for distributing update modules for computer software has been developed. The method includes requesting and receiving a list of updated software modules stored on a network server. The user then determines if each updated module is presently installed on the user's system. If the updated module is not installed, the user requests a runtime artifact from the server for the module which is then installed on the user's system.
Computer-readable media, systems, and methods for delegated pre-configuration are described. In embodiments, an identification of a user is received. Further, in various embodiments, one or more pre-configuration instructions is received from a delegate. In various embodiments, one or more online service settings is processed in accordance with the one or more pre-configuration instructions. In various other embodiments an online service is presented in accordance with the processed one or more online service settings.
Method for establishing a network platform for renting the electronic publications
A method for establishing a network platform for renting the electronic publications adopts a grid algorithm, links to the Internet via various networks, and establishes the network platform having an information service grid character for renting the electronic publication. Three types of nodes are established in the information service grid: a first type of node is established as service domain owner and the administrator grid node; a second type of node is established as service provider grid node that is composed of the consumers of the electronic publication; and the third type of node is established as the service provider grid node which is composed of the publishers of the electronic publication; the three types of node provide the network information service by utilizing the grid computing mode and the SOAP. The service provider grid nodes can do online maintenance on the content of the electronic publication provided by them and collect the charge. And the service consumer grid nodes can obtain the service provided by the service provider nodes through the variant service paths, which are provided by the service domain owner and the administrator grid nodes, and pay the service fee.
Method, apparatus, and network system for acquiring content
Embodiments of the present invention disclose a method for acquiring content, where the method includes: acquiring a content request from a client; determining the number of times for requesting requested content; and when the number of times for requesting is greater than a first preset threshold, acquiring the content from a content routing node group in a content network according to the content request, where the content routing node group has a content storage function, and sending the acquired content to the client. The embodiments of the present invention further disclose an apparatus and a network system to which the method is applied. By using the embodiments of the present invention, network transmission redundancy can be reduced, a response speed of user access can be increased, and user experience can be improved.
Method and system for preloading resources
A method and system for preloading data is provided. Resources are preloaded on a client before they are needed by an application. Application hints and static resources lists may be used to indicate resources are needed. The application may begin execution before receiving all of the resources associated with the application. Preloading may be done during execution of an application, or when the application is not executing. Preloading allows an application to run smoothly without consuming more resources than are needed by an application. A prediction graph may be generated that is used in predicting the resources that are likely to be needed by the application. An analyzer may also be used to simulate the system and adjust parameters used in creating the prediction graph.
Method and apparatus for synchronizing feed information
A method and apparatus for synchronizing feed information are provided. A podcasting client includes a synchronization-processing unit which synchronizes first feed information acquired from a connected device with pre-stored second feed information, and a communication interface which transmits feed information of content that is podcast based on the synchronized feed information to the connected device.
Message tying processing method and apparatus
This message tying processing method include: extracting tying keys from a key definition database storing, for each protocol, tying keys included in messages relating to the protocol and used in a message tying processing, and generating data of a structure including nodes respectively corresponding to the extracted tying keys and links connecting between the nodes of the tying keys belonging to the same protocol: judging whether or not a loop is formed in the structure by the links; when it is judged that the loop is not formed in the structure, identifying, among allocation patterns that are combinations of allocation of the tying keys to each of plural tying processors, that respectively carry out the tying processing in cooperation with each other, an allocation pattern satisfying a first condition that a communication load between the tying processors is the minimum.
Diameter session audits
Various exemplary embodiments relate to a method and related network node including one or more of the following: determining by the network device that an S9 session should be audited; determining that the S9 session is a suspect session; transmitting an S9 message to a partner device, wherein the S9 message includes an innocuous instruction; receiving, at the network device, a response message from the partner device; determining, based on the response message, whether the suspect session is orphaned; and if the suspect session is orphaned, removing an S9 session record associated with the suspect session.
Network management system and graphical user interface
A network management system and graphical user interface for configuring a network connection between first and second service access points utilizes a configuration manager and information manager to provide a generic set of models so that different manufacturer's nodal processors and other network hardware can be inserted into the network with minimal changes to the software which controls the device. The system comprises an information manager including routing information for the network. The configuration manager operates to establish a connection across each subnet on the route by sending requests to element managers to program the subnet elements.
Displaying images for people associated with a message item
Technologies are described herein for displaying a list of people associated with a message item along with images and other personal context information in a PIM application. The people associated with the message item are identified and a list is generated containing a name, an image, and other personal context information for each. The list of people associated with the message item is displayed in a window of the PIM along with the information regarding the message item.
Source identification for multipart content validation
A method, system, and computer usable program product for source identification for multipart content validation are provided in the illustrative embodiments. An identification information of a source server is obtained by parsing an update request, the update request being configured to request from the source server an update of a part of the multipart content. The identification information is recorded. A change in a part of the multipart content is observed. The change in the part results in an updated multipart content. A debugging directive is constructed, the debugging directive including the identification information of the source server. The debugging directive is inserted relative to the part that has changed thereby associating the source server with the part of the multipart content. The updated multipart content including the debugging directive is transmitted to a validation server executing in a second data processing system.
Processing selected browser requests
Processing a browser request that specifies a destination network resource generally includes intercepting a browser request that specifies a selected destination network resource and redirecting the browser request to a network server that differs from the destination resource specified by the browser request. Processing a browser request also may include intercepting a browser request received from a client computer at a proxy server when the browser request specifies a selected destination network resource and performing instructions associated with and in addition to instructions performed to download the selected destination network resource.
Facilitating server response optimization
A configuration of cached information stored within a cache is determined. One or more character omission rules are determined by: identifying the one or more optimizable characters based on the configuration, where the one or more optimizable characters are characters in the stored cached information that do not have an effect on an interpretation of the stored cached information by a requester computer; and determining, based on the configuration, one or more conditions under which omission of the one or more optimizable characters from the stored cached information produces a valid result in view of the configuration. One or more character omission rules are applied to the stored cached information by removing from the stored cached information the one or more optimizable characters that meet the one or more conditions.
Sessions to host processes with special requirements
Techniques are disclosed for enabling a system service executing in an isolated session to access system resources (such as a graphics processing unit) that it is isolated from. In an embodiment, the system service creates a “worker” session that is not isolated, and a “worker” process inside that worker session. Then, the system service is able to access the system resource that it is directly isolated from accessing by passing a request to the worker process to access the system resource on the system service's behalf. The worker process does so, and passes a result to the system service.
Managing server load by varying responses to page requests
A web server system regulates its own load level by dynamically varying its responses to requests for like web pages. The responses are preferably varied at least in-part using variables that directly or indirectly specify the type and/or quantity of processing to be performed in responding to requests for dynamically-generated web pages. The type of response generated by the web server system is preferably selected based upon one or more of the following: (a) the current load level of the server system as a whole, (b) the current load levels of specific computing devices or components invoked by the request, and (c) a profile of the user who requests the page.
Performing a binary coded decimal (BCD) calculation
To perform a binary-coded decimal (BCD) calculation, a processor receives values on which the BCD calculation is to be performed. A carry resulting from the BCD calculation is stored in a flag register of the processor, and the carry stored in the flag register is used to compute a result of the BCD calculation.
Device having programmable logic for implementing arithmetic functions
A device having programmable logic for implementing arithmetic functions is disclosed. The device comprises an input port coupled to receive a configuration bitstream; a plurality of configurable arithmetic blocks, each configurable arithmetic block comprising configurable circuits for implementing arithmetic functions according to bits of the configuration bitstream; a plurality of input registers coupled to receive multi-bit input words to be processed by the plurality of configurable arithmetic blocks; and an output register enabled to generate an output word. A method of implementing an arithmetic function in a device having programmable logic is also disclosed.
Caching and memory optimizations for multi-layer XML customization
Embodiments of the present invention provide techniques for customizing aspects of a metadata-driven software application. In particular, embodiments of the present invention provide (1) a self-contained metadata engine for generating customized metadata documents from base metadata documents and customizations; (2) a customization syntax for defining customizations; (3) a customization creation/update component for creating and updating customizations; (4) a customization restriction mechanism for restricting the creation of new customizations by specific users or groups of users; and (5) memory and caching optimizations for optimizing the storage and lookup of customized metadata documents.
Device and method for automatically detecting an unclear description
According to an instruction manual generated by an instruction manual generator, a process log of a practical process performed by a plurality of instruction executers is acquired. A command described in the instruction manual is extracted, and extracted commands are extracted from each process log. The sections of the process logs sectioned by the extracted commands are numbered, and the number of executions of the commands different from the extracted command is counted. When the variance of the number of the executions of a command in a section common in the plurality of process logs is larger than a specified value, the possibility of an unclear description in the corresponding section in the instruction manual is displayed for notification of a different process performed for each instruction executer.
Information managing apparatus, information managing method, and computer product
A method of a computer, the method including the computer authorizing, not only a first user, but also a second user to access data that is created by the first user and is stored in association with a community. Wherein the first user is registered as a member who belongs to a group, wherein a member belonging to the group is authorized to access data that is accessibly stored for the member of the group, and the second user is defined as a superior of the first user in organization information that indicates hierarchical-relation of users and does not belong to the group. The computer rejects access to the data for an additional user, wherein the additional user has been determined not to be within a publication range of the data, even though the user is within a publication range of the community to which the data belongs.
Scalable mechanism for resolving cell-level access from sets of dimensional access rules
Methods and apparatus, including computer program products, implementing and using techniques for resolving cell-level access in a multi-dimensional data structure based on one or more sets of dimensional access rules. A business hierarchy is provided with nodes arranged in a tree structure. An online analytical processing database has several data cubes, where at least some have the business hierarchy as one of their dimensions. One or more rule-based access tables are provided for controlling access to cells of each data cube. Groups of nodes with identical access settings are identified in the business hierarchy. A single access block is generated per node group. Each access block is a serializable access specification object that contains information for generating a complete cell-level mask of access settings for a single node of the business hierarchy. The mask is generated based on the information in the access blocks for each node in the hierarchy.
Selective storing of mining models for enabling interactive data mining
A new data mining model (DMM) is created having at least one of the following characteristics: quality and complexity. The new DMM is handled as a candidate for storing in a storage device if a predefined criterion for the characteristics is met. The sum of the sizes of the new DMM and already stored DMMs is determined. In response to the sum falling below a storage limit, the new DMM is stored in the storage device. In response to the sum exceeding the storage limit, a decision is taken based on priorities of the DMMs which DMMs to store in the storage device.
Care agent call classification
A computer-based method of analyzing call center data comprising collecting reports from customer care agents, wherein the reports comprise logged data of incoming customer calls; compiling the reports into a first data set; dividing the first data set into categories based on the incoming calls; determining a distribution within the categories; removing suspect data from the first data set to form a groomed data set; determining a distribution within the categories of the groomed data set; comparing the distribution of the first data set to the distribution of the groomed data set to form a confidence value; determining limits for a deviation of the data of the reports from the distribution of the groomed data set; comparing the deviation of a given customer care agent to the limits; and taking an action based on the comparing.
Efficient processing of queries in federated database systems
Methods and apparatus, including computer program products, implementing and using techniques for processing a federated query in a federated database system. A federated query is received at a federated database server. A federated query execution plan is generated based on the received federated query. The federated query execution plan defines one or more source servers of the federated database and a unique subquery to be executed on each of the source servers. The subqueries are distributed to the source servers in accordance with the federated query execution plan. The respective subqueries are executed asynchronously at the source servers. The subquery results are passed to a first designated source server defined in the federated query execution plan. The subquery results are joined and aggregated at the first designated source server into a final query result. The final query result is returned to the federated database server.
Systems, methods, and apparatus for facilitating chemical analyses
A knowledge management platform eliminates the trial and error process for analytical chemists in, for example, identifying appropriate methodologies for separating mixtures of chemical compounds. The platform allows the analytical chemists to perform a variety of searches on data existing from previous experiments, procedures, and/or processes. The platform may be employed to make faster decisions, and ultimately decreases the time taken in selecting an appropriate separation methodology.
Presenting a search suggestion with a social comments icon
Disclosed is a method of presenting a search suggestion to a user. The method includes receiving a portion of a search query from the user. Responsive to receiving the portion of the search query, presenting to the user one or more search suggestions and at least one social comment icon corresponding to at least one of the one or more search suggestions. The method also includes selecting the at least one social comment icon to view comments from and websites recommended by at least one friend of the user, the comments and websites pertaining to the corresponding at least one of the one or more search suggestions Also disclosed are computer program products.
Dynamically switching the serialization method of a data structure
Embodiments of the invention comprise a method for dynamically switching a serialization method of a data structure. If use of the serialization mechanism is desired, an instruction to obtain the serialization mechanism is received. If use of the serialization mechanism is not desired and if the serialization mechanism is in use, an instruction to obtain the serialization mechanism is received. If use of the serialization mechanism is not desired and if the serialization mechanism is not in use, an instruction to access the data structure without obtaining the serialization mechanism is received.
Method and apparatus of ordering search results
Ordering search results may include obtaining an exposed log file from a log system, computing a Bayesian posterior probability for relevancy between the log file and a search request, computing an expected value of the relevancy between the log file and the search request based on the Bayesian posterior probability, storing the search request and an identifier of the log file as a key and the expected value of the relevancy between the log file and the search request as a value into a search data structure, in response to receiving a search request submitted by a user, finding expected values of relevancy between the submitted search request and log files that are relevant to the submitted search request from the search data structure, and ordering the found log files in a descending order of the expected values.
Methods, systems, and computer readable media for self-targeted content delivery
Systems, methods, and computer-readable storage media are provided for self-targeted content delivery. Content objects can be delivered to a user and indications from the user to mark any content object can be received thereby generating standard data structures to be placed into a central data store. At a later time, on various other systems, a content guide may be provided to the user showing the content related to the standard data structures placed in the central store. The user may mark digital content as it is encountered via television, internet, mobile devices, automobile terminals, public terminals, kiosks, or otherwise. Standardized data structures can allow the marking to operate across platforms, operating systems, hardware, and delivery modes. Content guides created from data structures associated with marked content can allow the marked content to be recalled and accessed from any of various other systems at a later time.
Directions-based ranking of places returned by local search queries
A system and a method for ranking search results of local search queries. A local search query and a current location of a user are received. Next, two or more places that satisfy the local search query are identified, and for each respective place a corresponding distance from the current location of the user to the respective place is also identified. The two or more places are then ranked in accordance with scores that are based, at least in part, on popularity of the two or more places and the corresponding distances from the current location of the user, to produce a set of ranked places. The ranked set of places is then provided to the user.
Information processing device, content management system, method, and computer readable medium for managing contents
An information processing device includes an instruction accepting unit accepting an instruction, an acquiring unit acquiring content in one of a first mode for automatically beginning content acquisition and a second mode for beginning the content acquisition in response to an instruction to begin the content acquisition accepted through the instruction accepting unit, a storage storing the content, a keyword creating unit creating keywords for the content, a display unit displaying the keywords, and a controller configured to, when the content is acquired in the first mode, control the keyword creating unit and the display unit to create and display the keywords, respectively, in response to an instruction to access the content stored on the storage accepted through the instruction accepting unit. When the content is acquired in the second mode, the controller controls the keyword creating unit and the display unit to automatically create and display the keywords, respectively.
Providing objective and people results for search
Search results may include both objective results and person results. In one example, a search query is evaluated to determine whether it is the type of query that a user might want to ask to a friend. If the query is of such a type, then the search engine may examine a social graph to determine which friends of the user who entered the query may have information that is relevant to answering the query. If such friends exist, then the friends may be displayed along with objective search results, along with an explanation of each friend's relevance to the query. Clicking on a person in the results may cause a conversation to be initiated with that person, thereby allowing the user who entered the query to ask his or her friend about the subject of the query.
Validating translations using visual similarity between visual media search results
Methods, systems, and apparatus, including computer program products, for validating candidate translations for a phrase. A plurality of candidate translations for a phrase are received. A similarity score for each of the candidate translations is calculated. Each similarity score is an estimate of visual similarity between a group of visual media search results responsive to a visual media search query with text corresponding to the phrase and a group of visual media search results responsive to a visual media search query with text corresponding to a candidate translation. One or more of the candidate translations are selected based on the similarity scores. The selected candidate translations are associated with the phrase as valid translations for the phrase.
Interactive web crawler
The claimed subject matter provides a system or method for web crawling hidden files. An exemplary method includes loading a web page with a browser agent, and executing any dynamic elements hosted on the web page using the browser agent to insert pre-determined values. A list of form controls may be retrieved from the web page using the browser agent, and the controls may be analyzed using a driver component. Form control values may be sent from the driver component to the browser agent, and an event may be submitted to the web page by the browser agent or scripted content may be run to trigger operations on the web page corresponding to the form control values. A URL may be generated for various form control values using a generalizer.
In a first embodiment of the present invention, a method for automated creation of a mashup is provided, the method comprising: receiving data needs of a user; identifying sources of data to satisfy the data needs by comparing the data needs to available data sources; retrieving metadata relating to the identified sources of data from a source metadata store; identifying services to satisfy the data needs by comparing the retrieved metadata to available services; retrieving metadata related to the identified services from a service metadata store; and generating a plan for supplying data from the identified sources of data to the identified services based on the retrieved metadata from the source metadata source and the retrieved metadata from the service metadata source.
Creating model or list to identify queries
A server is configured to determine translations of queries from a first language into a second language, associated with a first specialized search engine, to obtain translated queries. The server is also configured to use a first model, associated with the first specialized search engine, to determine values for the translated queries. A value of the values, corresponding to a translated query of the translated queries, reflects a probability that the translated query is a type of query for which first specialized search results are responsive. The server is configured to create training data based on the queries and the values, and to create a second model based on the training data. The second model may be used to predict whether a particular query, received by the web search engine, is the type of query for which second specialized search results, from a second specialized search engine, are responsive.
Method and system for sharing documents between on-demand services
A method for sharing documents between on-demand services is provided. In an embodiment, a user of a first on-demand service may be able to view a list of content that includes content stored at the first on-demand service and content stored at a second on-demand service. The content of the second on-demand service may be associated with information about the content, allowing the content to be shared among multiple users of the first on-demand service. The user wanting to view the content, select or click on an indicator identifying the content, a connection to the second on-demand service is established, and images of the content are sent from the second on-demand service to the first on-demand service.
Visual information search tool
The subject matter disclosed herein relates to generating a search result comprising one or more candidate documents selected based at least in part on one or more criteria associated with an input value of a visual information metric.
System and method for data compression using compression hardware
A system and method for data compression using compression hardware is disclosed. In accordance with the method, a data set in a data stream is received. The data set includes a set of data descriptor fields. The data set is portioned into one or more data subsets using the set of data descriptor fields. One or more tabular slices and an index are generated for at least one of the data subsets using the set of data descriptor fields. The one or more tabular slices are identified by the index. The one or more tabular slices are compressed into a compressed data block by a data compression scheme using a hardware compressor. A compression data file is generated in a database. The compression data file has a header that stores information about the data compression scheme. The compressed data block is stored in the compression data file.
Contextual gravitation of datasets and data services
Through proactive structured dataset management, suggestions are made for dataset enrichment, cleansing, and other enhancements. Users need not go looking for potentially helpful datasets online or in an enterprise filesystem, because relevant datasets and services will be automatically suggested, based on a samplex cast from the user's dataset. Enrichment may add typed attributes, rows, and/or cell values from a matching dataset, may cleanse data, and may add another dataset which has data about the same entity as the original dataset. Proactive dataset and service matching occurs inside a security perimeter to protect confidentiality. Confidence in suggested modifications may be shown by color differences. Modifications may be previewed, and kept or reverted after acceptance. Suggestions are made in from-example or from-scratch scenarios. Samplex, preview, modification, and other modules reside in an architecture that supports a variety of data sources and dataset service providers, in an auction or other market.
