Locking mobile devices in a personal area network (PAN)
A mobile device out of range of other devices in a wireless network may be locked to provide security.
External interface access control
A method and apparatus of controlling access to a system containing vital corporation software and storing confidential data assets situated in an open accessible environment is provided. The method includes calculating a signature value for at least one file usable with the system, transferring the calculated signature value to a signature file, and providing at least one signature value in the signature file and at least one associated file to a file system configured to be received by the system. At least one signature value and at least one associated file are inspected by the system to verify the associated file is a known system software application asset. The system comprises an input/output data port configured to receive the external memory storage device, and an operating system capable of reading system data from and writing system data to the memory storage device.
System and method for providing private session-based access to a redirected USB device or local device
Restricting access to a device from a server, where the device is remote to the server and is connected locally to a client that is remote to the server, is described. The operations may include facilitating interception, at the server, of a function call to create a symbolic link; facilitating determination that the intercepted function call to create the symbolic link corresponds to a device object associated with the device that is remote to the server and is connected locally to a client that is remote to the server; facilitating obtaining configuration data indicating whether access to the device is to be restricted; and facilitating creation of the symbolic link in a local namespace of an object manager namespace of the server, upon obtaining configuration data indicating that access to the device is to be restricted.
On demand visibility services and smart directory
An on-demand communication system, device, method and program are provided which allows a consumer to request information from an on-demand visibility service. The on-demand visibility service places a request with the on-demand directory service that may then choose a relevant provider to be queried for this information based on situation-based access control logic. The on-demand visibility service then queries the relevant providers with the request for information. Providers may then gather information by optionally using sensors, and may then transmit a provider response to the on-demand visibility service. The on-demand visibility service may then forward this provider response in the form of an answer to the consumer, thereby satisfying the consumer request for information.
Privileged access to managed content
Privileged access to managed content is disclosed. In some embodiments, a privileged portion of application code manages user access to managed content at a level of access greater than the user would otherwise be afforded. The privileged code moves a content management session up or down in levels of access as required to allow a user to perform through the application one or more specific actions it is desired to permit the user to do in a particular context (e.g., at a particular time in the lifecycle of an item of content and/or a particular point in a business process or work flow), including to permit the user to perform an action it is not desired to let the user perform in other contexts, such as write a particular value to a content item it is not desired to allow the user to write to otherwise.
Dynamic selection of authorization processes
Systems, methods, and software are disclosed herein for licensing applications using a preferred authorization process dynamically identified based on conditions associated with an initiation of an application. Authorization is then attempted using the preferred authorization process. In some examples, the preferred authorization process is selected from at least a keyless authorization process and a key-based authorization process.
Content provision system
The second content provision system determines, in response to a request by a user from a second terminal belonging to a second network, a second content being a same content as a first content, which is provided to the first terminal belonging to a first network or an alternative content for the first content and matching rights of the user. The second content is provided from the second network to the second terminal and can be used by the second terminal. The second content is determined by using content information specifying the first content which is in-use or which the use has interrupted and ownership information indicating the rights of the user and the content provision system acquires the content information and the ownership information from the first content provision system in response to the request from the second terminal.
Role-based access to shared RFID data
An electronic product code information service (EPCIS) interface is provided, where the EPCIS interface is capable of allowing one or more accessing applications residing on a variety of systems and associated with a plurality of enterprises/organizations to receive EPC-related data. One or more roles of an entity attempting to receive EPC-related data through the interface may be identified. A query may be performed to generate a result set within an extent permitted by access authorization associated with the identified roles of the entity.
Method and system for providing a media change notification on a computing system
A method for providing a media change notification on a computing system. The present method polls a media device of a computing system for a media change wherein the polling of the media device cannot be blocked by the computing system. When a media change is detected on the media device, a media change notification is generated. The media change notification is then output when the media change on the media device is detected. In so doing, the media change notification cannot be blocked by the computing system.
Network security server suitable for unified communications network
A network security server constituted of: a device detection functionality, the device detection functionality arranged to detect devices on a network on an ongoing basis; a state extraction functionality arranged to read the state of each of the detected devices; an abstraction functionality arranged to translate each of the read states to a common abstract format; a state analysis functionality arranged to compare each of the translated read states with a predetermined database of states; and a session control functionality arranged to control communication of each of the detected devices responsive to the comparison with the predetermined database of states.
Integrated firewall, IPS, and virus scanner system and method
A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners. Further, each of the virtual firewalls, IPSs, and virus scanners is assigned to at least one of a plurality of user and is configured in a user-specific.
System and method for countering detection of emulation by malware
Instructions of an application program are emulated such that they are carried out sequentially in a first virtual execution environment that represents the user-mode data processing of the operating system. A system API call requesting execution of a user-mode system function is detected. In response, the instructions of the user-mode system function called by the API are emulated according to a second emulation mode in which the instructions of the user-mode system function are carried out sequentially in a second virtual execution environment that represents the user-mode data processing of the operating system, including tracking certain processor and memory states affected by the instructions of the user-mode system function. Results of the emulating of the application program instructions according to the first emulation mode are analyzed for any presence of malicious code.
Network data transmission auditing
Network computing systems may implement data loss prevention (DLP) techniques to reduce or prevent unauthorized use or transmission of confidential information or to implement information controls mandated by statute, regulation, or industry standard. Implementations of network data transmission analysis systems and methods are disclosed that can use contextual information in a DLP policy to monitor data transmitted via the network. The contextual information may include information based on a network user's organizational structure or services or network infrastructure. Some implementations may detect bank card information in network data transmissions. Some of the systems and methods may be implemented on a virtual network overlaid on one or more intermediate physical networks that are used as a substrate network.
Automatic modification of executable code
A method for automatically modifying an executable file for a software agent is provided. The method comprises detecting original static entry and exit points in the executable file and generating corresponding transformed points; modifying the executable file by linking the executable file to the integrity services environment and embedding a signed agent manifest; loading the modified executable file into memory and registering a target list with the software agent's hypervisor, wherein the target list provides mappings between protected and active page tables; detecting dynamic entry and exit points in the executable file and generating corresponding transformed points; switching to a protected context, in response to a transformed exit point being invoked, and switching to an active context, in response a transformed entry point being invoked; and de-registering the software agent with the memory protection module, in response to the software agent being unloaded.
Secure virtual machine
An approach to securely distributing and running virtual machines is described that addresses the inherent insecurity of mobile virtual machines by authenticating a user before establishing a specialized virtualization runtime environment that includes a filesystem driver inserted into the host operating system to provide secure access to a virtual machine by authorized hypervisors only. Further described is the creation of a SecureVM package that includes the various components used to perform the operations of installation, user authentication and establishment of the specialized virtualization runtime environment.
Automatic firewall configuration
In one example a method is provided. The method includes (i) discovering, by a gateway router, a server in a local area network, wherein the gateway router discovers the server by sending a universal plug and play (UPnP) message identifying the gateway router as a gateway router with access configurable by the server; (ii) receiving, by the gateway router, a response from the server, wherein the response identifies the server as a server that desires to establish external access; (iii) determining, by the gateway router, whether the server is a trustworthy server, wherein determining comprises comparing information received by the server with a stored list of trustworthy servers; (iv) configuring, by the gateway router, a logical port to forward incoming connection requests to the server; and (v) forwarding, by the gateway router, incoming connection requests to the server.
System and methods for automatically accessing a web site on behalf of a client
A system for performing an automated network-based login procedure on an interactive keypad image includes a software agent executable from a digital medium connected to the network for navigating to a login page, accessing the keypad image, and performing an automated login, and an automated login support application executable from the same or a different digital medium connected to the network, the support application including at least an image processor, an optical character recognizer, and an image data encoder and decoder. The software agent performs a login at the virtual keypad image based on character image matching and location information acquisition for each character of a client's specific set of credential characters included in the image of the keypad.
System and method for secure telephone and computer transactions using voice authentication
A secure electronic payment system and method for conducting a secure transaction using voice authentication is provided. A merchant's computer transmits an authorization request to an access control server. The access control server places a telephone call to the purchaser and performs voice authentication to confirm the identity of the purchaser. The access control server then transmits a response to the merchant's computer. If the purchaser is authorized to access the account, payment is processed by the merchant and the transaction is completed.
Mobile pin pad
A system is configured to: receive an authentication request for a transaction from a web server; identify a phone number of the mobile device based on identifying information of the user in the authentication request and the user information, transmit a message to the mobile device based on the phone number, receive a message response from the mobile device, determine whether the mobile device provided a mobile pin pad authentication for the user based on the message response, and transmit a success authentication response to the web server when the mobile device provided the mobile pin pad authentication for the user.
Systems and methods for secure watchlisting
A watchlisting module is configured to securely and efficiently create, modify, manage, and store a watchlist. The watchlisting module is configured to generate a watchlist consisting of watchlist entries. Each watchlist entry encapsulates information about an entity to be associated with the watchlist. The watchlist entry includes information about the entity including a unique identifier for the watchlist, a unique identifier of the watchlist entry, a unique identifier for the entity, and access control information for membership process related to the watchlist. The watchlist entry also includes a State Lock. Watchlisting module is configured to utilize the State Lock to secure and verify a watchlist entry.
Methods and apparatuses for controlling access to computer systems and for annotating media files
Methods and apparatuses for controlling access to computer systems and for annotating media files. One embodiment includes a method including generating a challenge to a user, wherein the challenge includes a verify part and a read part. The methods also includes prompting the user to solve both the verify part of the challenge and the read part of the challenge; receiving input from the user; determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge.
System and method for ensuring persistent communications between a client and an authentication server
A system for facilitating persistent communications between entities in a network. In a specific embodiment, the system is adapted to facilitate fast reauthentication of a client performed by a server, such as an Authentication, Authorization, and Accounting (AAA) server, that is coupled to the client via a load balancer. The system includes a first message to be exchanged between the server and the client, wherein the first message includes a field identifying the server and/or the client. A matching module communicates with or is otherwise incorporated within the load balancer. The matching module includes one or more routines for employing the field to selectively route the first message to the client and/or server. In a more specific embodiment, the server a fast reauthentication module adapted to append the field in the message. The field includes sub-realm information identifying the server.
Methods and systems for fallback modes of operation within wireless computer networks
Described herein are systems and methods for fallback operation within WLANs that rely on remote authentication procedures. When a primary network node authentication process fails, fallback access control parameters associated with a secondary network node authentication process are exchanged between a network node and an authentication server, wherein the secondary network node authentication process allows the network node to access other resources of a computer network.
Method and arrangement for user friendly device authentication
The present invention relates to fraud prevention and authentication of a device to a user. The method of authenticating a personal device according to the invention comprises a set up sequence, wherein at least a first preferred output format is selected by the user, and a device configuration verification sequence. In the device configuration verification sequence a checksum is calculated and converted to a user friendly output format based on the user selected preferred output format. In addition the checksum may be calculated based on variable, and user selectable, keying material. The personal device, after being authenticated according to the above, may be used to authenticate a second device.
Securing distributed application information delivery
In an example implementation, a data structure comports with a secure application instruction protocol. The data structure includes a first application-level request and a second application-level request. The first application-level request has application-specific instructions from a requestor and a requestor signature over the application-specific instructions from the requestor. The second application-level request has application-specific instructions from an intermediary and an intermediary signature over at least the application-specific instructions from the intermediary.
Authentication system, authentication apparatus, authentication method and authentication program
An authentication system is provided. The authentication system includes: a storage section that stores association information where a plurality of instructions for individual data is associated with authentication methods which are to be used to authenticate a user (the individual data is previously allocated to a legitimate user individually); a selection section that selects, based on the association information, the authentication method corresponding to the instruction input by a user; and an authentication section that follows the authentication method selected to authenticate the user as the legitimate user based on a result of checking challenge data obtained from the user for the check against template data previously registered as authentication information for the legitimate user.
Method and system of provisioning a feature for multiple media devices
An approach is provided for the self-provisioning of a feature corresponding to multiple media devices (e.g., set-top boxes). A request to provision a feature on a plurality of set-top boxes is received. It is determined whether the feature is compatible with each of the set-top boxes. The feature is automatically provisioned based on the request and the determination.
Container format for multimedia presentations
In a method for transmitting a multimedia presentation comprising a number of media objects: the media objects are organized in a multimedia container or container format; identifiers referring to the media objects are organized in the same container; and an identifiable file coordinating the media objects is also provided in the container.
Video download mechanism for transferring large data
A content delivery system stores large content as frames of video that can be served by content servers already optimized for streaming video. Instead of storing image tiles in separate files, the system treats each tile as a frame of a video and stores the tiles in a video format. This allows transfer of large data from a publisher to a content server by transferring a single file or a small handful of files (rather than thousands or millions of files). Web servers such as MICROSOFT Internet Information Server (IIS) include smooth streaming support that can return individual images as video frames as though the images were stored in separate files. Thus, the content delivery system provides easier management of large data for publishers while continuing to provide a smooth experience consuming the data for clients.
Methods for replicating media contents and P2P VoD systems
There is disclosed a method for replicating media contents in a P2P VoD system comprising a plurality of peers. The method may comprise: determining that a candidate media unit shall be replicated into a local storage of one of the peers; checking whether said local storage has enough space to store the candidate media unit; if not, selecting one media unit previously stored in said local storage to be replaced; and replacing the selected media unit by the candidate media unit.
Shared television sessions
Shared television sessions are described. In embodiment(s), television content can be received via a tuner of a tuner device. A shared television session can be established between rendering devices that share the tuner of the tuner device to receive the television content. A tuner configuration input can be received when initiated at a rendering device, and the tuner configuration input can be communicated to the tuner device to change the television content. The tuner device can receive different television content via the tuner according to the tuner configuration input. Tuner update data associated with the tuner configuration input can then be communicated to update the rendering devices that further share the tuner of the tuner device to receive the different television content.
Multimedia channel sharing
An initiating viewer identifies a multimedia channel and submits a request to share the multimedia channel with at least one recipient viewer at another viewer premises. This request is processed by the multimedia receiver of the initiating viewer so as to generate a channel change request for submission to a service provider. In response to the channel share request, the service provider queries the recipient viewer to determine whether the recipient viewer accepts or rejects the offered multimedia channel. If the recipient viewer accepts the multimedia channel, the multimedia channel can be provided to the multimedia receiver of the recipient viewer either for storage for later playback or for immediate playback concurrent with the provision of the multimedia channel to the initiating viewer. Billing for costs associated with the shared multimedia channel is conducted based on billing feedback provided by the initiating viewer.
Methods and devices for presenting guide listings and guidance data in three dimensions in an interactive media guidance application
Methods and devices for presenting guide listings and guidance data in three dimensions in an interactive media guidance application are provided. In some embodiments, methods for presenting guide listings and guidance data in three dimensions in an interactive media guidance application are provided, the methods comprising: presenting guide listings in a two-dimensional configuration; receiving a user selection of at least one of the guide listings in the two-dimensional configuration; identifying guidance data related to the selection; and presenting the guidance data so that the guidance data appears to be in a third dimension relative to the two-dimensional configuration.
Signal processing apparatus and methods
A unified system of programming communication. The system encompasses the prior art (television, radio, broadcast hardcopy, computer communications, etc.) and new user specific mass media. Within the unified system, parallel processing computer systems, each having an input (e.g., 77) controlling a plurality of computers (e.g., 205), generate and output user information at receiver stations. Under broadcast control, local computers (73, 205), combine user information selectively into prior art communications to exhibit personalized mass media programming at video monitors (202), speakers (263), printers (221), etc. At intermediate transmission stations (e.g., cable television stations), signals in network broadcasts and from local inputs (74, 77, 97, 98) cause control processors (71) and computers (73) to selectively automate connection and operation of receivers (53), recorder/players (76), computers (73), generators (82), strippers (81), etc. At receiver stations, signals in received transmissions and from local inputs (225, 218, 22) cause control processors (200) and computers (205) to automate connection and operation of converters (201), tuners (215), decryptors (224), recorder/players (217), computers (205), furnaces (206), etc. Processors (71, 200) meter and monitor availability and usage of programming.
A disk cartridge includes a case body that is capable of housing a plurality of disk-shaped recording media and is joined or separated by making a first shell contact with/separate from a second shell in an axial direction, and a lock lever that is rotatably supported and locks the first shell and the second shell in a joining manner, in the inside of the case body. A supporting shaft is provided to the case body, the lock lever includes a supported part and a lock part, a disk inserting/ejecting slot is formed, an open/close panel is provided to the first shell, the lock lever is supported on an end part of the case body, and an insertion concave part in which the lock part of the lock lever can be inserted and engaged is formed within an inner face of the open/close panel.
Integrated disk driving module including a lateral surface plate bent from an upper plate
An integrated disk driving module is disclosed, the module including a base unit including a spindle motor fixture including an opening-formed upper plate, a lateral surface plate bent from the upper plate to form an accommodation space, and a spindle motor fixture concavely formed from the upper plate toward the accommodation space, wherein the spindle motor fixture is integrally formed with the upper plate; and a spindle motor fixed inside the spindle motor fixture to rotate a disk.
Techniques for performing a remote procedure call using remote procedure call configuration information
Described are techniques for performing remote procedure calls (RPCs). An RPC API is described which provides for using an optimized technique and an unoptimized technique for performing RPCs. The optimized technique includes a client container performing a call to obtain RPC configuration information which is then stored by the client container and may be used by the client container in connection with multiple RPC invocations. Techniques are also described for communicating parameter information between containers executing in different address spaces by forming parameter information on the client side using embedded lists, encoding the parameter information on the client side prior to transmission to the server, and transmitting the encoded parameter information to the server which determines output parameters and returns the output parameters to the client.
Automated capacity provisioning method using historical performance data
An automated system obtains performance data of a computer system having partitioned servers. The performance data includes a performance rating and a current measured utilization of each server, actual workload (e.g. transaction arrival rate), and actual service levels (e.g. response time or transaction processing rate). From the data, automated system normalizes a utilization value for each server over time and generates a weighted average for each and expected service levels for various times and workloads. Automated system receives a service level objective (SLO) for each server and future time and automatically determines a policy based on the weighted average normalized utilization values, past performance information, and received SLOs. The policy can include rules for provisioning required servers to meet the SLOs, a throughput for each server, and a potential service level for each server. Based on the generated policy, the system automatically provisions operation of the servers across partitions.
Method, a mechanism and a computer program product for executing several tasks in a multithreaded processor
A method for executing several tasks in a multithreaded (MT) processor, each task having, for every hardware shared resource from a predetermined set of hardware shared resources in the MT processor, one associated artificial time delay that is introduced when a task accesses a hardware shared resource, the method including step (a) of establishing, for every hardware shared resource and each task to be artificially delayed, the artificial delay to be applied to each access of each task to every hardware shared resource; step (b) of performing the following steps (b1) to (b4) on the access of each task to be artificially delayed to every hardware shared resource in the predetermined set of hardware shared resources in the MT processor: step (b1) of verifying if a request is ready to be sent to the hardware shared resource; in case of positive result, Step (b2) of verifying if the hardware shared resource is ready to accept the request; in case of positive result, step (b3) of delaying the request by the artificial delay established for the hardware shared resource; step (b4) of allowing the request of the task to access the hardware shared resource.
Scheduling of tasks based upon historical execution times
Methods, systems, and implementations are disclosed to schedule a plurality of tasks on one or more processors. The tasks may be part of a larger job based on a user initiated query for information retrieval. One example method of operation may include estimating, based upon historical actual execution times of tasks of a respective corresponding type, an expected execution time for each task of the plurality of tasks. The method may further include scheduling the plurality of tasks for execution on the one or more processors based upon the estimated expected execution time of each task. The scheduling procedure utilized ultimately produces an optimized task execution schedule, and in turn, minimizes the expected job completion time.
Terminal device of non-android platform for executing android applications, and computer readable recording medium for storing program of executing android applications on non-android platform
Provided is a terminal device having a VM-based layer structure for executing heterogeneous applications. The terminal device includes: an application layer module including a first application and a second application; a platform layer module connected to a terminal processor and configured to operate the first application; and a middleware module configured to connect the platform layer module and the second application.
Resource allocation for controller boards management functionalities in a storage management system with a plurality of controller boards, each controller board includes plurality of virtual machines with fixed local shared memory, fixed remote shared memory, and dynamic memory regions
Provided is a computer system capable of linking and integrally operating a plurality of virtual machines. In this regard, a memory management mechanism capable of securing a shared memory secured, before the activation of the virtual machines, in a physical address that can be designated and capable of securing local memories corresponding to the number of the virtual machines is realized. In relation to a virtual system realized by a cooperation process by the plurality of virtual machines using part of physical hardware, a fixed area, in which the physical address and the size are determined at the activation of a hypervisor, and a dynamic allocation area, which is managed by the hypervisor, allocated from a memory pool that is shared by virtual machines that execute other functions, and in which the physical address and the size are determined at the activation of the virtual machines, are allocated to the virtual machines constituting the virtual machine group.
Method and apparatus for activating a virtual machine in a virtual solution
Embodiments of the present invention relate to a method for activating virtual machines in a virtual solution, including: for each virtual machine, activating activation items in a first activation item set independently of other virtual machines; and for at least one virtual machine, activating activation items in a second activation item set in coordination with activation of activation items of at least another virtual machine. There is further provided an apparatus for activating virtual machines in a virtual solution, including: a first activator for activating, for each virtual machine, activation items in a first activation item set independently of other virtual machines; and a second activator for activating, for at least one virtual machine, activation items in a second activation item set in coordination with activation of activation items of at least another virtual machine.
System and method for securing web application code and verifying correctness of software
Methods, software tools and systems for analyzing software applications, e.g., Web applications, are described. A software application to be analyzed is transformed into an abstract representation which preserves its information flow properties. The abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking. Runtime guards are inserted into the application to secure identified vulnerabilities.
Parallel processing of data
A data parallel pipeline may specify multiple parallel data objects that contain multiple elements and multiple parallel operations that operate on the parallel data objects. Based on the data parallel pipeline, a dataflow graph of deferred parallel data objects and deferred parallel operations corresponding to the data parallel pipeline may be generated and one or more graph transformations may be applied to the dataflow graph to generate a revised dataflow graph that includes one or more of the deferred parallel data objects and deferred, combined parallel data operations. The deferred, combined parallel operations may be executed to produce materialized parallel data objects corresponding to the deferred parallel data objects.
System and method for efficient compilation and invocation of function type calls
A system and method for efficient compilation and invocation of function type calls in a virtual machine (VM), or other runtime environment, and particularly for use in a system that includes a Java Virtual Machine (JVM). The system comprises a virtual machine for executing a software application; a memory space for the application byte code comprising callsites generated using a function type carrier; a bytecode to machine code compiler which performs MethodHandle invocation optimizations; a memory space for the compiled machine code; and a memory space for storing software objects as part of the software application. The system enables carrying the function type from the original MethodHandle to a callsite in the generated bytecode, including maintaining generics information for a function type acquired from a target function, and generating a callsite based on the generics information for the function object invocation.
System and method for code automation
A system is provided for computer application code automation comprising a code automation computer server configured for presenting an electronic user interface for receiving user input for generating a Structured Query Language (SQL) query, the user input comprising a plurality of SQL tokens, a processor, associated with the code automation computer server, for receiving the plurality of SQL tokens, the processor retrieving from memory and executing computer executable instructions for at least one of: (a) optimizing performance of the SQL query while receiving the user input, and (b) error checking the SQL query while receiving the user input, wherein the processor is adapted for automatically incorporating the generated SQL query into the computer application code and storing the computer application code in a non-transitory computer readable medium.
Object-oriented pull model XML parser
A system and method for parsing XML is provided. The method includes associating an input stream with a pull model parser, accepting requests to selectively parse out XML items from the input stream and retrieving metadata information associated with the parsed out XML items. The method further includes checking the pulled XML item to determine whether it conforms to XML syntax and/or semantic standards and validating the pulled XML item to determine whether it conforms to a selected DTD.
Verifying function performance based on predefined count ranges
A computer-implemented method of finding portions of a computer program exhibiting irregular performance can include detecting an entry into a function of a computer program under test indicating a current execution of the function and, responsive to detecting an exit from the function, determining a count of a computing resource utilized by the function during the current execution of the function. The count of the computing resource can be compared with a predetermined count range to determine whether the function is nonconforming to the predetermined count range. Usage information for the computer program under test can be output to a display of an electronic device resource, the resource usage information indicating that the function does not conform to the predetermined count range.
System and method for networked software development
A host having a network interface communicating with a plurality of users and a plurality of target devices, a workbench tool including software development tools, the plurality of users having access to the workbench, at least one user creating a first sensorpoint module using the workbench and a database storing the first sensorpoint module, the host loading the first sensorpoint module onto at least one of the target devices.
Method of tracing object allocation site in program, as well as computer system and computer program therefor
A data structure of a run-time object having a hash value field. The data structure allows an object allocation site to be traced from the run-time object, the object allocation site being a site in a program allocating the run-time object. A method for allowing an object allocation site to be traced from a run-time object includes embedding a value corresponding to the object allocation site in the program. A hash-value field includes the embedded value and the object identifier, and the tracing is performed by identifying the object allocation site that corresponds to the embedded value. A computer system for tracing an object allocation site includes a memory that stores the run-time object; an acquirer that acquires the value from a hash value field; and an identification unit that identifies the object allocation site that corresponds to the acquired value.
Apparatus and method for loading and updating codes of cluster-based java application system
The present disclosure discloses embodiments of an apparatus and method for loading codes of cluster-based Java application system. The loading techniques provided by the present disclosure do not need to publish the latest codes to each server in the cluster or restart the Java application in each server of the cluster. The loading techniques only need to update the codes in the codes storage server, such as a SVN server. Each server in the cluster will automatically load the latest codes, thereby improving the usability of the Java cluster system.
Automated application generation method and system
A modification method and system. The method includes retrieving by a computer processor of a computing system a list of features and plug-ins associated with an application. The features include features version metadata and the plug-ins include plug-ins version metadata. The computer processor compares features source code associated with the features with previous versions of associated source code. The computer processor generates modified features version metadata associated with the features version metadata. The modified features version metadata includes updated version labels differing from previous version labels of the previous versions of associated source code. The features are assembled into an application.
Decentralized system services
A Decentralized System Services (DSS) architecture defines a framework for building fault-tolerant distributed applications across decentralized and heterogeneous systems. DSS enables “complexity through composition” by defining distributed designs as compositions of limited function and observable services which may be quickly and dynamically assembled to perform higher level functions. DSS defines a standardized interaction between distributed services using sessionless, asynchronous communications with explicit failure semantics. Accounting for latency, failure and state management all become a natural part of the design process. DSS includes a runtime implementation for managing concurrent services—the Common Concurrency Runtime (CCR), a protocol for service interactions—the Web Services Application Protocol (WSAP), and a set of required service behaviors which provide for composibility, location independence, and fault tolerance—Distributed Protocol Oriented Programming (DPOP). DSS also includes a set of base level infrastructure services which make it easy to communicate, secure, distribute, debug, and store content across devices.
Automated scheduling of mass data run objects
Techniques are described in which indication of a computer application to be configured for use in a particular business enterprise is received. A mass data run object is identified. The mass data run object defines a computer operation to be performed by the computer application to transform business transaction data as part of a business process. The mass data run object identifies i) selection parameters to select business transaction data to be transformed by the computer operation defined by the mass data run object and ii) instructions, that when executed, perform the computer operation to transform the selected business transaction data. A mass data run object instance corresponding to the identified mass data run object is generated and scheduled for execution.
Describing formal end-user requirements in information processing systems using a faceted, tag-based model
A method, including: providing a computer menu from which a processing goal can be created, wherein the menu includes a plurality of facets, and wherein each facet includes at least one tag; receiving a processing goal, wherein the processing goal includes a plurality of tags selected from the menu; executing at least one application that includes a plurality of components arranged in a processing graph to produce information that satisfies the processing goal; and outputting the information.
Programming and development infrastructure for an autonomic element
Programming and development infrastructure for an autonomic element is provided. The system includes a control plane (ISAC), a host server, a management console, and a module development environment. The ISAC contains an Autonomic Controller Engine (ACE) and management module(s). The management module is comprised of a set of scenarios. The ISAC is embedded in a control plane.
Integrated circuit optimization modeling technology
A design optimization method for a target circuit design specified by a machine-readable file, comprises providing a computer-implemented model as a function of a set of characteristics of circuit designs of circuit optimization achievable due to a circuit modification procedure, such as timing constrained gate length modification for leakage power reduction. Using values of said set of characteristics for the target circuit design, the computer-implemented model is applied to the target circuit design to produce an indication of susceptibility of the target circuit design to optimization. The model can be produced using Monte Carlo simulations of a set of virtual designs, and fitting a function of said characteristics to the results.
Wire routing using virtual landing pads
Systems and methods for wire routing using virtual landing pads (VLPs) are described. In an embodiment, a method includes routing a wiring path between an output of a first circuit component and a VLP that represents an input of a second circuit component. For example, the VLP may have an area larger than the area of a physical pin of the second circuit component. The method may also include identifying a connection point on the VLP that is separated from an actual terminal of the second circuit, and completing the path between the connection point and the actual terminal. In some embodiments, the output of the first circuit component may also be represented by its own VLP. As such, systems and methods described herein may allow a circuit designer to perform routing procedures in a complex, highly integrated circuit, while reducing the circuit's overall capacitance and associated power consumption.
Clock tree for pulsed latches
The invention concerns a computer implemented method of circuit conception of a clock tree (200) comprising: a plurality of pulse generators (202) each being coupled to the input of one or more pulsed latches and being arranged to generate a pulsed signal (PS); and a tree of buffers (204) for supplying a clock signal (CLK) to the pulse generators, the method comprising: the conception of the clock tree without pulse generators based on a timing analysis by the computer of the propagation of clock edges in the clock tree; and replacing by the computer in the clock tree at least one buffer, coupled to the input of each pulsed latch, by a pulse generator.
Automatic verification of dependency
An approach is provided in which a formal verification tool sends a condition signal to a first circuit instance and to a second circuit instance, which are both instances of an electric circuit design. The formal verification tool selects a common input port and sends a first input value to the common input port of the first circuit instance and sends a second input value, which is different than the first input value, to the common input port of the second circuit instance. In turn, the first circuit instance generates a first output value and the second circuit instance generates a second instance value, which are utilized to verify dependencies between the electronic circuit's input ports and output ports.
Hierarchical stress parameter annotation
In an embodiment, the design flow is modified to avoid the flattening process but still accurately annotate the transistors with stress parameters. The location-based stress parameters may be generated, but may not be provided to the LVS tool. Instead, a hierarchical LVS process may be performed, black-boxing lower level blocks that already have stress parameter assignments, preserving hierarchy, etc. The output database from LVS thus includes a cross reference between layout devices and schematic devices, as well as locations of the schematic devices. The database may then be queried for the transistors in the non-flattened design, and the stress parameters may be assigned to the transistors based on the location-based stress parameters. In this fashion the stress parameters may be assigned to the desired transistors, permitting annotation of these parameters into the schematics, without flattening the design and doing unnecessary work on blocks to be skipped.
Partitioning for hardware-accelerated functional verification
A circuit design is partitioned for hardware-accelerated functional verification using a directed hypergraph with edge weights that are a function of slack. Slack may be computed as the difference between the early and late ranks for the source of an edge. The weight may further be computed as the difference between the edge's slack and a maximum slack value. In a preferred implementation each vertex also has multiple weights associated with resource requirements of different node types, and the partitioning is constrained to prevent vertex movement that would result in vertex weights for a given partition exceeding a partition resource capacity based on the accelerator architecture. Edge and vertex weights can be recomputed for the next level of partitioning. The partitioning process can be repeatedly iteratively until a termination criterion is met, the termination criterion being based in part on the number of directed cuts in each of the partitions.
An abstract decision module primitive for placement within a logical representation (i.e., a netlist) of a circuit design is described. The decision module primitive receives as inputs alternative solutions for a given function or segment of a netlist. The alternative solutions include functionally equivalent, but structurally different implementations of the function or segment of the netlist. The decision module primitive alternatively selects between connecting one of the inputs to the netlist to provide a complete functional definition for the netlist based on constraint information. The selected input of the decision module may be updated as additional constraint information is determined throughout the various stages of the design process. In addition, alternative solutions for a given function or segment of the netlist may be added to and/or removed from the inputs of a decision module as additional constraint information is identified.
Methods for decomposing circuit design layouts and for fabricating semiconductor devices using decomposed patterns
Methods for fabricating semiconductor devices are provided. In an embodiment, a method of fabricating a semiconductor device includes scanning a circuit design layout and proposing patterns for decomposed layouts. The proposed patterns are then compared with a library of prior patterns including a category of forbidden patterns and a category of preferred patterns. If a selected proposed pattern matches a forbidden pattern, the selected proposed pattern is eliminated. If the selected proposed pattern matches a preferred pattern, then the selected proposed pattern is identified for use in the decomposed layouts. Decomposed layouts are generated from the identified patterns. A plurality of masks is fabricated based on the decomposed layouts. Then a multiple patterning lithographic technique is performed with the plurality of masks on a semiconductor substrate.
Systems and methods for stochastic models of mask process variability
Systems and methods are disclosed for a stochastic model of mask process variability of a photolithography process, such as for semiconductor manufacturing. In one embodiment, a stochastic error model may be based on a probability distribution of mask process error. The stochastic error model may generate a plurality of mask layouts having stochastic errors, such as random and non-uniform variations of contacts. In other embodiments, the stochastic model may be applied to critical dimension uniformity (CDU) optimization or design rule (DR) sophistication.
Method for fabricating a semiconductor device using a modeling algorithm to model the proximity effect from the sub-layer
A method for forming a circuit layout comprises performing process proximity effect modeling based on process proximity effects caused by a sub-layer, wherein the sub-layer comprises an active layer positioned under a gate poly, and wherein performing the process proximity effect modeling includes calculating a pattern density of the sub-layer, incorporating results of the process proximity effect modeling into a modeling algorithm, and performing proximity correction using the results to manipulate a layout of a mask to be used when forming the circuit layout by photolithography.
Methods and apparatus to present recipe progress status information
Example methods and apparatus to present recipe progress status information are disclosed. A disclosed example method involves displaying a user interface screen associated with a recipe being executed in a process control system. The recipe includes a plurality of process phases. A plurality of process stage progress indicator are displayed in the user interface screen in an arrangement representative of the process flow of the recipe. Each of the process stage progress indicators is representative of at least one of the process phases of the recipe. A first one of the process stage progress indicators is indicative of a progress of at least one of the process phases. The first process stage progress indicator is updated in substantially real-time based on information received from the process control system.
System and method utilized for human and machine interface
The present invention discloses a system for human and machine interface. The system includes a 3-dimensional (3D) image capture device, for capturing a gesture of a motion object in a period of time; a hand-held inertial device (HHID), for transmitting a control signal; and a computing device. The computing device includes a system integration and GUI module, for compensating the control signal according to an image signal corresponding to the motion object, to generate a compensated control signal.
Intuitive data visualization method
A computer software program, method and system has a data visualization scheme in the form of plural identifiable virtual characters in a familiar virtual environment that is relevant for the characters and in which the characters act in the context of the environment and in a manner that is indicative of the data or data set portrayed by each character. From the actions and interactions of the virtual characters in the context of the virtual environment, information about the nature and interactions of the data and data sets is quickly and intuitively appreciated by a viewer.
A graphical user interface (GUI) includes an icon stack comprising a plurality of icons in an area within the GUI, whereby the icons overlap. The GUI further includes at least one interstitial navigation box that is capable of displaying information about at least one item associated with one of the icons.
Representing editable attributes of embedded content
A representational editing system for WYSIWYG editing of editable web pages with embedded content elements. The representational editing system presents embedded content elements in an editable manner that represents their actual appearance on the web page. Typically, the representational editing system displays an image in place of the embedded content. The representational editing system enables users to modify editable attributes of embedded content in a WYSIWYG editing environment.
Annotations for electronic content
Embodiments are described for capturing, displaying, and navigating text annotations in a non-modifiable document. In some embodiments, a determination is made that a text annotation is to be created and a system determines the file position of the selected object. The file position of the selected object can be stored along with the created text annotation in another file or a non-read only portion of a file storing the document. Using the file position, the text annotation may be identified with the selected object without modifying the non-modifiable document. In some embodiments, once a text annotation is displayed a user may easily navigate among the captured annotations.
Secondary user interface
A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally utilized by the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as a graphical user interface to the operating system. The desktop displays images representing files, documents and applications available to the user. The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SVGA standards. Displayable borders outside this area are the overscan area.
Method, system, and apparatus for keystroke entry without a keyboard input device
A method, system, and apparatus for entering alpha-numeric and non-alpha numeric data without the use of a keyboard input device are provided. According to one method, a grid is displayed on a display screen that includes one or more alpha-numeric characters. Distinguishing characters are displayed adjacent to each alpha-numeric character. In response to receiving a selection within the grid, a determination is made as to whether the selected location contains an alpha-numeric character and, if so, a further determination is made as to whether a distinguishing character is present on two sides of the selected location. If a distinguishing character is present on two sides of the selected location, then the character located at the selected location is entered into a keyboard buffer as if a keyboard input device had been utilized to type the character. The grid may also include character strings corresponding to non-alphanumeric keystrokes that may be selected and entered into the keyboard buffer in a similar manner.
Management system and management system control method
The present invention makes it possible to set a monitoring method for each of a plurality of monitoring-targeted objects. A node, such as a server, and a component, which is included in the node, are monitoring-targeted objects. An information acquiring part 140 acquires information from the monitoring-targeted objects. A control part 130 monitors the status of each of the monitoring-targeted objects based on the monitoring method set by a user for each of the monitoring-targeted objects, and outputs an alert in a case where a failure has been detected. A monitoring status is linked between monitoring-targeted objects that are associated to one another.
Interactive thumbnails for transferring content among electronic documents
Embodiments of the invention relate generally to computing devices and systems, software, computer programs, applications, and user interfaces, and more particularly, to generating a reproduction of an electronic document, such as a thumbnail, that includes an input field.
User interface for multiple display regions
User interfaces for multiple display regions are described. One embodiment provides an array of non-overlapping windows that are created from a set of overlapping windows, and a user can select one of the non-overlapping windows to obtain an enlarged view of that selected window while keeping the other windows in their non-overlapping state. In one embodiment, the array of non-overlapping windows can include minimized windows or windows in other virtual desktops (e.g. windows in other “Spaces”) or both. In one embodiment, only windows of a selected application are shown in non-overlapping mode while opened windows of other applications are not shown.
Software-based system and method for changing structural feature designations
A software-based system for changing structural feature designations within a production environment includes a menu page component adapted to support a menu page; an information document component interfacing with the menu page component and adapted to support at least one information document having structural feature designations of structural features; and an edit component interfacing with the information document component and adapted to view and edit the structural feature designations to expedite flow of materials in the production environment.
Display generation device, display generation method, program, and content download system
A display generation device, a display generation method, a program, and a content download system are provided. The display generation device for generating a display screen including one or two or more user-selectable playback control items is provided with a download section for downloading content data from a content server storing the content data, a data amount acquisition section for acquiring a data amount already downloaded and a data amount not yet downloaded by the download section among the content data, a rate acquisition section for acquiring a transmission rate of data from the content server to the display generation device, and a display screen generation section for generating the display screen including the playback control item according to the data amount acquired by the data amount acquisition section and the transmission rate acquired by the rate acquisition section.
Interactive access to media or other content related to a currently viewed program
A method for providing content related to a multimedia program on a display device where currently viewed multimedia programs are monitored so that content related to the currently viewed multimedia program may be retrieved from a content source and displayed on a flexible user interface on the display device upon request by the user, in which the user is able to adjust a size and position of the flexible user interface on the display device.
Methods and systems for generating a zoomable graphical user interface
Systems and methods according to the present invention provide a control framework for organizing, selecting and launching media items including graphical user interfaces coupled with an optional 3D control device for collection of the basic control primitives of point, click, scroll, hover and zoom which permit for easy and rapid selection of media items, e.g., movies, songs etc., from large or small collections. The remote control maps natural hand movements and gestures into relevant commands while the graphical display uses images, zooming for increased/decreased levels of detail and continuity of GUI objects to provide easy organization, selection and navigation among the media items by a user.
Smooth streaming client component
A streaming abstraction system is described herein that provides application developers a client software development kit (SDK) on top of which to build smooth streaming solutions. The system reduces development time considerably and abstracts platform specific intricacies and protocol handling on the client. In addition, the streaming abstraction system makes it possible to monetize streaming content with advanced features like advertising and analytics and provides advanced capabilities like multiple camera angles, diagnostics, and error handling. In some embodiments, the streaming abstraction system provides an intermediate layer that operates between an application and an underlying client media platform. The intermediate layer manages smooth streaming protocol handling as well as interactions with the platform-specific runtime.
Activation of fonts using font sets
Fonts may be activated based on the applications that are launched or operating on a computing device. Accordingly, if an application needs a particular set of fonts, the fonts may be activated upon launching of that application. Fonts may further be deactivated when they are no longer necessary or needed by the application (e.g., when the application is terminated). If supported by an operating system, instead of activating and deactivating the fonts, fonts may be pre-activated and then hidden from the operating system. The pre-activated fonts may be revealed when needed for the applications and then hidden again when the applications terminate.
Dynamic display of web page content for editing and review
Facilitating definition of a web page is disclosed. An indication that an external data is to be incorporated into the web page from an external source, such as another web page, is received via an editing interface. The external data is retrieved in real time from the external source and displayed in the editing interface.
Dynamically updating webpage style
A computer implemented method of presenting webpages at a client device or system, having one or more processors and memory storing one or more programs for execution by the one or more processors, includes, at a first time, presenting a first webpage having a first style, and in response to a refresh request at a second time, presenting a second webpage having a second style that is distinct from the first style. The first style and second style are determined in accordance with a value of a user selected variable, and the value automatically changes over time independent of user action. Furthermore, the user selected variable has a first value at the first time and a second value distinct from the first value at the second time.
Method and apparatus for coupling a visual browser to a voice browser
A method and apparatus for concurrently accessing network-based electronic content in a Voice Browser and a Visual Browser can include the steps of retrieving a network-based document formatted for display in the Visual Browser; identifying in the retrieved document a reference to the Voice Browser, the reference specifying electronic content formatted for audible presentation in the Voice Browser; and, transmitting the reference to the Voice Browser. The Voice Browser can retrieve the specified electronic content and audibly present the electronic content. Concurrently, the Visual Browser can visually present the network-based document formatted for visual presentation in the Visual Browser. Likewise, the method of the invention can include the steps of retrieving a network-based document formatted for audible presentation in the Voice Browser; identifying in the retrieved document a reference to the Visual Browser, the reference specifying electronic content formatted for visual presentation in the Visual Browser; and, transmitting the reference to the Visual Browser. The Visual Browser can retrieve the specified electronic content and visually present the specified electronic content. Concurrently, the Voice Browser can audibly present the network-based document formatted for audible presentation in the Voice Browser.
Constraint driven authoring environment
Techniques disclosed herein adapt a content authoring environment based on the specifications of destination electronic device for which that content is prepared. Such modification tailors features in the authoring environment to the destination device. The content authoring environment receives an identification of a destination device, such as a mobile phone, for which content is to be presented. The content authoring environment then modifies operation of itself to confirm to characteristics of the identified destination device. For example, such a modification can enable/disable authoring tools, provide device compatibility feedback in response to user content authoring, make changes to created content for device compatibility, and so forth.
Low density parity check decoder for irregular LDPC codes
A method and system for decoding low density parity check (“LDPC”) codes. An LDPC decoder includes a control unit that controls decoder processing, the control unit causing the decoder to process the blocks of a low density parity check (“LDPC”) matrix out of order. A decoder embodiment may process the layers of the LDPC matrix out of order and/or perform partial state processing on out of order blocks of the LDPC matrix and/or generate R messages out of order.
Integrated 2-level low density parity check (LDPC) codes
A method includes applying an error-detecting code to first input data to generate first protected data and applying the error-detecting code to second input data to generate second protected data. The method also includes generating a first encoded codeword by encoding the first protected data using a first low density parity check (LDPC) code, and generating an output by performing a binary exclusive-or operation on the first protected data and the second protected data. The method further includes generating a second encoded codeword by encoding the output of the of the binary exclusive-or operation using a second LDPC code, and multiplexing data for transmission over a communications channel based on (i) the first encoded codeword and (ii) the second encoded codeword.
Turbo coding for upstream and downstream transmission over a channel
A method of transmitting data in a cable modem system includes the steps of encoding the data using forward error correction. The data is then encoded with Turbo encoding. The data is then sent to a modulation scheme. The data is then transmitted over a cable channel. The data is then demodulated. The data is then decoded using a Turbo decoder. An inverse of the forward error correction is then applied to the data.
System and method for transmitting and receiving acknowledgement information
A system and method for transmitting and receiving acknowledgement information are provided. A method for communications device operations includes determining a hybrid automatic repeat request (HARQ) response for each CC in a set of configured CCs, thereby producing a set of HARQ responses, generating an information vector from the set of HARQ responses, encoding the information vector, and transmitting the encoded information vector. A sub-vector of one or more bits selected from the information vector is assigned a fixed vector value independent of HARQ responses for CCs not in a set of CCs when the set of CCs is not empty, where the set of CCs comprises at least one CC whose HARQ response is equal to DTX.
Self-timed error correcting code evaluation system and method
Error correcting codes (ECCs) have been proposed to be used in high frequency memory devices to detect errors in signals transmitted between a memory controller and a memory device. For high frequency memory devices, ECCs have delay characteristics of greater than one clock cycle. When the delay exceeds one clock cycle but is much less than two clock cycles, an entire second clock cycle must be added. By calculating and comparing the ECC value in a static logic circuit and a dynamic logic circuit, the logic delay is substantially reduced. In addition, the ECC value may be calculated and compared using two sets of static logic gates, where the second static logic gate is clocked by a clock signal that is delayed relative to the clock signal of the first set of logic gates.
Apparatus and method for detecting an approaching error condition
An apparatus and method are provided for detecting an approaching error condition within a data processing apparatus and includes a sequential storage structure arranged to latch an output signal generated by combinatorial circuitry dependent on a second clock signal. The sequential storage structure has a main storage element to latch a value of the output signal for provision to subsequent combinatorial circuitry. The sequential storage structure can be operated in either first or second modes of operation where, in the first mode, the predetermined timing window is ahead of a time at which the main storage element latches said value of the output signal enabling an approaching setup timing error to be detected. In the second mode, the predetermined timing window is after the time at which the main storage element latches said value of the output signal where an approaching hold timing error is detected.
Pulse dynamic logic gates with LSSD scan functionality
A scannable pulse dynamic logic gate may include an evaluation network that evaluates dynamic inputs in response to assertion of an evaluate pulse. The evaluate pulse may be generated from a clock signal such that it is shorter in duration than the clock signal. During a normal mode of operation, when the evaluate pulse is asserted, the evaluation network may discharge a dynamic node depending on the state of the dynamic inputs. The dynamic node may then drive output device(s). When the evaluate pulse is deasserted, the dynamic node may be precharged. The gate may also include scan input devices, which, during a scan mode of operation, may load scan input data onto the output node in response to assertion of a scan master clock. A storage element of the gate may receive and capture a value of the output node in response to assertion of a slave scan clock.
Defect detector for holographic storage systems
A system including a detection module, a reconstruction module, and a correlation module. The detection module receives first signals from a medium and detects data bits from the first signals. The reconstruction module reconstructs the data bits and generates second signals. The correlation module generates first correlation values by correlating the first and second signals and generates second correlation values by self-correlating the second signals. In response to at least one of the first and second signals including a floating number having a plurality of bits and a sign bit, the correlation module generates at least one of the first and second correlation values based on a plurality of most significant bits of the floating number and the sign bit of the floating number. The first and second correlation values indicate whether the data bits detected from the first signals include errors due to defects in the medium.
Memory error detection
Systems and methods are provided for detecting and correcting address errors in a memory system. In the memory system, a memory device generates an error-detection code based on an address transmitted via an address bus and transmits the error-detection code to a memory controller. The memory controller transmits an error indication to the memory device in response to the error-detection code. The error indication causes the memory device to remove the received address and prevent a memory operation.
Diagnostics methods for a communications device
A method facilitating the support of a communications device via diagnostic tools on the communications device and a remote computing device of monitoring predefined data elements associated with the operation of said communications device.
System and method to manage problems with network-based services
A method includes receiving a problem report from a customer via an access interface of a plurality of access interfaces at a first horizontal layer of a problem management system, wherein the problem report indicates that the customer is having a problem with one of the network-based services, receiving a request from the customer for self-service problem resolution via the access interface, identifying a workflow related to the problem, obtaining the workflow from a second layer of the problem management system, providing a diagnostic tool to the customer via the access interface, according to the workflow, and providing the diagnostic tool to an agent via another access interface after the customer contacts the agent.
Method and apparatus for distributed storage integrity processing
A distributed storage integrity system in a dispersed storage network includes a scanning agent and a control unit. The scanning agent identifies an encoded data slice that requires rebuilding, wherein the encoded data slice is one of a plurality of encoded data slices generated from a data segment using an error encoding dispersal function. The control unit retrieves at least a number T of encoded data slices needed to reconstruct the data segment based on the error encoding dispersal function. The control unit is operable to reconstruct the data segment from at least the number T of the encoded data slices and generate a rebuilt encoded data slice from the reconstructed data segment. The scanning agent is located in a storage unit and the control unit is located in the storage unit or in a storage integrity processing unit, a dispersed storage processing unit or a dispersed storage managing unit.
Computer system and data processing method for computer system
A plurality of computers to execute jobs, a management computer to manage the execution of jobs and the disposition of data in the computers and a storage device storing data are interconnected via a network. The management program for the management computer divides the data into distributed data according to hint information and distributively disposes the distributed data and their replicas in memory storages allocated in memories of the computers. The computers execute the job using the distributed data allocated to their own memory. In the event of a fault in any of the computers, the management computer requests computers having the replicas of those distributed data disposed in the faulted computer to re-execute the job.
Fallover policy management in high availability systems
The method determines whether a particular node of a high availability cluster is functioning properly or is a failed node. The method dumps node process state information as a dump data for the failed or crashed node in a shared storage area of the high availability cluster. A high availability cluster manager identifies the dump data that corresponds to the failed node as the most recent dump data for that failed node. The high availability cluster manager interrogates the dump data using kernel debugger services to identify a process trace and thereby identify the crash-causing application for the failed node. The method determines if the dump data includes a process match for the failed node process. The high availability cluster manager may initiate a crash-causing application notification to administrators or other entities of the high availability cluster. The method provides relocation and restoration capability of applications from the failed node to a fallover node and returns those application resources to the user and other entities using the high availability cluster.
Frequency adapter utilized in high-speed internal buses
A frequency adapter for synchronizing data transfers between a low-frequency module and a high-frequency module connected to an internal bus. The frequency adapter includes a low-to-high synchronization unit for synchronizing data transfers from the low frequency module to the high-frequency module, wherein the low-to-high synchronization unit is clocked by a low frequency clock; and a high-to-low synchronization unit for synchronizing data transfers from the high frequency module to the low-frequency module, wherein the high-to-low synchronization unit is clocked by a low frequency clock.
Deskewing apparatus for oscilloscope
A deskewing apparatus includes a power supply connector, a oscillator, a first switch unit, a second switch unit, a first logic member, a second logic member, a clock generator and a plurality of output channels. The oscillator generates an electrical signal with a predetermined frequency and sinusoidal waveform. The first switch unit and the second switch unit each generates on/off signals by controlling power on/off. The first logic member and the second logic member generate logic signals according to the corresponding on/off signals from the first switch unit and the second switch unit. The clock generator multiplies the frequency of the electrical signal based on the combination of the logic signals and converting the electrical signal from sinusoidal waveform into rectangular waveform. The output channels output the converted electrical signal.
Device having multiple graphics subsystems and reduced power consumption mode, software and methods
Many computing device may now include two or more graphics subsystems. The multiple graphics subsystems may have different abilities, and may, for example, consume differing amount of electrical power, with one subsystem consuming more average power than the others. The higher power consuming graphics subsystem may be coupled to the device and used instead of, or in addition to, the lower power consuming graphics subsystem, resulting in higher performance or additional capabilities, but increased overall power consumption. By transitioning from the use of the higher power consuming graphics subsystem to the lower power consuming graphics subsystem, while placing the higher power consuming graphics subsystem in a lower power consumption mode, overall power consumption is reduced.
Reconfigurable processor with pointers to configuration information and entry in NOP register at respective cycle to deactivate configuration memory for reduced power consumption
Described herein is a reconfigurable processor which uses a distributed configuration memory structure and an operation method thereof in which power consumption is reduced. A processing unit which configures the reconfigurable processor includes a functional unit, a distributed configuration memory, a no-operation (NOP) register, and a controller. The NOP register stores information which represents whether or not a NOP operation is performed at each clock cycle. The controller controls to deactivate the distributed configuration memory at a clock cycle at which a NOP operation is performed.
Method and apparatus for selectively placing components into a sleep mode in response to loss of one or more clock signals or receiving a command to enter sleep mode
On a typical motherboard the processor and memory are separated by a printed circuit data bus that traverses the motherboard. Throughput, or data transfer rate, on the data bus is much lower than the rate at which a modern processor can operate. The difference between the data bus throughput and the processor speed significantly limits the effective processing speed of the computer when the processor is required to process large amounts of data stored in the memory. The processor is forced to wait for data to be transferred to or from the memory, leaving the processor under-utilized. The delays are compounded in a distributed computing system including a number of computers operating in parallel. The present disclosure describes systems, method and apparatus that tend to alleviate delays so that memory access bottlenecks are not compounded within distributed computing systems.
Methods and systems for dynamically controlling operations in a non-volatile memory to limit power consumption
Systems and methods are disclosed for limiting power consumption of a non-volatile memory (NVM) using a power limiting scheme that distributes a number of concurrent NVM operations over time. This provides a “current consumption cap” that fixes an upper limit of current consumption for the NVM, thereby eliminating peak power events. In one embodiment, power consumption of a NVM can be limited by receiving data suitable for use as a factor in adjusting a current threshold from at least one of a plurality of system sources. The current threshold can be less than a peak current capable of being consumed by the NVM and can be adjusted based on the received data. A power limiting scheme can be used that limits the number of concurrent NVM operations performed so that a cumulative current consumption of the NVM does not exceed the adjusted current threshold.
Dynamic power state determination of a graphics processing unit
According to some embodiments, a method and apparatus are provided to determine a first operating point and a second operating point associated with a graphics processing unit, automatically determine a plurality of voltage/frequency values between the first operating point and the second operating point, and define a plurality of power states of the graphic processing unit. One or more of the power states may be associated with one of the plurality of voltage/frequency values. Each of the plurality of voltage/frequency values may include both a voltage and a frequency.
Method and apparatus for implementing secure and selectively deniable file storage
The invention concerns a method for writing data to a memory device arrangement comprising a first and a second memory device in which the first memory device comprises data blocks numbered with block numbers and the second memory device comprises at least one reference calculated from a data block digest and its physical block number. The invention is characterized in that it comprises the following steps: calculating the digest from at least part of the data block content, receiving at least one physical block number, to which the data block contents in the first memory device is stored, encrypting the data block content, storing the data block content to the first memory device to the position pointed by the physical block number, and storing or issuing a command to save the digest, or a number derived from it, and at least one said physical block number to the second memory device. Also a system, a computer program and server computer in accordance to the invention are presented.
Enhancing useability of mobile devices that securely store data
Methods, computer-readable media, and systems for enhancing useability of mobile devices that securely store data. An input to transfer a computer software application executing on a mobile device from a foreground state of the mobile device to a background state of the mobile device is received. In response, noise data based on application data associated with the application is generated. Both the application data and the noise data are encrypted using the same encryption mechanism, but using different keys. When another input to transfer the application from the background state to the foreground state is received, then the encryption mechanism is executed on the application data and the noise data using a key requested in response to the other input. The application is transferred to the foreground state if the received key matches the key with which the application data was previously encrypted. Other items of data are discarded.
Data encryption device and memory card
A data encryption device performs high-speed access to an arbitrary page when encrypting data and writing it to a storage device that can be accessed in a page unit or reading data therefrom and decrypting it. The device: encrypts data and writes it to the storage device or reads data from the storage device and decrypts it by a stream cipher; uses a counter mode of a block cipher to generate pseudorandom number series; specifies a data position in the storage device based on a page number and a page block number, by dividing one page into plural page blocks having a block length of the block cipher; and uses a value determined by a function of the page number, the page block number, and an arbitrary offset value, as an initial value of a pseudorandom number to be used in the counter mode.
Systems and methods for protecting against unauthorized access of encrypted data during power-management modes
A method may include detecting initiation of a power-management mode that suspends the functionality of at least one component of a computing device while maintaining the functionality of the device's memory. The method may also include, before the device enters the power-management mode, (1) identifying, within the device's memory, an encryption key that is required to access encrypted data stored in the device's storage device, and (2) removing the encryption key from the device's memory in order to protect against unauthorized access of the encrypted data during implementation of the power-management mode. The method may also include, upon detecting discontinuation of the power-management mode, (1) obtaining user credentials from a user of the device in order to authenticate the user and, upon successfully authenticating the user, (2) using the user credentials to regenerate the encryption key in order to enable access to the encrypted data stored in the storage device.
Systems and methods for generating replacement tokens are described herein.
Relying party specifiable format for assertion provider token
A security component may be associated with a network-enabled application. The network-enabled application may request access to restricted content from a relying party (e.g., web site). The security component associated with the network-enabled application may receive authentication policy information from the relying party and send a user's authentication credentials to an assertion provider to authenticate the credentials. The relying party may trust the assertion provider to authenticate user credentials. Upon successful authentication, the assertion provider may return an assertion token to the security component and the security component may sign the assertion token as specified in the authentication policy information. Subsequently, the security token may forward the signed assertion token to the relying party and the relying party may grant access to the restricted content.
Unique block header patterns for media verification
Authenticating the source of digital media is performed by using unique, randomly generated variably encoded frequency patterns to create mastering specific, profiles for sets end user media which can be verified by a manufacturer. A method for verifying the authenticity of an optical storage device includes the steps of: reading a randomly generated signature key value for the optical storage device; determining manufacturing information for the optical storage device; and matching read randomly generated signature key values and manufacturing information with known valid key the to determine the authenticity of the device.
Methods and system for storing and retrieving identity mapping information
System and method for storing identity mapping information in an identity management system to enable a user authenticated at a first domain to access a second domain. The method may include digitally signing the identity mapping information by the user; providing the mapping information to an identity management system; and storing the user-signed mapping information after being further digitally signed by the identity management system.
Attestation of computing platforms
A method and apparatus for attesting the configuration of a computing platform to a verifier. A signature key (SK) is bound to the platform and bound to a defined configuration of the platform. A credential (C(SK), CDAA(SK)) for the signature key (SK) is obtained from an evaluator. This credential (C(SK), CDAA(SK)) certifies that the signature key (SK) is bound to an unspecified trusted platform configuration. The platform can then demonstrate to the verifier the ability to sign a challenge from the verifier using the signature key (SK), and demonstrate possession of the credential (C(SK), CDAA(SK)) to the verifier, thereby attesting that the platform has a trusted configuration without disclosing the platform configuration to the verifier.
Method of managing metadata
Managing metadata in a metadata transmission server by generating a plurality of metadata fragment data by partitioning metadata to be transmitted based upon predetermined segment units, selecting predetermined metadata fragment data from among the plurality of the metadata fragment data, generating metadata-related authentication information using the selected metadata fragment data, and transmitting the selected metadata fragment data and the metadata-related authentication information including data format information indicating type of the selected metadata fragment data. A metadata receiving client uses the transmitted metadata fragment data, the metadata-related authentication information and the metadata format type information to authenticate the received metadata.
External interface access control for medical systems
A method and system of controlling access to a system in a medical environment is provided. The method includes calculating a signature value for at least one file usable with the medical system, transferring the calculated signature value to a signature file, and providing at least one signature value in the signature file and at least one associated file to a file system configured to be received by the medical system. At least one signature value and at least one associated file are inspected by the medical system to verify the associated file is a known medical software application asset. The medical system comprises an input/output data port configured to receive the external memory storage device, and an operating system capable of reading medical system data from and writing medical system data to the memory storage device.
Secure mobile telephony
An system for and method of providing end-to-end encrypted real-time phone calls using a commodity mobile phone and without requiring service provider cooperation is presented. The system and method improve upon prior art techniques by omitting any requirement for mobile phones that are specially manufactured to include end-to-end encryption functionality.
Methods and apparatus for delivering electronic identification components over a wireless network
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
Method and apparatus for transmitting, receiving and decoding data using encoded patterns of changing colors
A system and method for encoding, transmitting and decoding data is described which defines a plurality of bit patterns into a predetermined color combination of red/green/blue colors. A message is formed from the plurality of bit patterns and the message is then arranged into a recognizable format with a message protocol. The message is transmitted to a decoder, which decodes the message and displays the message on a display. A use is provided to establish a two factor authentication mechanism to authenticate a user by a requester.
Security system and method for wireless communication system
A security system processing method of a User Equipment (UE) and a security system for a wireless communication system are provided. The security processing method of the UE includes transmitting a Layer 3 message including a UE security capability to a Mobility Management Entity (MME) and the eNB, receiving a Access Stratum Security Mode Command (AS SMC) including a AS security algorithm selected by the eNB, as a result of verification of the UE security capability and information received from the MME, and a AS Message Authentication Code (MAC), transmitting a AS security mode complete message including the AS SMC to the eNB after verification of integrity of the AS SMC using the AS MAC, and transmitting, when receiving a Non Access Stratum (NAS) SMC including the UE security capability, a NAS security mode complete message to the MME after verification of integrity of the NAS SMC.