Method and system for database recovery
A business process catalog is built using pattern analysis of historical data of a database and deploying the built business process catalog to perform database recovery, A first set of statements are logged for transactions of a first business process batch and compared with a second set of statements. The second set of statements is included in a second business batch process stored in the business process catalog. The business process catalog is updated based on the comparison of the first and second sets of statements. The built business process catalog is deployed to identify and present business process batches to a database system user to select a business process batch used to perform the database system recovery.
Archiving de-duplicated data on tape storage media using graph partitions
Embodiments of the invention relate to data archiving on storage medium such as magnetic tapes based on graph partitioning. One aspect of the invention concerns a method that comprises representing a file system as a graph where each node of the graph represents a file and each edge represents file chunks common to the files corresponding to the nodes connected by the edge. The graph is repeatedly partitioned into disjoint sub-graphs. If the files and duplicate file chunks associated with a sub-graph fit into a data storage medium, then the files and duplicate file chunks are stored in the medium. Otherwise, the method may partition the sub-graph into smaller disjoint sub-graphs taking into consideration of degrees of connectivity of the nodes.
User interface for backup management
Systems and methods for providing a user interface including earlier versions of data. In one implementation, computer program product is provided. The computer program product generates a user interface. The user interface includes a view display area for presenting a current view and a history view display area for presenting a history view associated with the current view. The history view includes one or more first visual representations of corresponding earlier versions of the current view. The user interface also includes an input control for initiating a restoration of the current view according to at least a portion of an earlier version of the one or more earlier versions.
Massively scalable object storage system for storing object replicas
Several different embodiments of a massively scalable object storage system are described. The object storage system is particularly useful for storage in a cloud computing installation whereby shared servers provide resources, software, and data to computers and other devices on demand. In several embodiments, the object storage system includes a ring implementation used to associate object storage commands with particular physical servers such that certain guarantees of consistency, availability, and performance can be met. In other embodiments, the object storage system includes a synchronization protocol used to order operations across a distributed system. In a third set of embodiments, the object storage system includes a metadata management system. In a fourth set of embodiments, the object storage system uses a structured information synchronization system. Features from each set of embodiments can be used to improve the performance and scalability of a cloud computing object storage system.
System and method for backing up test data
In a method for backing up test data using a first backup device and a second backup device, backup times and storage paths for each test computing device in the first backup device and the second backup device, and a backup path of each test computing device are set. Test data of each of the test computing devices are backed up as backup data to the first backup device if a first current time of the first backup device matches the backup time in the first backup device, or to the second backup device if a second current time of the second backup device matches the backup time in the second backup device. Changes of each backup file of the backup data stored under the storage path are recorded. A log file of the backup time is generated.
A system and method for publishing a file on a network is. A caching service reduces the load on the publisher's server by publishing that the file is at a fictitious network location. Requests directed to the fictitious location are received by the caching service and the fictitious network location is parsed to determine what file is being requested. If the caching service already has a copy of the file, then the copy is transmitted to the requestor without alerting to the requester that the address is fictitious. If the caching service does not have a copy of the file, then a copy is automatically obtained based on information contained in the fictitious network location.
System, method, and computer program for real time remote recovery of virtual computing machines
Systems, methods, and computer program products are provided for deployment of a plurality of guest computing systems in two or more locations simultaneously. The individual components of the system, method, and computer programs that compose the backup, recovery, networking, license management, and security enhancements; the collection of some or all of these components into a single system are also described.
Systems and methods for tracking parcel data acquisition
In some embodiments, scripts may be used to perform parcel data acquisition, conversion, and clean-up/repair in an automated manner and/or through graphical user interfaces. The scripts may be used, for example, to repair geometries of new parcel data, convert multi-part parcel geometries to single part parcel geometries (explode), eliminate duplicate parcel geometries, append columns, create feature classes, and append feature classes. These scripts may be executed in a predetermined manner to increase efficiency. In some embodiments, different combinations of attributes may be appended to stored parcel data. In some embodiments, a tracking application may be used to track information about sources of data. In some embodiments, a tracking application may be used to track which system users are assigned to specific tasks (e.g., in a data acquisition project).
System and method for file coordination
An apparatus and method are described for performing file coordination operations on a computer system. For example, one embodiment of a system for performing file coordination comprises: a file coordination service having arbitration logic for arbitrating among different read and write processes attempting to perform file read and write operations, respectively; and a file presenter representing a file opened by a file editing application and registering the opened file with the file coordination service; wherein prior to permitting a read/write process to perform its designated read/write operation, the file coordination service notifies the file presenter and waits for a response from the file presenter indicating that the read/write operation may proceed.
Test strategy system and method for accounts held direct at-fund
A system and method for a user to test and transfer data from a client's database or network to a host's database or network is disclosed. A user acquires data information from a client and the user uses this information to generate a spreadsheet, and to populate the spreadsheet with assumed values based on the information received from the client. The user requests and receives a test file from the client and uses a developed algorithm to reformat the file so that it is consistent with the host's database configuration. The user determines the consistency between the reformatted file and the host's database by comparing the reformatted file to the previously generated spreadsheet. Any inconsistencies identified alert the user that the file reformatting algorithm needs updating.
Model-driven event detection, implication, and reporting system
An event analysis system monitors information available from both publicly and privately distributed networks of information for events that are relevant to the user's particular business concerns. Those concerns are defined in a customized model of the user's organization and external business environment. The system receives the information, detects events in the information, interprets the events, and determines implications of these events. The detection and implication proceeds with regard to specific entities, relationships between entities, and definitions of the types of events which may occur in the environment in which the entities exist. Accordingly, the analysis system intelligently adapts its processing to recognize and report events which may be of interest for any particular entity.
Determining relative skills of players
There is a desire to provide a way to determine relative skills of players of games such as computer games, chess, tennis and any other suitable type of game. Our earlier Bayesian Scoring system is implemented in Xbox Live (trade mark) and is currently commercially available under the trade name TrueSkill (trade mark). Here we build on our earlier work and use a new method of computation to enable processing times to be significantly reduced. Message passing techniques are adapted to enable computation of updated skill beliefs to be obtained quickly even in the case of multiple teams of multiple players.
Temporal rule-based feature definition and extraction
A temporal rule-based feature extraction system and method for extracting features from temporal-based rules satisfied by a trace. Once a temporal-based rule is found that is satisfied by the trace, then embodiments of the temporal rule-based feature extraction system and method leverage that rule to either use as a feature or to extract additional features. The extracted feature then is used to characterize the trace. Embodiments of the system include a feature definition module, which defines features based on the temporal-based rules satisfied by a trace, and a similarity measure module, which defines a similarity measure for the defined features. The defined features include both extrinsic features, which are based on extrinsic properties of the rule, and intrinsic features, which are based on intrinsic properties of the rule. The similarity module generates similarity measures that indicate the similarity of two traces.
Lazily enabled truth maintenance in rule engines
Some embodiments of a method to lazily enable truth maintenance in a rule engine have been presented. A rule engine can enable truth maintenance on an object type basis. In response to a working memory action involving a particular object type, the rule engine may check a truth maintenance parameter of the object type involved to determine if truth maintenance for the object type has to be enabled. If so, the rule engine may enable truth maintenance for the object type.
Method for approximation of optimal control for nonlinear discrete time systems
A method for approximation of optimal control for a nonlinear discrete time system in which the state variables are first obtained from a system model. Control sequences are then iteratively generated for the network to optimize control variables for the network and in which the value for each control variable is independent of the other control variables. Following optimization of the control variables, the control variables are then mapped onto a recurrent neural network utilizing conventional training methods.
Retrieval systems and methods employing probabilistic cross-media relevance feedback
In a retrieval application, a document relevance scoring function comprises a weighted combination of scoring components including at least one of a pseudo-relevance scoring component and a cross-media relevance scoring component. Weights of the document relevance scoring function are optimized to generate a trained document relevance scoring function. The optimizing is respective to a set of training documents including at least some multimedia training documents and a set of training queries and corresponding training document relevance annotations. A retrieval operation is performed for an input query respective to a database using the trained document relevance scoring function to retrieve one or more documents from the database.
Sharing social network information
Social network information may be shared across online service providers. Thus, one online service provider M that maintains a membership separate from a second online service provider N may nevertheless use the social network maintained by the second online service provider N to tailor content and/or services based on such social network information.
Online card present transaction
An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.
Application hierarchy and state manipulation
An instance of an application hierarchy can be stored on a client computer to facilitate enforcement of software licensing by a software license component of a software protection system. The application hierarchy is a tree structure (e.g., unordered) that includes a top node, one or more product offering group(s), and, one or more selling unit(s).A computer-implemented software protection system can facilitate enforcement of software licensing on a client computer. The software protection system includes a software license component that can store and enforce software licensing rule(s). The software license component can further manipulate state data of an instance of the application hierarchy stored in a licensing data store via application program interface(s) (APIs). State data and/or property(ies) of a particular node of the instance of the application hierarchy can be accessed through the API via an assigned identifier.
Content delivery system and content delivery method
In a content delivery system, delivery of content and charging the fee of the content are performed and managed in a highly secure and effective fashion. If a content-purchasing request is transmitted from a user device to a shop server, a charging process is performed. A user device authentication server, which manages content delivery, converts an encrypted content key KpDAS(Kc) encrypted using a public key of the user device authentication server (DAS) into an encrypted content key KpDEV(Kc) encrypted using a public key KpDEV of the user device. If the charging process is successfully completed, the shop server transmits, to the user device, the encrypted content key KpDEV(Kc).
Watermarking system and methodology for digital multimedia content
An open digital watermark system and methodology having various features for unifying watermark production and processing among diverse user multimedia terminals (112), such as set top box, that may be OPIMA compliant. In accordance with specific aspects, intentional image warping is employed to combat pirating, the analog video channel used to download programming, packet signature implemented for watermark insertion by pixel replacement and use of the data stream made to reduce local data processing and storage.
Encryption switch processing
A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is disclosed. One embodiment of the invention is directed to a method comprising receiving, at a payment processing network, a request to establish a secure communications channel between a consumer device and the payment processing network. Upon establishing a secure communications channel with the consumer device, the payment processor network receives non-financial electronic content from a merchant at the payment processing network where the non-financial electronic content is selected at the merchant by a user associated with the consumer device. The non-financial electronic content is sent to the consumer device from the payment processing network via the secure communications channel between the consumer device and the payment processing network.
System and method for the automated auditing and viewing of transaction documents
One aspect of the invention is a method and system for auditing transaction documents that includes searching a database to identify transaction documents satisfying at least one query criteria. The transaction documents are pre-loaded in a temporary storage space, and a first transaction document is displayed to a user. A user input is received from the user. In response to receiving the user input, at least one operation is performed on the first transaction document. A second transaction document is automatically displayed to the user without further user input.
System, program product, and computer-implemented method for loading a loan on an existing pre-paid card
Embodiments of the present invention provide systems, program products, and methods of loading a loan on a pre-paid card. A bank receives authorization from a lender to credit loan proceeds from the lender to an approved borrower on an existing pre-paid card associated with the pre-paid card processor. Next, the bank credits the loan proceeds to the pre-paid card processor for the existing pre-paid card so that the loan proceeds are released to the approved borrower and are immediately available.
System and method of a passphrase account identifier for use in a network environment
A system and method for facilitating a financial transaction over a network including use of a passphrase account identifier is described herein. In one embodiment, a system for facilitating a financial transaction over a network comprises a communication interface; and a payment provider system configured to receive via the communication interface a passphrase account identifier from a merchant system, match the passphrase account identifier to a corresponding funding instrument number of a corresponding funding instrument, communicate the corresponding funding instrument number to an issuer system, receive from the issuer system a notification indication of one of acceptance of the funding instrument or decline of the funding instrument, and communicate back to the merchant system the notification indication.
Communication network for gathering information and performing electronic transactions
In certain embodiments, a system for calculating a cost for an electronic transaction comprises one or more processors operable to receive first charge information associated with electronic transactions for a plurality of nodes, one or more memories operable to store the first charge information, the one or more processors further operable to receive a request execute an electronic transaction, determine a route for the electronic transaction comprising two or more of the nodes, determine first charge information applicable to the electronic transaction for the two or more nodes, and calculate a cost for the electronic transaction based at least in part on the first charge information for the two or more nodes on the route.
Method and system for preparing a transfer document
A system and method of preparing a transfer document for a client to transfer services provided by counterparties that require recurring transactions using a first account to use a second account is provided. A cashflow analysis for the first account and a cashflow analysis for the second account are performed to determine for each counterparty and each service the desired date to effect the transfer to avoid undesirable cashflow spikes or interruptions in both accounts. A transfer document for transferring services requiring recurring transactions for each counterparty is electronically generated via at least one computer. Each transfer document identifies at least the service to be transferred, the client, the second account, the desired date for the transfer and proof of authorization from the client. A replica of an account document selected according to the service being transferred and the second account is included on the transfer document.
Financial transaction system
A machine, manufacture, process, composition, and product produced thereby Representatively, there can be a computer-aided method for managing cash flows for a transaction, the method including the steps of: receiving respective descriptions of risks; receiving statistical assumptions for said risks; receiving financial assumptions for said risks; calculating, from the descriptions and the assumptions, expected cash flows corresponding to said risks for time periods; receiving actual cash flows information from occurrence of events corresponding to said risks; accounting for a first party to the transaction owing the expected cash flows to a second party to the transaction; accounting for the second party owing the actual cash flows to the first party; and computing a net settlement, for each of said time periods, between the parties in the transaction to manage the actual cash flows and the expected cash flows.
System and method for swapping of tangible and intangible items
A first user, second user, and third user are registered. Names of a first, second, and third item are stored a website for the first, second, and third users. The items can be tangible items or intangible items. The first user requests the second item. A first credit is removed from the first user and a second credit is stored for the second user when the first user receives the second item. The second user requests the third item. The second credit is removed from the second user and a third credit is stored for the third user when the second user receives the third item. The first credit, the second credit, and the third credit each represents a right to request a future swappable tangible or intangible item for the equivalent value of at least one previously swapped tangible or intangible item.
Method and apparatus for filtering and/or sorting responses to electronic requests for quote
A method and apparatus filters and/or sorts responses to electronic requests for quotes for a product or products offered for sale. The method includes comparing first data of each of a plurality electronic quotes to first data of an electronic request for quote. Each of the plurality of electronic quotes is classified as either a matching quote or a non-matching quote in response to the computer system comparing first data of the plurality electronic quotes and the electronic request for quote. Each matching quote is identified as having first data that equals the first data of the electronic request for quote. Each non-matching quote is defined as having first data that does not equal the first data of the electronic request for quote.
System and method of margining fixed payoff products
A system and method is disclosed for determining performance bonds for fixed payoff products, i.e. contracts which payoff a fixed amount based on the outcome of an underlying event regardless of the value thereof. The worst outcome of the overall portfolio, which may contain more multiple instruments, is calculated, allowing the portfolio to have both long and short positions on the same underlying event and offsets among instruments within the portfolio. A universe of outcomes is constructed including single events with single outcomes, and the probability thereof, and single events with multiple outcomes, each with a probability thereof. Each outcome has an associated price and probability. Low probability events will have low values, resulting in a lower margin requirement. The margin requirement is then the amount of the maximum loss that the portfolio can sustain for any possible outcome of the underlying event, adjusted for the probability thereof.
Weather derivative volatility surface estimation
Systems and methods are provided for determining the volatility of weather derivative option contracts. Volatility levels are initially determined with conventional methods. Unreliable volatility levels are then replaced with futures contracts volatility levels. If the futures contracts volatility levels are not available or appear unreliable, meteorological volatility levels are utilized. The data may be reduced to a three dimensional surface and used when determining margin account requirements.
Methods and systems regarding volatility risk premium index
An exemplary aspect comprises receiving data related to an underlying asset; calculating values corresponding to near-term implied volatility and realized volatility for the underlying asset; and transmitting data sufficient to describe an index based on a difference between the values corresponding to the near-term implied volatility and the realized volatility for the underlying asset. Another exemplary aspect comprises receiving electronic data related to an underlying asset; calculating data sufficient to describe a plurality of call options and a plurality of put options related to the underlying asset and written on a first settlement date; crediting an account with proceeds from selling the call and put options; and debiting the account to settle one or more of the options that are in-the-money on a second settlement date. Other aspects are apparent from the description and claims.
Method for investing working capital
A method of doing business comprises receiving an investment contract offer from a corporate investor specifying a principal amount and a maturation term. The investment contract offer is communicated to a plurality of securities dealers, each of whom may communicate an acceptance of the offer by providing an identification of the securities and a rate. At the end of a predetermined time period, a selection algorithm is used to select the most favorable or aggregation of most favorable acceptances to the corporate investor. In one embodiment of the invention, selection at the close of the predetermined time period is automatic acceptance and is communicated to the corporate investor and to the securities dealer having the selected acceptance.
Methods and apparatus for supporting electronic requests for information and promotions on multiple device platforms in an integrated manner
Methods and apparatus for supporting electronic promotions and electronic requests for information, e.g., in an integrated manner, on multiple platforms including, e.g., cable network systems, cell phones, etc., are described. Rewards and/or benefits are tracked in a centralized manner and a subscriber is allowed to accumulate rewards and benefits in a single account irrespective of which device or platform was used to initiate an eRFI and/or to act upon a promotion. The methods and apparatus of the present invention allow a cable service provider which supports eRFI on set top boxes to use the same eRFI server to provide responses to eRFI requests received from devices, e.g., cell phones and/or E-mail devices corresponding to a service subscriber, to forward electronic promotion information and to reward users in a forwarding chain for redemptions of coupons included in forwarded promotion information. Forwarded promotion information securely identifies each device/user in the forwarding chain.
Method and system for customization by sale of component parts and accessories
A method for selling component parts to a customer over a communications network includes providing a plurality of component part selections over the communications network, the component part selections being from a plurality of different manufacturers. The method further includes receiving a selection of a first component part over the communications network, sending a first image for display to the customer, the first image being of the first component part, receiving a selection of a second component part. The method further includes sending a second image for display to the customer, the second image being of the second component part, such that the second image being displayed in a position proximate the first image and registered relative to the first image to visually depict an assembly having both the first component part and the second component part.
Real-time alert during on-line transaction
Systems, computerized methods and computer program products for alerting consumers during on-line transactions. A consumer utilizes a browser executing on a computer to begin an on-line transaction. An add-on such as a plug-in to the browser detects that the consumer has begun an on-line transaction. The add-on accesses an account of the consumer hosted by a financial management system and compares alert criteria and data of the on-line transaction and before the on-line transaction is completed, generates an alert that is displayed to the consumer if execution of the on-line transaction would generate a pre-determined result relative to the alert criteria, e.g., if the transaction causes the consumer to go over budget or a bank account balance would drop below a certain level. The alert can be a passive notification or an active alert that invokes a waiting or cooling off period or prevents the consumer from completing the transaction.
System and method for community aided research and shopping
A system and method for providing product research help to a consumer doing internet shopping. A consumer helper application for internet commerce has been designed to integrate the techniques that are currently used by many internet consumers into a single application program. For example, the consumer helper application allows a user to take notes, store web site links, store web site annotations, obtain collaborative input, and perform other tasks commonly used by web site consumers. The consumer helper application stores all of the information gathered in a single place. Information provided by other consumers may be shared using the consumer helper application. The consumer helper application will suggest specific items for a consumer to purchase based up on the information gathered by the consumer into the consumer helper application.
Systems and methods for protecting consumer privacy in online advertising environments
Systems and methods are provided for protecting consumer privacy. According to one implementation, a method is provided for protecting consumer privacy in an online advertising environment. The method includes receiving an ad-related communication with associated ad notice metadata containing information about the ad-related communication, analyzing the ad notice metadata, and executing a consumer privacy response based on the analysis.