Managing method, device and terminal for application program
A managing method for an application program is disclosed, which includes that: a first terminal converts a file of a specified application program stored by the first terminal per se into an intermediate file in a predetermined intermediate format, wherein the intermediate format can be identified by other terminals having a running environment of the application program (S101); and the first terminal performs backup management on the specified application program by storing the intermediate file into a specified storage location, so as to enable a second terminal to recover the application program that has been made a backup, wherein both the second terminal and the first terminal have the running environment of the application program (S103). A managing device for an application program and a terminal are further disclosed. By means of the solution of the disclosure, performing universal backup management on an application program is realized, such that terminals that need to recover the application program convert a file in the intermediate format into a format required by each terminal, so as to recover and normally use the application program.
Apparatus and methods for protecting network resources
Apparatus and methods are provided for protecting network resources, particularly in association with automatic provisioning of new client devices. A global PKI (Public Key Infrastructure) scheme is rooted at a globally available server. Roots of PKIs for individual organizations also reside at this server or another globally available resource. To enable access to an organization's network, one or more authenticators are deployed, which may be co-located with access points or other network components. After a client device enabler (CDE) and an authenticator perform mutual authentication with certificates issued within the global PKI, the CDE is used to provision a new client device for the organization. After the client is provisioned, it and an authenticator use certificates issued within the per-organization PKI to allow the client access to the network.
System and method for adjusting to drive specific criteria
Embodiments provide systems and methods for adjusting to drive specific criteria. Data blocks sent to a drive may be padded to a constant size over a period to ensure optimal drive performance. Systems for padding data blocks to a constant size over a period may include padding logic which may pad data blocks addressed to a drive to a constant size over a period. The padding logic may be contained in an appliance located upstream of the drive in a network. The appliance may be operable to intercept data blocks addressed to the drive over a period, pad the data blocks to a constant size and forward the data blocks to the drive such that the drive receives data blocks of a constant size over a period.
Apparatus and method thereof for reliable booting from NAND flash memory
An apparatus for enabling booting from a NAND flash memory comprises a NAND flash controller connected to the NAND flash memory, wherein the NAND flash memory is configured to include at least a starter section for storing boot code, the starter section includes a predefined number of blocks to store copies of the boot code duplicated in a configurable number of blocks; and a fetch emulator for fetching a valid and complete starter block that includes the boot code.
Secure boot terminal, secure boot method, secure boot program, recording medium, and integrated circuit
A terminal that performs secure boot processing when booting, thereby booting reliably even if, during updating of a software module, the power is cut off or the update is otherwise interrupted. The terminal comprises a CPU, a software module storage unit, a certificate storage unit, an updating unit for updating the software module and certificate, a security device provided with a configuration information storage unit for storing the configuration information of the software module, an alternate configuration information storage unit for storing the configuration information of a software module in the configuration before the update, and a boot control unit for verifying and executing the software module by using the certificate. The terminal verifies the certificate of the software module by comparing the configuration information stored by the configuration information storage unit with the configuration information stored by the alternate configuration information storage unit.
Computer system for booting a system image by associating incomplete identifiers to complete identifiers via querying storage locations according to priority level where the querying is self adjusting
A computer system has extensible firmware interface firmware. The EFI firmware loads incomplete virtual boot data from a resource manager and then completes the boot data. The completed boot data is used to find an operating-system image to boot. The complete virtual boot data is transferred to the resource manager.
Electronic meter for concurrently updating firmware and collecting meter usage with a micro controller calculates the usage when a reset time is longer than a predetermined period of storing time
There are provided an electronic apparatus and a meter which are operable during the updating of an operating program and firmware. The electronic apparatus operable during program updating includes an operation unit performing a preset operation, a micro controller controlling an operation result of the operation unit to be stored according to a predetermined period of storing time, and controlling a program received from the outside to be stored, an update controller allowing the program stored during the predetermined period of storing time to be updated in the micro controller, and a storing unit storing the program and the operation result under control of the micro controller.
Dynamically updating a computer system firmware image
Methods, systems, apparatus, and computer-readable media for customizing a computer system firmware image utilizing a firmware configuration data structure. At least one firmware configuration data structure is created in a firmware image. Each data structure contains configuration data stored within a data field. A data structure signature identifying the data structure is stored within a data field of the data structure. A pointer to the configuration data within the data structure is stored in at least one firmware program module. An application may search for a firmware configuration data structure according to the data structure signature and content signatures corresponding to specific data entries, retrieve the applicable data structure and data entry, and store modifications to data stored therein.
Apparatus, system, and method for resetting and bypassing microcontroller stations
An apparatus, system, and method are disclosed for resetting and bypassing microcontroller stations. A command module asserts and de-asserts a reset line in response to a command. A reset module resets a microcontroller station if the command module asserts and de-asserts the reset line within a time interval. In addition, the reset module bypasses the microcontroller station if the command module asserts and holds the reset line for a time period exceeding the time interval.
Indirect branch target predictor that prevents speculation if mispredict is expected
In one embodiment, a processor implements an indirect branch target predictor to predict target addresses of indirect branch instructions. The indirect branch target predictor may store target addresses generated during previous executions of indirect branches, and may use the stored target addresses as predictions for current indirect branches. The indirect branch target predictor may also store a validation tag corresponding to each stored target address. The validation tag may be compared to similar data corresponding to the current indirect branch being predicted. If the validation tag does not match, the indirect branch is presumed to be mispredicted (since the branch target address actually belongs to a different instruction). The indirect branch target predictor may inhibit speculative execution subsequent to the mispredicted indirect branch until the redirect is signalled for the mispredicted indirect branch.
Processor and method providing instruction support for instructions that utilize multiple register windows
A processor including instruction support for large-operand instructions that use multiple register windows may issue, for execution, programmer-selectable instructions from a defined instruction set architecture (ISA). The processor may also include an instruction execution unit that, during operation, receives instructions for execution from the instruction fetch unit and executes a large-operand instruction defined within the ISA, where execution of the large-operand instruction is dependent upon a plurality of registers arranged within a plurality of register windows. The processor may further include control circuitry (which may be included within the fetch unit, the execution unit, or elsewhere within the processor) that determines whether one or more of the register windows depended upon by the large-operand instruction are not present. In response to determining that one or more of these register windows are not present, the control circuitry causes them to be restored.
Processing vectors using wrapping minima and maxima instructions in the macroscalar architecture
Embodiments of a system and a method in which a processor may execute instructions that cause the processor to receive an input vector and a control vector are disclosed. The executed instructions may also cause the processor to perform a minima or maxima operation on another input vector dependent upon the input vector and the control vector.
Virtualized storage system and method of operating thereof
A storage system and method are provided including physical storage devices controlled by storage control devices constituting a storage control layer operatively coupled to the physical storage devices and hosts. The storage control layer includes: a first virtual layer interfacing with the hosts, operable to represent a logical address space characterized by logical block addresses, characterized by an Internal Virtual Address Space (IVAS) and operable, responsive to I/O requests addressed to logical block addresses, to provide protocol-dependent translation of said logical block addresses into IVAS addresses; and a second virtual layer interfacing with the physical storage space, and operable to represent available physical space to said hosts and characterized by a Physical Virtual Address Space (PVAS). Each address in PVAS having a corresponding address in IVAS. The second virtual layer is operable to translate PVAS addresses corresponding to IVAS addresses into addresses in physical address space in a protocol-independent manner.
Reclaiming space occupied by an expired variable record in a non-volatile record storage
In a method for reclaiming space occupied by an expired variable record in a non-volatile record storage, a reclaim state data that includes a state of a reclaim operation is maintained. In addition, the state of the reclaim operation is marked to indicate a progress of the reclaim operation at a plurality of stages of the reclaim operation. The reclaim operation is implemented by sliding, one section at a time, the data in a first direction along the plurality of sections and by sliding, one section at a time, the variable records, excluding the expired variable record, in a second direction along the plurality of sections, to thereby remove the expired variable record.
Techniques for storing data
Techniques for providing access to data are disclosed. In an embodiment, a method for providing access to data involves storing data among a plurality of data stores where at least two of the data stores differ in at least one ability to perform a data operation. A mapping associates data containers with locations of corresponding data among the data stores. At least a portion of the data is redistributed among the data stores according to at least one policy that defines where among the data stores said at least a portion of the data should be stored. A request from a requestor to access particular data corresponding a data container is received and the particular data is located using the mapping. The particular data is provided to the requestor.
Unified optimistic and pessimistic concurrency control for a software transactional memory (STM) system
A method and apparatus for unified concurrency control in a Software Transactional Memory (STM) is herein described. A transaction record associated with a memory address referenced by a transactional memory access operation includes optimistic and pessimistic concurrency control fields. Access barriers and other transactional operations/functions are utilized to maintain both fields of the transaction record, appropriately. Consequently, concurrent execution of optimistic and pessimistic transactions is enabled.
Multi-layer content protecting microcontroller
The present invention relates to a microcontroller designed for protection of intellectual digital content. The microcontroller includes a secure CPU, a real-time cipher, and a user programmable multi-layer access control system for internal memory realized by programmable nonvolatile memory. Programmable nonvolatile memory allows in-system and in-application programming for the end user. The programmable nonvolatile memory is mainly used for program code and operating parameter storage. The multiple-layer access control is an integral part of the CPU, providing confidentiality protection to embedded digital content by controlling reading, writing, and/or execution of a code segment according to a set of user-programmed parameters. The cipher incorporates a set of cryptographic rules for data encryption and decryption with row and column manipulation for data storage. All cryptographic operations are executed in parallel with CPU run time without incurring additional latency and delay for system operation.
Automatic access management of clients to a storage system
Embodiments of the present invention provide a method of managing access of multiple client computers to a storage system that supports a limited number of logins. The method comprises, in response to a request to enable a subset of the clients to access resources of the storage system to perform a task, automatically configuring the storage system to provide the subset of the clients access to the resources, and, when the task is completed, automatically re-configuring the storage system so that the subset of the clients is no longer provided with access to the resources of the storage system.
Notifying software components using a shared physical storage medium
Techniques for updating a cached version of data in a computer system upon a change of the data as stored in a shared storage system networked to the computer system are described. In accordance with such techniques, a notification from the shared storage system is received at the computer system upon attempting to access the shared storage system. The computer system then determines that the notification occurred due to an unregistering of the computer system's access to the shared storage system by a second computer system that has updated the data stored in the shared storage system. As such, the computer system re-registers its access to the shared storage system and updates the cached version of the data with the data in the shared storage system that was updated by the second computer system.
Data storage device and data storing method thereof
A data storage device and a data storing method thereof, including first main memories coupled to a plurality of channels, second main memories coupled to the plurality of channels in common, a buffer memory temporarily storing data to be programmed to the first and the second main memories; and a controller configured to program data of victim cache lines from the buffer memory to the second main memories while data of a first victim cache line from the buffer memory is being programmed to the first main memories. The storing method includes that a victim cache line is selected based on cost-based page replacement.
Systems, methods, and computer readable media for configuring a rewriteable non-volatile memory for presentation of media by a selected media presentation device model
Systems, methods, and computer readable media for managing digital media in a memory storage device associated with a mobile smart device are disclosed. According to one aspect, the subject matter described herein includes a method for configuring a rewriteable non-volatile memory for presentation of media by a selected media presentation device model. The method includes providing a rewriteable non-volatile memory configuration interface through which a user can select at least one media file and one of a plurality of media presentation device models. and providing a rewriteable non-volatile memory configuration manager, which, in response to selection of the at least one media file and the one media presentation device model via the configuration interface, accesses a database including entries corresponding to the plurality of media presentation device models and configures a rewriteable non-volatile memory according to information retrieved from the database to allow presentation of the at least one media file when the rewriteable non-volatile memory is present in the selected media presentation device model.
Dynamically expanding storage capacity of a storage volume
A storage system includes at least one storage device on which are provided data storage volumes and an extended storage volume. The data storage volumes include a first data storage volume that is implemented with a data protection mechanism, and a second data storage volume that is implemented without the data protection mechanism. Also, an extended storage volume is provided that is initially un-allocated to any of the data storage volumes. A controller dynamically allocates at least one portion of the extended storage volume to the particular data storage volume to dynamically expand storage capacity of the particular data storage volume.
Connecting a storage subsystem and an electronic device with a control device that hides details of the storage subsystem
An apparatus includes an external interface port to connect to an external electronic device, where the external interface port is to communicate over a communications path with the external electronic device according to a serial communication protocol. The apparatus has a control device to hide details of the storage subsystem from the external electronic device. The control device is configured to perform at least one of (1) expanding a storage capacity of at least one logical storage volume of the storage subsystem, and (2) migrating a portion of data stored in the storage subsystem to a new physical storage device.
Automatic media readying system and method for a optical medium with file systems
In one aspect of the invention, a computer system comprises application logic executable to search an optical medium for at least one type of file system that may be resident on the optical medium. In response to identifying the presence of at least one type of file system resident on the optical medium, the system readies a media driver of an apparatus to make the at least one file system available for access.
Nonvolatile memory system and related method of preserving stored data during power interruption
A nonvolatile memory system comprises a temporary power supply that supplies power in the event of an unexpected power interruption. The temporary power supply provides power while metadata stored in one or more buffers is compressed and transferred to a nonvolatile memory device.
Devices and methods for operating a solid state drive
The present disclosure includes methods and devices for operating a solid state drive. One method embodiment includes receiving an indication of a desired number of write input/output operations (IOPs) per unit time performed by the solid state drive. The method can also include managing the number of write IOPs performed by the solid state drive at least partially based on the desired number of write IOPs per unit time, a number of spare blocks in the solid state drive, and a desired operational life for the solid state drive.
A protocol controller disposed between switches in a fiber channel fabric switch circuit and disk drive units for converting a protocol to enable one-to-one connectivity established between controllers and disk drive units.
Integrated circuits for accessing USB device
An integrated circuit for accessing a universal serial bus (USB) device via a USB 3.0 receptacle is provided. The integrated circuit includes a plurality of pins and a controlling unit. The pins include a first group for coupling to a first pair of differential pins of the USB receptacle, a second group for coupling to a second pair of differential pins of the USB receptacle, a third group for coupling to a third pair of differential pins to the USB receptacle, a ground pin, a first and second power pins. The second group is disposed between the first and third groups. The controlling unit controls the plurality of pins to receive or transmit the USB 2.0 or USB 3.0 signals.
Mass storage device and mass storage assembly
There is disclosed a mass storage device (such as a hard disk drive) comprising an input connector for electrically receiving both a first set of data signals and a second set of data signals. The first set of data signals are used to store or retrieve information on the mass storage device, whereas the second set of data signals are electrically conducted to an output connector on the mass storage device. When an adjacent mass storage device is connected to the output connector, the second set of data signals are used to store or retrieve information on this adjacent mass storage device.
Expanding functionality of one or more hard drive bays in a computing system
Methods, apparatus, and product are disclosed for expanding functionality of hard drive bays in a computing system that include: providing, by a connector in a hard drive bay, access to two or more data communication busses of different type; receiving, by the connector of the hard drive bay, a device mounted within the hard drive bay; and communicately coupling, by the connector of the hard drive bay, the device to one of the data communication busses.
System and method for storing communications intended for different groups using a limited amount of space
A system and method stores wirelessly received communications for wireless retransmission, making space in a storage device, if necessary, by deleting any one or more communications corresponding to the same group as the received communication. If storage in the storage device remains insufficient, communications that have been previously retransmitted by that same device are deleted, according to one or more characteristics of such stored communications, such as age or number of times an instance of that communication has been received. If storage in the storage device remains insufficient, communications of a different group are deleted according to one or more characteristics of the stored communications.
Method and apparatus for efficient synchronization request response
A data writing apparatus includes a tape drive, a buffer and non-volatile memory. When a synchronization request is received from a device sending data to be written to a tape, the apparatus is operable to copy data corresponding to the synchronization request from the buffer to the non-volatile memory. The data may be stored in the non-volatile memory until at least the time when the data which it is a copy of is written to the tape from the buffer.
Storage system with multicast DMA and unified address space
A system and method for clients, a control module, and storage modules to participate in a unified address space in order to and read and write data efficiently using direct-memory access. The method for reading data includes determining a first location in a first memory to write a first copy of the data, a second location in a second memory to write a second copy of the data, where the first memory is located in a first storage module including a first persistent storage and the second memory is located in a second storage module including a second persistent storage. The method further includes programming a direct memory access engine to read the data from client memory and issue a first write request to a multicast address, where the first location, the second location, and a third location are associated with the multicast address.
Smart printer cartridge
A system and method are disclosed for modifying the capabilities and functions of a printer after it is manufactured. A consumable/replaceable printer cartridge includes a storage device having updated and/or additional printer function data and other data for use by the printer control circuitry to execute printer functions and other types of functions. In addition, when the printer cartridge is installed in the printer the storage device may be utilized by the printer control circuitry as expanded memory for use in executing the updated and/or additional printer functions and other types of functions.
Advanced logic system diagnostics and monitoring
The Advanced Logic System (ALS) is a complete control system architecture, based on a hardware platform rather than a software-based microprocessor system. It is significantly different from other PLC-type control system architectures, by implementing a FPGA in the central control unit. Standard FPGA logic circuits are used rather than a software-based microprocessor which eliminate problems with software based microprocessor systems, such as software common-mode failures. It provides a highly reliable system suitable for safety critical control systems, including nuclear plant protection systems. The system samples process inputs, provides for digital bus communications, applies a control logic function, and provides for controlled outputs. The architecture incorporates advanced features such as diagnostics, testability, and redundancy on multiple levels. It additionally provides significant improvements in failure detection, isolation, and mitigation for the highest level of integrity and reliability.
Synchronization and ordering of multiple accessess in a distributed system
Several different embodiments of a massively scalable object storage system are described. The object storage system is particularly useful for storage in a cloud computing installation whereby shared servers provide resources, software, and data to computers and other devices on demand. In several embodiments, the object storage system includes a ring implementation used to associate object storage commands with particular physical servers such that certain guarantees of consistency, availability, and performance can be met. In other embodiments, the object storage system includes a synchronization protocol used to order operations across a distributed system. In a third set of embodiments, the object storage system includes a metadata management system. In a fourth set of embodiments, the object storage system uses a structured information synchronization system. Features from each set of embodiments can be used to improve the performance and scalability of a cloud computing object storage system.
System and method for providing remote data access and transcoding for a mobile communication device
A system for providing information content over a network to a mobile communication device includes a transcoding system and a first network device. The transcoding system includes a plurality of transcoders. Each transcoder is operable to transcode the information content from a respective input content type into a respective output content type. The first network device is in communication with the transcoding system and includes a connection handler system. The first network device is operable to receive a first connection request that includes transcoder request data and to select a corresponding connection handler. The connection handler is operable to select one or more transcoders from the plurality of transcoders based on the transcoder request data.
Methods, systems and computer program products for identifying traffic on the internet using communities of interest
Methods for identifying wanted traffic on the Internet are provided. The methods include determining a traffic history for a user of the Internet; identifying wanted traffic in a stream of Internet traffic based on the determined traffic history; and prioritizing the identified wanted traffic such that unwanted traffic is assigned a lower priority than the wanted traffic. Related systems and computer program products are also provided.
Network data transmission systems and methods
Network data transmission systems and methods are described. In one embodiment, a method for transmitting data between two nodes of a network can include transmitting the data using a protection bandwidth of a first transmission path between the two nodes and, based on detecting a failure condition in the first transmission path, using a different second transmission path between the two nodes to transmit the data otherwise transmitted using the protection bandwidth of the first transmission path. In one embodiment, the systems and methods can be applied to networks that use a layer-1 redundancy scheme.
Method and system for reducing packet latency in networks with both low latency and high bandwidths requirements
A method and structure for detecting whether the packets received by the switch are low latency packets or high bandwidth packets and routing detected low latency packets to a first one of a pair of switching structures and for high bandwidth packets to a second one of the pair of switching structures. The switch includes an output section for detecting whether a low latency packet is being received during transmission of a high bandwidth packet and, under such detected condition interrupting the transmission of the high bandwidth packet, transmitting the low latency packet, and then transmitting a remaining portion of the high bandwidth packet. The switch inserts delimiters at the start of transmission of the low latency packet and an end of transmission of the low latency packet. The transmission of the low latency packet commences immediately upon detection of such low latency packet.
Multicast address to packet identifier mapping for broadcast systems
A mapping method for simplifying broadcast systems, such as Digital Video Broadcast Terrestrial (DVB-T). Broadcast address information is mapped to the Packet Identifier (PID) field of a Motion Picture Expert Group level 2 transport stream (MPEG2-TS). Table complexity can be minimized, or the service information (SI) tables can be removed without impacting hardware level discrimination of likely relevant packets.
Systems and methods for downloading and viewing images
A system for displaying multiple images associated with an electronic message displays an image viewing icon in conjunction with the displayed electronic message on a client computer's monitor. In response to a single user selection of the image viewing icon, the system downloads from a document storage system a single document containing all associated images and displays the single document on the client computer's monitor.
Web browser proxy-client video system and method
Method of controlling playback of Internet web page video on remote or high quality video displays using a remote control device, such as a smart phone. The method runs a first client browser on the remote control device, which in turn sends commands to a proxy browser with a data buffer. In response to user commands from the remote control device, the proxy browser retrieves and buffers video and non-video web page data from Internet servers, and sends this data to the remote control device. Upon user command, the proxy browser also sends selected buffered data to a second client browser that is connected to the remote or high quality video display. Media player playback commands on the remote control are echoed to a second media player on the second client browser, resulting in good synchronization between devices. Various compression, IP address adjustment, and public key methods are also discussed.
Application single sign on leveraging virtual local area network identifier
A processor-implemented method for providing application single sign on leveraging a virtual local area network identifier is provided. The method comprises an authentication server providing a client device access to a network via association with a virtual local area network and a credential. The method also comprises the device invoking an application hosted on an application server and the application server identifying a virtual local area network tag associated with the device. The method also comprises the application server sending a message to the authentication server requesting linkage of the tag with a user identification associated with the device. The method also comprises the authentication server linking the tag with the user identification associated with the device and sending a message to the application server containing the identification. The method also comprises the application server using the identification to authenticate the device with the application and the device receiving access.
Method and system for proof-of-possession operations associated with authentication assertions in a heterogeneous federated environment
A method, apparatus, system, and computer program product are presented in which federated domains interact within a federated environment. Domains within a federation are able to initiate federated single-sign-on operations for a user at other federated domains. A point-of-contact server within a domain relies upon a trust proxy within the domain to manage trust relationships between the domain and the federation. Trust proxies interpret assertions from other federated domains as necessary. Trust proxies may have a trust relationship with one or more trust brokers, and a trust proxy may rely upon a trust broker for assistance in interpreting assertions. To enhance security, domains may also require users to re-prove their identity through proof-of-possession challenges that are executed after a user has initiated a single-sign-on operation.
Connection rate limiting for server load balancing and transparent cache switching
Each service in a computer network may have a connection rate limit. The number of new connections per time period may be limited by using a series of rules. In a specific embodiment of the present invention, a counter is increased each time a server is selected to handle a connection request. For each service, connections coming in are tracked. Therefore, the source of connection-request packets need not be examined. Only the destination service is important. This saves significant time in the examination of the incoming requests. Each service may have its own set of rules to best handle the new traffic for its particular situation. For server load balancing, a reset may be sent to the source address of the new connection request. For transparent cache switching, the connection request may be forwarded to the Internet.
Method for sharing rights object in digital rights management and device and system thereof
A method for sharing Rights Object (RO) of a specific DRM content resident in a certain device with different devices (or terminals) in a Digital Rights Management (DRM) system, in which a first device and a second device can share an RO for DRM content by performing a mutual authentication between the first device and the second device to set a session therebetween; creating, by the first device, a second RO for the second device; and transferring the second RO from the first device to the second device through a particular interface. Thereby, while the first device consumes a specific DRM content with employing the first RO, the second device simultaneously consumes the specific DRM content with the second RO transferred from the first device.
Device for wireless data exchange as well as method for establishment of a wireless connection between in particular a medical sensor unit and a computer
An apparatus and method to enable a simple installation of a sensor unit (in one example an intra-oral x-ray sensor) on a network. The sensor unit is preferably a sensor in the medical field, and it is provided that the sensor unit is itself fashioned as an access point and establishes its own network on which a computer automatically logs on in order to enable a data transfer between the sensor unit and the computer. Due to this measure no expertise is necessary for the installation of the sensor unit.
Providing client access to devices over a network
A centralized service identifies a pool of devices that can be accessed by clients over a network. Devices can include a local or network-accessible device, and a configurable file that represents a portion of a device (e.g., a SCSI storage device). In some cases, the devices (or the file representing a portion of the device) can be identified by an assigned logical unit number. The centralized service assigns one or more devices to a target, and associates client information with the target. The centralized service also can also assign the target a logical unit number, and assign the target to a protocol-independent portal, which further operates through protocol-dependent miniports. In one embodiment, a client accesses a network device by accessing the appropriate port through an appropriate miniport protocol (e.g., Ethernet, fiber channel, etc.), and by submitting appropriate target authorization.
Mimic support address resolution
Mimicking network devices with a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network, including obtaining an IP address of a device on the local network, determining an IP address for the second network interface card based on the obtained IP address of the device on the local network, and assigning the determined IP address to the second network interface card.
Method and device for pushing data
The disclosure provides a method and device for pushing data and relates to the Internet. The method includes acquiring data which meet a predetermined condition, acquiring attributes of reading-performed-users that have browsed the data, and determining a common attribute of the reading-performed-users; selecting reading-not-performed-users that have the common attribute and have not browsed the data; and pushing the data to the reading-not-performed-users. The device includes a common attribute acquisition module, a reading-not-performed-user selection module and a pushing module. According to the method and device for pushing data provided by the embodiments of the disclosure, the reading-not-performed-users that have the common attribute and have not browsed the data may be determined based on the data that meet a predetermined condition and a common attribute of the reading-performed-users, and the data are pushed to the reading-not-performed-users. Thus, the reading-not-performed-users may acquire their interesting data accurately.
Device, method, and storage medium for detecting multiplexed relation of applications
A configuration information collection unit 1502 and a transaction collection unit 1503 collect a transaction as the configuration information about an IT system and communication data, and stores them in a CMDB 1504. A multiplexed application detection unit 1501 detects as a candidate for a multiplexed application the software of applications multiplexed by evaluating whether or not the application names of the software of applications deployed to a target to be monitored on the IT system match each other. Then, it detects a multiplexed application by evaluating whether or not one or more of evaluation items of a subnet in which a candidate for a multiplexed application is performed, transaction context as the data relating to the names of an applications performed before and after the candidate for a multiplexed application, and transaction information as the transmission/reception data of the candidate for a multiplexed application match each other.
Reputation prediction of IP addresses
Daily query counts for e-mail messages sent from a number of IP addresses having unknown reputations are collected and logged, and optionally plotted. The logged query count data may optionally be normalized. The normalized query count data may also be plotted. The normalized data is divided into regions (numerically or graphically). Next, the divided regions are tagged (symbolically or graphically) with unique, symbolic identifiers such as letters, numbers, symbols or colors. Patterns for each unknown IP address are formed based upon the tagged regions. Common good and bad patterns are also identified for known good and bad IP addresses. The reputation of these unknown IP addresses are then predicted using these identified good and bad patterns using a suffix tree (for example). Finally, an output identifying the determined reputations of these unknown IP addresses is generated and output.
System management method in computer system and management system
To enable the setting of a suitable threshold for a component of each of apparatuses configuring a system. By using management software, a threshold for monitoring the performance of an apparatus to be monitored is set beforehand. When an acquired performance value exceeds the threshold, the acquired performance value is detected as a performance fault event. Further, the management software has a correlation analysis rule representing a causal relationship between the performance fault events in the managed apparatus. When detecting an event, the management software performs fault cause analysis processing to specify a fault cause apparatus and an apparatus (affected apparatus) affected by the fault from a plurality of received events.
Network system, terminal and recording medium
A network system includes printers as terminals interconnected via a network. Each of the printers can obtain information on the others, and transmit the obtained information together with information on itself to a browser computer as a controller. Therefore, by obtaining the information only from one of the printers, the computer can obtain together with it the information on the others. In this system, it is possible to obtain the information on the printers efficiently without using a server computer.
Abnormal point locating apparatus, method, and storage medium
An abnormal point locating method includes: a link primary abnormality judgment procedure that acquires information on a link through which each observation flow passes, locates a link through which an observation flow observed at an observation point passes, and judges whether the located link is normal or abnormal based on the observation flow; and a link secondary abnormality judgment procedure that judges a probability of abnormality based on a result of the link primary abnormality judgment procedure by using a connection relationship as seen from each observation point.
Verification of configuration information in BGP VPNs
Described are mechanisms for verifying configuration information in 2547 BGP VPNs. An originating PE generates a first knowledge digest encoding first configuration information associated with a current set of information advertised for a VRF. The originating PE also generates a second knowledge digest encoding second configuration information associated with cumulative information advertised for the VRF. The originating PE is capable of receiving a message from a user PE, the message including a third knowledge digest encoding third configuration information related to the user VRF. The originating PE is capable of comparing the first knowledge digest to the third knowledge digest and producing a first indication if the third configuration information encoded in the third knowledge digest is not a subset of the first configuration information encoded in the first knowledge digest.
Virtual machine migration
A source virtual machine (VM) hosted on a source server is migrated to a destination VM on a destination server without first powering down the source VM. After optional pre-copying of the source VM's memory to the destination VM, the source VM is suspended and its non-memory state is transferred to the destination VM; the destination VM is then resumed from the transferred state. The source VM memory is either paged into the destination VM on demand, or is transferred asynchronously by pre-copying and write-protecting the source VM memory, and then later transferring only the modified pages after the destination VM is resumed. The source and destination servers preferably share common storage, in which the source VM's virtual disk is stored; this avoids the need to transfer the virtual disk contents.
Autonomic computing system with model transfer
Methods and systems are provided for autonomic control and optimization of computing systems. A plurality of component models for one or more components in an autonomic computing system are maintained in a system level database. These component models are obtained from a source external to the management server including the components associated with the models. Component models are added or removed from the database or updated as need. A system level management server in communication with the database utilizes the component models maintained in the system level database and generic component models as needed to compute an optimum state of the autonomic computing system. The autonomic computing system is managed in accordance with the computed optimum state.
Data sharing between smart devices
Data sharing between networked smart devices is disclosed. One embodiment of the present disclosure pertains to a method for data sharing with one or more associated smart devices via a network. The method comprises displaying, on a display unit of the smart device, an image for each one of the associated smart devices within coverage of the network and an image of shared data. The method also comprises effecting a change in a first image for a first smart device of the associated smart devices when the first smart device is targeted as a target device for the data sharing. The method further comprises communicating the shared data with the first smart device via the network when, on the display unit, the image of the shared data is moved to or from a domain of the first image of the first smart device.
Apparatus and method for sharing a generic configuration across a group of network devices
Various embodiments provide an apparatus and method for sharing a generic configuration across a group of network devices. An example embodiment includes sending a scope challenge to a plurality of network devices; receiving a response to the scope challenge from a plurality of in-scope network devices; sending a configuration change message including a configuration change to the plurality of in-scope network devices; and receiving a commit message from the plurality of in-scope network devices indicating that the configuration change has been committed.
System for classification, location and transmission of music playlists
A server (1) transmits playlists, each playlist including a description of content acquisition information, and playlist configuration data represented between playlists in numerical values. A terminal device (2) receives playlists and playlist configuration data from the server (1), and for a reproduction of content, changes a playlist to be used in accordance with playlist configuration data to reproduce a content of playlist after change. This allows the terminal device (2) to reproduce content in accordance with a state of mind a user may have, based on the playlist configuration data.
Method for audio and video control response and bandwidth adaptation based on network streaming applications and server using the same
A method for audio and video control response and bandwidth adaptation based on network streaming applications is disclosed. A server delivers a received control command to a stream controller while a player empties the expired streaming data stored in a buffer thereof. The stream controller controls the input source of a video/audio capturer. The receiver buffer estimator of the receiver estimates whether the amount of the streaming data stored in the buffer is within a safe range and delivers the estimation result and bandwidth variation information to a stream adaptor. If the amount of the stream data is less than a threshold value, the timestamp scalar is adjusted based on the estimation result and the bandwidth variation information, thereby adjusting the consumption rate of the streaming data in the buffer of the player for re-accumulating streaming data of the buffer.
Method and a system for incorporating reliable messaging in web services client applications via an API
A method and a system that incorporate Web services reliable messaging in a Web services client application via an application programming interface (API). The method includes obtaining a Web services proxy object from the client application and using this object for creation of a logical sequence from a sequence factory. The Web services client application transmits a reliable message sequence to the Web services provider based on the logical sequence.
Motor drive with integrated server module
The present invention relates to a drive system that includes a module that operates as a server, where at least sometimes the module is at least one of directly integrated with another module that operates as a drive and fully integrated to include the drive. The server allows for communications with one or more terminals via an internet-type communications medium, while the drive is for controlling, monitoring and/or otherwise interacting with at least one motor, electromechanical machine, or other appropriate type of machine/process. In at least some embodiments, the server is capable of providing web pages, executable programs and/or other information including, for example, information in accordance with an FTP protocol onto the internet for receipt by the terminals. The terminals communicate commands and other information via the internet back to the server, which in turn can influence the drive and the controlled machine/process.
User profile service
Systems, methods, and device are provided for a user profile service. One embodiment includes a method for user profile service. The method includes collecting user profile data from different network sources in a localized database. Business rules are provided to an application server to manage access to the collected user profile data in the database. The method further includes allowing different network service applications to access the collected user profile data as determined by the business rules.
Custom event and attraction suggestions
A computing device may determine a geographic location of the computing device. The computing device may receive information associated with a user. The information may include a search history, a browsing history, an electronic communication message, a social media profile, and a geographic location history. The computing device may determine, based on the information associated with the user, a predicted interest of the user. The computing device may determine, based on the predicted interest of the user, events within a threshold distance from the geographic location of the computing device. The computing device may determine, based on a strength of a relationship between the predicted interest and respective event information associated with each of the events, a ranking of the events. The computing device may output, based on the ranking, at least a portion of the event information for at least one of the events.
Providing an interface to browse links or redirects to a particular webpage
Disclosed herein is a technique for providing an interface that allows a user to navigate backwards through linked webpages. Initially, a request to display inlinks of linking webpages that contain a link to a particular webpage is received. In response to the request, a new page that contains a set of inlinks that correspond to a set of linking webpages that each contain a link to the particular webpage is provided. Each of the inlinks may be associated with a particular clickable item. An indication of a selection of a clickable item, associated with a particular inlink is received. In response, a second new page which contains a second set of inlinks that correspond to a second set of linking webpages that each contain a link to the webpage that corresponds to the particular inlink is provided. Some of the displayed inlinks may correspond to webpages that redirect to the particular webpage.
Method and apparatus for the collection, formatting, dissemination, and display of travel-related information on a low-cost display bank
A low-cost display bank that displays travel-related information in a public travel-related area and includes one or more slave low-cost display units, and a master low-cost display unit that includes a communication interface that receives travel-related information, a display bank control unit that sends identification information to a display bank data management unit through the communication interface, receives a display bank unit profile containing display parameters based on the identification information through the communication interface, receives travel-related information from the display bank data management unit in accordance with the received display parameters through the communication interface, sends the received travel-related information intended to be displayed on the one or more slave low-cost display units to the one or more slave low-cost display units, and displays the received travel-related information on the master low-cost display unit and the one or more slave low-cost display units based on the received display parameters.
Handheld electronic device and associated method providing time data in a messaging environment
An improved handheld electronic device and an associated method are provided in which time data regarding certain aspects of a messaging conversation on a handheld electronic device are made available to a user. Such time data is provided, for instance, in situations where an interruption has occurred during a messaging conversation. Time data can also be provided to a user on demand in certain circumstances.
Methods, systems, and machine-readable mediums are disclosed for creating multimedia messaging service (MMS) messages. In one embodiment, the method comprises receiving a message in a first format, adapting the message to a MMS message, and sending the MMS message to a user device.
Enforced unitasking in multitasking systems
A computer system includes one or more devices that are capable of multitasking (performing at least two tasks in parallel or substantially in parallel). In response to detecting that one of the devices is performing a first one of the tasks, the system prevents the devices from performing at least one of the tasks other than the first task (such as all of the tasks other than the first task). In response to detecting that one of the devices is performing a second one of the tasks, the system prevents the devices from performing at least one of the tasks other than the second task (such as all of the tasks other than the second task).
Systems and methods for identifying terms relevant to web pages using social network messages
Systems and methods for retrieving social network messages and/or web pages in response to search queries are described. One embodiment of the invention includes generating a word list from at least a portion of the content of the web page using a web and message server system, generating an initial list of relevant terms based upon the word list using the web and message server system, identifying additional relevant terms using messages posted to at least one social network based upon the initial list of relevant terms, and creating an updated list of relevant terms by using the web and server system to combine terms in the initial list of relevant terms with the additional relevant terms identified using messages posted to at least one social network.
Hiding email identification using a configurable set of domains
A method of delivering an electronic mail message. A mail server receives and stores a rule from a first user. Thereafter the mail server receives the electronic mail message from a second user comprising a sender. The mail server compares the rule with an email address in a field of the electronic mail message. Responsive to the rule being satisfied the email server takes an action with respect to the email address or the field to form a modified electronic mail message. Thereafter, the email server delivers the modified electronic mail message to a third user comprising a recipient. The first, second, and third users may all be different from each other.
A multi-function device may be configured to receive a first electronic mail including a first attached file, analyze the first electronic mail, supply an image described by the first attached file to a print performing unit in a case where the multi-function device analyzes that the first electronic mail includes first command information including a first sort of a command and first designation information designating the first attached file, and send the first attached file to an other device in a case where the multi-function device analyzes that the first electronic mail includes second command information including a second sort of a command different from the first sort of the command and the first designation information.
System and method for providing a messaging kernel
The present invention enables a messaging kernel to serve as the basis for asynchronous messaging in a Web service platform. The kernel provides basic messaging features, including point-to-point and publish/subscribe messaging, persistent and non-persistent messages, a variety of acknowledgement modes, two-phase commit transactions, quotas, statistics, message sorting, and message paging. It also includes some novel features that maintain message order based on application requirements. This description is not intended to be a complete description of, or limit the scope of, the invention. Other features, aspects, and objects of the invention can be obtained from a review of the specification, the figures, and the claims.
Method and apparatus for automatically setting “out of office” greetings
A telecommunications method includes setting a media server greeting automatically responsive to detection of a change in setting of an e-mail system default message. The e-mail system default message may be an “out of office” outgoing message. The media server greeting may be a voice greeting.
Method and system for processing email during an unplanned outage
The method and system of the present invention provides an improved technique for processing email during an unplanned outage. Email messages are redirected from the primary server to a secondary server during an unplanned outage such as, for example, a natural disaster. A notification message is sent to users alerting them that their email messages are available on the secondary server by, for example, Internet access. After the termination of the unplanned outage, email messages received during the unplanned outage are synchronized into the users standard email application.
Dialog server for handling conversation in virtual space method and computer program for having conversation in virtual space
A dialog server which provides dialogs made by at least one user through their respective avatars in a virtual space. A method and a computer readable article of manufacture tangibly embodying computer readable instructions for executing the steps of the method are also provided. The dialog server includes: a position storage unit which stores positional information on the avatars; an utterance receiver which receives at least one utterance of avatars and utterance strength representing an importance or attention level of the utterance; an interest level calculator which calculates interest levels between avatars based on their positional information; a message processor which generates a message based on the utterance in accordance with a value calculated from the interest levels and the utterance strength; and a message transmitter which transmits the message to the avatars.
Sharing software applications
In general, this disclosure describes techniques for providing a mechanism to manage referrals for applications shared over a social network service when granted permission by users of the social network service. For example, a server system receives a message including user association information and an indication of a software application, and publishes a post to a subset of users as indicated by the user association information. The server system also receives a request for a version of the software application from a second user and determines whether the post was re-shared by a third user. If the post was re-shared, the server system stores in a database of the computing system, a referral association between the third user, the second user, and the software application. If the post was not re-shared, the server system stores a referral association between the first user, the second user, and the software application.
System and method for secure social networking
A system and method for secure social networking is disclosed. In one embodiment, a social networking site is accessible on the Internet for use by minors that allows for adult supervision and approval for participation on the site, and provides safeguards against abuses and misuse of many social networking sites available today. In another embodiment, a social networking site on the Internet is available for use by minors that permits users to access the Internet only according to guidelines previously approved by adults for each user. The system further comprises a call screening feature that allows incoming and outgoing calls according to guidelines previously approved by adults for each user.
System and method for executing hands-free operation of an electronic calendar application within a vehicle
One or more embodiments may include a method and system for operating a computer application stored on a nomadic device (ND) located within the vicinity of a vehicle. The system may include a vehicle computer system (VCS). The method may include receiving an input at the VCS to pair the VCS with the ND to establish a wireless communication link over which the VCS may receive one or more instructions from the ND. The one or more instructions may include instructions for establishing a connection with an electronic calendar application executing on the ND and instructions for prompting a user for one or more electronic calendar application events. The method may further include receiving a request from the user for the one or more electronic calendar application events and executing the one or more electronic calendar application events.
Systems and methods for wireless network selection
Systems and methods for selecting a wireless network are disclosed. In some embodiments, a method comprises receiving a first network device identifier for a first network device and a second network device identifier for a second network device, obtaining a first network profile comprising a first attribute, the first network profile based on the first network device identifier, obtaining a second network profile comprising a second attribute, the second network profile based on the second network device identifier, and selecting either the first network device identifier or the second network device identifier based on an attribute analysis of the first attribute and the second attribute.
Virtual server ID managing system, integrated monitoring system, virtual server ID managing program, and integrated monitoring program
In a system including an integrated monitoring system and its monitoring target system, a technology capable of achieving detailed monitoring for a plurality of virtual servers or others by appropriately identifying the plurality of virtual servers, managing their ID information, and others is provided. The present system includes an ID managing function of performing ID management for a monitor processing for each of a plurality of virtual servers (server instances) in the monitoring target system. The ID managing function performs a processing of providing a uniquely-identifiable ID (instance ID) to each of the plurality of server instances and identifies each of the server instances by referencing the ID at the monitor processing.
Distributed call server supporting communication sessions in a communication system and method
An apparatus, method, and computer program manage communication sessions that include a plurality of portions. Different processors handle each portion of a communication session. The apparatus, method, and computer program transfer the communication session from one of the processors to another of the processors during the different portions of the communication session.
Data rate conversion device and method
Data rate conversion devices and methods are provided. A method for converting a first digital signal having a first sampling rate into a second digital signal having a sampling rate close to a predetermined second sampling rate comprises the following operations: when the ratio of the first sampling rate to the second sampling rate is a repeating infinite decimal, calculate at least two calibrating coefficient values and output the calibrating coefficient values according to a predetermined rule; conduct overflow operation on the output calibrating coefficient; and interpolate the first digital signal using the output calibrating coefficient and the result of the overflow operation to obtain the second digital signal such that during any period of a certain length along time axis, sampling times of the second digital signal equals to sampling times of the second sampling rate.
Embodiments described herein describe the construction of frequency domain estimates of generalized power density and the filters that can be constructed from those estimates. Using the concept of the Stokes vector representation of the spectral matrix in an M-dimensional vector space, a generalization of the process in which the spectral matrix may be represented by a set of trace-orthogonal matrices that are based upon a particular signal state can be produced. One aspect of the process is as follows: given a particular signal, represented as by a state vector in the space, a complete, orthonormal set of vectors can be produced that includes the signal of interest. Then, a generalized set of matrices is constructed, based upon the developed vectors, that are trace-orthogonal and which serve as a basis set for the expansion of the spectral matrix. The coefficients of this expansion form a generalized Stokes vector that represents the power in the spectral matrix associated with the various state vectors. Filters that serve to extract or suppress information about a particular state may then be constructed using the components of the generalized Stokes vectors. The effectiveness of an embodiment this filter is demonstrated using acoustic data from a microphone array.
File management sub-system and file migration control method in hierarchical file system
A file management sub-system executes file migration without causing an unintended drop in the response time or the like. When a management computer issues a file migration direction, a file storage apparatus notifies client computer associated with a migration target file that file migration is scheduled. When postponement or suspension of file migration is requested by the client computer, the file migration is postponed or suspended.
Incremental class unloading in a region-based garbage collector
A technique for incrementally unloading classes using a region-based garbage collector is described. One aspect of such a technique includes maintaining a remembered set for a class set. The remembered set indicates whether instances of the class set are contained in one or more regions in memory, and in which regions the instances are contained. Upon performing an incremental garbage collection process for a subset of the regions in memory, the technique examines the remembered set to determine whether the class set includes instances in regions outside of the subset. If the remembered set indicates that the class set includes instances outside of the subset of regions, the technique identifies the class set as “live.” This will preclude unloading the class set from the subset of regions.
Asynchronous state engine with plug-ins for flexible application development
Various embodiments of the present disclosure provide for an asynchronous state engine incorporated within a host application program. The state engine may operate based on a state transition table that may be updated independently of the host application. The state transition table may instruct the asynchronous state engine as to actions that should be performed prior to changing states. Such actions may include interacting with external applications. The state transition table may also instruct the host application to reside in a hold state until responses from external applications are received. Furthermore, the state transition table may instruct the host application as to follow up actions that should be performed when a state is entered. By allowing an external application to plug-in criteria for state changes within the host application, development of the host application may maintain a significant level of flexibility.
System and method for modular business applications
A method of adding a program module to an installed program code. A data object having an interface for importation of data into and exportation of data out of the data object, the data object further comprising the program module, a switch identifier and a specification of a call to be inserted into the installed code is provided. Insert the call as specified by the specification of the data object into the installed program code and receive a setting for the switch from a user and storing the setting in a database table.
Method and system for providing contents available on the internet to mobile handset
An application server provides optimized contents or services obtainable over the Internet to wireless mobile communication devices. The application server, which may be operated by wireless communication provider pre-loads templates and mapping information appropriate for diverse wireless communication device models in its memory. The server provides contents or services requested by the wireless communication devices which is optimized according to the pre-loaded configurations and templates. A wireless communication device receives the optimized contents or services and renders the contents or services for display. The pre-loaded configuration and templates specific to each of the wireless communication devices in server memory enables the wireless communication devices to avoid experience disruption of currently running services and reduce any delay in rendering the requested contents or services.
Managing cyclic constructs of XML schema in a rdbms
A database system automatically detects a cyclic construct in a XML schema, determines a database representation for the cyclic construct, and maps the XML schema and elements involved in the cyclic construct to the database representation.
Apparatus and method for analyzing information about floating population
Disclosed herein is an apparatus and method for analyzing information about floating population. The apparatus includes an information collection unit, a data integration unit, a data mining analysis unit, and an interface unit. The information collection unit collects information about locations provided by mobile communication terminals of moving objects, information about attributes of the moving objects, and information about locations and attributes related to stationary objects. The data integration unit creates integrated data by integrating the information collected by the information collection unit, national statistical information, and map data registered previously. The data mining analysis unit extracts data, consistent with conditions input by a system user, from the integrated data, and searches the map data for based moving patterns of the moving objects using data mining analysis. The interface unit provides a map service in which search results have been applied to the map data.
Document information management system
A document information management system in which a search-engine-compatible interface unit makes a word in a document displayed on the screen to be specified, transfers the specified word to a search engine as a keyword to be used in the search engine, receives a search result from the search engine, and displays the search result on the screen, while a browser-compatible interface unit performs a search (a keyword search and/or global search) by using the keyword transferred from a browser and transfers a search result to the browser.
Method and system for managing user information in instant messaging systems
The present disclosure discloses a method for managing user information in an instant messaging system in order to address the problems of increasing system workload, increasing network overhead and deteriorated system performance in existing technologies due to frequent access of user information management server or servers when user information is searched. According to a disclosed method, an access server obtains and stores information of contacts of a logged-in user; the access server notifies user information of the logged-in user to other access servers; the access servers that receive the notification store the user information of the logged-in user upon determining that contact(s) is/are found locally therein; and when the access server needs to obtain the information of the contacts of the user, the access server performs a search either locally or in other access servers. Furthermore, a communication system is also provided. The disclosed method and system are believed to result in greatly reduced frequency of searching user information in the user information management servers, reduced workload of the user information management servers, improved performance of searching user information and reduced network overhead of the system.
Techniques for providing a prioritized task list to a mobile device including identifying a user profile in a portal that includes one or more associations between the user profile, associated with a user, and one or more content sources; comparing, for each task of one or more tasks, the content source associated with the task and the associations stored by the user profile, the content sources providing the tasks; ranking, based on the comparison, the tasks to define a ranked list of tasks; and preparing a subset of the ranked list of tasks for display on the mobile device.
Orthogonal corpus index for ad buying and search engine optimization
Systems and methods for applications of orthogonal corpus indexing (OCI), such as selecting ad words for purchase and improving visibility of web pages in search engines, are described. In one aspect, the systems and methods described herein employ OCI to recommend to an advertiser ad words for purchase. Advertisers pay search engines for placement of their advertising along side results in the search results page, when a given word or phrase appears in a user's search query. The described systems and methods enable automated selection of related and discriminating terms, identifying keywords that increase the ratio of ads clicked-through to money spent on keyword buying. In another aspect, the systems and methods described herein employ OCI to generate content for web pages. OCI may be used to determine content that when added to a web page improves the rank of that page in a search engine.
Deferring classification of a declared record
A records management system classifies records according to a file plan. Record are declared, and then classified. Some records have in initially indeterminate classification and classification is deferred, either by request or due to a lack of sufficient information to classify the record according to the file plan. Unclassified records are placed into a temporary container. At some time while in the temporary container a classification event occurs with a given record which allows the records management system to classify the record and place it into a container corresponding to its classification.
Technique for fast and efficient hierarchical clustering
A fast and efficient technique for hierarchical clustering of samples in a dataset includes compressing the dataset to reduce a number of variables within each of the samples of the dataset. A nearest neighbor matrix is generated to identify nearest neighbor pairs between the samples based on differences between the variables of the samples. The samples are arranged into a hierarchy that groups the samples based on the nearest neighbor matrix. The hierarchy is rendered to a display to graphically illustrate similarities or differences between the samples.
Transforming a single-table join predicate into a pseudo-join predicate
Methods, computing devices, and computer-readable media are provided for transforming an initial query with a single-table outer join predicate to a second, semantically equivalent query that includes a multi-table predicate instead of the single-table outer join predicate. Because the second query does not include the single-table outer join predicate, the second query may be available for further transformations or optimization techniques, may produce a more efficient or otherwise different execution plan, or may be executed more efficiently or differently. The single-table outer join predicate may be in a full outer join ON clause of the initial query or nested in a left outer-joined LATERAL VIEW of the initial query. The multi-table predicate may be in a WHERE clause of the second query. Unlike the initial query, the second query allows use of a temporary organization of data from multiple tables for evaluation of multiple rows of the left outer join.
Dynamic client interaction for search
A system for guiding a search for information is presented. The system comprises a user interface that accepts a phrase and receives at least one suggestion based at least in part on the phrase. The system also includes a phrase suggestion engine that matches the phrase with the at least one suggestion. Methods of using the system are also provided.
Data file access control
In one embodiment, a data file and policy are generated. The policy is then associated with the data file, wherein the policy includes one or more unassigned accounts and an access control definition that defines an access permission associated with each of the one or more unassigned accounts.
Active memory expansion in a database environment to query needed/uneeded results
Techniques are described for estimating and managing memory compression for request processing. Embodiments of the invention may generally include receiving a request for data, determining if the requested data contains any compressed data, and sending the requesting entity only the uncompressed data. A separate embodiment generally includes receiving a request for data, determining if the requested data contains any compressed data, gathering uncompression criteria about the requested data, and using the uncompression criteria to selectively determine what portion of the compressed data to uncompress.
Elimination of redundant objects in storage systems
Provided are a method, system, and article of manufacture, wherein a data structure corresponding to a set of client nodes selected from a plurality of client nodes is generated. Objects from the selected set of client nodes are stored in the data structure. A determination is made that an object corresponding to a client node of the selected set of client nodes has to be stored. An additional determination is made as to whether the object has already been stored in the data structure by any client node of the selected set of client nodes. The object is stored in the data structure, in response to determining that the object has not already been stored in the data structure by any client node of the selected set of client nodes.
Recording a log of operations
Systems and methods are provided that record an easily viewable log of operations. A particular system includes a response receiving unit that receives an input response from a server, the input response related to a first client request and including first content adapted to prompt data input via a client. Additionally, the system includes a response sending unit that sends the client an output response, including the first content and an identifier to identify the first content and a logging database to record the first content in association with the identifier. Further, the system includes a request receiving unit that receives a second client request including input data related to the first content and the identifier and a content combining unit that combines the input data extracted from the second client request with the first content that is retrieved from the logging database based on the identifier.
Mitigation of obsolescence for archival services
The claimed subject matter relates to an architecture that can determine costs associated with updating file formats. In particular, the architecture can interface with a network-accessible data storage service in order to determine a cost-benefit to the data storage service for a wide variety of conversion scenarios applicable to the particular topology of the data storage service. For example, the cost-benefit can differ for storage services configured according to a client-server model relative to storage services configured according to a distributed topology. Regardless, the architecture can identify a legacy format, select a converter for converting the legacy format to the updated format, and then determine the cost-benefit for a variety of conversion or migration scenarios.
A method of backing up a backup space includes splitting a complete backup of the backup space into a number of rolling backups, and backing up a portion of unchanged files and all changed and new files on each of the rolling backups.
Version management for application execution environment
Methods, systems, and apparatus, including medium-encoded computer program products, for managing an application execution environment on a computer. One or more aspects of the subject matter described in this specification can be embodied in one or more methods of managing an application execution environment, the one or more methods including: identifying which of multiple different versions of the application execution environment are installed on a computer; and managing the different versions of the application execution environment on the computer; wherein the identifying and the managing are performed using one or more of the different versions of the application execution environment.
System and method for synchronization of actions in the background of an application
A background page script is executing on a device. A plurality of webpages are executing on the device. The plurality of webpages register with the background page script. An action generated by one of the plurality of webpages is cached in a database. In response to a determination that the device is in an online state and that the one of the plurality of webpages is no longer registered, the background page script retrieves the action from the database and transmits the action.
Method and system for efficiently replicating data in non-relational databases
A method replicates data between instances of a distributed database. The method identifies at least two instances of the database at distinct geographic locations. The method tracks changes to the database by storing deltas. Each delta has a row identifier that identifies the piece of data modified, a sequence identifier that specifies the order in which the deltas are applied to the data, and an instance identifier that specifies where the delta was created. The method determines which deltas to send using an egress map that specifies which combinations of row identifier and sequence identifier have been acknowledged as received at other instances. The method builds a transmission matrix that identifies deltas that have not yet been acknowledged as received. The method then transmits deltas identified in the transmission matrix. After receiving acknowledgement that transmitted deltas have been incorporated into databases at other instances, the method updates the egress map.
Resolving database entity information
Entity resolution in a database comprises receiving imported data comprising imported data entities each having properties each having values; receiving first user input that selects the imported data entities for resolution to existing data entities in a database; receiving second user input that specifies matching criteria for matching the imported data entities to the existing data entities, wherein each of the matching criteria comprises a matching technique; matching the imported data entities to the existing data entities using the matching criteria, resulting in creating and storing matched entity information, wherein the matched entity information is organized in matched entity data sets associated with subsets of the matching criteria that were matched; consolidating the imported data entities into the existing data entities; storing the first user input and second user input as a named criteria set for use in subsequent entity resolution operations.
Method and system for client context dissemination for web-based applications
A method advertises the existence of a subscriber profile service on a communication network. A first data request sent from a client device to an application server is intercepted. The first data request is modified by inserting an advertisement of contextual information relating to the existence of the subscriber profile service into the first data request prior to transmission to the application server. The modified data request is transmitted to the application server.
High volume alarm management system
As system which contains a vendor-neutral, flexible and efficient alarm grouping and routing algorithm using enterprise level and alarm attributes for filtering. Also, the approach uses rule based alarm assignment to handle diverse alarm signal parameters within large volumes of individual signals coming from multiple sources. Many of the alarm signals may be deemed as unactionable signals and eliminated.
Simplified method of predicting a time-dependent response of a component of a system to an input into the system
Non-mechanistic, differential-equation-free approaches for predicting a particular response of a system to a given input are provided in the form of systems, methods, and devices. These approaches are generally directed to a non-compartmental method of predicting a time-dependent response of a component of a system to an input into the system. The systems, methods, and devices provide the ability to (i) reduce the cost of research and development by offering an accurate modeling of heterogeneous and complex physical systems; (ii) reduce the cost of creating such systems and methods by simplifying the modeling process; (iii) accurately capture and model inherent nonlinearities in cases where sufficient knowledge does not exist to a priori build a model and its parameters; and, (iv) provide one-to-one relationships between model parameters and model outputs, addressing the problem of the ambiguities inherent in the current, state-of-the-art systems and methods.
Contextual decision logic elicitation
The present invention is a method of creating decision logic. A first set of rules for the decision logic is received. The user is queried for data and this data is stored in a memory. A first decision is generated for a user based at least in part on the data. Input is received from the user for editing the first set of rules to create a new set of rules for the decision logic in the context of data. A final decision is generated derived at least in part from the data using the new set of rules.
Converting video metadata to propositional graphs for use in an analogical reasoning system
An automatic approach is described for the semantic analysis and conversion of video annotation metadata (e.g., Video Event Markup Language or “VEML” metadata) to propositional graphs suitable for analysis by an analogical reasoning system (ARS). Also as described herein, a system architecture implements this conversion while maintaining semantic consistency from annotation through results reporting. Further, the techniques herein leverage the same ontology to populate options for an annotation tool, provide the rules for the metadata-to-propositional graph mapping, and provide the basis for comparison in an analogical reasoning algorithm.
Cruncher—an MIP solver accelerator
Methods and systems are provided for solving an optimization problem using a model expressed in a mixed integer programming (MIP) language. The problem is constrained within a space of valid solutions by a plurality of MIP variables. A skeleton set of the variables are designated as eligible for fixed value assignments. An initial solution for the problem is obtained, which forms the basis for refinement. New versions of the problem are prepared and solved iteratively by fixing a proportion of the skeleton set to their best known values, as found in a previous problem-solving iteration.
Framework for optimized packing of items into a container
One embodiment is directed to a method of optimally packing items into at least one resource. The method includes receiving at least one of items, resources, and parameters, and setting up a set partitioning mixed integer programming (MIP) using the received items, resources, and parameters. The method further includes solving liner programming (LP) relaxation of the MIP, generating new packings, and checking whether new packings have been generated. When no new packings have been generated, solving the final MIP and creating a model of at least one resource packed according to the final MIP.
Computerized analysis of genetic profiles via internet portals
A computer-implemented process and apparatus for storing, accessing, and comparing genetic profiles in a form suitable for amateur human analysis is provided. The process includes imputing and storing data that represent individual genetic profiles which have been created using conventional genetic analysis processes. The process and apparatus allow remote consumer access via the internet to genetic profiles owned by consumer which can then be compared against other genetic profiles according to a genetic profile comparison process selected from several available processes. The resulting output of the process is a summary of the genetic profile comparison which answers the question posed by the consumer.
Methods, systems and storage medium for providing content notification based on user communities
A method of notifying consumers of available content in a content distribution system. The method includes determining the existence of a content event related to content. The content event is associated with a community. A consumer who is a member of the community is notified of the content event by sending a notification to the consumer. Access to content related to the content event is provided upon request by the consumer.
System and method to validate consumables installed in a printing system
The disclosure relates to a computerized method and system for tracking consumer replaceable units (CRU) used in products such as printing systems. In the method the CRUM ID and destination of the consumable is retrieved on shipment from a supplier. When the consumer replaceable unit is installed in a device such as printing system, the device reports the installation back to a management application. The management application then proceeds to authorize the consumable for the reporting printing system, offer to transfer ownership, or when the printing system is not a managed device then offers a customer the option of being billed for the consumable. The management application has the option of disabling printing with customer replaceable unit when reassignment or intent to purchase is not available. When the consumable is returned the management application can ascertain if the customer replaceable unit was used by its assigned printing device.
Sale of footwear by subscription
A user enters into a subscription to receive footwear having one or more specified performance characteristics. As the user finishes wearing one set of footwear, the user can obtain a replacement set of footwear that also will have one or more specified performance characteristics. The performance characteristics may be consistent for each set of footwear provided according to the subscription. Alternately, the footwear performance characteristics may vary over the life of the subscription. Thus, the footwear provider may periodically obtain biometric information describing the user's athletic activities or performance. The footwear provider then can tailor the performance characteristics of footwear provided under the subscription to match the user's athletic activities or performance.
Biometric authentication of mobile financial transactions by trusted service managers
A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile phone. The application is configured to generate instruction codes to effect the financial transaction upon verification of a user's identity. The user's credentials are stored in a second SE of the phone, which is operable to verify the user's identity from a biometric trait of the user input to the phone and to generate data authenticating the financial transaction in response to the verification of the user's identity. At the POS, the user invokes the application and then inputs a biometric trait to the phone. The second SE verifies the user's identity, and upon verification, generates data authenticating the transaction. The financial transaction data, including the instruction codes and the authenticating data, are then transmitted from the phone to the POS.
Fuel dispenser management
Systems and processes may provide for managing a fuel dispenser. In particular implementations, a system and process for a fuel dispenser may include the ability to receive at least a portion of transaction data for a fueling session, determine whether at least a portion of the received transaction data requires a security measure, and, if at least a portion of the received transaction data requires a security measure, apply a security measure to at least a portion of the received transaction data.
Intellectual property trading exchange and a method for trading intellectual property rights
An intellectual property trading exchange is disclosed for facilitating the trading of intellectual property rights. The exchange includes at least one intellectual property license contract relating to intellectual property rights and a forum configured to allow a plurality of participants to trade the license contract. The plurality of participants includes at least one seller, which may be the owner, having the license contract and desiring to trade the license contract. The plurality of participants also includes at least one buyer desiring to obtain the license contract. The buyer may be an investor, speculator, market maker, or arbitrageur, who purchases the license contract to achieve appreciation. The buyer also may be a licensee, who purchases the license contract to practice the intellectual property rights.