Managing payment for sponsored content presented to mobile communication facilities
A system and method for targeted delivery of advertising of a first or second sponsor to a plurality of cellular phones of a first or second type by way of a competitive bid auction process includes (a) receiving a credit card datum from a credit card provider; (b) presenting to the first and second sponsor data corresponding to (1) the credit card datum and (2) the first type and the second type of cellular phone; (c) receiving from each sponsor advertising associated with credit card characteristic relating to the credit card datum, wherein each advertising has a different rendering capability associated therewith; (d) attributing a priority to the delivery of the advertising based upon a resultant yield determination; and (e) transmitting the appropriate advertising to the types of cellular phones having the corresponding rendering capabilities of the advertising.
Predictive shopping notifications
This document describes techniques and apparatuses that enable predictive shopping notifications. In some embodiments, the techniques determine a purchase pattern for a product based on a user's purchase history, provide this purchase pattern to potential sellers, receive discount offers for the product from those sellers, and notify the user of these offers through his or her mobile device. By so doing, the techniques enables users to pay less for a product that the techniques predict that the user will want to purchase. Also, in some embodiments, the techniques remind a user to purchase a product based on this purchase pattern, such as through a notification indicating that the user is likely running out of that product.
Promotion on processor and management system
A data processing system employs a unique coded promotional vehicle to attract customers into retail establishments for the purchase of discounted goods. The promotional vehicle includes coupon styled graphics integrated with a code to allow data tracking by the store pursuant to purchases by that customer. The promotional vehicle is easier and less costly to distribute compared to the prior art, avoids cutting of coupons, and post purchase redemptions. The system further allows more targeted discounting at a lower cost, and substantially reducing fraud by eliminating post purchase coupon processing and redemption. Additionally, the system provides for selective deactivation of the code for each discount used by redemption of the vehicle without deactivating the code for the discounts not used so that the code may remain selectively active for future use.
Method and apparatus for transaction tracking over a computer network
An apparatus and a method for tracking transactions over a computer network is provided. An advertisement is provided to a user using a web client, such as a web browser, at a user node. The user selects the advertisement, e.g., by clicking on the advertisement, to request to an ad server for redirection to a transaction node associated with the advertisement. The ad server formats a cookie and provides to the user node. When the user requests a transaction after the redirection, the transaction node sends a transaction confirmation after performing the transaction. The transaction confirmation includes a command to record the transaction. In response to the command, the user node provides a query string and the cookie to the ad server for the transaction to be recorded.
Method and system for providing network based target advertising and encapsulation
A telecommunication system implements a method for providing a targeted on-line advertisement to a user accessing a content provider node of the system. The system further comprises an ad selection node and a user identification node. A generic advertiser provides a generic ad request. Geo-target availability is provided based on a number of requested impressions for the generic ad request and a web site designation. Geographically targeted ad requests are received from one or more child advertisers. A media buy output is determined based on the received information.
System and method for processing financial transactions
The invention relates generally to retail transactions and, more particularly, to systems and methods for monitoring consumer behavior and for providing a secure electronic payment in exchange for goods and services.
Method and system for determining total cost of ownership
Embodiments of the present invention are directed to a total cost of ownership method and system for technology components, applications or business units. The system provides financial reporting costs in information technology terms in order to build a bridge between technology and finance organizations. The method and system utilize data from systems of record for assets and charges, extract this data and deliver output reports and visualizations on the data processing and analysis in order to drive a Total Cost of Ownership for technology components, applications or business units. The method includes bringing data from disparate sources into the computer processor accessing at least one storage medium, validating the data by a Data Quality Engine, processing the data by matching the at least one charge to the at least one asset and performing data analytics and reporting on the Total Cost of Ownership.
Computer-implemented system and method for measuring and reporting business intelligence based on comments collected from web page users using software associated with accessed web pages
According to one embodiment, a computer-implemented method for measuring and reporting business intelligence based on comments collected from web page users using software associated with accessed web pages includes: using a computer system, accessing a plurality of user comments collected from users of one or more web pages using feedback collection software that provides users who access a particular web page a viewable element through which to provide their comments regarding one or more aspects of a business associated with the particular web page; using a computer system, associating each of the plurality of collected user comments with one or more of a plurality of predefined business-related categories; and using a computer system, generating a report identifying, for each of the plurality of predefined business-related categories, one or more quantitative values derived from the collected user comments associated with that business-related category.
Mileage tracking system and method
A mileage tracking system tracks trip data for a user over time, based on trip data provided by the user. The system provides the user with results of the tracking for a specified time period (e.g., a tax year), and the results may be estimated based on the trip data provided by the user as well as trip data provided by other users. The trip data is typically provided by mobile communication devices transmitting the data to a system server, in response to commands entered into the mobile communication devices.
System for work order refinement prior to acceptance and methods thereof
A system and method for managing requests for services, in particular via the use of the Internet, where requests for service may be refined before they are accepted. In response to the receipt of a service request from a service requester, a work order is created and routed to one or more of the service providers for the purpose of having one or more of the selected service providers indicate an acceptance of the work order. This work order can be later refined, for example if changes need to be made, especially in response to queries from the service providers.
Method, system and program product for generating an implementation of a business rule including a volatile portion
A method, apparatus and computer-usable medium for implementing business rules. According to one embodiment, a computer-implementable method includes receiving one or more business rules for an upper level business model, enabling designation of at least a portion of a particular business rule among the one or more business rules as volatile, and transforming the business rules to generate implementation code for the business process modeled by the upper layer business model. The transforming includes automatically generating implementation code by which the portion of the particular business rule is configurable at runtime.
Workers compensation system for determining a cost of insurance based on real-time payroll data
A system/method implemented at an insurance company estimates a final premium charge and more accurate real time estimate during the lifetime of the policy for workers compensation insurance associated with a risk based on: receiving real-time payroll data associated with the risk; monitoring the received real-time payroll data to identify and record raw data elements that have an identified relationship with any of, or a combination of, the following: the risk's business operation, insurability of the risk, character of the risk, or rating parameters associated with the risk's policy; and determining the final premium charge of workers compensation insurance for the risk based on a premium modification that increases or decreases a premium charge based on an evaluation of the recorded raw data elements.
Method and system for data submission management of insurance application in a data processing system
The present invention is a method and system for data submission management of insurance application data by a host data processing system. The invention comprises authenticating the submission of data relative to an insurance applicant. The authenticated data is matched with a set of data points and merged to create a submission to be matched with a set of price points in a quotation routine to establish a quote. The quote is then accepted or rejected by the applicant. If accepted, then the applicant is bound conditionally. A policy is then issued to the applicant in respect of the quote. Subsequently, a set of endorsements may be added to the policy. A policy information routine for matching the insurance application data to a set of data fields is initiated to establish a living folder which can be the source of data for populating other routines, system folders, or report generators.
Method and apparatus of providing a radiation scorecard
The present invention relates to a method to measure, record, analyze, and report cumulative radiation exposure to the patient population and provide automated feedback and recommendations to ordering clinicians and consultant radiologists. The data provided from this “radiation scorecard” would in turn be automatically recorded into a centralized data repository (radiation database), which would be independent to the acquisition site, technology employed, and individual end-user. Retrospective analysis can also be performed using a set of pre-defined scorecard data points tied to the individual patient's historical medical imaging database, thereby allowing for comprehensive (both retrospective and prospective) medical radiation exposure quantitative analysis. Patient safety can be improved by a combination of radiation dose reduction, exposure optimization, rigorous equipment quality control (QC), education and training of medical imaging professionals, and integration with computerized physician order entry (CPOE).
Medical treatment supporting method and medical treatment supporting apparatus for managing nursing care actions
An operating apparatus receives implementation contents of a medical treatment performed on a patient. A recording unit records the received implementation contents. A management unit extracts evaluation data on an evaluation from the implementation contents recorded by the recording unit. The management unit adds the extracted evaluation data to an edit area and edits a summary of an implementation result of the medical treatment. The recording unit records a result of the editing carried out in the management unit.
System and method to aid diagnoses using cross-referenced knowledge and image databases
The present invention is a method and apparatus for increasing the usefulness of visual knowledge in a number of applications. It distills the relationships between characteristics and hypotheses into database form, thereby organizing visual information in a manner suitable to aid the user in the investigation of the various hypotheses (medical diagnosis, pill identification, plant/animal identification, cause of death, cause of accident, etc.). The invention sidesteps unresolved issues around knowledge engineering by not automating a decision making process. Rather, the present invention utilizes a relational database to dynamically respond to textual and visual findings as an aid to assist a user reaching a reasoned conclusion based upon information available by direct observation and comparison with stored image and textual data.
Stretching/shrinking selected portions of a signal
Techniques are described to allow a user of a signal editing tool to “stretch” or “shrink” a selected portion of a recorded signal to change the length of the selected portion of the signal relative to a particular domain, without stretching or shrinking other parts of the signal. In the context of audio signals, techniques are provided to allow a user to “time stretch” an audio signal file to change the duration of the stretched portion of the audio. The user may select how the change affects the total duration of the audio signal. Options are provided for “shifting” the non-selected portion of the signal, or for not shifting the non-selected portion of the signal. When the non-selected portion is not shifted, the signal editing tool automatically generates audio for the gap (for shrinking operations), and automatically deletes audio that overlaps with the stretched portion (for stretching operations).
Methods and apparatuses for identifying audible samples for use in a speech recognition capability of a mobile device
Techniques for provided which may be implemented using various methods and/or apparatuses in a mobile device to allow for speech recognition based, at least in part, on context information associated with at least a portion of at least one navigational region, e.g., associated with a location of the mobile device. A speech recognition capability may, for example, be provided with a set of audible samples based, at least in part, on the context information. Such speech recognition capability may be provided by the mobile device and/or by one or more other devices coupled to the mobile device.
System and method of a list commands utility for a speech recognition command system
In embodiments of the present invention, a system and computer-implemented method for enabling a user to interact with a computer platform using a voice command may include the steps of defining a structured grammar for generating a global voice command, defining a global voice command of the structured grammar, wherein the global voice command building a custom list of objects, and mapping at least one function of a listed object from the custom list of objects to the global voice command, wherein upon receiving voice input from the user the platform object recognizes at least one global voice command in the voice input and executes the function on the listed object in accordance with the recognized global voice command.
Method and apparatus for predicting word accuracy in automatic speech recognition systems
The invention comprises a method and apparatus for predicting word accuracy. Specifically, the method comprises obtaining an utterance in speech data where the utterance comprises an actual word string, processing the utterance for generating an interpretation of the actual word string, processing the utterance to identify at least one utterance frame, and predicting a word accuracy associated with the interpretation according to at least one stationary signal-to-noise ratio and at least one non-stationary signal to noise ratio, wherein the at least one stationary signal-to-noise ratio and the at least one non-stationary signal to noise ratio are determined according to a frame energy associated with each of the at least one utterance frame.
Speech communication system and method, and robot apparatus
This invention realizes a speech communication system and method, and a robot apparatus capable of significantly improving entertainment property. A speech communication system with a function to make conversation with a conversation partner is provided with a speech recognition means for recognizing speech of the conversation partner, a conversation control means for controlling conversation with the conversation partner based on the recognition result of the speech recognition means, an image recognition means for recognizing the face of the conversation partner, and a tracking control means for tracing the existence of the conversation partner based on one or both of the recognition result of the image recognition means and the recognition result of the speech recognition means. The conversation control means controls conversation so as to continue depending on tracking of the tracking control means.
Method and apparatus for speech coding
A method and apparatus for prediction in a speech-coding system extends a 1st order long-term predictor (LTP) filter, using a sub-sample resolution delay, to a multi-tap LTP filter. From another perspective, a conventional integer-sample resolution multi-tap LTP filter is extended to use sub-sample resolution delay. Such a multi-tap LTP filter offers a number of advantages over the prior-art. Particularly, defining the lag with sub-sample resolution makes it possible to explicitly model the delay values that have a fractional component, within the limits of resolution of the over-sampling factor used by the interpolation filter. The coefficients (βi's) of the multi-tap LTP filter are thus largely freed from modeling the effect of delays that have a fractional component. Consequently their main function is to maximize the prediction gain of the LTP filter via modeling the degree of periodicity that is present and by imposing spectral shaping.
Curve editing with physical simulation of mass points and spring forces
A curve editor may model a continuous curve as a finite collection of discrete mass points (among which the curve's mass is distributed) and associated springs. The springs may include damped axial springs between pairs of consecutive mass points, and damped bending springs representing interactions between sets of three consecutive mass points. In response to manipulation of the curve at various mass points, the curve editor may determine new positions and/or velocities of one or more mass points using a real time physical simulation of the spring forces acting at mass points involved in the editing operation. The simulation may be dependent on viscous drag forces and/or on constraints applied to individual mass points, angles defined by consecutive mass points, or an absolute direction of a segment between two mass points. Mass points may be added to or removed from the model by adaptive resampling, and the mass redistributed accordingly.
Extreme event performance evaluation using real-time hysteresis monitoring
Extreme event performance evaluation using real-time hysteresis monitoring. A structure is monitored using one or more sensors. One or more inter-story Hysteresis Loops for the structure are generated in real-time using data from the sensors, thus enabling rapid decision making regarding the structure's condition.
Clock edge grouping for at-speed test
A method of grouping clock domains includes: separating a plurality of test clocks into a plurality of domain groups by adding to each respective one of the plurality of domain groups those test clocks that originate from a same clock source and have a unique clock divider ratio; sorting the domain groups in decreasing order of size; and creating a plurality of parts by adding the respective one of the plurality of domain groups to a first one of the plurality of parts in which already present test clocks have a different clock source, and creating a new part and adding the respective one of the plurality of domain groups to the new part when test clocks present in the respective one of the plurality of domain groups originate from a respective same clock source and have a different clock divider ratio as test clocks present in all previously-created parts.
Method of absorbance correction in a spectroscopic heating value sensor
A method and apparatus for absorbance correction in a spectroscopic heating value sensor in which a reference light intensity measurement is made on a non-absorbing reference fluid, a light intensity measurement is made on a sample fluid, and a measured light absorbance of the sample fluid is determined. A corrective light intensity measurement at a non-absorbing wavelength of the sample fluid is made on the sample fluid from which an absorbance correction factor is determined. The absorbance correction factor is then applied to the measured light absorbance of the sample fluid to arrive at a true or accurate absorbance for the sample fluid.
Method and apparatus for calibrating seeders
A calibration device for calibrating a metering system that dispenses a product to a seeder towed by a farm vehicle is provided for obtaining and maintaining a desired rate of delivery of the product from the seeder. The calibration device includes a first console port positioned at or near the farm vehicle and a second console port at or near the metering system, each operative to receive at least one a calibration console for calibrating the rate of product delivery and adjust the metering system accordingly.
Testing the integrity of products in containers
In order to test the integrity of products in containers, several characteristics of the products are detected with physical measuring methods and a good-bad signal is produced on the basis of the measuring results, for which purpose several of the measuring results are placed in relation to each other, which can consist in the following: the deviations of the individual measuring results from a reference value, optionally after weighting and standardization are added up and the sum is compared to a threshold value. The measuring results can also form a multidimensional area in which one or several boundary surfaces separate the good value areas from the bad value areas.
Nonaqueous electrolyte type lithium ion secondary battery system, method of determining lithium deposition in the system, and vehicle mounting the system
It is arranged to obtain charging voltage when charging voltage is applied to a nonaqueous electrolyte type lithium ion secondary battery and discharging voltage when a discharging current is generated by the battery. A coefficient of a quadratic term of an approximated curve of a quadratic function with respect to changes in value within a sampling period for each of the charging voltage and the discharging voltage is calculated. This calculation is repeated over a plurality of the sampling periods. Based on occurrence situations of symmetry phenomenon and intersection phenomenon in the calculated coefficients, it can be determined whether or not there is a possibility of lithium deposition without disassembling the battery.
Battery learning system
A fuel battery system is comprised of a power source circuit, a rotating electrical machine that is a load, a memory device and a control unit. Here, a battery learning system corresponds to an arrangement including a fuel battery that is a structural component of the power source circuit, a high frequency signal source, an electric current detection means, a voltage detection means, the memory device and a battery learning part that is a structural element of the control unit. An impedance value can be obtained from alternating current components of respective detecting values of the electric current detection means and the voltage detection means. The battery learning unit has an I-V characteristic curve learning module that learns an I-V characteristic curve and a learning prohibition judgment module that judges whether or not an acquiring interval of the impedance value is over a predetermined threshold interval set in advance, and prohibits learning if the former is over the latter.
Fast fault isolation and restoration for distribution networks
In one embodiment, a method includes obtaining information relating to a steady state operation of a portion of an electrical network, the electrical network including a plurality of components, the information being obtained from the plurality of components while the portion of the electrical network is operating at steady state, wherein the information is obtained through a communications network that at least partially overlays the electrical network. The method also includes detecting a fault in the electrical network, isolating the location of the fault, and restoring the electrical network. The fault is detected by at least a first component of the plurality of components. Restoring the electrical network includes determining when the first component owns the fault. Determining when the first component owns the fault includes at least processing the information obtained from the plurality of components.
Apparatus, system and method for measuring resistance of an inhaler
An apparatus, a closed-loop system and method for measuring the resistance of inhalation systems and/or devices are disclosed.
System and method of assessing analgesic adequacy using biopotential variability
The system and method for predicting and measuring a subject's analgesic state and analgesic adequacy. Biopotential signals are obtained from a subject through electrodes. A processor will compute a measure that is representative of the subject's sedative state and/or muscle activity. A metric representative of such measures is then determined. In the case where a measure is taken of both the subject's sedative state and muscle activity the two measures are combined into an index representative of the subject's analgesic state and analgesic adequacy.
Method of determining subterranean formation parameters
A method for assigning a wettability or related parameter to a subvolume of formation located between two or more boreholes is described. The method includes the steps of obtaining measurements of resistivity at a subvolume, obtaining further parameters determining a relation between resistivity and saturation from logging measurements along the two or more boreholes, obtaining geological measurements defining geological or rock-type boundaries within the formation between the two or more boreholes, selecting the subvolume such that it is intersected by the geological or rock-type boundaries; transforming the resistivity measurements into the saturation at the subvolume; and using the saturation and/or the further parameters to determine the wettability or related parameter for the subvolume.
Methods for evaluating drill pattern parameters such as burden, spacing, borehole diameter, etc., at a blast site are disclosed. One method involves accumulating the burden contributed by successive layers of rock and matching the accumulated rock burden to a target value for a borehole having a length related to the average height of the layers. Another method relates to varying drill pattern parameters and characteristics to match blast design constraints, including the substitution of one explosive material for another by the proper balance of materials and/or output energies to the associated rock burden. Analysis of deviations from target rock burdens and corrective measures are disclosed, as well as cost optimization methods. The various methods can be practiced using an appropriately programmed general purpose computer.
Core sample preparation, analysis, and virtual presentation
Core samples may be easily, quickly, and safely split using a fluid cutter, such as a water jet. Cutting may take place upon exit of the sample from the drill tube, or core samples may be placed in core carriers for cutting. Core samples may also be stored and transported in the core carriers. Assessment of core samples is facilitated by scanning the core samples, with the results stored to produce a virtual core sample. Virtual core samples may be displayed on a computing device, including a core sample display device which simulates the appearance of a section of an actual core.
System and method for analyzing trees in LiDAR data using views
A method and apparatus for identifying individual trees in LiDAR data based on the view of a LiDAR data point. In one embodiment, the number of trees represented by a LiDAR data point cluster is estimated based on a calculated value related to the exposure to the sky of a LiDAR data point in the LiDAR data point cluster.
Computer-aided route selection
In some aspects, a processor may receive a starting point and an ending point from a runner. The processor may receive calorie information from the runner. The processor may receive pace information from the runner. The processor may receive a mile marker input from the runner. The processor may display the route based on the starting point and the ending point. The processor may display the number of calories burned based on the route and the calorie information. The processor may display a pace of running the route based on the route and the calorie information. The processor may display a mile marker on the route in response to the first mile marker input.
A method of GPS navigation includes receiving a request for a new route, determining the new route, removing known GPS signal-loss areas from the new route to create a loss-free route, and providing the loss-free route.