Providing “identified” compositions and digital-works
A method for identifying and providing a composition or digital-work to a user. The user may explicitly and/or implicitly indicate an interest in a composition that is discovered during everyday activities. The “interesting” composition and/or information associated with the composition may be emanating from an external source (e.g., background music in a restaurant) or may be encountered while using an interactive device (e.g., surfing the web); or information (e.g., a magazine article or advertisement) about/associated with a composition may be encountered by the user. A portion of the “interesting” composition and/or information about/associated with the “interesting” composition may be captured and the composition identified. A composition or composition-highlight related to the identified-composition may be provided one or more times; within a customized sequence of compositions that is generated and/or adapted for each user. The provided-composition may be added to the user's favorites or library. Usage-rights for the provided-composition may be acquired for the user. The composition may be any type of digital-work including music, sound, text, image, video or other media. In some cases, the composition may be an advertisement for a product or service.
Method and system for secure distribution of subscription-based game software
Methods and systems for securely distributing software in a subscription-based environment are provided. A Game Security Facility (“GSF”) associated with a game server manages secure communications with game clients. A subscriber is registered in a manner that includes a unique identifier of the machine upon which the subscription data will reside. Encryption keys are generated for the registered subscriber and encrypted subscription data is exchanged, thus preventing unauthorized copying to another machine or unauthorized use by a third party. The subscriber is re-registered, and new encryption keys are generated. Access is enabled to the previously exchanged encrypted subscription data without causing the previously exchanged data to be re-downloaded.
Automated transaction machine
An automated retail terminal in which a plurality of goods and/or services are provided in an integrated system. The integrated system generally avoids duplicating hardware or functions in the course of delivering the goods or services offered, so for example in a combination ATM and Internet kiosk the same credit card or smart card reader is used for both the ATM and the Internet kiosk functions, the same control screen activates the ATM functions and the Internet functions, and etc.
Payment service that applies user-specified rules to divide payment amounts among multiple payment instruments
A network-based transaction processing system allows users to flexibly and efficiently make payments using a combination of different payment instruments. The system includes a user interface through which a user can define one or more payment plans, each of which may specify a plurality of payment instruments and associated rules for dividing payment amounts among these payment instruments. These rules may be non-transaction-specific, such that a user can re-use a payment plan over time to complete multiple transactions. When placing an order or otherwise initiating a payment transaction, the user can select a payment plan for use in completing the transaction.
Method and system for performing a cash transaction with a self-service financial transaction terminal
A method and system for performing a cash transaction with a self-service financial transaction terminal makes use of computer hardware and software that allows a financial institution cardholder to authorize a recipient to withdraw a specified amount of cash at an ATM of the particular financial institution. The cardholder can set up the transaction, for example, from any telephone using an interactive voice response (IVR) system, or by utilizing the application at a financial institution ATM, or by using an Internet website application. The originator can set up the recipient's ATM transaction to be either cardless or card-initiated.
System and associated method and service for providing a platform that allows for the exchange of cash between members in a mobile environment
A system and associated method and service for providing a platform that enables members to transfer, receive, or otherwise exchange cash in various international denominations and commodities, such as precious metals (e.g., gold, silver, etc.), in a mobile highly secured telecommunications environment. The system is capable of delivering cash instantly between two or more users by allowing the exchange of secure transactions between system and cash dispensing machines (ATMs). Users may pay, receive, exchange, deposit, transfer, pay bills, exchange currency, retrieve cash, deposit cash and create accounts based on the mobile phone number or a system generated code.
Method and system for offering a credit product by a credit issuer to a consumer at a point-of sale
A method for offering at least one credit product by at least one credit issuer to a consumer at a point-of-sale between a merchant and the consumer. The method includes the steps of: providing a credit issuer data set including a plurality of data fields to a central database; initiating a transaction between the consumer and the merchant at the point-of-sale; offering, to the consumer at the point-of-sale, the at least one credit product; and presenting, to the consumer at the point-of-sale, at least one data field in the credit issuer data set. The at least one data field presented to the consumer is populated with data directed to the credit product, the credit issuer, or any combination thereof. An apparatus and system are also disclosed.
Self service rate lock
Systems and methods are disclosed for enabling a borrower to rate lock a line of credit. An offer to rate lock at least a portion of the borrower's line of credit may be presented to the borrower. The rate lock offer may include converting an advanced amount, and/or an amount that is available to be advanced, from the borrower's line of credit to a fixed rate loan having a fixed interest rate, a fixed loan duration, and/or a fixed payment schedule. After the borrower has accepted the offer, the rate lock may be executed. The disclosed embodiments may enable the borrower to electronically obtain the rate lock without any human intervention.
System and method for holding and sending an order to a matching engine
A user can submit an order to buy or sell a tradeable object, only the order does not get sent to the matching engine. Instead, the order is placed in temporary storage and it is displayed to the user in the form of a virtual order icon. The virtual order icon indicates that an order request is waiting for an event to occur before it is automatically released to the matching engine. The virtual order icon can be managed by the user, which might include moving the icon to a different price level or deleting it. The system continuously monitors for an event to take place. In response to detecting the event, the order is released to the matching engine. As such, the virtual order icon is transformed or removed and a real order icon is displayed indicating that the order has now been sent to the matching engine.
Delta neutral futures allocation
In an Exchange which assigns only a whole number/integer approximate of a computed number of futures contracts to a covered order for one or more option contracts, the disclosed embodiments relate to factoring a residual number of futures contracts, remaining after fulfillment of an incoming covered order counter to a resting covered order for a quantity of options contracts less than the resting quantity and approximation of the computed number of futures contracts assigned thereto, into the approximation of the computed number of futures contracts assigned to fulfillment of a subsequent order from the same trader counter to the same resting order for less than or equal to the remaining resting quantity of options contracts. This may have the effect of increasing or decreasing the number of futures contracts assigned to the subsequent order.
System and method for providing borrowing schemes
A system and method providing a borrowing scheme. The method comprises the steps of: receiving a time-based spending alert threshold designation from a user via the network; receiving at least one category of transaction designations from the user via the network, wherein each of the categories is associated with a portion of the time-based spending alert threshold designation; automatically allocating user transactions among the categories using the programmed computer processor; notifying the user via the network of the portion of the time-based spending alert threshold designation for a particular category that is being approached or surpassed; and automatically modifying the portion of the time-based spending alert threshold designation for the particular category for the upcoming period of time if the limit is surpassed, wherein the modification is performed by the programmed computer processor.
Location-based categorization prompting of transactions
Systems, methods, and computer program products are provided for providing suggested transaction categories based on location. The system includes a computer apparatus including a processor and a memory; and a software module stored in the memory. The software module includes executable instructions that when executed by the processor cause the processor to determine a location of a user; access a database including a plurality of locations and associated transaction categories; determine at least one category associated with the location of the user using the database; and provide the at least one category to the user so that the user may categorize a transaction. In some embodiments, the system determines the category based on a combination of the location and a characteristic of the transaction or a previous input by the user. The system assists users in categorizing transactions so that the user is better able to track spending.
Method and system for identifying business expenditures with vendors and automatically generating and submitting required forms
A method and system for determining business expenditures with vendors and automatically generating and submitting required forms whereby vendor identification data and/or contact information is obtained. Data representing current vendor reporting requirements and/or contact information for any associated reporting agency is obtained and stored along with data representing one or more associated reporting forms. Financial transaction data associated with a business is then obtained and analyzed using the current vendor reporting requirement data to identify/match one or more vendors used by the business that are subject to the reporting requirement. At least part of the identification data associated with subject vendors, and at least part of the financial transaction data associated with the business, is used to auto-fill one or more forms associated with the reporting requirement for each of the identified subject vendors and the auto-filled forms are then sent to the respective vendors, and/or the appropriate reporting agency automatically.
RFID methods in the manufacture of reclosable packages
The present disclosure relates to the implanting of RFID (radio frequency identification) chips into the slider of a zipper of a reclosable package. This allows for subsequent reading of the RFID identifying data to identify associated with the reclosable package. This can be done by using the RFID data directly or by using the RFID data to access a database This can be done for authentication, security, quality control, inventory control and similar purposes.
Method and system for managing and displaying product images
A method and system for displaying and managing images of consumer products. A multi-resolution mosaic (MRM) digital image of a shelf layout on which consumer products, including those for pre-determined demographic groups, are displayed is created. The created MRM digital image includes a layered hierarchy of vector images and/or visual overlays stored in progressive resolution format and allows progressive resolution display without loss of image quality on the selected plural consumer products that appear in the MRM digital image. The created MRM digital image is displayed via a communications network and provides a virtual shopping experience that emulates a shopping experience in an actual retail store.
Managing consistent interfaces for merchandising business objects across heterogeneous systems
A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to merchandise and point-of-sale transaction business objects.
Methods and systems for issuing tickets
Methods and apparatus for issuing tickets for events are disclosed. In an embodiment, a method includes providing a ticket purchaser with both an electronic ticket and a duplicate replica ticket. The replica ticket provides the user a piece of memorabilia, without presenting the issue of having multiple tickets capable of being used for entry. In an additional embodiment, the replica ticket can also be used to gain access to the event.
Method and system for determining point of sale authorization
According to an embodiment of the present invention, an automated computer implemented method and system for determining authorization for a point of sale transaction, wherein the method is executed by a programmed computer processor which communicates with a user via a communication network comprising receiving a point of sale authorization request for a transaction from a customer at a merchant, via a communication network; accessing profile data associated with one or more of the customer, an account associated with the customer and the merchant involved in the transaction; applying one or more rules to the authorization request wherein the one or more rules comprises one or more of credit rules and fraud rules; applying one or more scoring algorithm to the authorization request wherein the one or more scoring algorithm indicates an assessment of risk; determining an authorization response, via a programmed computer processor, based at least in part on a combination of profile data, the one or more applied rules and the one or more applied scoring algorithms; providing the authorization response for the transaction via the communication network.
Advertisement delivery capable of providing data to satisfy advertising requests for displaying information to a user accessing an online computer system, generally includes using a first server that is structured and arranged to deliver advertisements to a first region of a display, and a second server that is structured and arranged to deliver advertisements to a second region of a display that is different from the first region. Advertisement delivery may also include a display server that sends input based on demographic data to the servers, where the display server receives instructions from at least one of the first and second servers based on the region controlled by the server, and a configuration system that generates and sends a first configuration file to the first server and a second configuration file to the second server, where the first configuration file includes instructions for displaying advertisements to the first region, and the second configuration file includes instructions for displaying advertisements to the second region.
Mobile advertisement and marketing integration with business process and workflow systems
A mobile communications marketing and advertising platform is described for delivering advertising content to subscribers of a telecommunications network over telecom-based channels, such as SMS, MMS and WAP Push. The platform is integrated with business tools, such as business process execution language (BPEL) based systems, business intelligence (BI) systems, Billing and Revenue Management (BRM) and business analytics monitoring (BAM) systems. By integrating these systems, the business tools can leverage the data generated by the mobile marketing and advertising platform in order to provide an improved view, analysis and understanding of the content delivery process. Similarly, the mobile marketing platform can utilize the functionality provided by the integrated business systems in order to more efficiently deliver the advertising content to subscribers.
Evaluating performance of binary classification systems
Methods and apparatus are described for evaluating a binary classification system operable to classify each of a plurality of events as a first event type or a second event type. At least some of the events of the first event type are independently verifiable with reference to verification data. The binary classification system is susceptible to a first error type in which events of the first event type are classified as the second event type, and a second error type in which events of the second event type are classified as the first event type. Operation of a first configuration of the binary classification system is evaluated with reference to an objective function. The objective function is derived by expressing a number of errors of the second error type in terms of a number of errors of the first error type with reference to the verification data, and by assuming relative proportions of the first and second event types within the plurality of events.
Impression-trend techniques for providing a display advertising supply forecast
Techniques are described herein for using an impression-trend technique to provide a display advertising supply forecast. A display advertising supply forecast is an estimate of a number of impressions, which are to occur in a future time period, that have specified attribute values. For example, the specified attribute values may be descriptive of impressions with respect to which an advertiser wishes to place ads. An impression-trend technique is a forecasting technique that uses trends regarding past impressions to forecast a number of future impressions that have specified attribute values. The past impressions include attribute values that are related to the specified attribute values.
Automatic advertising campaign structure suggestion
A group of key terms associated with an ad campaign are identified, each key term including a keyword or a key phrase, the ad campaign being associated with one or more negative key terms. The group is automatically classified into two or more sub-groups each having one or more key terms, at least one of the sub-groups having key terms that have a higher similarity level than the key terms in the original group. Associations between the one or more negative key terms and the two or more sub-groups are determined, and the two or more sub-groups of key terms and associated zero or more negative key terms are provided to a sponsor of the ad campaign.
Methods and systems for bulk activation of multiple, disparate stored value accounts
According to one embodiment of the invention, a method of activating a plurality of disparate stored value accounts utilizes a set of multiple presentation instruments redeemable at different merchants. Each presentation instrument includes a unique presentation instrument identifier used to associate value with the presentation instrument. Also, the set includes a set identifier, which may be included on a package that secures the presentation instruments together. In one embodiment, the set identifier is received over an electronic network, a list of the presentation instruments in the set is accessed from a computer database, and each of the presentation instruments is activated.
Method and system for electronic delivery of incentive information based on user proximity
A method and system for the electronic distribution of product or service promotion information to a mobile user are disclosed. A user may provide profile information to an online promotion service, such as user interests and preferences with respect to products and services as well as other information. The online promotion service may receive location information of point-of-sale facilities associated with particular promotions for products or services. The online promotion service may generate one or more targeted promotions to a mobile user when the user travels within a predetermined distance of an associated point-of-sale facility. A mobile user's location may be identified by a global positioning system and conveyed to the online promotion service. The user location information may be transmitted via a cell phone, a PDA, a pager or other device. This enables the user to take advantage of targeted or requested promotions while the user is within a close proximity to an associated point-of-sale facility.
Method and system for providing reward status
The present invention generally relates to providing a status for one or more rewards using a format in a plurality of display formats. Portable device information associated with a portable device and acceptance point device information associated with an acceptance point device are determined. A status for one or more rewards is determined based on the portable device information and the acceptance point device information. A display format is then determined from a plurality of display formats based on the portable device information and acceptance point device information. A status is then displayed using the display format.
Systems and methods for analysis of legal service providers and comparative unit costs or ratio costs
Systems and methods for analyzing legal service providers and unit or ratio costs are provided. Billing data from legal services providers is analyzed to identify common tasks based on task codes. The common tasks are then analyzed to determine a unit cost or ratio cost for the tasks or a ratio cost for the tasks compared to the total costs for a matter. Analysis constraints are applied to the billing data to generate a cost model, which can be output in a variety of different graphical formats. This output, which identifying at least some of the total matter costs on a unit cost or ratio cost basis, allows for comparison of legal services provided by a number of different legal services providers. It also allows for comparing price quotes from a number of legal services providers against each other and against historical cost information.
Performance management system
A computerised method of managing the performance of an employee or a group of employees of an organisation, the method comprising the steps of: a) creating a job description containing job description data for an employee or group of employees, b) creating an objectives file containing objectives data relating to objectives to be achieved by the employee or group of employees in the performance of their job description, c) processing of the job description data and the objectives data to obtain defined performance expectation data for employee or group of employees, d) receiving performance data obtained from the organisation relating to the performance of employee or group of employees, e) comparing the performance data with the defined performance expectations data and f) creating and/or modifying a development plan for the employee or group of employees.
Automated process assembler
A method and system for automatically assembling a complete machine readable description of a process by observing and filtering digital messages executing on one or more message bus and that relate to the process. Message details are stored and a tracker record published in a common format. The stored message details are processed into a set of service execution path descriptions, which in turn are processed into the complete machine readable description of the process, using a suitable process design language. The invention automates the capture and documentation of a process, regardless of the complexities of the underlying messaging environment, and produces a complete and unambiguous description of the end-to-end process, free of errors, omissions and interpretation, thereby addressing a key need in any process re-engineering project, including the delivery of SOA implementations and other forms of agile and adaptable systems.
Insurance product, rating system and method
In the present invention, an insurance product, rating system and method generally relates to a rating and pricing system for quantifying the risk that the annual savings will not fall below specified levels associated with implementing and maintaining economic improvements. The product, system and method can be applied to various industries, including, power generation, petro-chemical, manufacturing and refining facilities. Various embodiments disclosed herein relate to systems and products for providing a computer implemented insurance product.
Systems and methods for determination of long term care benefits
In one aspect, the invention comprises a computer implemented method comprising: (a) determining an average monthly cost of long term care for a consumer; (b) determining an estimated total cost of long term care for the consumer; (c) receiving and storing in a computer readable medium data describing the consumer's preferences regarding long term care resources; (d) calculating with a processor an initial benefit amount for the consumer; (e) adjusting with a processor the initial benefit amount based on the data describing the consumer's preferences to determine a total benefit amount; and (f) recommending a long term care policy providing the total benefit amount to the consumer, wherein the processors may the same processor or different processors. Other aspects of the invention comprise related method, computer system, and software embodiments.
Management, reporting and benchmarking of medication preparation
A system for preparing and managing patient-specific dose orders includes an order processing server configured to receive the patient-specific dose orders, define a queue of dose orders and distribute the dose orders to at least one dose preparation station. The dose preparation station is in bi-directional communication with the order processing server and has an interface for providing an operator with a protocol associated with each received drug order and specifying a set of steps to fill the drug order. Steps to fill the drug order are captured at the station and a display, positionable independent of the station outputs the dose order queue and metrics concerning activity at the dose preparation station. Systems for preparing patient-specific doses and a method for telepharmacy in which data captured while following the protocol are provided to a remote site for review and approval by a pharmacist.
Electronic medical records information system
There is provided an apparatus for organizing a clinical observation in the form of clinical information entered by a user into memory. The apparatus includes a mechanism to receive the clinical information, which is associated with the clinical observation and has a plurality of clinical attributes. There is a mechanism for parsing the clinical information, and which identifies a clinical information data structure representative of the clinical information and which has one or more granule information data structures. Each of the granule information data structures has a collection of generic attributes. There is a mechanism to assign the clinical attributes to respective ones of the generic attributes of the one or more granule information data structures. The clinical information data structure associates the clinical attributes with respective ones of the generic attributes of each of the granule information data structures.
Interactive atlas to image registration
When modeling anatomical structures in a patient for diagnosis or therapeutic planning, an atlas (26) of predesigned anatomical structure models can be accessed, and model of one or more such structures can be selected and overlaid on an a 3D image of corresponding structure(s) in a clinic image of a patient. A user can click and drag a cursor on the model to deform the model to align with the clinical image. Additionally, a processor (16) can generate a volumetric deformation function using splines, parametric techniques, or the like, and can deform the model to fit the image in real time, in response to user manipulation of the model.
Quality improvement techniques in an audio encoder
An audio encoder implements multi-channel coding decision, band truncation, multi-channel rematrixing, and header reduction techniques to improve quality and coding efficiency. In the multi-channel coding decision technique, the audio encoder dynamically selects between joint and independent coding of a multi-channel audio signal via an open-loop decision based upon (a) energy separation between the coding channels, and (b) the disparity between excitation patterns of the separate input channels. In the band truncation technique, the audio encoder performs open-loop band truncation at a cut-off frequency based on a target perceptual quality measure. In multi-channel rematrixing technique, the audio encoder suppresses certain coefficients of a difference channel by scaling according to a scale factor, which is based on current average levels of perceptual quality, current rate control buffer fullness, coding mode, and the amount of channel separation in the source. In the header reduction technique, the audio encoder selectively modifies the quantization step size of zeroed quantization bands so as to encode in fewer frame header bits.
Apparatus and method of processing an audio signal, utilizing unique offsets associated with each coded-coefficients
In one embodiment, the method includes receiving an audio signal including a prediction residual of a block of digital audio data and coded coefficient values. Table index information is obtained from the digital audio data. The table index information identifies a table from a plurality of tables to select. A set of prediction coefficient values are reconstructed from the coded-coefficient values. This reconstruction includes selecting a table including offset values and entropy parameters from the plurality of tables based on the table index information, wherein 16, 19 or 20 unique offsets are associated with coded-coefficients of the first twenty coefficients, first entropy decoding the coded-coefficient values using entropy codes defined by the entropy parameters from the selected table, and calculating a set of prediction coefficient values based on the offset values from the selected table and the decoded coded-coefficient values.
Multi-channel interactive self-help application platform and method
An interactive voice response (IVR) platform running a voice application for use with a voice client is extended to support text messaging clients and other clients of other media types on other channels. An application-to-text messaging interface interfaces with text messaging clients via a text messaging protocol transport and interfaces with the IVR via an API. It includes a user/application manager to handle user and application accounts and a state/session manager to handle state information required by the text messaging operations and to handle sessions maintained by the IVR. Text modules are implemented having text synthesis and text recognition with a dictionary/grammar. These allow voice-specific application scripts to be interpreted in a text channel. The extended multi-channel platform supports an open source text messaging network and also through a transport gateways to other types of text messaging clients.
Training and applying prosody models
Techniques for training and applying prosody models for speech synthesis are provided. A speech recognition engine processes audible speech to produce text annotated with prosody information. A prosody model is trained with this annotated text. After initial training, the model is applied during speech synthesis to generate speech with non-standard prosody from input text. Multiple prosody models can be used to represent different prosody styles.
Voice activity detection
Discrimination between two classes comprises receiving a set of frames including an input signal and determining at least two different feature vectors for each of the frames. Discrimination between two classes further comprises classifying the two different feature vectors using sets of preclassifiers trained for at least two classes of events and from that classification, and determining values for at least one weighting factor. Discrimination between two classes still further comprises calculating a combined feature vector for each of the received frames by applying the weighting factor to the feature vectors and classifying the combined feature vector for each of the frames by using a set of classifiers trained for at least two classes of events.
Visualizing automatic speech recognition and machine translation output
An automated speech processing method, system and computer program product are disclosed. In one embodiment, a speech-to-text (STT) engine is used for converting an audio input to text data in a source language, and a machine translation (MT) engine is used for translating this text data to text data in a target language. In this embodiment, the text data in the target language is rendered on a display device, and different visualization schemes are applied to different parts of the rendered text data based on defined characteristics of the STT engine and the MT engine. In one embodiment, the defined characteristics include a defined confidence value representing the accuracy of the rendered text. For example, this confidence value may be based on both the accuracy of the conversion of the audio input and the accuracy of the translation of the text data to the target language.
Robust downlink speech and noise detector
A voice activity detection process is robust to a low and high signal-to-noise ratio speech and signal loss. A process divides an aural signal into one or more bands. Signal magnitudes of frequency components and the respective noise components are estimated. A noise adaptation rate modifies estimates of noise components based on differences between the signal to the estimated noise and signal variability.
Method for automated training of a plurality of artificial neural networks
The invention provides a method for automated training of a plurality of artificial neural networks for phoneme recognition using training data, wherein the training data comprises speech signals subdivided into frames, each frame associated with a phoneme label, wherein the phoneme label indicates a phoneme associated with the frame. A sequence of frames from the training data are provided, wherein the number of frames in the sequence of frames is at least equal to the number of artificial neural networks. Each of the artificial neural networks is assigned a different subsequence of the provided sequence, wherein each subsequence comprises a predetermined number of frames. A common phoneme label for the sequence of frames is determined based on the phoneme labels of one or more frames of one or more subsequences of the provided sequence. Each artificial neural network using the common phoneme label.
Automated demographic analysis by analyzing voice activity
Methods, systems, and media for determining a response to be generated in an environment are provided. The methods, systems, and media monitor the environment for a voice activity of an individual. The voice activity of the individual is detected and analyzed. A content descriptor of the voice activity is determined based on the voice activity of the individual. A demographic descriptor of the individual is determined based on the voice activity of the individual. The content descriptor, the demographic descriptor, and known information are correlated to determine the response to be generated in the environment.
Non-negative hidden Markov modeling of signals
Methods and systems for non-negative hidden Markov modeling of signals are described. For example, techniques disclosed herein may be applied to signals emitted by one or more sources. In some embodiments, methods and systems may enable the separation of a signal's various components. As such, the systems and methods disclosed herein may find a wide variety of applications. In audio-related fields, for example, these techniques may be useful in music recording and processing, source extraction, noise reduction, teaching, automatic transcription, electronic games, audio search and retrieval, and many other applications.
Systems, methods, and apparatus for context replacement by audio level
Configurations disclosed herein include systems, methods, and apparatus that may be applied in a voice communications and/or storage application to remove, enhance, and/or replace the existing context. Enhancing the context of a voice communication may first include suppressing an existing context component from the digital audio signal to obtain a context suppressed signal. This signal may then be mixed with a new context signal to create a context enhanced signal, which may then be encoded before transmission. When this new context enhanced signal includes a speech component, it may be encoded and transmitted at a particular bit rate. When the context enhanced signal does not include a speech component, it may also be encoded at a similar bit rate. However, depending on the state of a process control signal, portions of a digital audio signal that lack a speech component may also be transmitted at a lower bit rate.
Voice activity decision base on zero crossing rate and spectral sub-band energy
A voice activity detection method and apparatus, and an electronic device are provided. The method includes: obtaining a time domain parameter and a frequency domain parameter from an audio frame; obtaining a first distance between the time domain parameter and a long-term-sliding mean of the time domain parameter in a history background noise frame, and obtaining a second distance between the frequency domain parameter and a long-term-sliding mean of the frequency domain parameter in the history background noise frame; and judging whether the audio frame is a foreground voice frame or a background noise frame according to the first distance, the second distance and a set of decision inequalities based on the first distance and the second distance. The above technical solutions enable the judgment criterion to have an adaptive adjustment capability, thus improving the performance of the voice activity detection.
Methods and apparatus to extract data encoded in media content
Methods and apparatus to extract data encoded in media content are disclosed. An example method includes sampling a media content signal to generate digital samples, determining a frequency domain representation of the digital samples, determining a first rank of a first frequency in the frequency domain representation, determining a second rank of a second frequency in the frequency domain representation, combining the first rank and the second rank with a set of ranks to create a combined set of ranks, comparing the combined set of ranks to a set of reference sequences, determining a data represented by the combined set of ranks based on the comparison, and storing the data in a memory device.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating suffix rewriting rules. A method includes obtaining a plurality of canonical suffix-rewriting rules each associated with one or more words, generating a suffix tree from the words, selecting a minimum colored subset of the nodes and leaves in the suffix tree, and generating a plurality of final suffix-rewriting rules from the nodes in the minimum colored subset. Another method includes receiving applicable and non-applicable words for a suffix-rewriting rule, generating a suffix tree from the applicable words and the non-applicable words, selecting a minimum colored subset of the nodes and leaves in the suffix tree, and generating a plurality of suffix-rewriting rules, wherein each rule corresponds to a node in the minimum colored subset with a valid status.
Network tearing for circuit simulation
A circuit is simulated by using system or network tearing to obtain a real solution. The circuit may be an entire integrated circuit, portion of an integrated circuit, or a circuit block. A circuit simulation technique of the invention generates a system graph, finds a tree, and partitions the tree into two or more subtrees. The technique identifies global links and local links in the graph. Each subtree may be solved individually using distributed, parallel computing. Using the results for the subtrees, the technique obtains a real solution, branch voltages and currents, for the circuit.
Modeling complex environments using an interconnected system of simulation layers
A method is provided for creating or evolving a virtual environment with a computer system. Steps of the method include: forming a plurality of layers of data, including a first layer and a second layer, each layer including a plurality of cells containing data corresponding to a variable; operating on the data from the cells in the first layer with a function to yield target data; distributing the target data to corresponding cells in the second layer; and altering the data in at least one of the plurality of cells in each layer according to a rule.
Calculation method for physical value, numerical analysis method, calculation program for physical value, numerical analysis program, calculation device for physical value, and numerical analysis device
A calculation method for physical value for calculating physical values in a numerical analysis method for numerically analyzing a physical phenomenon, comprises a physical value calculation step of calculating physical values in an analysis domain divided into a plurality of divided domains, wherein in the physical value calculation step, the physical values are calculated by using: a discretized governing equation that uses values not requiring coordinates (Vertex) of vertices of the divided domains and connectivity information (Connectivity) of the vertices and that is derived on the basis of a weighted residual method; and a calculation data model in which volumes of the divided domains and characteristic values of boundary surface indicating characteristics of boundary surfaces of adjacent ones of the divided domains are provided as the values not requiring coordinates (Vertex) of vertices of the divided domains and connectivity information (Connectivity) of the vertices.
Designing an assembly of objects in a computer-aided design system
An embodiment of a method for designing an assembly of objects in a system of computer-aided design can include:(i) selecting a first object and a second object of the assembly, each of the first object and the second object having interface information; (ii) computing a set of positions of the first object relatively to the second object of the assembly, and (iii) displaying simultaneously representations of the computed positions of the first object relatively to the second object.
Systems and methods for differentiating and associating multiple drawings in a CAD environment
Systems and methods for facilitating CAD design of one or more structures by automatically categorizing and/or associating multiple drawings without pre-existing knowledge as to the type of drawings being categorized. In some examples, a computing system receives a set of CAD drawings from a third-party, and a host manager automatically determines which of the drawings are host, stand-alone, and external reference drawings. Moreover, the host manager can determine which of a set of external references comprises a broken reference, such as a network pathway that does not contain the desired external reference. For each broken or corrupt reference, the host manager can create a dummy (proxy) drawing that can be inserted in place of the broken reference so that the system can process (e.g., bind) the set of drawings without crashing. An interface may be further provided for displaying the categorized set of drawings to the user.
Physiological signal quality classification for ambulatory monitoring
Physiological signal quality classification methods and systems for ambulatory monitoring. Physiological signals are classified as good, noisy or weak based on signal properties. Once classified, signals are processed differently depending on their classification For example, for a good signal, physiological data may be extracted from the signal and displayed to a person being monitored. For a noisy signal, a noisy signal notification may be displayed to the person in lieu of extracted physiological data. For a weak signal, a weak signal notification may be displayed to the person in lieu of extracted physiological data. Moreover, a noisy or weak signal notification displayed to a person being monitored may be accompanied by a corrective action recommendation, such as “move to quieter environment” for a noisy signal or “check body placement of sensor” for a weak signal.
Enterprise wide system and methods for configuring, diagnosing, and updating appliances
A system and methods to provide appliance field support personnel with a tool that, together with proper interface modules, simplifies the execution of diagnostic procedures and provides an easy way to configure, reconfigure, or update electronic boards in the home on a client side of an enterprise wide system. The electronic boards serve as electronic controllers in the appliances and are programmable generic service boards. With such a system, it is possible to update and re-configure electronic boards and interact directly with an electronic controller of an appliance while an appliance is operating. Software, configuration data, and control data are downloaded from a server-side configuration of the enterprise wide system to update the electronic boards.