Control circuit for an electrochemical gas sensor and method for adjusting an electrochemical gas sensor
An electrochemical gas sensor is provided for a motor vehicle. The gas sensor contains a digital controller and a detection circuit. The digital controller captures, by a feedback input, a value of the voltage applied to the inside of the gas sensor cell. The output of the digital controller provides a control value for the current flowing in the gas sensor cell. The detection circuit is used to detect the properties of the gas sensor cell and to adjust the dynamic control properties of the digital controller corresponding to the properties of the gas sensor cell.
Method for adapting the performance of a fuel prefeed pump of a motor vehicle
In a method for adapting the performance of a fuel prefeed pump of a motor vehicle which has a common rail injection system and an internal combustion engine, after the ignition is switched on and before the internal combustion engine is started, adaptation values are determined and stored which are assigned to the fuel prefeed pump and describe its individual performance. After the internal combustion engine is started, the stored adaptation values are taken into consideration during the determining of an actuating signal for the prefeed pump.
Vehicle control apparatus and control method
With the use of a model expression (FIG. 9C), of which inputs include a desired value of an in-cylinder air amount that is a controlled object of a system and predetermined parameters, such as engine speed (ne), a desired throttle opening degree (θref) required to control the in-cylinder air amount to the desired value is calculated. In this model expression, parameters, such as the engine speed (ne), that oscillate at a relatively high frequency are excluded from subjects of differentiation, and the desired in-cylinder air amount value only is included in the subjects of differentiation.
Method and apparatus for operating an engine using an equivalence ratio compensation factor
A control system and method of controlling operation of an internal combustion engine includes a load determination module that determines an engine load, an equivalence ratio module that determines an equivalence ratio, a correction factor module that generates a correction factor based on the engine load, the equivalence ratio, and the engine speed and an engine operation module that regulates operation of the engine based on the correction factor.
Computer network for calculating aircraft cornering friction based on data received from an aircraft's on board flight data management system
This invention relates to a computer network for calculating the true aircraft cornering friction coefficient of an aircraft runway or taxiway using the data collected by and available in the aircraft Flight Data Recorder (FDR) or other flight data management system, for example, the Quick Access Recorder (QAR). The invention may optionally distribute to personnel in the ground operations of an airport and airline operations, including but not limited to aircraft pilots, airline operation officers and airline managers as well as airport operators, managers and maintenance crews, the most accurate and most recent information concerning the true aircraft cornering friction coefficient to aid in making better and more accurate safety and economical decisions.
Brake control apparatus
Disclosed is a brake control apparatus which includes a brake booster for augmenting deceleration, and which addresses the problem in conventional brake control apparatuses that deceleration and pedal reaction force depend on driver brake pedal input, and thus the pedal response and the ride comfort from the feeling of deceleration are affected by the manner in which the brake pedal is actuated by the driver. The brake control apparatus comprises a pedal reaction force generation unit for generating a pedal reaction force on the brake pedal, and a brake control unit for controlling the brake force in such a way as to suppress driver brake input fluctuations, wherein the pedal reaction force generation unit suppresses pedal reaction force fluctuations in accordance with specific deceleration and pedal reaction force characteristics. The brake control apparatus further comprises a calculation unit for calculating a target deceleration on the basis of lateral jerk information in the left-to-right direction of the vehicle, wherein the brake control unit suppresses the brake force in such a way that the target deceleration is produced and, when the amount by which the brake pedal is depressed reaches a specific amount in respect of the target deceleration, the pedal reaction force generated by the pedal reaction force generation unit may be increased.
Driving force controller of vehicle
A driving force control apparatus includes a driver model which is a functional block adjusting characteristics relevant to human senses and a powertrain manger which is a functional block adjusting vehicle's hardware characteristics. The driver model includes a target base driving force calculation unit (static characteristics) calculating a target driving force from an accelerator pedal position using a base driving force map or the like, and a target transient characteristics addition unit calculating a final target driving force from the target driving force using transient characteristics represented by a transfer function. The powertrain manager includes a target engine torque and AT gear calculation unit and a characteristics compensator compensating for response of the vehicle.
System and method for managing accumulator effects during engagement of a lockup clutch in a torque converter
A method and system for managing accumulator effects during engagement of a lockup clutch of a torque converter includes selecting a pump speed profile that reduces a rotational speed of a pump of the torque converter from an initial value to a rotation speed of a turbine of the torque converter. A pump acceleration profile is determined based on the pump speed profile. Engagement of the lockup clutch is controlled as a function of an inertia of an engine associated with the torque converter, a torque applied by the engine to the pump, the rotational speed of the turbine, the pump speed profile, and the pump acceleration profile.
Control device for vehicular automatic transmission
A control device for a vehicular automatic transmission is provided which can preferably execute backpressure control of accumulators and torque-up control so as to minimize the occurrence of interference between learning on these controls during a gearshift operation. With the control device for the vehicular automatic transmission including the accumulators (104, 106 and 108) operative to control a hydraulic pressure supplied to second and third clutches (C2 and C3) and a third brake (B3), the backpressure control is executed for controlling a backpressure of the accumulators (104, 106 and 108) during the gearshift operation while the torque-up control is executed for raising torque output from an engine (12). Completion of learning on the backpressure control is determined when no completion of learning on the backpressure control is determined, learning on the backpressure control is executed with no execution of the torque-up control. Thus, no interference occur between learning on the backpressure control and the torque-up control.
Method and device for controlling a vehicle movement capability and/or a closure device
A method and a device (1) for controlling a vehicle movement capability and/or a closure device (2), which closes at least one vehicle interface for receiving external feed equipment. It is possible for external feed equipment to be received only when a closure device is open. The vehicle movement capability knows at least the states ‘admissible’ and ‘inadmissible’, and the closure device (2) knows at least the states ‘locked without unlocking enabled (VOF)’ and ‘locked with unlocking enabled (VMF)’. The state of the closure device can be changed depending on at least one state of the vehicle movement capability and/or the state of the vehicle movement capability depending on at least one state of the closure device (2).
Vehicle with a luggage compartment and an operating element
In a vehicle that features a luggage compartment with a cargo opening that can be closed, as well as an operating element that can be actuated in order to open the luggage compartment, an auxiliary function is provided for a function other than the function of opening the luggage compartment and assigned to the operating element while the cargo opening is open such that no additional operating elements.
Method and system for vehicle parking assistance
A method to assist steering of a vehicle equipped with an active steering system when operating in a reverse direction is provided. The method comprises monitoring vehicle operating characteristics and an operator steering input. Boundaries of a target region and a reference point are determined. A target steering angle range is calculated based upon the reference point and the target location. A controlled steering angle of the active steering system is corrected when the operator steering input is outside the target steering angle range. An aspect of the invention included determining the reference point comprising a point of intersection of a first vector and a second vector, the first vector parallel to and passing through a centerline of a rear axle of the vehicle and the second vector perpendicular to and passing through a centerline of an inside front steerable wheel of the vehicle.
A control device is provided for integration in a vehicle that includes, but is not limited to a steering arrangement, that includes, but is not limited to a steering device and a steering column. The control device is configured to control an information display arrangement that includes, but is not limited to a display device. The control device is formed by at least one touch-sensitive surface, which is aligned radially to an imaginary straight line G through a center of the steering device, and/or which is directed toward a driver's and/or passenger's door of the vehicle.
Systems and methods for diagnosing an engine
Methods and systems are provided for an engine. A condition of the engine may be diagnosed based on a combustion torque profile of the engine estimated using signals from a generator operationally connected to the engine and/or other signals associated with the engine. Different types of degradation may be distinguished based on discerning characteristics within the estimated combustion torque profile data. Thus, a degraded engine component may be identified in a manner that reduces service induced delay.
Method and apparatus for transmitting data between a tachograph and a data processing device
A system and method for transmitting data via a transmission path between a tachograph arranged in a vehicle, and a data processing device which is remote from the vehicle. To improve data protection, the transmission takes place via a first path section of the transmission path, which path section is arranged between the tachograph and a communication controller arranged in the vehicle, and a second wireless path section of the transmission path, which path section is arranged between the communication controller and the data processing device. The tachograph in response to an encryption request signal sent from the data processing device to the tachograph encrypts data sent from the tachograph to the data processing device. The data is transmitted in encrypted form from the tachograph to the data processing device both via the first path section and via the second path section.
Method for determining an estimated driving range for a vehicle
A method for determining an estimated driving range for a vehicle that uses battery power for vehicle propulsion, where the estimate is in the form of a range of values as opposed to a single value. In one embodiment, the method adds a positive offset value to an initial estimate value to determine an upper limit, and subtracts a negative offset value from the initial estimate value to determine a lower limit. The positive and negative offset values may be determined separately and on a real-time basis so that the extent of the overall estimated driving range may be influenced by the volatility in power consumption and/or power creation.
Control system and method for remotely isolating powered units in a rail vehicle system
A control system for a rail vehicle system including a lead powered unit and a remote powered unit is provided. The system includes a user interface, a master isolation module and a slave controller. The user interface is disposed in the lead powered unit and is configured to receive an isolation command to turn on or off the remote powered unit. The master isolation module is configured to receive the isolation command from the user interface and to communicate an instruction based on the isolation command. The slave controller is configured to receive the instruction from the master isolation module. The slave controller causes the remote powered unit to supply tractive force to propel the rail vehicle system when the instruction directs the slave controller to turn on the remote powered unit. The slave controller causes the remote powered unit to withhold the tractive force when the instruction directs the slave controller to turn off the remote powered unit.
Aircraft avionics system
An aircraft avionics system (10) for an aircraft, comprising includes a mission system (2), controlled by an open systems mission computer with a tactical communications system (320) and a tactical navigation system (220), The avionics system also includes a civil system (I), controlled by a flight management system with a civil communications system (310) and a civil navigation system (210), The mission system (2) is logically separated from the civil system (I) through separation of a navigation system (20) of the aircraft into a civil navigation system (210) and a tactical navigation system (220), and through separation of a communications system (30) of the aircraft (100) into the tactical communications system (320) and the civil communications system (310), and through the independence of the open systems mission computer from the flight management system, The separation allows the civil system (I) to operate and be updated independently from the mission system (2).
A vehicle security system including a remote control device, such as a keypad and a vehicle battery having a controller arranged to reduce battery power when the vehicle engine is turned off, and arranged to receive a unique code transmitted from the remote control device and to subsequently selectively permit the battery to supply sufficient power to start or drive the vehicle. The battery can be a replacement battery for the vehicle or supplied as an OEM part. The battery controller can be provided with a unique serial number to be directly linked to the vehicle. Authorities can be provided with a control codes that can be transmitted remotely from a police pursuit vehicle to selectively absorb the external power from the vehicle electrical systems and remotely stop the engine in the event of a stolen or misused vehicle.
Method for providing control commands for a vehicle steerable by means of an operating unit and control system for a steerable vehicle of this type
Method and control system for providing control commands for a vehicle steerable by an operating unit or for an image acquisition device of the vehicle by sequential display of acquired image data on an image display device of the operating unit connected to the vehicle via a data transfer connection. The method includes acquiring data of an image recorded by the image acquisition device, acquiring vehicle state data at a time the image was recorded, and compressing the image data. The method also includes transferring the compressed image data and the vehicle state data via the data transfer connection to the operating unit, decompressing the transferred image data to form a displayable image, and displaying the displayable image on the image display device. The method further includes entering an operator command into the operating unit to at least one of change a direction of movement of the vehicle and change a direction of view of the image acquisition device, calculating a new image from the displayable image that takes into account the transferred vehicle state data and the entered operator command, displaying the new image on the image display device instead of the displayable image, and transferring a control command from the operator command to the vehicle via the data transfer connection.
Method for integrating individual load forecasts into a composite load forecast to present a comprehensive synchronized and harmonized load forecast
A method is provided for merging different load forecasts for power grid centers. Area load forecasts are accepted from load forecast engines. A relational database saves load forecast engine data. A comprehensive operating plan integrates individual load forecasts into a composite load forecast to present a comprehensive, synchronized and harmonized load forecast.
Method and apparatus for configuring scheduling on a wall module
The present disclosure relates generally to building control systems and, more particularly, to methods and devices for configuring and/or displaying parameters or other information such as menu screens on a programmable wall module of a building control system. In an illustrative embodiment, a configuration tool may be configured to create a number of screens for the user interface of the programmable wall module based on a number of user inputs received via the user interface of the configuration tool. In some cases, the number of user inputs received via the user interface of the configuration tool may be less than, and sometimes far less than, the number of screens that are created by the configuration tool. Regardless, with the number of screens created, the configuration tool may upload the number of screens to the programmable wall module for use on the user interface of the programmable wall module.
HVAC system with automated blower capacity dehumidification, a HVAC controller therefor and a method of operation thereof
An HVAC controller, a method of operating a HVAC unit and a HVAC system are disclosed herein. In one embodiment, the HVAC controller includes: (1) an interface configured to receive both a latent cooling demand and a sensible cooling demand and (2) a processor configured to direct both a dehumidification function and a cooling function when simultaneously processing both the latent cooling demand and the sensible cooling demand, the dehumidification function based on an operating capacity of an indoor air blower system.
Apparatus and method for controlling environmental conditions in a data center using wireless mesh networks
Various embodiments provide an apparatus and method for controlling environmental conditions in a data center using wireless mesh networks. An example embodiment includes receiving an alert message from a reporting wireless network sensor of a plurality of wireless network sensors via a wireless sensor network, the alert message including information indicative of a modification needed to an environmental condition; and using the information indicative of a modification needed to an environmental condition at a networked controller to command a device capable of modifying the environmental condition to modify the environmental condition in a manner corresponding to the information in the alert message.
Robot and control method
A robot one of transfers an article to an external subject and receives the article from the human subject and flexibly copes with changes in human intention. If a pushing force applied to robot hands is sensed, the robot hands grip and pull the article to inform the external subject that the robot hands are prepared to receive the article from the external subject, and transfers the article to the external subject or takes the article from the external subject according to whether the pushing force or a pulling force applied to the robot hands is sensed. If the pulling force applied to a robot hands is sensed, the robot pushes the article to inform the external subject that the robot hands are prepared to transfer the article to the external subject, and transfers the article to the external subject or takes the article from the external subject according to whether the pushing force or the pulling force applied to the robot hands is sensed.
Sheet product dispensers and methods for controlling the dispensers
Sheet product dispensers and methods for controlling the dispensers are provided. A sheet product dispenser includes a housing and a dispensing assembly disposed in the housing. The dispensing assembly is configured to hold a roll of sheet product thereon and to dispense a portion of the roll of sheet product. The sheet product dispenser further includes an ultraviolet light source disposed on the housing. The ultraviolet light source is configured to emit ultraviolet light.
Method and apparatus for sensing object load engagement, transportation and disengagement by automated vehicles
A method and apparatus for sensing object load engagement, transportation and disengagement by automated vehicles is described. In one embodiment, the method includes processing data that is transmitted from a sensor array comprising at least one device for analyzing a plurality of objects that are placed throughout a physical environment, executing an object recognition process on the sensor array data using model information to identify at least one object, determining orientation information associated with the at least one object, wherein the orientation information is relative to the lift carriage and positioning at least one lifting element based on the orientation information.
Method of configuring a dicing device, and a dicing apparatus for dicing a workpiece
A method of configuring a dicing device 101, which dices along a cutting line of a workpiece 111 according to a dicing step, is disclosed. Numerical input of a dicing order of the dicing device 101 to dice a workpiece 111 is time-consuming and prone to errors. The disclosed method comprises the step of depicting a graphical user interface 202, which includes a layout 203 of the workpiece 111 that further includes a plurality of cut lines relating to respective cutting lines along the workpiece 111. The disclosed method further comprises the step of graphically contacting a cut line from the layout 203 through a user-interface device 201, to allow selection of the cut line before the selected cut line is assigned to the dicing step of the dicing device 101. By providing the plurality of cut lines in the layout 203 that are graphically contactable through the user-interface device 201, the method advantageously allows an easier process of configuring the dicing step of the dicing device 101. Also disclosed are a dicing apparatus for dicing a workpiece 111, as well as a computer-readable medium having a computer program for instructing a computer to perform the disclosed method.
Method and apparatus for generating control data for controlling a tool on a machine tool
The present invention relates to a method and apparatus for generating control data for controlling a predetermined tool on a machine tool for machining a workpiece clamped in the machine tool from a blank to a finished part. Machining geometry model data of a machining geometry of the workpiece at a machining time are compared with finished part geometry model data in order to determine a difference geometry between the machining geometry and the finished part geometry. On the basis of the determined difference geometry, a machining path is determined for the predetermined tool for removing material from the workpiece, and path data is generated such that a maximally large part of the volume of the difference geometry is removed per time unit in dependence of a maximum machining volume of the predetermined tool.
Vacuum processing apparatus and program
Provided is a method for controlling efficient transferring operations in a vacuum processing apparatus with a linear tool. In the apparatus, plural transferring robots are arranged in transferring mechanism units in which plural process chambers are connected with each other, and to-be-processed wafers are received and passed between plural transferring robots. As the transferring robots is far from the load lock, the number of transferring operations to the process chambers is set larger, the number of times of continuous transferring operations to the process chambers is set as small as possible, and an odd number of times of continuous transferring operations to buffer rooms is set, by a destination determination unit and operation control rules. Further, transferring operations are performed based on the destination determination unit and the operation control rules.
Methods for constructing an optimal endpoint algorithm
A method for automatically identifying an optimal endpoint algorithm for qualifying a process endpoint during substrate processing within a plasma processing system is provided. The method includes receiving sensor data from a plurality of sensors during substrate processing of at least one substrate within the plasma processing system, wherein the sensor data includes a plurality of signal streams from a plurality of sensor channels. The method also includes identifying an endpoint domain, wherein the endpoint domain is an approximate period within which the process endpoint is expected to occur. The method further includes analyzing the sensor data to generate a set of potential endpoint signatures. The method yet also includes converting the set of potential endpoint signatures into a set of optimal endpoint algorithms. The method yet further includes importing one optimal endpoint algorithm of the set of optimal endpoint algorithms into production environment.
Process and system for manufacturing a customized orthosis
A process and system for fitting, customizing and manufacturing an orthosis for a subject. 3-dimensional coordinates for a plurality of landmarks corresponding to anatomical characteristics of the subject, means for attachment of the orthosis to the subject, and a reference plane are digitally acquired. Then, coordinates of one or more virtual landmarks corresponding to one or more anatomical joint centers or joint projection locations are calculated. The landmarks are clinically aligned in a reference position of one of the anatomical joint centers and a customized digital model of the orthosis is created using the clinically aligned landmarks. Finally, the orthosis is fabricated using a computer aided manufacturing process, based upon an output from the customized digital model.
Audio signal processor and audio signal processing system
Even when a system is made to have a configuration in which a plurality of transmission paths are connected to each other, a transmission-impossible time in each transmission path caused by changing a clock source to a device of a different transmission path can be shortened. In an audio signal processing system including first and second networks connected to each other through a bridge device, the bridge device operates as a slave in the first network and as a master in the second network. When the second network is reset, the bridge device starts to operate as a slave in the second network. Then, when continuous reception of an audio transmission frame that another device operating as a master in the second network has transmitted is started, the bridge device resets the first network and starts to operate as a master in the first network.
Automatic selection of representative media clips
A system determines human recognizable labels for portions of an electronic media stream, gathers data associated with the electronic media stream from a number of media players, and determines at least one section of the electronic media stream with a particular media feature. The system selects a representative clip for the electronic media stream based on information regarding the labeled portions, the gathered data, and the at least one section.
Adaptive conductive lead systems
The invention describes fluid-based lead systems. The fluid-based leads may be used for sensing from, and stimulating of, human tissue. The fluid-based leads can be used to transfer signals between two locations. The fluid-based leads offer advantages when communicating signals along their length since the leads may be safely used in magnetic environments and offer increased elastic characteristics which are less prone to breakage. The leads can be used externally or with implantable devices, such as those used to monitor, and deliver therapy during the treatment of medical disorders such as cardiac and neurological disorders.
Techniques for sensing and adjusting a compliance voltage in an implantable stimulator device
Disclosed herein are methods and circuitry for monitoring and adjusting a compliance voltage in an implantable stimulator devices to an optimal value that is sufficiently high to allow for proper circuit performance (i.e., sufficient current output), but low enough that power is not needlessly wasted via excessive voltage drops across the current output circuitry. The algorithm measures output voltages across the current source and sink circuitry during at least periods of actual stimulation when both the current sources and sinks are operable, and adjusts the compliance voltage so as to reduce these output voltages to within guard band values preferably indicative for operation in transistor saturation. The output voltages can additionally be monitored during periods between stimulation pulses to improve the accuracy of the measurement, and is further beneficial in that such additional measurements are not perceptible to the patient.
Apparatus for the stimulation of neural networks
An apparatus (100) is described which comprises at least one measuring unit (31-34) for recording test signals from neurons, a generator unit (10) for generating electrical stimulation signals in accordance with the test signals, and a plurality of stimulation units (11-14) that are connected to the generator unit (10). The stimulation units (11-14) stimulate a plurality of neural networks in a deferred manner by means of the stimulation signals and thus induce a deferred activity in the stimulated neural networks.
Multi-coil wireless communication system for an implantable device
An implantable medical device comprising first and second coils each comprising one or more circular windings defining a diameter. Each of the first and second coils have a length, wherein the diameter of the one or more windings of the first coil are greater than the length of the first coil, and wherein the diameter of the one or more windings of the second coil are smaller than the length of the second coil, and wherein at least one of the one or more windings of the first coil is substantially orthogonal to at least one of the windings of the second coil.
System and method to design structure for delivering electrical energy to tissue
A computer-assisted method can include defining a target volume of tissue activation to achieve a desired therapeutic effect for an identified anatomic region. At least one parameter can be computed for an electrode design as a function of the defined target volume of tissue activation. The computed at least one parameter can be stored in memory for the electrode design, which parameter can be utilized to construct an electrode.
Nerve stimulation and blocking for treatment of gastrointestinal disorders
Systems and methods of using a system for treating a gastrointestinal disorder characterized by dysmotility of a gastrointestinal organ. A system comprises a first electrode adapted for placement on the vagus nerve at a stimulation site proximal to at least one site of vagal innervation of a gastrointestinal organ, a second electrode adapted for placement on the vagus nerve at a site proximal to the stimulation site, a third electrode adapted for placement on the vagus nerve at a distal blocking site distal to the stimulation site, an implantable controller comprising at least one circuit for generating a neural conduction blocking signal connected to the second and third electrode, at least one circuit for generating a neural conduction stimulating signal connected to the first electrode; and an external programmer configured to communicate at least one parameter for the neural conduction blocking signal to the implantable controller; and an external coil adapted to be worn by the patient, wherein the external coil is connected to the external programmer, and is adapted to inductively couple to the implantable controller.
Subthreshold stimulation of a cochlea
An implantable apparatus, such as a cochlear implant, for delivering electrical plasticity informative stimuli to a neural network of an implantee. The apparatus comprises a stimulator device (40) that generates stimulation signals, and an electrode array (20) that receives the stimulation signals and delivers the stimuli to the neural network of the implantee in response to the signals. The stimuli delivered to the implantee facilitates and/or controls the production and/or release of naturally occurring agents into the neural network to influence the functionality thereof.
Hermetically sealed feedthrough case
An implantable medical device includes a housing component comprising a flexure; and a ceramic feedthrough attached to the flexure such that the flexure reduces transmission of forces from housing component to the ceramic feedthrough. According to one illustrative embodiment, the implantable medical device is a cochlear implant which includes a titanium feedthrough case made up of a body portion and a flexure; and a ceramic feedthrough being hermetically joined to the flexure by an active braze, the flexure reducing transmission of forces from the titanium feedthrough case to the ceramic feedthrough.
Power converter for use with implantable thermoelectric generator
Method and apparatus for converting the output of a thermoelectric generator to voltages compatible with implantable medical devices is provided. One apparatus includes an implantable thermoelectric generator. The apparatus includes an input terminal for receiving an input voltage generated by a thermoelectric energy converter and a charging inductor connected in series with the input terminal. The apparatus also includes a switching Field Effect Transistor (FET) connected to the inductor, and a capacitor connected to the FET and the input terminal via a diode. The FET is switched with a frequency and duty cycle such that a voltage level at an output terminal is compatible with an implantable medical device. According to various embodiments, the FET is switched using a closed loop feedback system that controls the frequency and duty cycle based on an observed voltage level at the output terminal. Other aspects and embodiments are provided herein.
Automatic programming of rate-adaptive therapy via activity monitoring
A rate-adaptive pacemaker and a method for its operation in which the response factor for a minute ventilation sensor or other type of exertion level sensor is automatically set during a parameter adjustment mode that utilizes an activity level measurement to determine when the patient is at a target activity level with which is associated an appropriate target pacing rate. In a preferred embodiment, the target activity level corresponds to casual walking (e.g., 2 mph at a 4% grade) with a target pacing rate selected as appropriate for that level of activity in the individual patient.
Evaluating therapeutic stimulation electrode configurations based on physiological responses
A medical system comprises a plurality of electrodes; at least one sensor configured to output at least one signal based on at least one physiological parameter of a patient; and a processor. The processor is configured to control delivery of stimulation to the patient using a plurality of electrode configurations. Each of the electrode configurations comprises at least one of the plurality of electrodes. For each of the electrode configurations, the processor is configured to determine a first response of target tissue to the stimulation based on the signals, and a second response of non-target tissue to the stimulation based on the signals. The processor is also configured to select at least one of the electrode configurations for delivery of stimulation to the patient based on the first and second responses for the electrode configurations. As examples, the target tissue may be a left ventricle or vagus nerve.
Left ventricle-only and right ventricular safety pacing in the context of multi-site left ventricular pacing
One way in which cardiac resynchronization therapy may be delivered is to only deliver paces to the left ventricle. If left ventricular pacing is inhibited during a cardiac cycle, it may be desirable to deliver a right ventricular safety pace to prevent asystole. Methods and devices for implementing right ventricular safety pacing in the context of multi-site left ventricular-only pacing are described.
Internal medical devices for delivery of therapeutic agent in conjunction with a source of electrical power
The invention generally relates to internal (e.g., implantable, insertable, etc.) drug delivery devices which contain the following: (a) one or more sources of one or more therapeutic agents; (b) one or more first electrodes, (c) one or more second electrodes and (d) one or more power sources for applying voltages across the first and second electrodes. The power sources may be adapted, for example, to promote electrically assisted therapeutic agent delivery within a subject, including electroporation and/or iontophoresis. In one aspect of the invention, the first and second electrodes are adapted to have tissue of a subject positioned between them upon deployment of the medical device within the subject, such that an electric field may be generated, which is directed into the tissue. Furthermore, the therapeutic agent sources are adapted to introduce the therapeutic agents into the electric field. In another aspect, the therapeutic agent sources are polymeric regions that contain one or more types of ion-conductive polymers and one or more types of charged therapeutic agents. In yet another aspect, the therapeutic agent sources are polymeric regions that contain one or more types of electrically conductive polymers and one or more types of charged therapeutic agents.
Intracardiac tracking system
In general, in one aspect, a method is disclosed for determining information about a position of an object. The method includes: (i) causing current to flow between each of three or more sets of current-injecting electrodes on a first catheter inserted into an organ in a patient's body, the organ having a periphery (ii) in response to current flow caused by each set of current injecting electrodes, measuring an electrical signal at each of one or more measuring electrodes located on one or more additional catheters inserted into the organ in the patient's body and (iii) determining the position of each of one or more of the measuring electrodes on the additional catheters relative to the first catheter based on the measured signals from the one or more measuring electrodes.
Infrared endoscopic balloon probes
Balloon probes, adapted for use in endoscopy and other medical procedures, are useful to obtain spectroscopic information reflected or emitted from a tissue of interest in the infrared spectral region. The information collected by the probe is useful in the diagnosis and treatment of disease. The invention also relates to methods utilizing these probes to analyze a surface of interest, in a minimally invasive manner, in connection with the diagnosis and treatment of disease.
Imaging device and method for operating an imaging device
An imaging device is disclosed for generating successive tomograms of an object. In at least one embodiment, the imaging device includes a radiation source, a detector, a positioning unit and a control unit for controlling the positioning unit and for evaluating the recorded data of the detector. In at least one embodiment, it is provided that the control unit is set up for matching a contrast medium protocol, in which parameters for contrast medium administration are stored, provided for examinations in a contrast medium device, to a scan protocol provided for the examination, in which operating parameters for generating successive tomograms are stored, for preventing unnecessary administration phases. This provides for a contrast medium examination with the least possible contrast medium administration.
Device features and design elements for long-term adhesion
An electronic device for long-term adhesion to a mammal includes a housing with an electronic component. The electronic device may include a first wing and a second wing, each being integrally formed with the housing. An electrode is positioned on a bottom surface of each of the wings, the electrodes electrically connected to the electronic component. An adhesive layer is provided for adhesion to a surface of the mammal. The adhesive layer may cover a portion of the bottom surfaces of the wings but generally does not cover the electrode or a bottom surface of the housing. A method of applying an electronic device to a mammal includes removing first and second adhesive covers from first and second wings of the electronic device to expose an electrode and an adhesive coated on a bottom surface of each wing.
Method of low duty mode operation in a femto base station in consideration of a femto cell type
The present invention relates to a broadband wireless access system including a femto cell, and more particularly, to a method of low duty operation in a femto base station. According to one embodiment of the present invention, in a broadband wireless access system, a method of a low duty mode operation of a femto base station saving power includes the steps of determining a low duty mode pattern to be performed by the femto base station according to a preset reference and performing the low duty mode operation according to the determined pattern. In this case, the preset reference can include at least one selected from the group consisting of a battery level, an available resource status and a subscriber type of the femto base station.
Mobile wireless communications device including a self-contained rechargeable battery pack with filter and related methods
A mobile wireless communications device may include a portable device housing, wireless communications circuitry carried by the portable device housing, and a self-contained rechargeable battery pack carried by the portable housing for powering the wireless communications circuitry. The self-contained rechargeable battery pack may include a battery casing, at least one internal battery cell carried within the battery casing, internal battery circuitry carried within the battery casing, and at least one internal filter element carried within the battery casing and coupled to the internal battery circuitry.
System and method for managing local time of contact person of mobile phone
In a method for managing a local time of a contact person of a mobile phone, the mobile phone includes a plurality of contact items. Each of the contact items includes time zone information that indicates a time zone corresponding to a location of a contact person of the mobile phone. Time zone information of a contact item is acquired and is sent to a world clock application of the mobile phone. The world clock calculates a local time of a contact person correspond to the contact item. The local time of the contact person is displayed on a display screen of the mobile phone.
Methods and apparatus for device applet management on smart cards
Methods and apparatus for device applet management on smart cards. A method includes obtaining device applets at a first device, generating a directory structure that identifies platform types and corresponding device applets, and storing the device applets in the directory structure on a smart card so that when the smart card is in communication with a second device supporting a selected platform, device applets associated with the selected platform are accessible to the second device. An apparatus includes a transceiver to obtain device applets at a first device, and a processor generate a directory structure that identifies platform types and corresponding device applets, and stores the device applets in the directory structure on a smart card so that when the smart card is in communication with a second device supporting a selected platform, device applets associated with the selected platform are accessible to the second device.
Method and system for controlling transmission power of a downlink signaling channel based on enhanced uplink transmission failure statistics
A method and system for controlling the transmission power of at least one downlink (DL) enhanced uplink (EU) signaling channel such that enhanced dedicated channel (E-DCH) DL signaling is delivered efficiently and reliably. The system includes at least one wireless transmit/receive unit (WTRU), at least one Node-B and a radio network controller (RNC). At least one of the WTRU and the Node-B compute EU transmission failure statistics on the DL EU signaling channel and report the EU transmission failure statistics to the RNC. The RNC then adjusts a transmission power offset of the DL EU signaling channel to be used in determining transmission power level of the DL EU signaling channel at the Node-B based on the EU transmission failure statistics.
Time-shifting for push to talk voice communication systems
A network communication device located on a Push To Talk (PTT) communication network and configured to provide time-shifting capabilities to a user of a PTT communication device is disclosed. The network communication device includes a receiver configured to progressively receive time-based media. The network communication device also includes a time-shifting buffer for progressively storing the received time based media as the time-based media is received and a time-shifting buffer controller configured to control the rendering of the time-based media at the PTT device.
Call server, call terminal, call system, transfer processing method, and program storage medium storing program thereof
A reception-process manager of a call server writes, in a transfer-voice-data storage, voice data contained in a voice packet received from the transmitter terminal which has acquired the talk right. A transmission-process manager of the call server determines the next transmission interval of a voice packet for each receiver terminal on the basis of determination information received from the each receiver terminal. The transmission-process manager reads out the voice data in a size dependent on the determined transmission interval from the transfer-voice-data storage, generates voice packet containing the voice data for the each receiver terminal, and transmits the voice packet to the each receiver terminal. Thus, the voice-packet transmission interval can be changed for each receiver terminal without stopping voice-packet transmission.
Method for initial scanning of frequencies, frequency scanning controller, and apparatus
A method for initial scanning of frequencies at start-up of a multi-band cellular communication apparatus is disclosed. The method comprises determining whether there is any interfering signal from any other communication system transmitting at a frequency in vicinity of frequencies of frequency bands of which the multi-band cellular communication apparatus is supposed to establish contact with a base station in at least one of the frequencies within the frequency bands. If the determination gives a result of no interfering signal, a first scan procedure is applied comprising plain scanning of the frequencies of the frequency bands of which the multi-band cellular communication apparatus is supposed to establish contact with a base station in at least one of the frequencies within the frequency bands, or if the determination gives a result of an interfering signal, a second scan procedure is applied, taking into account the determined interfering signal. A frequency scanning apparatus for initial scanning, and a radio access circuitry for such initial scanning is also disclosed.
Provision of text messages to emergency call takers
Concurrent text and voice communications can be maintained with an emergency call taker. An application executing on a mobile communications device in conjunction with a network gateway provide voice communication as well as an interactive Short Messaging System (SMS) session with a public safety answering point (PSAP). The gateway correlates and manages SMS messages with the PSAP and the mobile device. As such, a virtual session is generated over a traffic channel, that provides the advantages of a voice call as well as allowing text based communications.
Customized location area paging
Methods for determining a customized location area (CLA) for a subscriber in a cellular network are provided herein. One such method includes the steps of monitoring the cell to which a mobile station registers; storing data corresponding to the cell within a database; determining at least one CLA based upon the data, the CLA each including at least one cell; storing said at least one CLA; utilizing a predictive algorithm to determine which CLA the mobile station is currently located within, if at least two CLAs are stored; and paging each of the cells associated with the appropriate CLA. Other methods are also provided.
Location tracking method in coordinator-based wireless network
A location tracking method in a coordinator-based wireless network is provided. The location tracking method in a coordinator-based wireless network includes transmitting a first frame including its own identifier and time information to the wireless network by a device associated with the wireless network in order to disclose its location information; and receiving a second frame including the location information of the device transmitted from the wireless network by the device, as a response to the first frame.
Apparatus and method for providing cognitive radio access by communication mode guide data in mobile terminal supporting multi communication modes
Disclosed is an apparatus and method for supporting cognitive radio access by communication mode guide data in a mobile terminal supporting a multi communication mode. When the mobile terminal supporting the multi communication mode needs to change an available communication mode according to a movement situation, the mobile terminal can select an optimal available communication mode at the current location, the movement spot or the movement prediction spot.
Round robin assignment based communication system
A round robin assignment based communication system may include a dynamic subscriber identification module (SIM) provisioning module to obtain and selectively assign a phone number to a device from a predetermined number of devices based on a round robin assignment technique to allow each device to communicate upon assignment of the phone number. A machine-to-machine (M2M) application module may determine priority of the phone number assignment to the devices.
Handling resources in a communications network
A method and apparatus for managing Time Division Multiplex resources for a pool of Mobile Switching Center Servers in a communications network. Time Division Multiplex resources are provided at a Media Gateway function serving the pool of Mobile Switching Center Servers. Virtual Time Division Multiplex resources are allocated to each Mobile Switching Center Server in the pool and mapped to the Time Division Multiplex resources. An ISUP signalling proxy function may be provided at the Media Gateway function. TDM resources are allocated to at least one Mobile Switching Center, and associated with an identifier of the Mobile Switching Center Server. The TDM resources are mapped to the Time Division Multiplex resource identifier. When the media Gateway receives an ISUP message, it replaces the identifier with an ISDN User Part signalling proxy function identifier before sending the message to a node in an external network.
Method and apparatus for allocating cell ID in self-organizing network
A method and an apparatus allocate a cell identifier in a self-organizing network. A database stores and obtains position information of a plurality of femto base stations. A Physical Cell Identifier (PCID) reconfiguring unit configures an initial Merge Table (MT) including allocation information of a PCID based on the position information of the femto base station and minimizes the number of rows or columns according to at least one permutation set in the initial MT.
Method and system for implementing the local switch of the local call
The present invention provides a method for implementing local call local switch, including: a calling side MSC receiving a call setup request from a calling user, the calling side MSC and a called side MSC mutually transferring the access information of the calling user and the called user; the calling side MSC or the called side MSC judging whether a local switch can be triggered according to the access information of the opposite end user; when judging that a local switch can be triggered, the calling side MSC or the called side MSC informing BSS to implement the local switch. The present invention further provides a system for implementing local call local switch, which includes a MSC and a BSS, to provide the support to implementing local call local switch.
Femto parameter profiles based upon nearby access point
A system and methodology that facilitates efficiently and accurately defining operating parameters for a femto access point (FAP) is provided. In particular, during provisioning of the FAP, the system obtains operating parameters utilized by a nearby FAP expected to have a substantially similar radio environment as the provisioning FAP. Moreover, weighting is applied to the nearby FAP to determine which set of operating parameters to utilize at the provisioning FAP. Accordingly, pre-existing operating parameters, optimized by the nearby FAP are employed to augment initial network listen measurements performed at the provisioning FAP, and thus improve speed and accuracy of initial FAP parameter provisioning.
Combined base transceiver station and base station controller handoff
A system, method, and computer readable medium for a softer handoff comprises receiving a Pilot Strength Measurement Message (PSMM) to request a handoff by a selector distribution unit (SDU), receiving a softer handoff request message by a channel element control (CEC), receiving a softer handoff request message by a radio call control (RCC), receiving a traffic channel assignment message by the CEC, and receiving an indication of an addition of a new sector for the softer handoff by the SDU.
Systems and methods for autonomously determining network capacity and load balancing amongst multiple network cells
A networked computing system including multiple network base stations, user equipment, a network resource controller (NRC), and a data communications network facilitating communications amongst all devices of the networked computing system. The NRC determines a current radio channel available capacity based on a user load associated with regional user equipment, and then forecasts a maximum radio channel capacity based on the current radio channel available capacity. The NRC may be a network base station and it may determine a number of additional user equipment it can support as a component of the forecast maximum radio channel capacity. The NRC/base station may be further configured to determine a handover threshold utilizing the forecast maximum radio channel capacity, and when the NRC base station's number of users exceeds the handover threshold, one or more user equipment may be handed over to a second network base station with better service capacity.
GPS assisted network administration
Embodiments disclosed herein include methods, apparatus, and system architectures for using GPS within wireless networks to assist with wireless network management including handovers and data transfers, along with navigation decisions within heterogeneous networks.
Handover to an unlicensed mobile network
A cellular radio telecommunication handover system and method for enabling the handover of a mobile telecommunications device between a licensed (cellular) network and an unlicensed mobile network comprising a plurality of low power access points having all of them the same common cell identity (GGI) is disclosed. The mobile telecommunications device establishes a handover between one access point of the licensed network and another access point of the unlicensed network by communication of handover resources therebetween.