System and method for predicting cooling performance of arrangements of equipment in a data center
A system and method for evaluating equipment in an improper cluster in a data center, the equipment including a plurality of equipment racks, and at least one cooling provider. In one aspect, the method includes receiving data regarding each of the plurality of equipment racks and the at least one cooling provider, the data including a layout of the improper cluster of equipment racks and the at least one cooling provider, storing the received data, identifying at least one gap in the layout, determining cooling performance of at least one of the plurality of equipment racks based, at least in part, on characteristics of the at least one gap, and displaying the layout of the data center, wherein the layout includes an indication of the cooling performance of the at least one of the plurality of equipment racks.
System and method for ground isolation detection in a vehicle
A first amplifier is arranged to receive a first signal from a first bus terminal. A second amplifier is configured to receive a second signal from a second bus terminal. An inverter input of an inverter is coupled to the output of the first amplifier. An input or inputs of an analog-to-digital converter are coupled to an inverter output of the inverter and the output of the second amplifier. The analog-to-digital converter is capable of producing a digital signal representative of the signals received from the first bus terminal and the second bus terminal. A data processor is capable of receiving an output of the analog-to-digital converter. The data processor is configured to apply one or more frequency domain transforms to the digital signal. The data processor identifies a circuit location of the ground fault or degraded isolation, a type of ground fault, or both based on the application of the frequency domain transform.
Method, system and computer program for estimation of the pressure
The invention is directed to a system, a method and a computer program including program code for carrying out the method, when executed on a processing system, of estimating a tire pressure deviation of a vehicle's tire (2). The system includes an input section (100) adapted to receive as an input signal a vehicle signal, a calculation section (200) adapted to calculate at least one shape factor of a resonance peak associated with the vehicle signal spectrum (2) on the basis of the input signal, and a determination section (300) adapted to derive, depending on said at least one shape factor, a tire pressure signal indicative of a tire pressure deviation within the vehicle's tire (2).
Pump integrity monitoring
A method of monitoring integrity of a pump. The method may include recording timing information of the pump during operation while simultaneously sampling acoustic data with a high speed equidistant acquisition mechanism or at a rate based on the speed of the pump in operation. The acquisition of acoustic data is followed by evaluation thereof. Such techniques may improve resolution of acquired data while substantially increasing processor capacity for evaluation. A pump integrity monitor for carrying out such techniques is also described.
Viral polyhedra complexes and methods of use
Cypoviruses and baculoviruses are notoriously difficult to eradicate because the virus particles are embedded in micron-sized protein crystals called polyhedra. The remarkable stability of polyhedra means that like bacterial spores these insect viruses remain infectious for years in soil. Although these unique in vivo protein crystals have been extensively characterized since the early 1900s, their atomic organization remains elusive. Here we describe the 2 crystal structure of both recombinant and infectious silkworm cypovirus polyhedra determined using 5-12 micron crystals purified from insect cells. These are the smallest crystals yet used for de novo X-ray protein structure determination. It was found that polyhedra are made of trimers of the viral polyhedrin protein and contain nucleotides. Although the shape of these building blocks is reminiscent of some capsid trimers, polyhedrin has a new fold and has evolved to assemble in vivo into 3-D cubic crystals rather than icosahedral shells. The polyhedrin trimers are extensively cross-linked in polyhedra by non-covalent interactions and pack with an exquisite molecular complementarity similar to that of antigen-antibody complexes. The resulting ultra-stable and sealed crystals shield the virus particles from environmental damage. The structure suggests that polyhedra can serve as the basis for the development of robust and versatile nanoparticles for biotechnological applications such as in cell culture systems, microarrays and biopesticides.
Method and apparatus for searching nucleic acid sequence
A method and apparatus for searching compressed nucleic acid sequences are disclosed. In the method, a reference sequence is compared with a subject sequence to be encoded, the subject sequence is compressed, an index is created with respect to the reference sequence and the compressed subject sequence, a position corresponding to a query is searched for in the compressed subject sequence using the index, a character found at the position within the compressed sequence is converted into a sequence, and the sequence is output as the response to the query.
Modeling device, program, computer-readable recording medium, and method of establishing correspondence
A modeling device is disclosed that easily projects characteristic information obtained from an object onto a differently-shaped object, even if the object, from which the characteristic information is obtained, has a complex shape. A modeling device in one embodiment of the present invention includes a virtually electrifying section to calculate an electric potential at a spot in a heart at the time when a predetermined voltage is applied to the heart, and a projecting section to project a fiber orientation onto a heart model created on the basis of shape information that is input to the input section. The projecting section specifies a spot to be a target of projection on the basis of the electric potential obtained by the virtually electrifying section. Use of the electric potential in specifying the spot makes it possible to easily project the fiber orientation onto any heart having complex and various shapes.
Method and apparatus for analyzing genotype data
Provided are a method and apparatus for analyzing genotype data plotted in a two-dimensional space. The method includes: connecting points representing the genotype data to a predetermined point to form straight lines and obtaining angles between adjacent straight lines; extracting the two largest angles from the obtained angles; and analyzing the plotted genotype data using three groups of the genotype data separated by the two extracted largest angles. According to the present invention, when the experimental results of classifying genotype are to be analyzed, the two largest angles from the angles obtained by connecting straight lines between points representing each of the genotype data and a predetermined point plotted in a two-dimensional space are detected, and three data regions separated by the detected two largest angles are used to analyze the genotype data. Thus, a large amount of the experimental data for classifying the genotype can be analyzed rapidly and conveniently.
Method and system of plotting values indicative of characteristics of an underground formation
Plotting values indicative of characteristics of an underground formation. At least some of the illustrative embodiments include: obtaining a plurality of values indicative of characteristics of an underground formation; and plotting the plurality of values on an output device of a computer system. The plotting may further include: plotting parallel to a first axis a first plurality of symbols where each symbol is indicative of a value of a characteristic of a first portion of the underground formation, location of the first plurality of symbols with respect to the first axis is indicative of a first parameter, and location of the first plurality of symbols with respect to a second axis is indicative of a second parameter distinct from the first parameter; and wherein location of at least one symbol with respect to the first axis is also indicative of a third parameter, different than the first and second parameters.
Reconstructing seismic wavefields
A technique includes receiving seismic data acquired in a seismic survey in the vicinity of a reflecting interface. The survey has an associated undersampled direction. The technique includes providing second data indicative of discrete samples of incident and reflected components of a continuous seismic wavefield along the undersampled direction and relating the discrete samples to a linear combination of the continuous incident and reflected seismic wavefields using at least one linear filter. Based on the relationship, an unaliased representation of the linear combination of the continuous incident and reflected seismic wavefields is constructed.
Treatment data processing and planning system
A patient treatment management system involves a repository including treatment information for a particular patient identifying treatment objectives and an associated schedule for achievement of the objectives. An interface processor acquires data representing clinical information of a particular patient related to a particular treatment objective. A monitoring processor assesses from the acquired clinical information whether the particular treatment objective is achieved substantially by a scheduled time deadline. A task scheduling processor automatically initiates scheduling of a first sequence of tasks to be performed by a healthcare worker in response to a determination the treatment objective is achieved and initiates scheduling of a different second sequence of tasks to be performed by a healthcare worker in response to a determination the treatment objective is not achieved.
Meeting notification and modification service
Techniques are described for providing a meeting notification and automatic modification service. A system may be configured to identify an appointment in a calendar application, identify a geographic location of the appointment, and identify, before the appointment time, a geographic location of a first participant of the appointment. Based on the geographic information, the system may identify a route extending from the geographic location of the first participant to the geographic location of the appointment, and may identify a travel time associated with the route. Based on the travel time and the appointment time, the system may determine whether the first participant is estimated to arrive at the appointment on time and, based on the determination, the system may send a message to participants of the appointment or dynamically reschedule the appointment.
Static and dynamic contours
Methods and apparatus, including computer program products, for a static and dynamic contours. A method includes rendering a contour map including static contours and dynamic contours, and displaying the contour map on a device to a user. A Global Positioning System (GPS) device includes a processor coupled with an input device, memory, and the display, and the processor linked to a GPS receiver coupled with a GPS antenna, the memory including a vector source database, a parameter source database and a contour map process to render a topographic map comprising static contour lines and dynamic contour lines.
Reporting of changes in navigation map data for navigation system
A method, navigation unit and map update server for updating navigation map data are disclosed. Navigation map update data is received from a navigation unit using mobile communications. The navigation map update data is obtained by detecting the position of a vehicle, calculating a route for the vehicle to a destination using the navigation map data and detecting when the calculated route to the destination is left. If so, the method begins storing position data until the vehicle is back on the calculated route, on a recalculated route to the destination from an actual position, or when it has reached the destination. Furthermore, the method comprises evaluating the stored position data to obtain navigation map update data. Navigation map update data is kept local for a geographically limited area corresponding to an area serviced by a network node in the cellular communication network.
Energy efficient routing using an impedance factor
A method and system for calculating an energy efficient route is disclosed. A route calculation application calculates one or more routes from an origin to a destination. For each of the routes, the route calculation application uses impedance factor data associated with each segment in the route. The impedance factor is calculated using probe data when the probe data is available for a road segment. When probe data is unavailable, the impedance factor is calculated using machine learning techniques that analyze the results of the impedance factor classifications for road segments having probe data.
Electronic device and method for indicating position of the electronic device on electronic map
An indication method indicates position of an electronic device on an electronic map. The electronic device includes a global positioning system (GPS) and an e-compass. The method detects a position and an orientation of the electronic device using the GPS and the e-compass, indicates the detected position on an electronic map on a display screen of the electronic device, and marks the detected position and the detected orientation of the electronic device in the electronic map. Upon the condition that the detected direction is initialized, a default orientation of the electronic device is pointed North and the electronic map is initially oriented accordingly, the indication method then adjusts the electronic map as needed according to the detected orientation of the electronic device, and displays the adjusted electronic map on the display screen.
Navigation device and method for conveying information relationships
A method and device are disclosed for conveying information relationships. In one embodiment, the method includes prompting, in a navigation device, at least one of input and selection of a travel destination and a desired arrival time at the travel destination; calculating an arrival time during travel to the travel destination; and outputting via the navigation device, during travel to the travel destination, an indication of a relationship between the desired arrival time and the calculated arrival time. In another embodiment, the method includes inputting a travel destination on a navigation device; determining a travel route to the input travel destination; calculating a speed in a navigation device during travel to the travel destination along the determined route; and outputting, via the navigation device, an indication of a relationship between a permitted speed and the calculated speed.
Systems and methods for driver performance assessment and improvement
Disclosed are systems and methods for driver performance assessment and improvement. The systems and methods may be: active for warning purposes only; passive for monitoring purposes only; and active and passive. Any of the foregoing system and methods may be cooperative as well.
Ultraviolet detection system and method thereof
An ultraviolet detection system comprises a global positioning device for receiving signals transmitted from global positioning satellites, and generating global positioning satellite distribution data and current position data; and a processor, coupled to the global positioning device, for generating ultraviolet intensity information according to the current position data and the global positioning satellite distribution data. The processor generates ultraviolet intensity information more accurately according to a current time data, which is transmitted from the global positioning satellite or is automatically generated from the global positioning device.
Navigation system for a motor vehicle
A navigation system is for a motor vehicle. The navigation system includes a motor vehicle, an isolated, immobile memory node for storing navigation data, a wireless communication connections between the isolated, immobile memory node and the motor vehicle for transmitting the navigation data from the isolated, immobile memory node to the motor vehicle and a man-machine interface arranged in the motor vehicle for outputting the navigation data to an operator of the motor vehicle.
Aircraft fuel optimization for multi-stop routes
Computer-implemented systems, methods, and computer-readable media for reducing operational costs relating to fuel burn of aircraft include receiving trip data specifying an origin, an intermediate destination, and a final destination from a client device; receiving operational data from one or more computing device; performing optimization logic to determine an optimized route having a minimized fuel cost, the optimized route specifying how much fuel to purchase at each of an origin airport, an intermediate destination airport, and a final destination airport; and transmitting the optimized route to the client device.
System and method for controlling operation of an airline
An airline operations control system for an airline having multiple aircraft and multiple routes formed by one or more flights where the airline operations control system includes a computer searchable database a query module configured to query the database and a prognostic module.
System and method for airport surface management
Described herein are systems and methods for surface management of an airport. One embodiment of the disclosure of this application is related to a method including receiving airport data from an airport network, receiving surface surveillance data for specific segments of an airport area, identifying predicted conflicts within one of the segments based on the airport data and surface surveillance data, and allocating a taxi time slot for the flight. Another embodiment of the disclosure of this application is related to a system comprising a user interface displaying information related to flight plan data and airport data received from an airport network, and a surface management module receiving the airport data and surface surveillance data for specific segments of an airport area, identifying predicted conflicts within one of the segments based on the airport data and surface surveillance data, and allocating a taxi time slot for the flight.
Intelligent traffic control mesh
An approach is provided that gathers observational traffic data at traffic controller nodes. Each of the traffic controller nodes communicates observational traffic data to other traffic controller nodes via a network. The traffic controller nodes negotiate traffic control parameters. The negotiating process receives timing proposals from the other traffic controller nodes included in the related set. The nodes analyze the proposed timings based on the traffic controller's gathered observational traffic data. The traffic controller node prepares responses in response to the analysis. The traffic controller node sends the negotiation responses to the other traffic controller nodes. The traffic controller node also adjusts its traffic control parameters that control the node's cycle times based on the analysis.
Service bay high pressure common rail injector performance test
A method for testing a fuel injector including providing an engine with a common rail fuel injection system having one or more fuel injectors; operating the engine at a selected set of operating conditions; conducting a motoring event; allowing a first settling duration; measuring a first rail pressure; operating a first selected injector including operating the first selected injector singly in response to a selected fuel quantity, a selected number of combustion cycles, and a selected number of injections per combustion cycle; allowing a second settling duration; measuring a second rail pressure; calculating a pressure difference value in response to the first rail pressure and the second rail pressure; inferring an amount of fuel delivered by the first selected injector in response to the pressure difference value; and evaluating a first performance factor of the first selected injector in response to the amount of fuel delivered.
Stop control system for internal combustion engine
A stop control system for an internal combustion engine, which controls a stop position of a piston of the engine, is provided. An valve opening amount of an intake air flow rate control valve is determined based on the detected engine rotational speed and the detected crank angle after the ignition switch is turned off, and the intake air flow rate control valve is controlled so that the valve opening amount of the intake air flow rate control valve coincides with the determined valve opening amount. For example, the valve opening amount of the intake air flow rate control valve is determined according to the crank angle at the time the engine rotational speed decreases to reach a predetermined range, and the intake air flow rate control valve is controlled to be opened. With this control, the intake air amount of the engine is increased so that the stop position of the piston coincides with the desired position.
Internal combustion engine system controller
Provided is an internal combustion engine system controller, including a sub-feedback learning section, a state determining section, and a learning update-speed setting section. The state determining section determines, to which of at least three states including: (a) a stable state in which a fluctuating state of a sub-feedback learning value is stable; (b) an unstable state in which the fluctuating state greatly fluctuates; and (c) an intermediate state between the stable state and the instable state (may be referred to as sub-stable state), the fluctuating state corresponds. The learning update-speed setting section sets an update speed of the sub-feedback learning value in accordance with the result of determination by the state determining section. Further, the learning update-speed setting section suppresses the occurrence of hunting of the sub-feedback learning value.
Method for operating an internal combustion engine
Described is a method for operating an internal combustion engine (1), in which method at least one parameter of the exhaust gas flowing in an exhaust-gas duct (10) is detected by at least one exhaust-gas probe (30; 32), wherein the internal combustion engine (1) is at least temporarily turned over by a starting device (3), during which an injection and combustion of fuel does not take place, and during and/or after which the exhaust-gas probe (30; 32) is adjusted.
Vehicle driving assist system
A vehicle driving assist system has a controller configured to calculate a risk potential indicative of the degree of convergence between a host vehicle in which the system is installed and a preceding obstacle. Then, the controller performs a driver notification controlling operation that produces a driver notification stimulus based on the risk potential. Considering the acceleration of the preceding obstacle, the speed of the host vehicle, and the following distance between the host vehicle and the preceding obstacle, the controller calculates a threshold value for determining when to commence the control of the driver notification controlling operation.
Method for actuating a clutch of a hydrodynamic torque converter
A method of actuating a clutch of a hydrodynamic torque converter in a self-propelling working machine such that when the clutch is engaged and thereby connects a drive input of the hydrodynamic torque converter to a drive output of the hydrodynamic torque converter, and when a service brake is actuated, the clutch is disengaged thereby separating a drive input of the hydrodynamic torque converter from a drive output of the hydrodynamic torque converter. The method comprises the steps of, when the service brake is actuated, actuating the clutch in the engaging direction, and maintaining engagement of the clutch if a device for recognizing a driving status of the working machine detects that the working machine is driving downhill.
Apparatus for driving shaft rotation and method
An apparatus for driving shaft rotation is provided and includes a shaft, which is rotatable about an axis thereof, a machine operably coupled to the shaft to be rotatable with the shaft and configured to be responsive to a load applied thereto and a driving element, which is configured to engage with the shaft at a first predefined speed and a second speed greater than the first predefined speed to drive shaft rotation.
Method for adapting gear selection in a vehicle
A method for adapting gear selection in a vehicle, the vehicle including an engine with an engine output shaft connected to an automated mechanical transmission via a clutch, a transmission output shaft connected to at least one driven wheel of the vehicle, an arrangement for registering whether a towed vehicle is connected to said vehicle, and at least one control unit for receiving input signals including signals indicative of the towed vehicle connection, and for processing the signals in accordance with programmed logic rules to issue gear selection command output signals to the transmission for gear shifting, where the control unit, when sensing that a towed vehicle has been connected to the vehicle, changes an originally selected first gear to a lower second gear having a higher starting gear ratio compared to the first gear. The towed vehicle connection registering arrangement registers at least bounce from when the vehicle bounces into the towed vehicle for connecting the towed vehicle to the vehicle. A more sure registration of whether a towed vehicle is connected to the vehicle or not is obtained.
CVT control system having variable power source speed
A powertrain control system is disclosed. The powertrain control system may have a power source and a CVT coupled to an output of the power source. The powertrain control system may further have a controller in communication with the power source and the CVT. The controller may have a map with a plurality of speed modes, and, for at least one of the plurality of speed modes, the controller may be configured to vary an actual power source speed based on at least one of a CVT output speed or a ground speed.
Control apparatus for continuously variable transmission
In a control apparatus for a continuously variable transmission, when the difference between a target transmission gear ratio calculated immediately after switching the control mode from a manual shift mode to an automatic shift mode and a current transmission gear ratio (that is, a fixed transmission gear ratio of the transmission gear stage selected in the manual shift mode immediately before the switching) is greater than or equal to a set value, a shift control unit sets a temporary target transmission gear ratio between the target transmission gear ratio and the current transmission gear ratio. If a temporary target transmission gear ratio is set, the shift control unit causes the transmission gear ratio obtained during transition of mode from the manual shift mode to the automatic shift mode to match the target transmission gear ratio stepwise via the temporary target transmission gear ratio.
Pressure control system for a hydraulic lift and flotation system
A control system is provided to control the rate of pressure rise in a hydraulic lift and flotation system. When a hydraulic cylinder of the hydraulic lift and flotation system is to be adjusted, the pressure in the hydraulic lift and flotation system has to be increased to a predetermined pressure controlled by a relief valve before the hydraulic cylinder can be operated. The unload valve of the hydraulic lift and flotation system can be closed in a controlled or regulated manner in order to control the rate at which pressure rises in the hydraulic lift and flotation system.
Automatic transmission device for wheel loader and wheel loader
An automatic transmission device for a wheel loader includes: a shift mechanism; a work detection device that detects that the wheel loader is performing an excavation work; and a shift control device that executes control so as to downshift a speed stage at the shift mechanism if the work detection device detects that the wheel loader is performing the excavation work.
System and method for an anticipatory passenger cabin
A system for anticipating the needs of at least one passenger onboard a mobile platform is provided. A passenger seating area for receipt of the passenger includes a seat that has a seat back that moves into a reclined position, a tray table that is operable to be positioned to provide a surface for use by the at least one passenger, and a light source disposed for illumination of at least a portion of the passenger seating area. A camera acquires an image of the passenger, and a gesture control module generates activity data that includes at least one activity that the passenger is performing as recognized in the image of the at least one passenger acquired by the camera. A smart control module moves the seat back, positions the tray table, activates or deactivates the light source and performs combinations thereof based on the activity data.
Motor vehicle steering system
A steering system for a motor vehicle equipped with a cargo-handling machine including a pair of left and right loading portions is provided. The steering system includes a turning actuator that turns a steered wheel according to an operation of a steering member, and a side shift actuator that shifts the pair of loading portions in the left-right direction. A control unit that controls driving of the side shift actuator includes a target side shift amount calculating section that calculates a target side shift amount of the pair of loading portions based on lateral acceleration detected by a lateral acceleration sensor.
Method for communication between two automotive electronic control units and associated device
A method of communication between at least two automotive electronic control units, including two communication interfaces between the units enabling messages to be sent via one or the other of the interfaces, the units each including a microcontroller linked to the interfaces managing sending and receiving of the messages according to a given priority level, transmission speed and recurrence, and including a diagnostic system for checking the functionality of the interfaces, a message scheduler, the method including: introducing a logic switch into each microcontroller, for selecting one or the other interface; checking that neither interface is defective; scheduling by the scheduler the sending of messages in succession via one or the other of the interfaces; selecting one or the other of the interfaces to send the messages scheduled by the message scheduler; and sending the scheduled messages in succession by one or the other of the interfaces.
Method of identification of the nodes of a computer network in an air conditioning installation of a motor vehicle, and air conditioning installation using the method
In a motor vehicle air conditioning installation comprising a central control unit (12), a computer network (14) connected to the central control unit (12) and a plurality of peripherals (101, 102, 103, . . . , 10n) connected to nodes (N1, N2, N3, . . . , Nn) of the computer network, the peripherals are connected in series via a common conductor (18). The installation comprises means (120) for inputting at the level of each peripheral an electric signature on a common conductor, means (130) for detecting an electric signal depending upon the electric signatures of the peripherals situated upstream on the common conductor (18), means for generating a data item representing the relative position of the peripheral on the basis of the electric signal detected, and means for identifying the node of the network to which it is connected on the basis of the relative position data item generated. The identification of the node of the network permits the assignment of an address or monitoring of the connection of the peripheral from the central control unit.
Multimedia information and control system for automobiles
In a multimedia information and control system for use in an automobile, at least one interface is employed which enables a user to access information concerning the automobile and control vehicle functions in an efficient manner. The user may select one of a plurality of displayed options on a screen of such an interface. Through audio, video and/or text media, the user is provided with information concerning the selected option and the vehicle function corresponding thereto. Having been so informed, the user may activate the selected option to control the corresponding vehicle function.
Method and apparatus for detecting tire having decreased internal pressure, and program for detecting tire having decreased internal pressure
A method of detecting a tire having a decreased internal pressure by making a relative comparison among wheel speeds of tires attached to the respective wheels, includes detecting wheel rotation information regarding the respective tires of the vehicle; calculating wheel speeds based on the detected wheel rotation information; calculating DEL2 as a decreased pressure determination value by comparison between a front wheel speed and a rear wheel speed; and determining, when the resultant decreased pressure determination value exceeds a predetermined threshold value, that a tire has a decreased internal pressure. The method further includes a threshold value setting step of setting the predetermined threshold value based on (a) a relation obtained in advance, depending on a difference of the mass of the vehicle, between DEL2 and a load sensitivity during a vehicle turning, and (b) a load sensitivity obtained by a turning at the time of determination.
Control apparatus for hybrid vehicle
A control apparatus for a hybrid vehicle to permit charging of an electric-energy storage device with an electric energy supplied from an external electric power source provided outside said hybrid vehicle, while said hybrid vehicle is held stationary; and to operate an engine for operating a lubricant supply device to supply a predetermined amount of the lubricant, during charging of said electric-energy storage device by said external electric power source, irrespective of whether a count of said motor running counter has reached a predetermined upper limit, and to reset said motor running counter.
System for operating a vessel
One or more embodiments of a system for operating a vessel is provided herein. An illustrative system can include a plurality of power sources for operating the vessel. The power sources can include a battery bank and an AC power source. The system can also include an auxiliary device disposed on the vessel, wherein the auxiliary device comprises an electrical rotating source. Energy can be harvested from the electrical rotating source and transferred to the DC power source, a load of the vessel, or both. The illustrative system can also include a power management system that can include a processor; a data storage in communication with the processor; and a plurality of computer instructions stored on the data storage.
Airspace awareness enhancement system and method
A display system and method for an aircraft renders various airspaces and associated airspace types on an aircraft display device. An image is selectively rendering on the aircraft display device that includes at least an airspace boundary graphic representative of at least a portion of the boundary for the airspace, and a textual airspace type designation label representative of the airspace type of the airspace.
Power supply and demand control apparatus and power supply and demand control method
A power supply and demand control apparatus includes a power generation planning unit that calculates one day's power outputs of multiple distributed power sources and a power flow target of a linking point to another power system, a long-cycle control unit having a long-cycle supply-demand balancing control unit that performs control every few minutes so as to ensure the supply-demand balancing of electric energy in a given amount of time at the linking point in order to perform control for making deviations between total power output calculated by the power generation planning unit and load power in the power system constant, and a short-cycle control unit having a short-cycle supply-demand balancing control unit that performs similar control every few seconds. In the power supply and demand control apparatus, the long-cycle control unit and short-cycle control unit perform the supply-demand balancing control in a hierarchical fashion to determine output assignments of the distributed power sources.
Multivariable control of regulation and fast demand response in electrical grids
One embodiment of the present invention provides a system for resolving energy imbalance within an electrical grid. During operation, the system receives an imbalance signal and current outputs from a regulation service subsystem and a demand response subsystem. Subsequently, the system generates control signals for controlling future outputs of the regulation service subsystem and the demand response subsystem based on the imbalance signal and the current outputs, and applies the generated control signals to the regulation service subsystem and the demand response subsystem.
System for control of mobile hydraulic equipment
A controller for mobile hydraulic equipment includes a radio receiver, hydraulic controller, and display unit. The controller further includes terminals configurable to function as a combination of analog or digital inputs or outputs according to the system requirements. A user interface included on the controller permits an operator to select a desired function for each terminal and to configure the controller according to the application requirements.
Machining system and method
According to the present invention, even during and immediately before a machining operation by a machining apparatus, it is possible to improve positioning control accuracy thereof and, as a result, machining accuracy thereof. A robot 11 equipped with a machining tool 12 performs a moving operation to a target position 41 of a machining target workpiece 2 and a machining operation on the machining target. A robot moving mechanism 14 moves the robot 11 in parallel with the workpiece 2 that is being conveyed by a conveyance carriage 18. A robot control device 17 controls movement of the robot moving mechanism 14 using a detection result of a synchronizing sensor 15 and carries out positioning control of the robot 11 using the detection result of a visual sensor 13 or a synchronizing sensor 15.
Disclosed herein is a robot, which has a simple structure and makes a gesture in a curved shape. The robot includes a body part, at least one cam member symmetrically arranged at both sides of the inside of the body part, an outer cover member surrounding the at least one cam member, and a linear moving device to linearly move the at least one cam member. The shape of the outer cover member is varied, under the condition that the outer cover member is adhered closely to the at least one cam member, according to the movement of the at least one cam member.
Apparatus for process automation using a pin and bushing array
An apparatus comprises a plurality of bushings arranged and held together in an array; and a plurality of pins residing in the plurality of bushings, wherein the plurality of pins are for transferring samples. Manufacturing tolerances for inside diameters of the bushings and outside diameters of the pins substantially match to allowing the pins to slide freely within the bushings. The plurality of bushings can reside in one or more plates, each of which having plurality of holes, with the plurality of bushings being held together in the array.
System for determining a relative location of a plurality of items upon a plurality of platforms
A system is described for determining a relative location of a plurality of items upon a plurality of platforms. The system may include a memory, an interface, and a processor. The memory may store a first item, a second item, a first period of time and a second period of time. The interface may be operative to communicate with a user and an antenna. The antenna may be able to detect an item for a period of time. The processor may be operative to receive from the antenna, via the interface, the first item, the first period of time, the second item and the second period of time. The processor may determine whether the periods of time overlap. If the periods of time overlap the processor may communicate to the user that the items are upon the same platform, otherwise that the items are on consecutive platforms.
Substrate transfer method and substrate transfer apparatus
A substrate transfer method of delivering a substrate transferred by a transfer arm to a mounting unit and associated apparatus. The method includes moving the transfer arm to a position above the mounting unit, and, when delivering the substrate onto the mounting unit, detecting a mounting portion of the mounting unit by a mounting portion detector having a light emitting element and a light receiving element provided at opposite positions across a center point of the transfer arm on a bottom surface of the transfer arm, and then lowering the transfer arm in an oblique direction to mount the substrate on the mounting unit.
Posture control method and posture control device
A posture control method controls a posture of a processing unit by measuring a distance between the processing unit and a process surface of a round pipe to be processed by the processing unit, using four distance measuring units. The method controls a posture about a pitch axis based on a difference obtained by subtracting a second measurement distance from a first measurement distance, and a difference obtained by subtracting a fourth measurement distance from a third measurement distance, controls a posture about a yaw axis based on a difference obtained by subtracting the third measurement distance from the first measurement distance, and a difference obtained by subtracting the fourth measurement distance from the second measurement distance, and controls a posture about a roll axis based on a difference between a first total distance obtained by adding the second measurement distance and the third measurement distance, and a second total distance obtained by adding the first measurement distance and the fourth measurement distance.
Processing end point detection method, polishing method, and polishing apparatus
A processing end point detection method detects a timing of a processing end point (e.g., polishing stop, changing of polishing conditions) by calculating a characteristic value of a surface of a workpiece (an object of polishing) such as a substrate. This method includes producing a spectral waveform indicating a relationship between reflection intensities and wavelengths at a processing end point, with use of a reference workpiece or simulation calculation, based on the spectral waveform, selecting wavelengths of a local maximum value and a local minimum value of the reflection intensities, calculating the characteristic value with respect to a surface, to be processed, from reflection intensities at the selected wavelengths, setting a distinctive point of time variation of the characteristic value at a processing end point of the workpiece as the processing end point, and detecting the processing end point of the workpiece by detecting the distinctive point during processing of the workpiece.
System and method for cutting substrate into workpieces
A computer obtains user input from an input to control a cutter and a conveyor to cut a substrate. The control module of the computer calculates a total number of cuts of the substrate and a distance that the substrate moves before each cut of the substrate according to user input. A conveyer control module of the computer controls the conveyer to move the substrate, where a reminder signal is sent out after the substrate has moved the distance. A cutter control module of the computer controls the cutter to cut the substrate.
Fabrication system of CIGS thin film solar cell equipped with real-time analysis facilities for profiling the elemental components of CIGS thin film using laser-induced breakdown spectroscopy
A fabrication processing system is used to produce copper indium gallium selenide (CuIn1-xGaxSe2 or CIGS) thin film solar cells, more particularly to a fabrication processing system CIGS of thin film solar cells, equipped with real-time analysis facilities for profiling the elemental components of CIGS thin film using laser-induced breakdown spectroscopy. The system provides a process control system for determining whether abnormalities are present or not by measuring a physical and chemical properties on a continuous production process lines of CIGS thin film solar cell in real time, and performs a production and quality management at the same time by providing a feedback to CIGS fabrication process.