Method for obtaining telecommunications services through a telecommunications terminal
A telecommunications service to be obtained for a user is split into a plurality of service components. A telecommunications terminal determines the most appropriate service provider for each service component; each of the service components is obtained by a corresponding service provider; and the telecommunications terminal invokes the functionality of each service component according to the service to be obtained. This is particularly useful for wireless mobile telecommunications terminals.
Apparatus and method for improving mobile terminated cell setup performance during inter-frequency cell reselection
An apparatus and method comprising determining if the timing of a registration system information (RSI) or a paging occasion occurs first; if the paging occasion occurs first, checking for a page and answering the page on the target cell after collecting system information (SI) if the page exists; or if the timing of the RSI occurs first: reading RSI and obtaining a registration area indicator of the target cell; determining if the registration area indicators of a source cell and of the target cell are the same; if not, determining whether checking the page in the source cell would overlap with receiving SI from the target cell; if overlap, or if same, collect SI and monitor a paging channel in the target cell; or if no overlap, checking for the page in the source cell, and if no page, collect SI and monitor the paging channel in the target cell.
Systems and methods for multi-channel sequential detection in cognitive radio systems
Systems and methods for detecting unoccupied channels for a multi-channel cognitive radio system are described. To detect unoccupied channels, truncated sequential detection processes are employed that can use a dynamically extended truncation time that is based on early completion of detection processes applied to preceding channels.
Method and apparatus for setting discontinuous communication interval
An approach is provided for assigning a discontinuous communication interval to a user equipment that is served by a cell associated with a wireless network. The discontinuous communication interval is modified based on speed of the user equipment and size of the cell.
Multi-band wireless cellular system and method
A single wireless cellular system provides cellular service using first and second radio bands, belonging to two different Operators, respectively. The first radio band is located higher in frequency than the second radio band. Subscriber Stations, associated with either of the Operators, or with a third Operator, may perform partial roaming between the two bands within the single wireless cellular system, in order to optimize data throughputs, coverage, or both.
Efficient use of assistance data services in dual/multi-SIM terminals
Method, apparatus, and computer program product example embodiments of the invention are disclosed for providing flexibly in selecting sources for Assisted Global Navigation Satellite Systems (A-GNSS) services. Example embodiments include at least two SIM modules in a wireless communications device to enable accessing at least two different wireless carriers to obtain at least two different sets of A-GNSS capability information. Optimal A-GNSS features are selected from the A-GNSS capability information from the at least two different wireless carriers and combined into a composite set of optimal A-GNSS features. Example embodiments of the invention may include a wireless communications device having at least two SIM modules sharing one or more RF modems.
Apparatus and method for transmitting/receiving activation indicator regarding component carrier in wireless communication system
A method for supporting activation/deactivation of serving cells by a base station (eNB) in a wireless communication system provides decreased overhead and decreased power consumption for a user equipment (UE). The method includes configuring M supportable serving cells in the UE, configuring an indicator indicating activation/deactivation of each of the M serving cells, configuring a medium access control (MAC) message which includes a MAC control element (CE) and a logical channel identifier (LCID), the MAC CE including the indicator configured for each of the M serving cells and having a length corresponding to an integer multiple of 8 bits, the LCID indicating that the MAC CE includes the indicator indicating activation/deactivation of each serving cell, and transmitting the configured MAC message to the UE. Accordingly, a control channel or data channel regarding a component carrier is selectively received depending on whether the component carrier is activated.
Method for dynamic change of operation mode in wireless communication system
Disclosed is a method of operating a femto base station (BS) in a wireless communication system, the method comprising: receiving an access request comprising a closed subscriber group (CSG) identifier (ID) from user equipment (UE); determining a number N of UE accessing the femto BS; ascertaining an access type to determine whether the UE is a CSG UE or a non-CSG UE of the femto BS on the basis of the CSG ID of the UE; and determining whether to admit access of the UE on the basis of the access type, the N and access admittable information, the access admittable information comprising UCSG, i.e., a maximum number of CSG UE of which access is admitted; UALL, i.e., a maximum number of non-CSG UE of which access is admitted; and UMAX, i.e., a maximum number of UE of which access is admitted.
Method and system for network assisted discovery of femto cells
Method and system for a femto serving switch system. A request for registering a wireless device with a femto cell environment is received. The wireless device is registered based on the request with respect to the femto cell environment. Information related to the femto cell environment and one or more applications is then obtained, based on which a femto discovery notification (FDN) is generated. Such generated FDN is then delivered to the wireless device to assist the wireless device to operate in the femto cell environment.
System and method for in-band modem to modem communication
Systems, methods and programmed instructions are disclosed useful for transmitting signals representing data messages to and from a wireless handheld telephony device along a first call leg of a communication session previously established between the wireless handheld telephony device and at least one second telephony device, the communication session being controlled by a call control server.
Communication system, apparatus and method for providing call state thereof
A communication system, an apparatus, and a method for providing a call state thereof are provided. The method for providing a call state of a communication system, supporting communication over a mobile communication network and an interne network, includes, when presence of mobile call execution changes through a base transceiver station over the mobile communication network, notifying the presence of mobile call execution to an Instant Messaging/Presence Service (IM/PS) server managing presence of interne call execution over the interne network by a User Equipment (UE), and sending the presence of mobile call execution to another UE by the IM/PS server.
Systems and methods for accessing content at an event
The accessing of event related content on a client device at an event techniques include a method, and non-transitory computer-readable storage medium. In some embodiments of these techniques, the method includes receiving a request to check-in to the event from the client device. The check-in request includes geographic location information of the client device. The method further includes determining whether the client device is located at a venue holding the event based on the received geographic location information of the client device and a first predetermined radius. The method further includes determining whether the event at the venue is in progress. The method further includes transmitting a first plurality of event information to the client device based upon determination that the client device is located at the venue and the event is in progress.
Wireless satellite digital audio radio service (SDARS) head unit with portable subscription and cell phone abilities
A system and method for automated activation of a radio, or content receiver, used to receive subscription radio services such as XM or Sirius radio. A wireless communications device with a short range data link wirelessly communicates with the content receiver to control the content receiver and receive a unique identification code from the content receiver. The wireless communications device also has its own unique identification code. The wireless communications device transmits an activation request message over a long range wireless communications link to a control station. The activation request message contains the receivers unique identification code and the communications device's own unique identification code. The control station maintains a database of valid identification codes that is used to authenticate the request. If the control station receives a valid request, an activation signal is sent to the receiver to allow operation of the receiver.
Single voicemail for dual-mode phones
Single voicemail for dual-mode phones. Functionality is added to a dual-mode phone such that the dual-mode phone when operating in cellular mode sends a predetermined signal when it answers an incoming call. An enterprise mobility controller, on forwarding a call to the cellular side of a dual-mode phone after failing to complete a Wi-Fi connection, starts a timer. If the mobility controller does not receive the predetermined signal before the timer expires, it assumes that the cellular call has been handed off to the cellular voicemail system, terminates the cellular call, and sends the call to the enterprise voicemail system.
Communications system providing text-to-speech message conversion features using audio filter parameters and related methods
A communications system may include at least one mobile wireless communications device, and a wireless communications network for sending text messages thereto. More particularly, the at least one mobile wireless communications device may include a wireless transceiver and a controller cooperating therewith for receiving text messages. The controller may be switchable between a normal message mode and an audio message mode. Also, the at least one mobile wireless communications device may further include a user interface device connected to the controller for receiving at least one audio mode filter parameter from a user, and an audio output connected to the controller. The controller, when in the audio message mode, may select received text messages based upon the at least one audio mode filter parameter, and output audio messages including speech generated from the selected text messages via the audio output.
Public address system using wireless mobile communication devices
A public address system is set forth, comprising at least one wireless mobile communication device; a sound system; and a back-end system for selectively receiving a wireless signal from the wireless mobile communication device and transmitting the signal to the sound system for broadcast.
System, method and terminal for forwarding incoming call
The present invention discloses a system, method and terminal for implementing the forwarding of incoming call, wherein the method comprises: a terminal A with Wireless LAN Authentication and Privacy Infrastructure (WAPI) function establishing a connection with another terminal B with the WAPI function through a WAPI module; when either the terminal A or terminal B has an incoming call, the terminal having the incoming call forwarding the incoming call to another terminal which has established the connection with the terminal having the incoming call. In the present invention, the incoming calls on the terminal A can be forwarded to the terminal B, and the phone calls on the terminal B also can be forwarded to the terminal A, which is convenient for users to answer the phone calls and can solve the phenomenon of the users missing calls due to various reasons very well.
System and method for profitable operation of an unlimited communications plan
A system and method for profitably operating communications services may include providing a service plan inclusive of at least a portion of the communications services being unlimited for a user. A computing system may collect usage data of the user during a time period associated with the unlimited portion of the service plan. The computing system may determine whether the usage data is indicative of the user using the communications services in violation of service terms and conditions associated with the unlimited portion of the service plan. The computing system may perform an action in response to determining that the user is in violation of the terms and conditions.
Event-based modes for electronic devices
Event-based modes of operation are supported on an electronic device. One or more event-based modes of operation may be automatically or selectively applied to the device when a new life event is detected. The device's previous mode of operation may be backed up to the device or a network location and restored after the event-based mode of operation is no longer applied. The event-based modes of operation may be used to restrict access to certain applications or functionalities on the device, enforce or restrict certain user interface or other types of settings, and add or remove or rearrange the priority of device assets. The new life events associated with event-based modes of operation may be of various types, including location-based events, environment-based events, calendar-based events, news-based events, and usage-based events.
Emergency communications mobile application
An automated system, method or computer program product for providing emergency communications can include an emergency communications application and a MyFlare emergency communications server. The MyFlare emergency communications application can run on a mobile device and can be configured to, when activated, interface with the MyFlare emergency communications server to send preconfigured emergency messages to a preconfigured set of emergency contacts. Different emergency profiles can be preconfigured for which different emergency messages can be sent. Additionally, a different set of emergency contacts can be assigned for different emergency profiles. The emergency communications application can be configured to capture additional information, such as but not limited to GPS location of the device, photo, video, or sound recording, in preconfigured time intervals. The updated information can be sent to the one or more preconfigured emergency contacts as part of the initial emergency message or a subsequent emergency notification update.
Methods and apparatus for emergency tracking
An apparatus includes a set of network communication modules, a communication control module and an input actuator. Each network communication module from the set of network communication modules is configured to send signals to and receive signals from a remote device via a distinct communication mode from a set of communication modes. The communication control module is configured to periodically send a set of second status signals intended to be sent to the remote device via each communication mode from the set of communication modes when the communication control module is in an emergency operating mode and the communication mode is available. The communication control module is configured to switch from the default operating mode to the emergency operating mode in response to receiving an input signal indicating that the input actuator has been actuated.
Emergency message button and method on a wireless communications device for communicating an emergency message to a public safety answering point (PSAP)
A wireless communications device including a housing, a user interface configured to enable a user to type text messages for communication over a communications network, an emergency message button selectable by a user, and a processing unit in communication with the user interface and emergency message button. The processing unit may be configured to generate and send an emergency message to a public safety answering point in response to a user selecting the emergency message button.
Buffer circuit with integrated loss canceling
A filter circuit enhances a deficient Q-value in a filter stage and buffers the filter stage from subsequent filter stages using a common active device. A filter circuit includes a first buffered filtering stage including a first Q-deficient filter stage to receive an input signal and a first Q-enhancement buffer stage. The first Q-enhancement buffer stage is coupled to the first Q-deficient filter stage, wherein the first Q-enhancement buffer stage includes a single active device to increase a Q-value of the first Q-deficient filter stage and isolate the first Q-deficient filter stage from any subsequent filter stage. A filtering method includes filtering an input signal in a first Q-deficient filter stage and enhancing a deficient Q-value of the first Q-deficient filter stage with an active device. The method further includes buffering the first Q-deficient filter stage from any subsequent filter stage with the active device.
Performing power control in a receiver based on environmental noise
In one embodiment, a method includes receiving and processing an incoming radio frequency (RF) signal in a receiver. Based on this signal, an environmental noise level can be determined, where this level corresponds to environmental noise present in an environment in which the receiver is located. Then, if the environmental noise level is substantially greater than receiver-generated noise, power consumption of at least one analog front end component of the receiver can be reduced.
Semiconductor integrated circuit and radio receiver
The first control circuit controls the gain of the variable gain amplifier circuit and the cut-off frequency of the first low-pass filter so as to keep constant a product of a transfer function of the variable gain amplifier circuit and a transfer function of the first low-pass filter. The second control circuit compares a level of the second feedback signal and a preset threshold value after completion of gain control of the variable gain amplifier circuit, the second control circuit inputting the signal outputted from the first low-pass filter, as the first feedback signal to the first terminal as long as the level of the second feedback signal is not lower than the threshold value, the second control circuit inputting the signal outputted from the second low-pass filter, as the first feedback signal to the first terminal.
Squelch detection circuit and method
A squelch detection circuit and method involves a first comparator coupled to a complimentary input signal pair and having a first polarity output. A second comparator coupled to the complimentary input signal pair has a second polarity output. An offset associated with complimentary input signal pair establishes a positive squelch threshold and a negative squelch threshold. A calibration unit coupled to the first comparator and the second comparator generates a digital output including threshold settings and calibration settings to the first comparator and to the second comparator. The digital output can be associated with establishing the offset and with calibrating the positive squelch threshold and the negative squelch threshold.
Methods and apparatuses of network system with power saving functions
A network system includes a wireless network device, a network control device, and a first controller. The wireless network device includes an RF unit for transmitting/receiving frames and a first connection interface unit. The network control device includes a second connection interface unit, wherein the second connection interface unit is coupled to the first connection interface unit via a transmission connection, in order to perform data transmission with the first connection interface unit. When there is no data transmitted via the transmission connection, the first controller turns off at least one of power supplies of the first connection interface unit and the second connection interface unit. The first controller may be disposed in the network control device or the wireless network device.
System and method for digitally controlling the launch of high-power broadband radio frequency waves with high linearity
An apparatus for digitally controlling the launch of high-power broad-band RF waves with high linearity for use with a software defined air-interface system. A wave launcher contains an Eplane array containing a plurality of Epixel partition elements is configured with a master digital controller. The master digital controller processes all signals to be launched as RF waves and develops the digital images necessary for digital synthesizers to format the signals to be converted to analog. A plurality of digital-analog converters coupled with power amplifiers convert the digital signal to analog, and the analog signal is then sent to the partition elements to be transmitted as RF waves.
Transmit power amplification control for wireless device
A system and method are disclosed for controlling transmit power amplification in a wireless transmitting device. A processor receives data to determine whether a communication channel from a transmitting device to a receiving device is strong enough to support a target data transmit rate of the devices with a power amplifier either on or off. The processor controls a switching device between a data transmitter circuit and the transmitter's antenna based on the quality of the communication channel. In a first state, the switching device connects the data transmitter circuit to the power amplifier to increase the strength of the signal communicated to the antenna. In a second state, the switching device bypasses the power amplifier. The power amplifier is turned off when the switch is in the second state, thereby decreasing the power consumed by the transmitting device as it transmits data at the target data transmit rate.
Adaptive average power tracking
Exemplary embodiments of the invention include a request received to change a TX output power setting or a frequency channel setting. In response, the requested TX output power setting is used to generate a TX output signal in the proper frequency channel. Handset circuitry makes OOB power measurements, the results of which are used to determine a VCC2 setting. The VCC2 setting is a setting that results in an MPS requirement just being met. The VCC2 setting is stored in association with the TX output power and frequency channel setting. The determined VCC2 setting is also used to set the VCC2 supply voltage for the power amplifier. Once set, VCC2 remains fixed until the next request. Each individual handset uses this Adaptive Average Power Tracking (AAPT) method, thereby reducing its VCC2 voltage during operation and conserving power. Because each handset uses AAPT, factory calibration to account for unit-to-unit variations in transmitter circuitry performance is avoided.
Antenna arrangement and test method
A method including providing a matching circuit, a first contact connected, without an intervening test connector to a transmitter and/or a receiver, and a second contact, separate from the first contact, connected to the matching circuit; sensing a parameter of the transmitter and/or the receiver by connecting test apparatus to the first contact; and providing an antenna element for coupling with the first contact and the second contact.
Data processing terminal system and transmitting and receiving method using the same
An information processing terminal system includes an information processing terminal; and a transmitting and receiving unit which is attached to the information processing terminal. The transmitting and receiving unit converts a reception wave signal from a network into a reception analog baseband signal. The transmitting and receiving unit converts the reception analog baseband signal into a reception digital baseband signal in synchronization with a clock. The information processing terminal converts the reception digital baseband signal into a reception data in synchronization with a clock, and a transmission data into a transmission digital baseband signal in synchronization with the clock. The transmitting and receiving unit converts the transmission digital baseband signal into a transmission analog baseband signal in synchronization with the clock. The transmitting and receiving unit converts the transmission analog baseband signal into a transmission modulation wave signal to output to the network.
Apparatus including housing incorporating a radiating element of an antenna
An apparatus including an antenna for wireless communications is disclosed. The apparatus comprises an antenna including first and second radiating elements, a circuit adapted to process a signal received from or to be provided to the antenna, and a housing enclosing at least a portion of the circuit, wherein at least a portion of the housing comprises the second radiating element. The second radiating element may forms a base of the housing. Additionally, the second radiating element may be electrically coupled to ground potential. Further, the first radiating element may be situated entirely within the housing, partially within the housing, or entirely external to the housing.
Method of communicating by radio frequencies in a home-automation installation
Method of communicating by radio frequencies in a home-automation installation comprising at least one command transmitter and at least one command receiver, comprising the following steps: receiving by virtue of a radiofrequency receiver of a command receiver a signal transmitted by a command transmitter, —measuring the power level of the signal received, comparing the power level measured with a power level recorded in a memory of powers that are blocked at the level of the command receiver, in the case where the measured power level corresponds to the power level recorded in memory, not processing the signal received.
Methods and apparatus for uplink and downlink inter-cell interference coordination
A method for inter-cell interference coordination (ICIC) by a home evolved NodeB (HeNB) is described. A portion of bandwidth is reserved for a user equipment (UE). Notification of the reserved portion of bandwidth is sent to at least one potentially interfering evolved NodeB (eNB). A data exchange is performed with the UE using the reserved portion of bandwidth. Notification is sent to the potentially interfering eNBs releasing the reserved portion of bandwidth.
Communications devices comprising NFC communicators
A communications device has a NFC communicator (15) having a coupler (17) to couple with a coupler of a near field RF communicator in near field range to enable communication of data between the communicators by modulation of a magnetic field, a demodulator (42) to extract modulation from a modulated signal coupled to the coupler and a modulator (40) to modulate an RF signal in accordance with data to be communicated by the NFC communicator. The device also has at least one secure element (30; 31) separate from the near field RF communicator (15) to provide secure data storage for transaction data representing or relating to a transaction. A controller controls operation of the NFC communicator, reads transaction data from the at least one secure element and causes the modulator to modulate an RF signal in accordance with transaction data read from the at least one secure element so as to communicate the read transaction data to a near field RF communicator in near field range as proof of the transaction to enable an action related to the transaction to be carried out.
Antenna and satellite alignment using beam projections
Disclosed is a satellite beam pointing system that uses color encoded signals from subscribers to align antennas on a satellite and to align the satellite. Subscribers detect the signal strength and signal-to-noise ratio of signals that are transmitted from the satellite. The values of the signal strength and signal-to-noise ratio data are encoded in signals that are transmitted back to a ground station that color encodes the data and graphically displays the signal strength and signal-to-noise ratio of the subscriber received signals. The actual beam projection can then be determined and the satellite antennas moved, so that the actual beam projection coincides with the intended beam projection. Also, the satellite can be properly oriented using this technique.
Accessing LP transponders with CP terminals via wavefront multiplexing techniques
The invention is about a method and apparatus for grouping multiple satellite transponders with both (LP) polarization formats in different frequencies through Wave-Front (WF) Multiplexing (muxing) techniques for ground terminals with incompatible (CP) polarization formats. As a result of this invention, linear polarized (LP) transponders can be accessed and efficiently utilized by circularly polarized (CP) ground terminals and vice versa. This invention consists of conventional ground terminals, a unique organization of space assets, and a unique polarization alignment processor. The applications of wavefront multiplexing techniques to satellite communications offer many potential advantages, including improved flexibility and utility efficiency of existing space assets. Our proposed “Polarization Utility Waveforms” is an entirely new concept in VSAT and Earth Station Antenna diversity. The implementation enables antennas to switch between different polarization formats at the press of a button, and provides tele-port operators with greater flexibility in how they manage their assets.
Mobile phone dock for TV
A mobile telephone docking station that makes use of a TV as a display and that allows use of a standard keyboard and mouse to have a faster, more comfortable means to control the phone. Access to all of the cell phone's functions is allowed through the docking station/TV.
Transmit and admission control for CDMA satellite communication system
A system for performing transmit power and admission control for a satellite based wireless communication systems. Admission control uses centralized admission and distributed admission controls. Centralized admission control uses a maximum persistence value broadcasted from a hub to terminals. Persistence is the probability that a transmission will timely occur. Each terminal transmits a persistence that is no greater than the maximum persistence value. If the transmission fails, the transmission is repeated using the same probability. Lowering the persistence introduces a delay for alleviating congestion. Power control is performed using centralized and distributed power control. Centralized power control uses power control commands transmitted from the hub to each terminal. When an acknowledge is not received, a backoff and recovery procedure is performed. Distributed power control is performed during the recovery process when a terminal fails to receive an acknowledgment message after a predetermined number of attempts.
Computing method and system using detached sensor
One embodiment includes a computer-implemented method using a window environment of a display, with a detached imaging sensor, to enable a user to learn. Another embodiment includes a computer-implemented system helping a user learn using a detached imaging sensor. In yet another embodiment, a computer-implemented system monitors automatically more than once a user's behavior while the user is working on materials. Through monitoring the user's volitional or involuntary behavior, the system determines whether to change what is to be presented by the display. The change could include providing rewards, punishments, and stimulation; or changing the materials. The system can also react by asking the user a question. Based on the user's response, the system may change to more appropriate materials, or different presentation styles.
Image forming apparatus
The present invention includes an image forming unit, a reversing unit configured to reverse the sheet on which the image has been formed by the image forming unit, a reconveyance path which conveys the sheet reversed by the reversing unit to a feeding path for forming an image on the sheet by the image forming unit again, a position detection unit which is provided on the reconveyance path and configured to detect a position of the sheet in a width direction, a skew-feeding correction unit which is provided on the reconveyance path and configured to correct skew-feeding of the sheet, wherein the position detection unit is disposed on the downstream of the skew-feeding correction unit in reconveyance path, wherein the image forming unit corrects the position of the image to be formed on the sheet, which is conveyed through the reconveyance path, based on a signal from the positioning detection unit.
Sheet measuring apparatus and image forming apparatus
A sheet measuring apparatus includes a first rotating member including a first peripheral surface portion that contacts a transported sheet; a second rotating member including a second peripheral surface portion that contacts the first peripheral surface portion; a first rotation amount detecting unit that detects a first rotation amount of the first rotating member; a second rotation amount detecting unit that detects a second rotation amount of the second rotating member; a sheet calculation unit that obtains a first rotating member correction value for correcting an error that is superposed on the second rotation amount due to a radius distribution of the first rotating member and that performs calculation related to the transported sheet; a radius distribution calculating unit that calculates a new radius distribution of the first rotating member; and an updating unit that updates the first rotating member correction value to a new first rotating member correction value.
A printing apparatus comprising: a printing section including a conveyer, a reconveyer, and a printer; a sensor; a determination section; and a controller. The determination section determines whether a pair of the first sheet and the second sheet is eligible for the high-speed duplex printing based on the combination of the length of the first sheet and the length of the second sheet before the second sheet conveyed by the reconveyer. The controller controls the printing section to convey the first sheet and the second sheet to the reconveyer when the pair of the length of the first sheet and the second sheet is eligible for the high-speed duplex printing, and controls the printing section to eject at least one of the first and the second sheet when the pair of the length of the first and the second sheets is not eligible for the high-speed duplex printing.
Image forming device
An image forming device includes a rotation member being held rotatably while making contact with an image carrier, a solid lubricant pressed so as to make contact with the rotation member, and a potential application unit for applying a potential to the rotation member, wherein the material of the solid lubricant and the material of the rotation member are selected so that the charged polarity of the solid lubricant charged due to the friction between the rotation member and the solid lubricant becomes identical with the charged polarity of toner, and the potential to be applied to the rotation member is set so as to be higher or lower than the surface potential of the neutralized image carrier so that the charges having the same polarity as the charged polarity of the solid lubricant are attracted from the rotation member to the neutralized image carrier.
A fixing device includes a film, a roller forming a nip with the film, for conveying a sheet while nipping the sheet, a member for urging one of the film and the roller toward the other, a heater for heating one of the film and the roller, a cam, rotationally driven by a motor, for moving the urging member in a releasing direction or a restoring direction of an urging force by the urging member, a gear that swings, depending on normal or reverse rotation of the motor, and a stopper to stop the swinging of the gear. By this arrangement, the rapid rotation of gears that are free from engagement, which can cause impact noise during a transitional process between a gear engagement state in a nip-released state by the roller and a gear engagement state during a nipping function by the roller, can be suppressed.
Developing device with improved developer transport efficiency
Provided is a housing that encloses: a first developer transport member that transports developer, which includes toner, laterally in a first direction; a second developer transport member that transports the developer in a second direction opposite to the first direction; a first communication passage configured to direct the developer transported by the first developer transport member to an upstream edge, along the second direction, of the second developer transport member; and a second communication passage configured to direct the developer transported by the second developer transport member to an upstream edge, along the first direction, of the first developer transport member. The second communication passage progressively reduces the amount of developer directed through the second communication passage to the upstream edge of the first developer transport member as an inclination angle of the housing increases so that the second communication passage is lower than the first communication passage.
Charging member, process for its production, and electrophotographic apparatus
To provide a charging member that can not easily cause faulty cleaning. A charging member having a conductive support and an elastic layer that is a surface layer; the elastic layer having on its surface a region having been cured by irradiation with electron rays, where the region having been cured supports at least one type of spherical particles of spherical silica particles, spherical alumina particles and spherical zirconia particles in such a state that the spherical particles are exposed at least in part to the surface of the elastic layer so as to make the surface roughened.
Image forming apparatus with reduced leakage from a charging device
An image forming apparatus includes an image carrier whose surface is moved in a specific direction, a charging device to charge the image carrier, an exposure device to form an electrostatic latent image by exposing a surface of the charged image carrier in accordance with an image signal, a developing device to supply a developer to the surface of the image carrier on which the electrostatic latent image is formed, a transfer device to transfer a developer image formed on the surface of the image carrier onto an image forming medium, and a dielectric member that has a dielectric constant of 5 or less and is disposed near the image carrier and between the charging device and the exposure device, in which the charging device, the exposure device, the developing device and the transfer device are sequentially arranged around the image carrier along the movement direction of the surface of the image carrier.
Air duct and toner cartridge using same
A cartridge for containing toner material used in an image-forming device according to one example embodiment includes a developer roll, two J-seals that provide interfaces with the developer roll at the ends thereof, and an air duct that conducts airflow across the interfaces to cool the developer roll and seals. The air duct is an unitary structure including an elongated hollow body and a pair of nozzles in fluid communication with the hollow body. One of the nozzles is disposed at a distal end of the developer roll near one J-seal, and the other of the nozzles is disposed at a proximal end of the developer roll near the second J-seal.
Image forming apparatus controlling belt position in a perpendicular direction to a belt conveying direction
An image forming apparatus capable of improving the reliability of intermediate transfer belt shift control and attaining a high quality image. The image forming apparatus includes an intermediate transfer belt onto which a toner image is transferred and formed, a shift position detecting sensor that detects a shift position of the belt, a shift control roller that changes the shift position of the belt, and an angle adjustment cam and an angle adjustment arm that correct an inclination angle of the roller. An amount of correction for the inclination angle is calculated by an ASIC based on the belt shift position detected by the sensor. In a Kf multiplier and a Kr multiplier, coefficient values used for the calculation of the amount of correction for the inclination angle can variably be changed independently for respective directions of control for the roller inclination angle.
Combined burst mode level and clock recovery
An apparatus comprising an optical receiver configured to receive an optical signal, and a combined level and clock recovery circuit coupled to the optical receiver and configured to update a signal threshold and a clock phase substantially simultaneously. Also included is an apparatus comprising at least one processor configured to implement a method comprising recognizing reception of a signal, and adjusting a threshold and a clock phase associated with the signal using a rising time for the signal and a falling time for the signal. Also included is a method comprising receiving a signal, and adjusting a threshold level of the signal to establish level recovery using a clock recovery scheme.
Photonic RF frequency conversion
Devices and techniques for frequency conversion of radio frequency (RF) or microwave signals based on photonic processing.
ROADM transponder aggregator systems and methods of operation
ROADM node systems and methods of operation are disclosed. ROADM node systems may include transponder aggregators including transponders to add signals for switching through the ROADM node. The transponder aggregators may be constrained from adding signals on adjacent channels for simultaneous use. Further, the transponder aggregators may include an optical coupler in lieu of an optical multiplexer. The ROADM system may include a set of wavelength selective switches associated with output ports that can provide an additional filtering function for the added signals prior to transmission on a WDM network.
Dispersion compensating apparatus, dispersion compensating method, optical receiving apparatus, and optical receiving method
A dispersion compensating apparatus includes a tunable dispersion compensator that dispersion-compensates an optical signal using a group delay property that is asymmetrical in bands outside an effective band; a set device that sets a dispersion compensation amount in the tunable dispersion compensator; and a shifter that shifts a central frequency of the effective band of the tunable dispersion compensator, based on the dispersion compensation amount set by the set device.
Optical communication system, optical receiver of same, and optical communication method of same
In a polarization demultiplexing optical communication system (1000), an optical transmitter (100) provides a predetermined frequency deviation between carrier wave frequencies of optical signal to be transmitted, and provides a periodic fluctuation having a predetermined frequency to the light intensity of the optical signal to be transmitted. An optical receiver (300) extracts intensity information of a frequency component of the periodic fluctuation from the received optical signal, and calculates a wavelength dispersion value of the optical transmission line on the basis of the extracted intensity information. For this reason, it is possible to measure the wavelength dispersion value of the optical transmission line while operating the optical communication system. Thereby, there is provided an optical communication system capable of resetting the propagation characteristics of an optical waveform equalization section in a simple manner and at a low cost without adversely influencing the transmission quality.
Camera device and method for assembling camera device
A camera unit (1) of a camera device includes: a lens unit (2) having a size according to zoom magnification; a tilt chassis (3) that rotatably supports the lens unit (2) in a tilt direction; and a pan chassis (4) that rotatably supports the lens unit (2) in a pan direction through the tilt chassis (3). The tilt chassis (3) has a plurality of attaching positions to the pan chassis (4). Additionally, the tilt chassis (3) is attached to the pan chassis (4) at an attaching position of the plurality of attaching positions according to the size of the lens unit (2). As a result of this, cost, time, and labor required for development of the chassis can be reduced, and development efficiency of the chassis is improved.
A face detecting section of a camera detects a face area in a shooting screen under an output of an image sensor. A focus detecting section calculates a defocus amount from a relative interval of a pair of images under an optical flux passed through a shooting lens in each of optional areas in the shooting screen. A first focus controlling section specifies a focus detecting area from the optional areas under an output of the face detecting section, and performs a focus operation under the defocus amount of the focus detecting area. A second focus controlling section calculates a focus evaluation value in the face area under an output of the image sensor, and performs a focus operation by using the focus evaluation value. A control section causes at least one of the first focus controlling section and the second focus controlling section to perform a focus operation.
Multimedia signal processing system
A multimedia signal processing system utilizes an easily manipulated, low-cost storage and display system that allows the user to view a television program and instantly review previous scenes within the program. The invention also allows the user to store selected programs while simultaneously watching or reviewing another. A versatile system architecture enables providing the invention in multiple configurations, each adapted to receive input signals from a different source. At the highest level, the system includes an input section and an output section. Across all configurations, the output section remains substantially the same, while the input section varies according to the signal type and the source. Thus, several configurations are provided, each one requiring only minor system board modifications. The system architecture thus simplifies the design and manufacturing challenge presented by producing units to serve different markets, such as digital satellite, digital cable and analog cable.
Recording medium and method and apparatus for reproducing text subtitle stream recorded on the recording medium
The computer readable medium stores an executable data structure for managing reproduction of text by a reproducing apparatus. The data structure includes at least one text subtitle stream having a style segment and at least one presentation segment. The style segment defines a group of region styles, and the presentation segment contains at least one region of text. The region of text is linked to a selected one of the group of region styles defined in the style segment by an identifier. The style segment and the at least one presentation segment are encapsulated into respective PES packets. The presentation segment contains a continuous presentation flag indicating whether continuous presentation is required for the presentation segment with a previous presentation segment. A presentation start time of the presentation segment is equal to presentation end time of the previous presentation segment when continuous presentation is required for the presentation segment with the previous presentation segment.
System and method for fingerprinting video
Disclosed are various embodiments of generating video fingerprints. Scene changes can be detected in a video and a video fingerprint generated based upon a time at which the scene change occurs as well as time intervals between the scene changes relative to adjacent scene changes. A video can be captured and analyzed by comparing scene changes detected in the video to those described by the video fingerprint.
Information recording method, information recording medium, and information reproducing method, wherein information is stored on a data recording portion and a management information recording portion
With this invention, at least one of a video file containing video information, a still picture file containing still picture information, and an audio file containing audio information and a management file having management information on a control method of reproducing the information in the file are recorded on an information storage medium. This realizes a data structure that causes the recording and deleting places on the information storage medium to correspond spuriously to places on a single tape, such as a VTR tape. Use of the data structure provides users with an easy-to-use interface.
Reproducing device, reproducing method, program and recording medium
A reproducing method includes: a keyword specifying step of specifying a plurality of keywords corresponding to one unit being reproduced; a keyword switching step of switching the plural keywords that have been specified, by every constant or different time interval, to choose one keyword; and a list display step of allowing the symbols of the respective contents of video or sound relating to each of the keywords that have been chosen by the keyword switching step to be switched and to be listed.
Display device and method, transmission device and method, and reception device and method
A device for displaying stereoscopic video images on a screen includes a receiving unit, signal processing unit, and display unit. The receiving unit receives stream data including left-view frames and right-view frames of stereoscopic images. The signal processing unit alternately extracts left-view frames and right-view frames from the stream data. Over one frame period of the stereoscopic video images, the signal processing transmits a pair of a left-view frame and a right-view frame when the control information indicates a 3D playback mode, and transmits only a left-view frame when the control information indicates a 2D playback mode. The display unit displays each frame transmitted from the signal processing unit for a predetermined time on the screen.
Audiovisual recording apparatus
In response to an instruction to duplicate audio-video data recorded on a recording medium, duplication history information and unduplicated audio-video data that is indicated by the duplication history information are transmitted. Upon receipt of an instruction to generate duplication history information, an apparatus configured to record onto the recording medium, duplication history information indicating that the transmitted audio-video data has been duplicated, generates history information indicating that the audio-video data recorded on the recording medium has been duplicated.
Resin composition for production of clad layer, resin film for production of clad layer utilizing the resin composition, and optical waveguide and optical module each utilizing the resin composition or the resin film
The present invention provides a resin composition and film for forming a cladding layer of an optical waveguide, which composition contains (A) a (meth)acrylic polymer having a weight average molecular weight more than 100,000, (B) a urethane (meth)acrylate, and (D) a radical polymerization initiator; and an optical waveguide and an optical module produced by use of the composition or film. There can be provided a resin composition for forming a cladding layer and a resin film for forming a cladding layer, which exhibit excellent bending durability and twisting durability, and an optical waveguide and an optical module each produced therefrom.
Telecommunications cabinet with connector storage
A housing including a plurality of openings for receiving fiber optic connectors and protecting the polished end face of the connectors from damage while the connectors are stored within a telecommunications connection cabinet. A module with a plurality of optical fiber cables connected to a first optical fiber cable and terminated by a fiber optic connector. Each of the connectors are inserted within openings in a connector holder for storage and protection until the cables need to be connected to a customer equipment cable.
Asymmetric hybrid photonic devices
Optical devices having a first semiconductor slab including a first lateral boundary for an optical mode and a second semiconductor slab above and asymmetrically overlapping the first lateral boundary included in the first semiconductor slab and including an edge of a second lateral boundary for the optical mode. The second lateral boundary is disposed above and to a side of the first lateral boundary. The first semiconductor slab is of a silicon material while the second semiconductor slab is of a III-V material. A first and a second electrical contact are coupled to the second semiconductor slab, one on each lateral side of the second lateral boundary.The optical device further includes an optical waveguide region formed by the first and second lateral optical mode boundaries, wherein a complex refractive index of the optical waveguide region changes based on an electrical difference applied between the first and second electrical contacts.
Large effective area optical fiber with low bend loss
An optical fiber includes a central glass core region comprising maximum refractive index delta percent Δ1, a first inner annular region surrounding said core comprising refractive index delta percent Δ2, a depressed annular region surrounding said inner annular region and comprising Δ3 and a third annular region surrounding the depressed annular region comprising refractive index delta percent Δ4; wherein Δ1MAX>Δ4>Δ2>Δ3. The difference between Δ4 and Δ2 is greater than 0.01% and profile volume, |V3| is at least 10%-μm2. The fibers exhibit an effective area at 1550 nm which is greater than 110 μm2.
Light emitting diode lighting system
A lighting system for generating an illumination product comprises an excitation source, blue/UV LED, operable to generate excitation radiation and a remotely located phosphor, photo luminescent material. Excitation radiation is guided from the excitation source to the phosphor by a waveguiding medium, the waveguiding medium being configured such that the distance the radiation travels from the excitation source to the phosphor layer is at least one centimeter in length. The UV/blue excitation source provides excitation radiation to the phosphor(s), causing the phosphor(s) to photo luminesce, and it may also provide a component of the final illumination product. The configuration of the waveguide allows a greater flexibility in lighting system configurations, such as hanging lighting fixtures, desk lighting fixtures, floor standing lighting fixtures, desk lamps, track lighting, spot lighting, accent lighting, lighting panels, inspection lamps and endoscopes.
Optical resonator and optical sensing system comprising the same
An embodiment of the invention relates to an optical resonator. The optical resonator includes an input optical waveguide and a closed loop coupled to the input optical waveguide. The closed loop is adapted to receive light from the input optical waveguide, wherein the closed loop includes at least one hole formed within a portion of the closed loop.
Thermally compensated arrayed waveguide grating assemblies
Arrayed waveguide grating can have one or both slab waveguides with relatively sharply folded optical paths and a mirror that provides the folding of the path. The folded optical paths through the slab waveguides can result in a more compact geometry of the waveguides through the device as well as smaller slab waveguides such that the device can be formed with a significantly smaller overall footprint. Also, arrayed waveguide gratings that cooperate with pivotable mirrors can adjust light passage through the waveguide in response to temperature changes to provide for thermally compensated operation of the device. Thus, very compact planar lightwave circuits filters are described that provide thermally compensated operation.