Device and method to reduce ear wax clogging of acoustic ports, hearing aid sealing system, and feedback reduction system
Devices and methods to reduce ear wax clogging of acoustic ports, hearing aid systems, and feedback reduction systems are provided. A conformal hearing aid includes a hearing aid body, where the hearing aid body houses a microphone and a receiver, where the microphone is positioned within the hearing aid body to measure acoustic signals from an ambient environment, and where the receiver is positioned within the hearing aid body to emit acoustic signals toward a tympanic membrane of a user; an expandable element, where the expandable element is operatively connected to the hearing aid body, and where the expandable element is configured to encompass a circumferential portion of the hearing aid body when expanded; and an inflation management system, where the inflation management system is configured to expand the expandable element when actuated.
High-frequency interpolation device and high-frequency interpolation method
It is possible to generate an interpolation signal in which spectrum in frequency characteristics develops in a continuous manner according to a reproduced music without increasing the sampling rate (sampling frequency) in up-sampling processing. A high-frequency interpolation device 1 includes: a frequency band determination section 2 that determines a bandwidth type of an audio signal as a frequency band determination value preset for each bandwidth according to the frequency characteristics of the audio signal; and an interpolation signal generation section 3 that selects a filter coefficient of a high-pass filter in accordance with the frequency band determination value 2, performs filtering for the audio signal by using the high-pass filter having the selected filter coefficient, and generates a high-frequency interpolation signal for the audio signal.
APP rating system
A technique to automatically provide assistance with the selection of an app for an electronic game is described. An apparatus may comprise an app rating application arranged to receive as input game performance information representing gameplay of an electronic game. The app rating application may process the game performance information and output an app rating indicator of an app corresponding to the app identifier parameter based on the performance information to assist a user in selecting the app. Other embodiments are described and claimed.
Implantable electrode array assembly including a carrier, superstrates mounted to the carrier and electrodes disposed on the superstrates
An implantable electrode array (40, 310) that includes multiple spaced apart electrodes (42, 316) to which current can be individually sourced and sunk. The array includes a carrier (80, 312) that supports the electrodes. One or more control modules that source current to or sink current from the electrodes are disposed in windows (81, 404) within the carrier.
MRI-compatible implantable lead having a heat spreader and method of using same
An implantable lead is provided that comprises a lead body and a header assembly. The lead body has a distal end and a proximal end. The lead body is configured to be implanted in a patient. The header assembly is provided at the distal end of the lead body and includes an internal chamber and a tissue engaging end. An electrode is provided on the header assembly. The electrode is configured to deliver a stimulating pulse. A resonant inductor is located within the chamber in the header assembly. An electrically floating heat spreader is provided on the header assembly. The heat spreader is located proximate to the resonant inductor and is positioned on the header assembly to cover at least a portion of the resonant inductor. The heat spreader is thermally coupled to the resonant inductor to convey thermal energy away from the header assembly.
Electrode paddle for neurostimulation
An implantable electrode paddle for use in a neurostimulation system may include a dorsally-projecting lead that allows all of the edges of the electrode paddle to be situated near a vertebral body for stimulation of neural structures. Embodiments may include one or more flanges for cooperating with a vertebral body and thereby stabilizing the electrode paddle. Embodiments of the present invention may also include features to allow an electrode paddle to be divided during surgery. Embodiments of the present invention may also include an electrode paddle having a plurality of paddle sections, wherein at least one of the paddle sections comprises a plurality of asymmetrically configured contacts. Embodiments of the invention include a method of assembling a neurostimulation system and a method of implanting an implantable system in a body, wherein the implantable system includes an electrode paddle that may be divided into a plurality of paddle sections.
Medical lead having a variable change in stiffness
According to one embodiment, the present invention includes an elongate implantable medical lead having a distal portion that is relatively flexible, a proximal portion that is relatively stiff, and a transition portion which has a variable transition stiffness. The transition stiffness varies over the length of the transition portion that generally decreases in a distal direction. The relatively stiff proximal portion of the lead gives the lead steerability while the gradual change in stiffness in the transition portion reduces the likelihood that the lead will prolapse when it is guided into a branch vein. The distal stiffness is less than the proximal stiffness giving the lead a safe end that is unlikely to puncture vascular walls and is able to maneuver around various tortuosities when the lead is implanted into a patient.
Power optmization in a medical implant based system
Power optimization in a medical implant based system. A method includes receiving a portion of a signal by a first transceiver. The method further includes determining, from the portion of the signal, a time duration after which a subsequent portion of the signal will be transmitted. The subsequent portion is transmitted at end of the portion. The method also includes entering into an inactive state for the time duration.
Adaptable communication sensitivity for an implantable medical device
A wireless communication threshold for an implantable medical device is automatically adapted in an attempt to maintain optimum signal detection sensitivity. In some aspects, a threshold level may be adapted to account for current environmental conditions, implant conditions, device conditions, or other conditions that may affect the reception of wireless signals at the device. In some aspects, the determination of an optimum level for the threshold involves a tradeoff relating to effectively detecting target signals while avoiding detection of noise and/or interference. In some aspects, adaptation of a threshold may be based on maximum energy levels associated with one or more sets of RF energy sample data. In some aspects, adaptation of a threshold may be based on the number of false wakeups that occur during a period of time.
Therapy program modification
A therapy program may be generated based on an algorithmic model of a baseline therapy field, which may represent a therapy field resulting from therapy delivery via the first therapy system based on a first therapy program. A second therapy program that controls therapy delivery by a second therapy system may be generated based on the baseline therapy field model. For example, therapy parameter values of the second therapy program may be selected to maintain at least one field characteristic of the baseline therapy field model. In some examples, the second therapy system may result from a hardware modification to the first therapy system. In other examples, the first and second therapy systems may be associated with different patients. For example, the baseline therapy field model may be an efficacious therapy field for a patient class, and a second therapy program may be generated for a patient in the class.
Method for inspection of materials for defects
The present invention is a non-destructive method of inspecting a bond, particularly a braze bond, in a hermetic package. The invention involves a unique hermetic package design adapted for ultrasonic inspection and a method of inspecting the package. This package and non-destructive inspection process are particularly useful in implantable neural stimulators such as visual prostheses.
Selective high frequency spinal cord modulation for inhibiting pain with reduced side effects, and associated systems and methods
Selective high-frequency spinal cord modulation for inhibiting pain with reduced side effects and associated systems and methods are disclosed. In particular embodiments, high-frequency modulation in the range of from about 1.5 KHz to about 50 KHz may be applied to the patient's spinal cord region to address low back pain without creating unwanted sensory and/or motor side effects. In other embodiments, modulation in accordance with similar parameters can be applied to other spinal or peripheral locations to address other indications.
Therapy control based on a patient movement state
A movement state of a patient is detected based on brain signals, such as an electroencephalogram (EEG) signal. In some examples, a brain signal within a dorsal-lateral prefrontal cortex of a brain of the patient indicative of prospective movement of the patient may be sensed in order to detect the movement state. The movement state may include the brain state that indicates the patient is intending on initiating movement, initiating movement, attempting to initiate movement or is actually moving. In some examples, upon detecting the movement state, a movement disorder therapy is delivered to the patient. In some examples, the therapy delivery is deactivated upon detecting the patient is no longer in a movement state or that the patient has successfully initiated movement. In addition, in some examples, the movement state detected based on the brain signals may be confirmed based on a signal from a motion sensor.
Method and apparatus for neural stimulation with respiratory feedback
A neural stimulation system controls the delivery of neural stimulation using a respiratory signal as a therapy feedback input. The respiratory signal is used to increase the effectiveness of the neural stimulation, such as vagal nerve stimulation, while decreasing potentially adverse side effects in respiratory functions. In one embodiment, the neural stimulation system synchronizes the delivery of the neural stimulation pulses to the respiratory cycles using a respiratory fiducial point in the respiratory signal and a delay interval. In another embodiment, the neural stimulation system detects a respiratory disorder and, in response, adjusts the delivery of the neural stimulation pulses and/or delivers a respiratory therapy treating the detected respiratory disorder.
Inductively rechargeable external energy source, charger, system and method for a transcutaneous inductive charger for an implantable medical device
Techniques for transcutaneous transferral of energy to an implantable medical device are disclosed. An embodiment includes a system comprising an implantable medical device having a secondary coil. An external device is provided to transcutaneously transfer energy to the secondary coil. The external device comprises a housing having a side adapted to be positioned in proximity to the secondary coil when the external device is transferring energy to the secondary coil. A temperature sensor is coupled to the side to determine a temperature indicative of heat to which the patient is being exposed during the transfer of energy. A control circuit is adapted to control the transfer of energy to the secondary coil based on the temperature. For instance, the control circuit may limit transfer of energy by controlling times at which transfer of energy occurs or controlling an amplitude of a signal within the external device.
Detection of strong static magnetic fields and MRI examination safekeeping for an implantable cardiac prosthesis
An active implantable medical device for one of cardiac stimulation, resynchronization, and defibrillation is shown and described. The device includes means for placing an electronic circuit in a safekeeping operating mode in response to detecting a first magnetic field associated with a permanent magnet and detecting a second magnetic field associated with an MRI imager.
Biological information measurement device, biological information measurement method, and body composition measurement device
To accurately acquire body composition information using data acquired by another device. Thus, there is provided a body composition monitor with scale including a communication unit for allowing input of biological component information (cross-sectional area, site length, subcutaneous fat percentage, visceral fat percentage, etc.) of a living body measured with another device such as an MRI, where step of calculating the body composition of the living body based on the biological component information, an impedance detected by an impedance detection unit, and a weight measured by a load detection unit is executed.
Methods of identifying and/or assessing cardiac arrhythmias using an implantable medical device
Apparatus using one or more modes of statistical analysis with one or more monitored parameters of a patient's heart to identify and/or assess arrhythmias. Through use of the one or more modes of statistical analysis, a medical professional can be aided during evaluation of patient data for diagnosis of the patient. At least one of the monitored parameters may include one or more values used representatively for storage intervals of a selected length. As such, for each storage interval, a value may be determined for the one monitored parameter occurring at an upper percentile and a lower percentile. In addition, a median value may be determined for the one monitored parameter for each storage interval. Over a plurality of the storage intervals, these determined values can be used in one or more modes of statistical analysis to better identify and assess the arrhythmias.
Device for the analysis of an endocardiac signal of acceleration
A device for the analysis of an endocardiac signal of acceleration. The device preprocesses the acquired endocardiac acceleration (EA) signal by cutting the signal EA collected into sub-signals EA, each one have a duration of one cardiac cycle; separating the cut signals to isolate in each sub-signal EA at least one component EAx, associated with a major cardiac sound, and preferably into components EA1 and EA2 associated with the two major cardiac sounds S1 and S2; and performing a correlation on each component EA1 and EA2, to readjust each sub-signal in relation to a maximum of correlation, so as to deliver a readjusted component EA1 and a readjusted component EA2. The device further determines, starting from the isolated correlated components EA1 and EA2, a component average EA1 and a component average EA2, and to combine these components EA1 and average EA2 so as to produce an average global signal EA for one cycle. The device extracts from these information temporal markers of characteristic moments in the cardiac cycle, in particular markers of the moment of opening and closing of the aortic valve.
A medical apparatus includes a storing section in which information concerning a drug movement in a living body is stored, an arithmetic processing section that acquires, based on the information stored in the storing section, information concerning a target region to which a first fluorescent drug is administered, information concerning a method of administering the first fluorescent drug, and information indicating start of administration, diagnosis end timing corresponding to the first fluorescent drug and sets, administration start timing of a second fluorescent drug, and a control section that performs control to start the administration of the second fluorescent drug when a current time reaches the administration start timing of the second fluorescent drug and, after the diagnosis end timing corresponding to the first fluorescent drug, performs control to reduce an irradiating light amount of excitation light for exciting the first fluorescent drug.
Phase-free cardiac roadmapping
According to an exemplary embodiment of the present invention, a cardiac roadmapping technique is provided, that does not rely on the prerequisite of a phase-centric pairing of the angiogram and life images. Instead, both the pairing and accurate registration of the images are combined within a single operation, for example by using a multi-device map. This may provide for robust and precise cardiac roadmapping.
Image annotation in image-guided medical procedures
Presented herein are methods, systems, devices, and computer-readable media for image annotation in image-guided medical procedures. Some embodiments herein allow physicians or other operators to use one or more medical devices in order to define annotations in 3D space. These annotations may later be displayed to the physician or operator in 3D space in the position in which they were first drawn or otherwise generated. In some embodiments, the operator may use various available medical devices, such as needles, scalpels, or even a finger in order to define the annotation. Embodiments herein may allow an operator to more conveniently and efficiently annotate visualizable medical data.
Electrode for physiological signal measurements and method for making same
The present invention is concerned with an electrode and electrode catheter using thin metallic threads or wires, for example, microwires having diameters as low as 10−6 to 10−4 meters or less. The embodiments allow for the efficient mounting of at least one electrode on a catheter, resulting in the creation of a flexible ring-microelectrode that is suitable for, amongst other things, the detection of myoelectrical activity in a patient's muscle, such as the diaphragm or other inspiratory-related muscle.
Photoacoustic measurement of analyte concentration in the eye
An in vivo determination of the presence or concentration of an endogenous or exogenous substance by photoacoustically assaying the substance in the eye and correlating the presence or concentration of the substance in the eye to the presence or concentration of the substance in the blood, without removing a tissue or fluid sample from the body for assay. The eye, unlike other body sites such as the skin, has a relatively constant pressure and temperature, providing an additional utility for the inventive method.
Set for determining blood type and cover body
Disclosed is a set for determining whether blood obtained in puncture tools by puncturing a blood vessel is venous blood or arterial blood easily, and ensuring handling under a sterile state. A set for determining blood type has a cover body to be attached to a syringe set, and a blood type determination unit to be housed in the cover body. The blood type determination unit comprises a light projecting portion and a light receiving element, and a blue output LED and a red output LED showing a judgment result based on a signal obtained from the light receiving element. The cover body has a body and a lid that are combined with each other to cover the blood type determination unit, a partition for passing blood between the light projecting portion and the light receiving element, and a pair of measurement windows for transmitting light between the light projecting portion and the light receiving element through the partition.
Mobile terminal and antenna connection cable thereof
Provided are a mobile terminal and an antenna connection device of the mobile terminal which can reduce the number of connection paths between an antenna and a wireless communication unit and can thus minimize path loss. The mobile terminal may include a body including a first case in which an antenna is disposed and a second case in which a wireless communication unit is disposed; a mobile switch which is disposed in the second case and serves as a radio frequency (RF) input/output (I/O) port for the wireless communication unit; and an antenna connection cable which is formed in one body with the antenna and includes a connector formed at one end of the antenna connection cable, the antenna connection able being connected to the mobile switch via the connector.
Portable electronic apparatus having casings
A portable electronic apparatus includes a first casing, a second casing movably connected to the first casing, a first elastic member provided on a surface of the second casing facing the first casing and a second elastic member provided on a surface of the first casing facing the second casing. The second elastic member includes a convex portion that elastically contacts with the first elastic member in a closed state in which the first casing and the second casing are superposed.
Reconfigurable touch screen mobile device with keyboard cover
A multifunction cover with touch screen display, icons, and a keyboard is described. A multifunction touch screen enabled mobile device may be configured to be connected to the separate cover, which may be attached to the device and detached from the device. The mobile device may be enabled with a cellular voice and data communication, WiFi connectivity, Bluetooth connectivity, and Internet Protocol connectivity. The mobile device may be enabled to play videos, capture photos, and stream multimedia content.
Swing-type portable terminal
A portable terminal with a pair of housings is provided, in which a fixed member has a through hole and is fixed to one surface of a first housing, the through hole penetrating both surfaces of the fixed member, a rotation member is fixed to one surface of a second housing, facing one surface of the fixed member, a driving member is rotatably engaged with the through hole on the other surface of the fixed member and fixed to the rotation member, and an elastic member has one end supported by the fixed member and the other end supported by the driving member, for providing a driving force to rotate the driving member. The second housing covering the first housing or moving to a position where the second housing is in parallel with the first housing by rotating along with the rotation member and the driving member around a hinge axis extended vertically with respect to the first housing by the driving force of the elastic member.
Handheld electronic device including automatic selection of input language, and associated method
A method of automatically establishing an input language for a handheld electronic device includes receiving a request to initiate the composition of a new message, receiving a selection of a particular contact that is the intended recipient of the message, and determining whether the particular contact has a stored preferred input language. If a preferred input language is stored, the method includes determining whether the preferred input language is different than the current input language (which may be a pre-established default input language). If the preferred input language is different, the method further includes switching the current input language to the preferred input language. Also provided is an improved handheld electronic device having one or more routines adapted to implement the method. Also provided is a method of indicating a preferred language in association with a call received by or placed to the device.
Free-form entries during payment processes
Various methods and systems are provided that allow a user to perform a free-form action, such as making a mark on a device, speaking into a device, and/or moving the device, to cause a step to be performed that conventionally was performed by the user having to locate and select a button or link on the device.
Apparatus and method for controlling subscriber identity module card
A Subscriber Identity Module (SIM) card control apparatus applied to a mobile communication device is provided. The mobile communication device has a first SIM card and a second SIM card. The SIM card control apparatus includes a judgment unit, a SIM card controller and a switch device. The judgment unit is used to generate a selection signal according to a to-be-accessed SIM card among the first and the second SIM cards. The SIM card controller transmits signals via a group of signal lines. The switch device is used to selectively connect the group of signal lines to the first SIM card or the second SIM card according to the selection signal.
Mobile terminal having an image projector and controlling method therein
A mobile terminal having an image projector and controlling method therein are disclosed, by which a detachable image projector can be provided to the mobile terminal and by which a projection mode of a detachable image projector can be conveniently changed. The present invention includes a housing, a touchscreen provided to one surface of the housing to recognize a touch input of a user, a detachable projector module having an activation switch provided to one lateral side, the detachable projector module configured to project a prescribed image on an external surface, and a controller controlling an activation message for receiving an confirmation of a presence or non-presence of activation of the projector module from the user to be displayed on the touchscreen if the activation switch is manipulated. In this case, the detachable projector module is attached to a prescribed surface of the housing except the one surface of the housing to which the touchscreen is provided.
Mobile electronic device and mobile system
An object is to provide a mobile electronic device with high operability and high safety. The mobile electronic device includes an image projector that projects an image, a control unit that controls a projection operation by the image projector, and a cabinet that supports the image projector and the control unit. The control unit can select a first mode and a second mode, and controls an operation of the image projector, when the first mode is selected, in a condition different from that when the second mode is selected. The object is thereby solved.
The mobile phone comprising a voice communication implementer, a caller's information displaying implementer, and a mobile phone updating implementer.
Control methods for communication devices
A control method for a communication device is provided. The control method includes the steps of: determining whether the communication device is in a wrong communication state when a call of a communication function is made from the communication device, and if the communication device is in the wrong communication state, prohibiting the communication function from being performed by the communication device after the call is finished.
Apparatus for controlling signal-transmission power, mobile station, method of controlling signal-transmission power, and program
The peak-index calculator calculates a peak index as an indication of PAR in accordance with gain factors β of channels. The coefficient selector includes a lookup table storing therein fitting coefficients X and Y each categorized in accordance with a combination of β, and selects coefficients X and Y each having a value determined in accordance with a combination of the gain factors β. The power-reduction calculator calculates a reduction in maximum signal-transmission power in accordance with both the peak index and the selected coefficients X and Y. The TXAGC calculator controls maximum signal-transmission power in accordance with the calculated reduction.
System condition based adaptive reference power offset positioning
Within a cell area, an RBS typically provides communication services to UEs. During operation, the UE adjusts its transmission power according to a transmission parameter value such as the E-TFCI. The RBS provides a predetermined number of reference points for E-TFCI that covers the limited range. For any intermediate values not specifically provided, the UE calculates the SIR through interpolation. The RBS predicts a range of transmission power likely to be used by the UE and provides the reference points based on the prediction. The prediction is performed based on operational measurement.
Method and apparatus for providing power control of a wireless terminal
An approach is provided for power control. The sum of path gain relating to non-serving sectors is determined. Power spectrum density (PSD) is determined according to a power control scheme. A power level is set based on the power spectrum density (PSD).
Telephone messaging privacy
A user can select to automatically delete sent and received text messages from a phone, to avoid complications of another person having access to the phone reading stored messages.
Method for transmitting short messages
A method for transmitting short messages (5) in a telecommunications network (10) is proposed, which enables especially simple, convenient downloading of data fields (15, 20, 25, 30) of the short message (5) from a network operator (70). A notice is sent to a subscriber (60) of the telecommunications network (10) as a function of a short message (5) transmitted to the telecommunications network (10) for the subscriber (60). With the notice, data that include items of information about the makeup and/or content of the short message (5) are transmitted to the subscriber (60).
Device, method, and apparatus for offline discontinuous reception (DRX) processing in cellular systems
An apparatus and method for processing signals are disclosed. The apparatus may include a transceiver configured to receive a first paging signal during a first cycle, a memory, and a processor configured to store the received first paging signal in the memory, to switch the transceiver to an off state after the first paging signal is stored in the memory, and to process the stored first paging signal while the transceiver is in the off state.
Location service for wireless devices
A location service for wireless devices is described. In embodiments, a connection identifier is received that indicates a wireless device is linked to a communication node for wireless communication. Additional wireless devices are also linked to the communication node for wireless communication, and the additional wireless devices can each identify its geographic location. Location data is received from the additional wireless devices, where the location data indicates the respective geographic locations of the additional wireless devices. A location of the communication node can be determined from the location data that is received from the additional wireless devices, and a current location can then be assigned to the wireless device based on the determined location of the communication node.
Determining and providing locations of communication devices in proximity to wireless access points
Systems, methods, apparatus and software have been discovered for use by individual users to monitor the geographic location of other people or assets with some relationship to the user. Once some manner of location information is determined, users have the ability to describe that location in various ways and control how that information is shared with other users.
A method of tracking a first wireless communications device using another computing device, such as a second wireless communications device, includes obtaining current position data for the first wireless communications device and obtaining one or more of speed data, time data, and path data for the first wireless communications device. The first wireless device then transmits the current position data and at least one of the speed data, time data and path data to the second wireless communications device or other computing device. In addition to current position data, the speed, path and time data facilitate tracking of the first wireless communications device. When a first mobile user wants a second mobile user to follow him, the first mobile user can put his device in “follow me” (tracking) mode. This is particularly useful when the first and second mobile users are traveling in respective cars or other vehicles.
Methods and systems for providing dynamic bandwidth adaptation in wireless systems
A method is provided for altering a channel bandwidth in a wireless system, wherein the method comprises sending to a wireless device a report request message comprising an indicator of an ability to change the channel bandwidth from a first channel bandwidth to a second channel bandwidth, receiving at an access node a report response message from the wireless device, wherein the report response message comprises a channel condition for the wireless device, and changing the channel bandwidth from the first channel bandwidth to the second channel bandwidth based upon the channel condition.
Method and apparatus for scheduling assignment of uplink packet transmission in mobile telecommunication system
Methods and apparatus are provided for communication between a User Equipment (UE) and a Node B in a communication system. The UE generates a Media Access Control-Protocol Data Unit (MAC-PDU) including scheduling information having information representing an amount of packet data to be transmitted. The MAC-PDU including the scheduling information is transmitted to the Node B. The information representing the amount of packet data exists per priority queue.
Base band pool device, and method for implementing base band data switch thereof
A baseband pool device includes a control unit, and a plurality of baseband processing units which are connected one another. The control unit is configured to determine one or more baseband processing units participating in data processing according to a size of data received by the baseband pool device and baseband data processing capabilities of various baseband processing unit, and allocate an identifier of the baseband data to be processed to each baseband processing unit participating in the data processing to construct a data allocation relationship, and respectively transmit the data allocation relationship to the baseband processing units participating in the data processing. The baseband processing units receive the data allocation relationship; and, process the received data according to the data allocation relationship, or transmit the received data to other baseband processing units of the baseband pool device, or receive data processed and then forwarded by other baseband processing units. A method for implementing baseband data distributed switch is also provided. The present invention increases the baseband processing capacity and reduces the cost.
Channel partitioning for wireless local area networks
The present application discloses, inter alia, a system for improving the aggregate throughput of a wireless local area network which includes: at least one access point that is equipped with at least one transceiver configured to simultaneously transmit and receive at multiple frequencies using multiple channels; and the access point being configured to acquire channel conditions of users and to pool sets of users on the channels based on the channel conditions.
Method for transmitting data and transmitter
A method for transmitting data includes using a plurality of time slots of a physical channel for transmission of the data, the plurality of time slots being grouped into at least a first time slot group and a second time slot group, transmitting data items of the data being associated with a first priority using time slots of the first time slot group, and transmitting data items of the data being associated with a second priority using time slots of the second time slot group.
Distributed scheduling coordination for plural service areas
An apparatus (20) is associated with a telecommunications node (N) which serves a service area (S) which belongs to one set of plural sets of service areas comprising a network. The apparatus (20) divides a time resource for the node into plural phases in coordinated manner with other service areas. The apparatus (20) further generates a schedule for transmission/reception of user traffic for wireless terminals served by the node for plural consecutive phases. The schedule is generated so that during the plural consecutive phases the node can transmit and receive scheduled user traffic before receiving in the plural consecutive phases scheduling information from another node which serves another set of service areas.
Method and procedures for automatic calibration of a wireless communications system simulation
A method of automatic calibration in which the simulation adapts itself to more closely resemble the actual network is provided. For a given network architecture and a probabilistic customer usage profile a simulation provides an estimate of key performance metrics. These simulated metrics are compared against actual measurements from the network. To the extent that they do not match within a prescribed tolerance, an iterative adaptive calibration procedure is used to perturb slightly the probabilistic model of network usage.
Computing an action time for allocation of resources to a mobile station that is handing over from a source to a target base station
To perform a handover of a mobile station from a source base station to a target base station, the source base station determines a delay of a connection between the source base station and the target base station. The source base station computes an action time taking into account the determined delay, the action time specifying a time when the target base station is able to allocate resources to the mobile station for the handover.
Cell selection based on priority factors in overlapping cells using different frequencies
A wireless communication system includes: at least one base station that forms a plurality of cells of different frequencies such that the cells partially or completely overlap with each other; and a terminal that is capable of recognizing the cells of the different frequencies. The base station determines priority factors of the different frequencies of the cells, and transmits the priority factors to the terminal that has set a cell formed by the base station as a serving cell. The terminal receives the priority factors from the base station forming the serving cell, and selects a cell to be set as the serving cell next from among the cells based on the priority factors.
Method for switching operating carrier at a user equipment in wireless communication system
According to one embodiment, a method for switching operating carrier at a user equipment (UE) includes receiving a message including a carrier index of a target carrier for a current primary carrier change from a base station. The message further includes action time information indicating a start time in which the mobile station switches from the current primary carrier to the target carrier. The UE may switch from a current operating carrier to the indicated target carrier based on the received action time information and the carrier index of the target carrier.
System and method for non-contention based handover based on pre-reserved target cell uplink allocations in communication systems
In accordance with aspects of the present invention, a method, apparatus and system for non-contention based handover based on pre-reserved target cell uplink allocations in communication systems. In one embodiment, the apparatus includes a transceiver (760) configured to communicate with a source base station and a data processor (750) coupled to the transceiver (760). The data processor (750) is configured to produce a measurement report based on a signal received from the source base station, initiate transmission of the measurement report to the source base station, process a handover command received from the source base station, and enable transmission of access bursts to a target base station in a reserved window of time on an uplink shared channel.
Client device method and apparatus for routing a call
A telecommunication method, server and system that route an outbound telephone communication initiated by a wireless remote device through an enterprise communication network. The system also routes an incoming call to a device associated with an enterprise communication network to a plurality of telephony devices including wireless devices and other remote devices.
System and method for automatically setting environment of user terminal
A system for automatically setting an environment of a user terminal includes a space and context-aware device for sensing a space and a context using a plurality of sensors, defining environment setting information corresponding to the sensed space and context, and sending the defined environment setting information to a user terminal, thereby requesting environment setting or release. Further, the system for automatically setting an environment of a user terminal includes a user terminal for changing environment setting mode while communicating with the space and context-aware device and automatically changing to a status corresponding to the environment setting information when the environment setting information is received.
Devices for congestion control
The embodiments herein relate to a method in a transceiver (110) for permitting access to a cellular communications system (100). The transceiver (110) is configured to transmit traffic to a communication node (101,120). The transceiver (110) receives a permission message from the communication node (101,120). The permission message indicates permission to a group of transceivers to transmit an access request message indicating a request to transmit the traffic to the communication node (101, 120). The transceiver (110) determines whether the transceiver (110) is comprised in the group of transceivers having permission to transmit the access request message based on the received permission message.
Use of IMSI during femtocell registration to avoid identifier conflicts
A method and system is disclosed for including an IMSI in an EVDO access request. When an access terminal determines that any access request it makes will be sent to a micro-type base station, the access terminal will include its IMSI in any EVDO access request. When a micro-type base station receives an EVDO access request containing an IMSI of the requesting access terminal, the micro-type base station will use the included IMSI to establish and identify a data connection to a PDSN.
System and method for managing events associated with the detection of wireless devices
The disclosed embodiments provide a system and method for managing events associated with the detection of wireless devices. The disclosed embodiments utilize a residential wireless access point for detecting the signal transmitted by a wireless device. A user configures a wireless device detection program to perform specified events in response to the detection and/or absence of a wireless device. The disclosed embodiments may provide home automation functions, home security functions, and/or provide child monitoring features.
Method, apparatus, and computer program product for signaling allocation of neighbor cells
A method, user equipment, network device, and software product employ indicators from a plurality of respective cells to indicate a difference, if any, regarding allocation in the respective cell as compared to neighbor cells. Mobility measurements are then performed according to the indicators, and also on the basis of configuration of a cell where the measurements are performed.
Apparatus and method for storing hand over information
An apparatus for storing handover information in a mobile communication system is provided. The apparatus includes an estimation unit configured to estimate a direction of arrival (DOA) of a received signal with respect to a first base station based on the received signal, the received signal being received from a terminal belonging to the first base station, and a storage unit to store the estimated DOA as handover information associated with a second base station when the terminal is handed over to the second base station.
Preventing roaming of a home subscriber in a visited network restricted for roaming
At present, there are operators which perform a Location Update procedure for a subscriber via Local Number Server under invoice agreement with the subscriber himself, and even where the subscriber is roaming in an area without roaming agreement with the subscriber's operator. In this situation, the subscriber's operator loses revenues because it has no roaming agreements with the operator where the subscriber is roaming, whilst the latter gets revenues from the subscriber by using the subscriber's operator Subscriber Identity Module or newer operator's card. To avoid this situation, there is provided a home location server arranged to determine whether roaming restrictions apply for a home subscriber before providing authentication data for said home subscriber and either deny the authentication data for the home subscriber to the requesting entity or apply a charging or billing for the provision of the authentication data for said home subscriber.