Photonic devices having degenerate spectral band edges and methods for using the same
Provided herein are photonic devices configured to display photonic band gap structure with a degenerate band edge. Electromagnetic radiation incident upon these photonic devices can be converted into a frozen mode characterized by a significantly increased amplitude, as compared to that of the incident wave. The device can also be configured as a resonance cavity with a giant transmission band edge resonance. In an exemplary embodiment, the photonic device is a periodic layered structure with each unit cell comprising at least two anisotropic layers with misaligned anisotropy. The degenerate band edge at given frequency can be achieved by paper choice of the layers' thicknesses and the misalignment angle. In another embodiment, the photonic device is configured as a waveguide periodically modulated along its axis.
Micro free-space WDM device
Techniques for designing optical devices that can be manufactured in volume are disclosed. In an exemplary an optical assembly, to ensure that all collimators are on one side to facilitate efficient packaging, all collimators are positioned on both sides of a substrate. Thus one or more beam folding components are used to fold a light beam up and down through the collimators on top of the substrate and bottom of the substrate.
Methods and apparatus of WDM fiber reflector
New designs of optical devices, particularly for dropping a selected wavelength or a group of wavelengths as well as demultiplexing a multiplexed signal into several signals, are disclosed. An optical device employs thin film filters with reflectors to reassemble as a fiber Bragg grating. Depending on implementation, a reflector may be a mirror or a coated substrate disposed in a unique way to reflect a light beam from a filter back to a common port of a device. The reflector may also be coated accordingly to bypass a certain portion of the light beam for other purposes. As a result, the optical devices so designed in accordance with the present invention are amenable to small footprint, enhanced impact performance, lower cost, and easier manufacturing process.
Method of fabricating waveguide devices which use evanescent coupling between waveguides and grooves
An optical waveguide device (10) comprises a planar substrate with a lower cladding layer (14), a core layer (16) and an upper cladding layer (18), a groove (20) in the substrate that extends at least into the core layer (16), and a waveguiding channel (22) in the core layer (16), wherein at least a part of the waveguiding channel (22), which may contain a Bragg grating, is sufficiently proximate to the groove (20) in the plane of the substrate for an evanescent field of light propagating in the waveguiding channel (22) to extend laterally into the groove (20). Material contained in the groove modifies the properties of the waveguiding channel, so that a sample of material can be analysed or an active material can be used to modulate the propagating light. The groove (20) can be made before the waveguide (22). The groove (20) can be made by cutting into the substrate with a saw and the waveguide (22) can be made by direct writing in the core layer (16) with an ultraviolet beam.
Image upscaling technique
A method for interpolation includes receiving an input image having a plurality of pixels. The edge direction proximate a first pixel of the input image is estimated using a first technique from a plurality of discrete potential directions. An edge direction is selected based upon the estimating the edge direction proximate the first pixel of the input image using a second technique. The pixels proximate the first pixel are interpolated based upon the selected edge direction. The pixels proximate the first pixel are interpolated based upon another technique. An output image is determined pixels having more pixels than the plurality of pixels.
Image processing apparatus
There is provided an image processing apparatus capable of preventing colors from changing while being displayed when images are combined. The image processing apparatus according to an embodiment includes a video graphic processor that combines a plurality of image signals to generate a combined image signal and an HDMI Tx that transmits, when the combined image signal is transmitted, an identification flag of one of a first color space standard and a second color space standard having a color gamut wider than a color gamut of the first color space standard as the color space standard of the combined image signal and a host CPU decides the first or second color space standard so as to prevent change in color while being displayed.
Correction of blotches in component images
Blotches may be identified and processed to reduce or eliminate the blotch. The blotch may be in just one of several separations and multiple separations may be used, for example, to identify the blotch. An implementation (i) compares a first component image of an image with a first component image of a reference image, (ii) compares a second component image of the image with a second component image of the reference image, and (iii) determines based on these comparisons whether the first component image of the image includes a blotch. Multiple image separations also, or alternatively, may be used, for example, to modify the blotch, as well as to evaluate whether a modification is beneficial.
Image processing device, image processing method and storage medium
An image processing device that sequentially generates a synthetic image by joining a first image, which is a single image or constituted by a plurality of the images joined together, and a second image that is input, every time when the second image is input, includes: an overlapping region obtainment portion 14 that obtains a motion vector on the basis of the second image and an image input immediately before the second image among the images constituting the first image, and obtains an overlapping region where the image input immediately before and the second image overlap each other on the basis of the obtained motion vector; a brightness-value conversion factor calculation portion 16 that calculates a brightness conversion factor for converting a brightness value of the first image or a brightness value of the second image on the basis of the brightness value of the first image and the brightness value of the second image in the overlapping region so that a change in the brightness values between the first image and the second image becomes small; and a synthetic image generation portion 12 that generates the synthetic image by converting the first image or the second image using the brightness conversion factor and by joining the first image and the second image.
Method and apparatus for transferring and reconstructing an image of a computer readable medium
A forensically sound image of a computer readable storage medium can be transferred across a low bandwidth communications network. The method can include the step of scanning an image of the computer readable storage medium for redundant data, the redundant data duplicative of locally stored data. The method can also include generating a skeleton image based on the image of the computer readable storage medium by excluding the redundant data from the image of the computer readable storage medium. The method can include transmitting, by a transmitting device, the skeleton image over the communications network to a receiving device to enable reconstruction of an image copy of the computer readable storage medium using the skeleton image and the locally stored data. A receiving device can reconstruct a bit-for-bit copy of the image of the computer readable storage medium.
Image processing apparatus, imaging apparatus, and image processing method
An image processing apparatus includes a parameter setting unit which sets a noise reduction processing parameter for use in noise reduction processing for applying onto an original image signal including a plurality of color components; a correlation arithmetic processing unit which calculates coefficients of correlation between each of the color components in the original image signal; a parameter correcting unit which corrects the noise reduction processing parameter based on the coefficient of correlation; and a noise reducing unit which reduces noise in the original image signal using the corrected noise reduction processing parameter.
Image signal encoding apparatus and image signal encoding method
An encoding method encodes a first image signal of a first view and a second image signal of a second view. The method includes encoding the first image signal to generate a base stream. The method also includes encoding the second image signal to generate a dependent stream, and inserting a dependent delimiter indicating a picture boundary between pictures in the dependent stream at the beginning of a picture in the dependent stream.
Method for sending compressed data representing a digital image and corresponding device
A method for sending compressed data representing at least part of a digital image includes the following steps: encoding (220) source data representing said part to obtain first compressed data having a given size; based at least on said size, including (210) said first compressed data either in a first slice comprising second compressed data representing other parts of the digital image or in an empty second slice; sending the slice comprising said first compressed data. A corresponding device is also described.
Computer readable medium, apparatus, and method for adding identification information indicating content of a target image using decision trees generated from a learning image
A computer readable medium storing a program causing a computer to execute a process for adding image identification information is provided. The process includes: calculating first feature vectors for partial regions selected from a target image to be processed; and adding a piece of first identification information indicating content of the target image to the target image using a group of decision trees that are generated in advance on the basis of second feature vectors calculated for partial regions of a learning image and a piece of second identification information added to the entire learning image.
System and method for document location and recognition
Templates of known forms are stored in computer system. The templates are digitized pixels on which connected component analyses are performed resulting in a first list of components. Five to ten of those components are selected to create an ordered feature list for each form. The computer system then captures an optical image of a form positioned on the top of a stack of forms. The optical image is digitized and stored in the computer (or processor) system as a captured digital image of pixels. A connected component analysis is performed on the captured digital image that results in a second list of image components. Image components on the second list are compared to those on the first list and then each succeeding feature in one of the ordered feature lists. If the comparison is successful, the form is known and other marks on the form may then be processed. If the comparison is unsuccessful, a new feature list is tried.
Method, program, and system for calculating similarity between nodes in graph
A computer-implemented method, program, and system for calculating similarity between nodes in a graph by computer processing. The method includes: calculating a new label value of a node on the basis of a label value of a node adjacent to the node with respect to each of the nodes in one or more graphs; correcting the new label value of the adjacent node to remove an influence of the label value of a target node with respect to each of the target nodes for the calculation of the similarity between the nodes; and calculating the similarity between the target nodes by using the corrected new label value of the node adjacent to one target node and the corrected new label value of the node adjacent to another target node.
Image pattern matching systems and methods for wafer alignment
A computer-implemented image pattern matching method for wafer alignment is provided, for determining an overall similarity value and an overall geometry relationship between a target wafer image and a model wafer image. The method includes: determining a plurality of model patterns in the model wafer image; searching the target wafer image to identify a plurality of target patterns, thereby generating a plurality of matches each including a respective target pattern and model pattern; selecting, using multiple threshold values, ones of the plurality of matches according to a plurality of similarity values; and determining, using a predetermined algorithm and the selected ones of the matches, the overall similarity value and the overall geometry relationship between the target wafer image and the model wafer image.
Image patch descriptors
Described herein are various technologies for generating descriptors for image patches. An image patch can be received, and gradients of pixels in the image patch can be determined. The gradients are normalized based upon an average magnitude of the gradients in a local spatial region with respect to a given pixel under consideration. A four-dimensional histogram is defined that takes into consideration pixel orientation, and normalized gradients are selectively assigned to bins of the histogram. The bins are binarized as a function of a number of gradients assigned thereto, and the binarized bins can be utilized as a descriptor for the image patch.
Data capture from multi-page documents
A method for processing a batch of scanned images is disclosed. The method includes processing the scanned images into documents. For documents of multiple pages, the method maintains a page-based coordinate system to specify a location of structures within a page and joins the pages to form a multi-page sheet associated with a sheet-based coordinate system to specify a location of structures within the multi-page sheet. Data may be extracted from each document through a page mode wherein structures are detected on individual pages using the page-based coordinate system and a document mode wherein structures are detected within the entire document using the sheet-based coordinate system.
Method and apparatus for real-time/on-line performing of multi view multimedia applications
A method and apparatus for real-time/on-line performing of multi-view multimedia applications are disclosed. In one aspect, a method of computing a disparity value of a pixel includes computing from two input images a plurality of first costs for a pixel, each cost associated with a region selected from a plurality of regions a first type, the regions covering the pixel and being substantially equal in size and shape. The method also includes computing from the first costs a plurality of second costs each associated with a region selected from a plurality of regions of a second type, the regions of the second type covering the pixel, at least some of the regions of the second type having a substantially different size and/or shape. The method further includes selecting from the second costs the minimal cost and selecting the corresponding disparity value as the disparity value.
Character recognition device and recording medium
A character recognition device which recognizes an operation for writing a character performed by a housing including an acceleration sensor while being moved in a spatial plane based on a measurement result from the acceleration sensor, a control section acquires acceleration data of each component acquired during the period from the start of writing to the end of the writing of one character determined based on acceleration data of a component associated with each axis of the acceleration sensor, as a series of acceleration data that are temporally continuous from the first stroke to the last stroke of the character including acceleration between strokes. The control section identifies feature points for each component that exist in a series of acceleration data, generates feature point data for each component which includes the plurality of feature points as inputted character data, and collates it with basic character data.
Building roof outline recognizing device, building roof outline recognizing method, and building roof outline recognizing program
Provided is a building roof outline recognition device which facilitates automation. A small-building candidate region is extracted based on normalized DSM data using a region segmentation method. By using the building candidate region as a marker and further using height information included in the normalized DSM data and the like, a building region is extracted using a region growing method. While referencing the height information, from among edges appearing in the orthoimage, edges fitting with an outer shape of the building region are extracted as an outer shape of the roof when viewed from above. Further, for a building judged to have a slanted roof, a roof structure line which is the boundary between the roof surfaces is extracted from the building region, and a three-dimensional structure of the building roof outline is determined from the roof outer shape and the roof structure line.
Method and apparatus for segmenting multi-view images into foreground and background based on codebook
Embodiments of the present invention provide methods and apparatuses for segmenting multi-view images into foreground and background based on a codebook. For example, in some embodiments, an apparatus is provided that includes: (a) a background model generation unit for extracting a codebook from multi-view background images and generating codeword mapping tables operating in conjunction with the codebook; and (b) a foreground and background segmentation unit for segmenting multi-view images into foreground and background using the codebook and the codeword mapping tables.
Data processing apparatus, image registration method, and program product
A data processing apparatus for registering image data includes a network processing unit configured for acquiring image data through a network, an image correction unit for analyzing the image data, extracting a background image and a subject image from the image data, and correcting the extracted background image according to a correction condition, and a database unit for storing the corrected image data such that the image data is associated with the corrected image data.
Gamma adjustment for maximizing information in images
Methods, systems, and apparatus, including computer programs encoded on computer storage media, are described for transforming an image at least in part by using a gamma transformation that maximizes information in the transformed image. In one aspect, a digital image is received and brightness of the digital image is determined. The brightness of the digital image can include luminance or color. Maximum available detail in the digital image is brought out at least in part by applying to the brightness of the digital image a first gamma exponent that is equal to one divided by a negative of an average logarithm of the brightness of the digital image.
Face-detection processing methods, image processing devices, and articles of manufacture
Face-detection processing methods, image processing devices, and articles of manufacture are described. According to one arrangement, a face-detection processing method includes accessing image data of a plurality of images to be processed for detection of human faces in the images, determining whether or not to use skin-detection processing for face-detection processing of individual ones of the images, and in accordance with the determining, performing the face-detection processing of one of the images using the skin-detection processing to detect human faces in the one of the images and performing the face-detection processing of another of the images without using the skin-detection processing to detect human faces in the another of the images.
Classifier learning image production program, method, and system
A classifier learning image production program, method, and system are provided which are capable of efficiently acquiring learning images to be employed in development of a discrimination application, or more particularly, efficiently acquiring initial learning images to be employed in an early stage of development of a discrimination algorithm. A classifier learning image production program allows a computer to execute the steps of inputting an image; detecting a discrimination area from the inputted image, acquiring plural detected data, and recording the detected data in a storage device; integrating the plural detected data to obtain learning image candidate information, and recording the learning image candidate information as the detected data in the storage device; clipping plural learning images from the inputted images, and recording the plural learning images as learning image data in the storage device; classifying the learning images into one or more sets; and displaying the learning images on a display device.
Image processing apparatus, information processing system, and image processing method
A technique is provided which can improve the precision of a matching point search with a plurality of images taking the same object where distant and near views coexist. A plurality of first images obtained by time-sequentially imaging an object from a first viewpoint, and a plurality of second images obtained by time-sequentially imaging the object from a second viewpoint, are obtained. Reference regions including a reference point are set respectively in the first images with the same arrangement, and comparison regions corresponding to the form of the reference regions are set respectively in the second images with the same arrangement. One reference distribution of pixel values about two-or-more-dimensional space is generated from the distributions of pixel values about the plurality of reference regions, and one comparison distribution of pixel values about two-or-more-dimensional space is generated from the distributions of pixel values about the plurality of comparison regions. Then, a matching point in the plurality of second images that corresponds to the reference point is detected by using the reference distribution of pixel values and the comparison distribution of pixel values.
Digital watermark detection in 2D-3D content conversion
A system and method are provided for analyzing 3D digital content to determine whether a watermark is detectable. The watermark may exist in 2D content that is converted to 3D, and in such cases, the survivability of the watermark to the conversion process is evaluated. An anticipated location of the watermark in left and right 3D images may be determined, and the detectability based upon the anticipated location. A report may indicate whether the watermark survived the conversion in one or both images, or neither. The process may be performed for single frames, sequences of single frames, or entire files containing many image frames. Watermark placement may also be proposed for locations in 2D content, 3D content, or both. Watermarks may similarly be placed in the content.
System and methods for determining a concentricity of a component mounted within an aperture of an electronic device housing. In particular, a method for determining concentricity of a camera includes obtaining an image of a camera mounted within the aperture of the housing and identifying a plurality of circular shapes within the image using a processor. One of the circular shapes represents the aperture in the housing and the other circular shape represents the camera. An offset between two of the plurality of circular shapes is calculated.
CD metrology system and method of classifying similar structural elements
A CD metrology system and method of classifying similar structural elements. The method includes: a) obtaining an image of the semiconductor structure; b) identifying sufficient numbers of structural elements belonging to first and second groups of similar structural elements, each group originating from a different manufacturing stage; c) assessing to each given structural element within the sufficient numbers of structural elements belonging to the first and second groups, one or more features indicative of a respective manufacturing stage, wherein values of the respective features are derived from the obtained image and; d) using results of the assessment for a classification decision related to manufacturing stages and, respectively, originating therefrom structural elements in the first and second groups of similar structural elements.
Image processing method and image processing system
An image processing method and an image processing system can perform image processing with higher accuracy while a gloss is removed without immobilizing a continuously moving inspection object. The image processing apparatus images the inspection object moving in a predetermined direction plural times with an imaging unit disposed in a predetermined position while a visual field of the imaging unit is lighted by a lighting source disposed in a constant relative position with respect to the imaging unit, aligns plural images with the inspection object as a reference by searching sequentially a region indicating at least part of the inspection object between the two images in the plural images acquired by a series of imagings with the imaging unit, and produces a composite image from the aligned plural images.
Localization of a valid area of a blood smear
Automated localization of a valid area of a blood smear and, thus, localization requiring less effort and being more objective is enabled in that a picture of the blood smear pixels are classified at least into first pixels, which represent blood cells, and second pixels, which do not represent the blood cells, and the valid area is then found on the basis of a local frequency of pixel clusters of at least Amin first pixels, Amin being a minimum threshold for a number of first pixels of a pixel cluster, and a local average size of the pixel clusters for laterally distributed areas of the blood smear.
System for targeting cells or other materials
An image sensor integrated circuit may contain image sensor pixels. A channel containing a fluid with particles such as cells may be formed on top of the image sensor. Some of the image sensor pixels may form a calibration sensor and some of the image sensor pixels may form an imager. As the fluid and particles flow through the channel at a flow rate, the calibration sensor may measures the flow rate and illumination intensity in the channel. Based on calibration data such as measured flow rate and measured illumination intensity, adjustments may be made to ensure that the imager acquires satisfactory image data. The adjustments may include flow rate adjustments, image acquisition data rate adjustments, and illumination adjustments. A processing unit in the channel may contain a laser or other component to destroy selected cells. A flared region in the channel may be used as a chromatograph.
Method of removing moiré in fluoroscopic X-ray image and X-ray imaging equipment using the same
Provided is a method of removing a moiré in a fluoroscopic X-ray image that preliminarily complements a defective pixel with no disturbance in regularity of a moiré pattern to ensure that no trace of the defective pixel and no ghost thereof create even when the fluoroscopic X-ray image contains the defective pixel. A moiré frequency derivation section determines frequency of the moiré that appears in the fluoroscopic X-ray image, a defective pixel preliminary complement section forms a preliminary complement image, a moiré removal section conducts frequency analysis of the preliminary complement image to form a moiré removed image, an image smoothing section performs an image smoothing process to the preliminary complement image to form a smoothed image suitable for complement of the defective pixel, and a first defective pixel recomplement section recomplements the defective pixel by superimposing the moiré removed image on the smoothed image.
Method and apparatus for reconstructing image and medical image system employing the method
A method and apparatus for reconstructing an image and a medical image system are provided. An image reconstruction processing method may include acquiring an initial value with respect to a tomographic image of an object to be inspected, initializing an auxiliary variable, acquiring one or both of a weighted value and an error value, based on a measured value, transforming a measured image signal, updating the auxiliary variable using a transform coefficient used to transform the measured image signal, and updating the measured value using the updated auxiliary variable, and one or both of the acquired weighted value and the error value.
Method and system utilizing parameter-less filter for substantially reducing streak and or noise in computer tomography (CT) images
Photon starvation causes streaks and noise and seriously impairs the diagnostic value of the CT imaging. To reduce streaks and noise, a new scheme of adaptive Gaussian filtering relies on the diffusion-derived scale-space concept in one embodiment of the current invention. In scale-space view, filtering by Gaussians of different sizes is similar to decompose the data into a sequence of scales. As the scale measure, the variance of the filter linearly relates to the noise standard deviation of a predetermined noise model in the new filtering method. The new filter has only one optional parameter that remains stable once tuned. Although single-pass processing using the new filter generally achieves desired results, iterations are optionally performed.