Systems and method for frequency based satellite channel scanning
A satellite signal demodulator is configured to use frequency-based channel scanning to sense the presence of a channel and to obtain the frequency profile of the channel. Once the channel is identified and the profile is obtained, channel extraction is used to identify the frequency parameters for a given channel. A coarse parameter estimation is performed to obtain a coarse estimate of the symbol rate (SR) and the center frequency (fc) of the channel. The coarse estimation can then be followed by a fine estimation of the symbol rate and center frequency (fc), using a bit tracking loop (BTL) lock indicator.
Network coverage by cycling through beam shape coverage configurations
Technologies and implementations for providing network coverage by cycling through beam shape coverage configurations are generally disclosed.
Interaction analysis and prioritization of mobile content
In embodiments of the present invention improved capabilities are described for receiving interaction information relating to a first mobile communication facility, weighting content based at least in part on the interaction information, and ordering the content for presentation on a second mobile communication facility based at least in part on the weighting.
Method and process for activating a telematics device without a pre-activated MDN
The described principles provide a method and system for circumventing the use of live MDNs and nongeographic prefixes in new vehicle-hosted telematics devices, while allowing the purchaser/user convenient use of the vehicle-hosted telematics device. The telematics unit is programmed or configured from the manufacturer with the same parameters as a cancelled or deactivated unit, with a cleared number for re-acquisition. A geographically specific MIN/MDN is later programmed into the device based on one or more preset locational and other VDU triggers.
Mobile terminal device, computer executable program for exchanging personal information, and method and system for exchanging personal information
A mobile terminal device that has a short range wireless communications unit performing short range wireless communications. A personal information storage unit storing a set of simple personal information relevant to the user of the mobile terminal device and a set of contact information for the user attached to the set of simple personal information and inhibited from being displayed on a device receiving this information.
Mobile communication terminal having a direct dial function using call history and method for performing the function
A mobile communication terminal call history displays call distinguishing icons representing the types of calls performed with counterparts. The call types include sent and received voice calls, video calls, and messages. If a user selects one call distinguishing icon displayed on a mobile communication terminal's display unit, a voice call or a video call is sent to the counterpart or a screen on which a message can be written to the counterpart is displayed, according to the call type of the selected call distinguishing icon. The user can directly select a counterpart and the call type to be sent to the counterpart by selecting one of the call distinguishing icons displayed on the display unit. A desired call distinguishing icon can be selected by entering a command on a touch screen, a keypad, or by voice command.
System, method and computer program product for monitoring the filling in of remote forms
A system monitors the remote filling of forms. The system includes an electronic writing device that may detect form input data corresponding to a first predefined area and a second predefined area of a form. The system also includes a mobile station that may receive the form input data from the electronic device and send the form input data to a monitoring station. The mobile station may receive an error notification from the monitoring station when the form input data corresponding to the first predefined area is deficient, but may not receive an error notification when the form input data corresponding to the second predefined area is deficient. The mobile station may generate an output signal in response to receive an error notification.
Data communication system
A portable communication terminal transmits a request signal that requests voice data representing an email message, to a server apparatus when the portable communication terminal receives the email that has been sent to the portable communication terminal, and the portable communication terminal transmits the voice data received from the server apparatus, to an in-vehicle equipment. A server apparatus converts an email message that has been sent to a portable communication terminal, into voice data in response to a request signal received from the portable communication terminal, and the server apparatus returns the voice data to the portable communication terminal. The in-vehicle equipment detects a position of a portable communication terminal in a cabin, and the in-vehicle equipment outputs a voice message converted only from voice data representing an email message received by the portable communication terminal located in a specific position in the cabin, inside the cabin of the vehicle.
Position locating device and position determining system
A position locating device comprises a position determining unit for periodically determining the position of the device and storing position data in a memory. On activation of the device, a position transmitting unit periodically transmits a terminal identifier and position data, to a base station via a satellite. A power management unit controls the periodicity of the transmission by the position transmitting means. A position determining system includes the position determining device and a base station for receiving the terminal identifier and position data and relaying the information to a first responder.
Using electronic surveillance data as event triggers for lawful location tracking
A system and method to automatically provide a location estimate of a mobile station in communication with a mobile wireless network to an appropriate law enforcement agency in response to detecting an electronic surveillance event within a mobile wireless network. A surveillance location server extracts pertinent information from a surveillance event message and sends a request for a location estimate to network components that generate and return the location estimate. The surveillance location server forwards to the location estimate to an appropriate law enforcement agency.
Automated alert generation in response to a predetermined communication on a telecommunication device
A cell phone software application that automatically informs a person's ICE contacts when their cell phone has made an emergency 911 call. Also included are systems for sending the GPS location of the cell phone to both the emergency service responders and to the ICE contacts. Personal medical information can also be transmitted automatically to the emergency service when the emergency call has been made. A system for disabling the alerting of the person's ICE contacts is also included such that the cell phone user is free to make emergency calls on behalf of other people.
Commerical mobile alert system interface
A system and method for facilitating the distribution of emergency alert messages to electronic devices via a communications network, such as a commercial mobile wireless network. The system includes a commercial mobile service provider (CMSP) gateway that is in communication with an alert gateway and the communications network. The CMSP gateway has a commercial mobile alert system (CMAS) interface, such as an application programming interface (API), that is configured to receive an emergency alert message from the alert gateway. The emergency alert message includes elements that have been mapped from a corresponding emergency alert message that was issued by an alert initiator. The CMAS interface is further configured to process the emergency alert message into a format suitable for distribution to electronic devices that are in communication with the communications network. The emergency alert message is then distributed to the appropriate electronic devices via the communications network.
Wireless device, method of operation and computer program
A wireless device has two or more radio systems and SIM channels. At least a part of the first radio system can be shut down to reduce the power consumed by the device. This occurs if the first radio system is unable to obtain suitable service for the first SIM channel and the second radio system is at least one of (i) providing at least some service on the second SIM channel for the device, and (ii) capable of searching for service for the first radio system.
Dual polarization transmission system, dual polarization transmission method, reception apparatus, transmission apparatus, reception method, and transmission method
A receiving device of a dual polarization transmission system includes: a receiver that receives an RF signal that is transmitted with the use of two orthogonal polarizations; two reception local oscillators that include PPL circuits to convert the received RF signal of each of the polarizations into an IF signal; and a demodulator that demodulates an IF signal of one polarization, which is obtained by the conversion, into a baseband signal. The reception local oscillators control a loop band of the PLL circuits in response to a signal from the demodulator.
System and method for dynamic cell searching
Systems and methods for signal detection are dynamic cell searching are disclosed. In one embodiment, the period according to which a channel is monitored is dynamically adjusted according to a condition of an electronic device. In another embodiment, between a first and second monitoring of a channel of a first cell, the amount of time searching for an second cell is dynamically adjusted according to a charging condition of an electronic device.
AM transmitter and modulation method using same
An AM (Amplitude-Modulated) transmitter capable of improving modulation distortion is provided. An adder adds a modulation signal to a pre-set power reference signal. An APC (Automatic Power Control) amplifier compares a level of a detecting signal outputted by the LPF (Low Pass Filter) with a level of an adder signal. The APC amplifier, based on the comparison result, generates a gain controlling signal that makes a difference between a level of the detecting signal and level of the signal approach zero and feeds the gain controlling signal to a power amplifier. The power amplifier modulates the signal outputted from the amplifier by the gain controlling signal and power-amplifies the modulated signal according to a level of the gain controlling signal. Since the APC amplifier feeds the gain controlling signal to the power amplifier, a modulation degree does not depend on a nonlinear distortion characteristic of the power amplifier.
Frequency generator and gain calibration technique for two-point modulation in a phase-locked loop
A frequency generator includes a phase-locked loop (PLL) and a voltage controlled oscillator (VCO), where the VCO is arranged to receive low-pass data via a first input and high-pass data at a second input. The first input is coupled to a first set of varactors in the VCO. The second input is coupled to a second set of varactors in the VCO. A controller sets the input voltage at the first input and directs a charge pump to operate in a tri-state mode that opens the feedback loop of the PLL. The controller applies different voltages via the second input and measures the change in output frequency. A present gain of the VCO is determined from the ratio of the change in frequency and the change in voltage at the second input and is used to calibrate a portable transceiver.
System and method to enable resource partitioning in wireless networks
Systems and methodologies are described that facilitate improved resource partitioning and interference management in a wireless communication system. Techniques are described herein for the transmission and use of various types of signaling, such as Access Request commands, Reverse Link Special Resource Utilization Message (R-SRUM) signaling, Forward Link Special Resource Utilization Message (F-SRUM) signaling, and the like, for managing interference associated with range extension, restricted association networks, and other jamming scenarios. As described herein, downlink resource coordination and interference management are accomplished through the use of Access Request or R-SRUM signaling conducted in a unicast or broadcast fashion, and uplink resource coordination and interference management are accomplished through the use of F-SRUM signaling. As further described herein, a clean communication channel such as a Low Reuse Preamble (LRP) channel can be utilized for interference management signaling and/or leveraged for determining timing of various signaling messages.
Method for establishing a wireless communication link
A wireless communication link between two communication devices is established. A communication signal for contacting a second communication device is emitted from a first communication device. The communication signal is a first type of wireless data communication. Communications that are configured to transmit and receive data according to a second type of data communication are activated in the first communication device. Upon receipt of the communication signal, communications that are able to transmit and receive data according to the second type of data communication are activated in the second communication device, and the communication link according to the second type of data communication is established.
Method and system for multi-stage device filtering in a bluetooth low energy device
A Bluetooth low energy (BLE) device receives advertising packets from an advertising BLE device. The BLE device filters the received advertising packets utilizing hardware to search for the advertiser. If the advertiser is not found by the hardware, the packet filtering continues utilizing firmware. Device identity information, comprising non-private and/or private device identities, of preferred BLE devices is partitioned to form a different white list for the hardware, firmware, and host, respectively, to concurrently support privacy and white listing. If the advertiser is found by the hardware, the hardware sends a response to the advertiser following a successful CRC check performed in the hardware. If the advertiser is found by the firmware, the device identity information of the advertiser is inserted in the white list for the hardware. The host may be awakened based on the device configuration and/or attribute type information of the received advertising packets.
Enhanced notification mechanism for broadcast networks using bit-map vectors
Methods, apparatus, systems and computer program products are defined for enhancing the delivery of overhead notifications in a broadcast network, in particular a broadcast network suitable for wireless device implementation. The broadcast-receiving devices only receive new notification messages, as opposed to receiving all of the currently active notification messages. This is achieved by broadcasting a listing of the currently active notifications versions and having the devices compare the currently active notification versions to the locally stored version(s) to determine which version or versions require capturing. In those aspects in which the broadcast-receiving device is a battery powered wireless device, battery power consumption is minimized because the device only captures active notification messages not currently in device memory, as opposed to all of the currently active notifications.
Method and apparatus to provide machine-assisted training
A method and an apparatus to provide machine-assisted training have been disclosed. In one embodiment, the method includes monitoring action performed by a trainee during machine-assisted training and dynamically adjusting the machine-assisted training in response to the trainee's action. Other embodiments have been claimed and described.
Method of correcting curl of sheet and recording apparatus
In a first step, a sheet is conveyed in a direction, whereby a leading end portion of the sheet is fed to a position between a decurl roller and a decurl pinch roller, which are in positions spaced apart from each other. In a second step, the leading end portion of the sheet is curved and held by causing the decurl pinch roller to come close to or press against the decurl roller. In a third step, the leading end portion of the sheet is withdrawn from between the decurl roller and the decurl pinch roller by conveying the sheet in a direction opposed to the conveying direction. After executing the first to third steps, the sheet is conveyed in the conveying direction through the first step while the sheet is curved by the decurl roller.
Printing medium feeding apparatus and image forming apparatus having the same
A printing medium feeding apparatus includes a feeding part which feeds a printing medium, and a printing medium aligning roller part which aligns a leading edge of the printing medium fed from the feeding part and transfers the aligned printing medium to an image forming part which forms an image on the printing medium, wherein the printing medium aligning roller part comprises a pair of rollers which transfer the printing medium to the image forming part, and an aligning shutter which is rotationally coupled to at least one of the pair of rollers, which rotates when the leading edge of the printing medium contacts the aligning shutter with a pressure greater than a reference pressure in a reference direction and guides the leading edge of the printing medium fed from the feeding part toward the reference direction.
Fixing device and image forming apparatus including the same
A fixing device includes a heating rotating member that generates heat by induction heating; an induction coil that generates magnetic flux for induction heating; and a magnetic member core section forming a magnetic path and including a first core section, a second core section, a magnetic flux shielding member, and third core sections. The magnetic flux shielding member is disposed at a side of an end portion of the first core section opposite to the second core section and separated from the end portion, and disposed at a position that is separated from the outer surface of the heating rotating member by a separation distance. The third core sections are disposed at a side of the magnetic flux shielding member facing the end portion of the first core section. At least one of the third core sections is movable to a first position and to a second position.
Belt driving unit and image forming apparatus
Provided is a belt driving unit including a plurality of rollers including a driving roller; an endless belt stretched round the rollers; a driving unit that conveys the endless belt by driving the driving roller; a control unit that controls the driving of the driving roller; and a detection unit that detects the position of the endless belt in a widthwise direction perpendicular to the conveying direction of the endless belt. The driving roller includes a first driving roller and a second driving roller. A direction in which the first driving roller forwards the endless belt and a direction in which the second driving roller forwards the endless belt are nonparallel. The control unit controls the position of the endless belt in the widthwise direction by driving the first driving roller and the second driving roller at different speeds on the basis of the detection result of the detection unit.
Developing device, image forming apparatus, and process cartridge
A developing system includes a first developer carrier to carry and supply two-component developer including toner and carrier to a latent image formed on an image bearer. A first magnetic field generator having plural first magnetic poles is rotatably installed in the first developer carrier and causes the two-component developer to put forth ears and conveys the two-component developer on the developer carrier. A cross-sectional center of the first magnetic field generator is deviated from that of the first developer carrier toward the image bearer by a prescribed length. A developer peel-off device including a second magnetic field generator is provided in the vicinity of the surface of the first developer carrier to peel off the developer not supplied to the image bearer and remaining on the surface of the first developer carrier.
Developer unit for an image forming apparatus
A developer unit for an image forming apparatus is provided. The image forming apparatus includes a developer device having a developer agent carrier and a developer agent supplier, a developer agent container arranged in an upper position with respect to the developer device, and a curved wall, which separates the developer device from the developer agent container; is curved toward the developer agent container; and is formed to have a feeding opening and a collecting opening, and a conveyer, which is arranged along the developer agent supplier and conveys the developer agent toward the collecting opening. The curved wall is arranged to be in proximity to the conveyer and to fit with outlines of the conveyer.
Toner cartridge with shutter opening/closing and image forming apparatus using the same
A toner cartridge includes a toner containing section which contains a toner therein; a toner discharging unit which is disposed in one side of the toner containing section and has a toner discharging port; a screw member which is disposed inside the toner containing section and transports a toner inside the toner containing section to the toner discharging unit; a bearing member which holds an end of the screw member; a rotary shutter which is disposed in the toner discharging unit to be rotatable about a rotation axial line of the screw member and has a circular-arc-shaped cross-section; and a shutter opening and closing mechanism which opens the rotary shutter in conjunction with rotation of the screw member.
Toner cartridge having shutter that selectively opens and closes toner-supply hole of the toner cartridge
A developer cartridge includes a casing, which accommodates a developer and is formed with an opening through which the developer is discharged. A shutter is movable between a first position to close the opening and a second position to open the opening. A first engaging part is movable between an advanced position and a retracted position. The first engaging part at the advance position allows the shutter to move between the first and second positions, and the first engaging part at the retracted position prevents the shutter from moving between the first and second positions. A maintaining member maintains the first engaging part at the retracted position in a condition where the shutter is at the first position.
Developing device, image forming apparatus, developer agitating and conveying method
A developing device includes a developer tank and a developing roller. An internal space of the developer tank is divided into an upper conveying path, a lower conveying path, a communication path, a main pumping conveying path section, and a developer supply path, by a partition wall. A developer pumping conveying section conveys a developer inside the main pumping conveying path section in a conveyance direction Z, and includes an inner spiral blade, a rotational tube, a first outer spiral blade, a second outer spiral blade, a pumping rotation shaft member, and a pumping gear. An attracting magnet is located in a position horizontally spaced from the rotational tube.
Image forming apparatus
An image forming apparatus includes a corona charger having an opening, a shutter configured to open and close the opening of the corona charger, a humidity sensor configured to detect humidity, and a control unit configured to control the so that time from ending an image forming process to closing the opening using the shutter is reduced when the humidity detected by the humidity sensor increases.
Image forming apparatus
An image forming apparatus includes: a recording medium cassette storing recording medium; an image forming unit, a feed unit; an upper frame that supports the image forming unit and the feed unit; and a lower frame in which the recording medium cassette is detachably attached, the upper frame being disposed on the lower frame, and the lower frame having rigidity lower than the rigidity of the upper frame, the lower frame including a rail for guiding the recording medium cassette to a predetermined receiving position, wherein the feed unit has a groove portion formed along a direction parallel to a horizontal direction, the recording medium cassette has a first convex portion which is fitted in the groove portion when the recording medium cassette is attached in the lower frame, the recording medium cassette having a second convex portion which is contact with a portion of the rail of the lower frame.
Image forming apparatus
An image forming apparatus includes a photosensitive body on which a visible image is developed by developer, an intermediate transfer belt to which developer of the photosensitive body is transferred, and a first transfer roller to transfer the developer from the photosensitive body to the intermediate transfer belt, wherein since a developing unit housing at which the photosensitive body is mounted is provided with position regulating guides to support a shaft of the first transfer roller, the intermediate transfer belt comes into contact with the photosensitive body at a uniform angle. As a result, uniform print quality may be obtained.
Toner box and developing device having the same
A toner box includes: a main body; a shutter; and a shutter cover. The main body is configured to accommodate toner therein and has a main-body-side communication through-hole, through which an interior and an exterior of the main body communicate. The shutter is disposed so as to be capable of moving between an open position in which the shutter opens the main-body-side communication through-hole, and a closed position in which the shutter closes the main-body-side communication through-hole. The shutter cover is configured to cover part of the shutter and that is elastically deformable.
Developing device having magnetic sealing member and image forming apparatus including the same
An embodiment of a developing device may include a housing, magnetic developer, and a developer bearing member. In some embodiments, the developer bearing member may include a magnet member. The magnet member may allow the developer to remain in the housing. A developer regulating member may be positioned proximate the developer bearing member and have one or more cut portions. In some embodiments, the cut portions may be positioned at each end of the developer regulating member in a surface facing the developer bearing member. The developer regulating member may regulate an amount of the developer held on the developer bearing member. A magnetic sealing member may extend along an outer peripheral surface of the developer bearing member at each end and may be positioned proximate the cut portion. In some embodiments, a portion of the magnetic sealing member may be positioned within the cut portion.
Image forming apparatus which controls setting of contrast potential
An image forming apparatus, which is capable of bringing an output density close to a target density even if a charge amount of toner particles changes, includes an image forming unit having an image carrier and a developing unit, a storage unit storing a saturation charge amount of toner particles, and a control unit. The control unit forms a patch image using the image forming unit, measures the density of the patch image to obtain a first potential that is a contrast potential corresponding to a target density, estimates the charge amount of the toner particles in the developing unit to obtain a first charge amount, obtains a second potential from the first potential, the first charge amount and the saturation charge amount, and sets the second potential as the contrast potential.
Toner cartridge with memory for image forming apparatus
An image forming apparatus mounted with a toner cartridge having a memory unit includes a toner cartridge which stores a plurality of control data depending on toner in the memory unit, an acquisition unit which selects one of the plurality of control data in the memory unit and acquires image formation-related information and a setting unit which sets image formation parameters on the basis of the image formation-related information.
Replacement printer cartridge chip with a microcontroller with an encrypted memory device
The invention is a replacement printed circuit board or chip that allows a printer to utilize a replacement printer cartridge. The printed circuit board has an encrypted memory device and a microcontroller, wherein the microcontroller is programmed to intercept the request from the printer for the unique lot number data and to provide the appropriate unique lot number data to the printer in response to the request. The encrypted memory device is programmed just like the custom original equipment manufacturer encrypted memory device, and, with the exception of providing the unique lot number data to the printer, communicates with the printer just as the original equipment manufacturer encrypted memory device would.
Job error correction in a multicolor electrophotographic print engine
A method and system for printing image documents using a variety of toners where some toners using a multi-development station having two or more development stations. These toners are co-printed prior to fixing, on the receiver by the multi-development station.
Method for setting power control initial value using indication light in visible light communications and transmission/receive apparatus using the same
Disclosed is a method for setting a power control initial value by using an indication light in visible light communications and a transmission/reception (Tx/Rx) apparatus using the method. The method includes the steps of: radiating multiple indication lights having power levels different from one another by a visible light communication transmitter; aligning a communication position simultaneously with measuring Received Signal Strength Indication (RSSI) of the indication light on detecting the indication light, selecting a power level whose RSSI is in a preset threshold range and which is adequate for transmission/receive among the multiple power levels different from one another, and informing the visible light communication transmitter of the adequate power level by a visible light communication receiver; and transmitting data from the visible light communication transmitter to the visible light communication receiver by using a transmitted power initial value according to a selected power level.
Apparatus and method for visible light communication
An apparatus for transmitting Visible Light Communication (VLC) data, in which a data processor processes data to be transmitted, a modulator modulates data received from the data processor into a signal for VLC, a light output unit outputs light of a predetermined color and includes in the light a signal of any selected one characteristic among signals of two different characteristics, and a light output controller selects at least one of the signals of different characteristics, and controls the light output unit so that a signal from the modulator is output through the signal of the selected characteristic.
Failsafe optical splitter and method to isolate faults in a passive optical network
An optical splitter for a passive optical network for telecommunication signal transmission with an optical line terminal includes a wavelength selective optical electrical converter, an AC/DC splitter, an energy reservoir and optical switches, where the splitter comprises also a data transmission processing module by which the optical switches can be controlled according to data signals transmitted from the optical line terminal.
Methods and systems for constructing optical networks
A branch-ring optical network and a technique for manufacturing a branch-ring optical network are disclosed. By connecting an outgoing optical conduit to a number of ports and one or more diffraction-grating based add/drop modules, and coupling the first distribution-node to at least one or more distribution-end-nodes having one or more diffraction-grating based add/drop modules, a branch-ring optical network that is easily constructed and maintained is formed.
Recording medium storing a text subtitle stream including a style segment and a plurality of presentation segments, method and apparatus for reproducing a text subtitle stream including a style segment and a plurality of presentation segments
A non-transitory computer readable recording medium and method and apparatus for reproducing and recording text subtitle streams including a style segment and presentation segments. The style segments define a region style, and each presentation segment contains a region subtitle associated with a region subtitle and presentation time information defining a presentation time of a corresponding presentation segment. The recording medium and method allow text subtitle streams to be more efficiently and effectively reproduced and recorded.
Data stream storage system
A device for recording at least part of a data stream including a recording module to record records divided among a plurality of segments, the records including a record for each instance of an event type of the data stream, each segment covering a range of the positions in the data stream such that different segments cover different ranges of positions in the stream, record the value of each instance, create a refresh region in each segment, the refresh region including data from the most recently recorded instance of each event type, create a plurality of links between the records to enable traversing the records in position order, and create an indexing table including an entry for each segment, the entry for each segment including the range of the positions covered by the records of the one segment. Related apparatus and method claims are also included.
Adaptable connection enclosure
An adaptable connection enclosure (ACE) is disclosed. The ACE can employ a number of different connector blocks thereby enhancing versatility to address a myriad of different connection scenarios. In aspects, the ACE can support coax, coax/fiber, coax/CAT5, fiber/CAT5, fiber or CAT5 connector blocks without altering the ACE housing. In accordance therewith, adapter plates can be employed to effect the interchangeability.
Graded index multimode optical fiber
A graded index multimode optical fiber (10) includes: a core (11) having an outside diameter of 45-65 μm; a first cladding (12) surrounding the core (11); a second cladding (13) surrounding the first cladding (12) and made of a material having a lower refractive index than the first cladding (12); and a third cladding (14) surrounding the second cladding (13) and made of a material having a higher refractive index than the second cladding (13). The ratio of the outside diameter of the first cladding (12) to the outside diameter of the core (11) is 1.15-1.25.
Unbalanced Mach-Zehnder interferometer and modulator based thereupon
There are provided an unbalanced Mach-Zehnder interferometer and a modulator based thereupon. The interferometer comprises a loop comprising a plurality of cascaded segments of polarization-maintaining fibers, into which an input signal is split such that two light portions of the split signal propagate concurrently in mutually opposite directions along the loop; and a first optical arrangement between a first and a second segment of the loop for rearranging the axes of propagation of the two light portions such that, on at least a one segment, the two light portions propagate along mutually orthogonal polarization axes of the polarization-maintaining fiber. The light portions are then recombined to mutually interfere. Birefringence of the segment(s) where the light portions propagate on mutually orthogonal polarization axes then provides a differential path length of the interferometer. An unbalanced Mach-Zehnder modulator is obtained by inserting a phase modulator within the loop.
Apparatus and method for image processing
An image processing apparatus for generating an enlarged image obtained by enlarging an original image. The image processing apparatus includes a change rate calculation unit which calculates a first pixel change rate at a first pixel position of the original image and a second pixel change rate at a second pixel position of the original image; and a pixel value calculation unit which calculates a pixel value at an interpolation position to be interpolated between the first pixel position and the second pixel position of the original image according to an enlargement of the original image, based on the first pixel change rate weighted by a first weight according to the interpolation position and the second pixel change rate weighted by a second weight according to the interpolation position.
Image processing device, image processing system, image processing method and image processing program
[PROBLEMS] In a system for converting a low resolution image to a high resolution image, it is difficult to carry out processing to generate a high resolution image for each frame in real time using temporally continuous frame images. [MEANS FOR SOLVING THE PROBLEMS] An image processing system includes a conversion parameter calculation unit 101, an initial image generation unit 102, a high resolution image generation unit 103, and an input image and conversion parameter storage unit 110, and converts the high resolution image generated at the previous frame in accordance with a current frame based on the conversion parameter for the current frame with respect to the previous frame so as to perform high resolution image generation processing of the current frame with the converted image as an initial value.
Imaging apparatus, data processing method, and program
An imaging apparatus includes: an orientation sensor that detects orientation representing the direction in which the imaging apparatus is oriented; a controller that produces data formed of a captured image and attribute information associated with the captured image and records the data in a recording section; and the recording section that stores a captured image and attribute information, wherein the controller successively records an entry in a memory, the entry relating orientation information calculated by successively receiving a value detected with the orientation sensor to a time stamp representing the time at which the detected value is inputted from the orientation sensor, extracts a plurality of entries having time stamps close to the time at which the image was captured from the entries recorded in the memory, and calculates orientation information representing the direction in which the image was captured by using the plurality of pieces of orientation information in the extracted entries.
Image processing apparatus and image processing method for correcting distortion in photographed image
An image processing apparatus including an image photographing unit, and a control unit, wherein the control unit includes a document image acquiring unit that acquires a document image including at least an image of a document, a contour extracting unit that extracts a contour of the document from the document image, the extracting the contour being performed based on luminance, a distortion position detecting unit that detects a contour straight line located at a location where a distance between the contour and a center point of a rectangle having the minimum area surrounding the contour is shortest, the contour straight line being detected as a distortion position in the document, the contour straight line being located on the contour, and a corrected image generating unit that performs a geometric correction on the document image to extend the contour to a correction reference line determined from the distortion position, and generates a corrected image having the distortion in the document image corrected.
Image processing apparatus combining plural sets of image data and method for controlling the same
An image processing apparatus that generates image data having a high dynamic range by combining a plurality of image data having different exposure amounts includes: an input unit configured to input a plurality of M-bit image data; a determining unit configured to determine reference image data serving as an exposure reference from among the plurality of input M-bit image data; a composition unit configured to combine the plurality of M-bit image data, and generate one N-bit composite image data (N>M); a characteristic parameter setting unit configured to set a characteristic parameter of tone compression on the N-bit composite image data such that a predetermined reference luminance in the reference image data does not change; and a generating unit configured to generate M-bit composite image data by compressing a luminance tone of an image component based on the set characteristic parameter.
Image processing apparatus, filter device, methods of controlling same and computer programs therefor
Provided are an image processing apparatus and method of controlling same for detecting, in pixel units, an edge that exists prior to encoding, thereby protecting an edge that exists prior to encoding and reducing noise produced by encoding. To accomplish this, the image processing apparatus compares a threshold value generated from quantization information of each pixel when decoding is performed, and the absolute values of differences between a pixel of interest and pixel peripherals thereto, detects, in pixel units, an edge that existed prior to encoding, and corrects only noise produced by encoding.
Data transform apparatus
This invention decreases the count of access to a memory which stores image data regarding orthogonal transform, and quickly generates orthogonal transform coefficients. An apparatus includes a storage unit which stores image data, a memory controller which reads each block from the storage unit, a first transforming unit which receives and orthogonally transforms the input block, and calculates only one DC component, a selector which selects and outputs one of the block read out via the memory controller, and data of DC components from the first transforming unit that are equal in number to pixels included in the block, a second transforming unit which orthogonally transforms data that have been output from the selector and are equal in number to pixels included in the block, and outputs either one DC component or a plurality of AC components, and a controller which controls the memory controller, selector, and second transforming unit.
Depthmap compression using a primitive
Systems and methods for compressing a depthmap are provided. In some aspects, a system includes an encoding module configured to group a plurality of pixels of a depthmap. Each grouped pixel of the depthmap includes a depth value and is associated with an optic ray aligned with a camera capturing the depthmap. Each of the plurality of depth values is within a predetermined offset from one another. The encoding module is further configured to generate a primitive based on the grouped plurality of pixels. The primitive includes an identification value. Each of the plurality of optic rays intersects a corresponding portion of the primitive. The encoding module is further configured to transform the depthmap based on the primitive. Each grouped pixel of the transformed depthmap includes the identification value. The system also includes a compression module configured to compress the transformed depthmap.
Systems and methods for compressing a depthmap are provided. In some aspects, a system includes an encoding module configured to determine a minimum value and a maximum value of a depthmap. The encoding module is further configured to normalize the depthmap based on the minimum value, the maximum value, and an encoding model. The normalized depthmap includes a scalar value for each pixel of the depthmap. The system also includes a compression module configured to compress the normalized depthmap.
Image transmission terminal
The present invention is an image transmission terminal including: an image capture unit (17, 47) that outputs pixel signals; an image data generating unit (18, 48) that generates and outputs image frame data; a first image data compression unit (19, 49) that compresses and outputs the image frame data; a second image data compression unit (21, 51) that either leaves the image frame data uncompressed or else compresses and outputs the image frame data; an image selection unit (11, 13, 41, 43) that receives an operation input from a user, and selects the image frame data; an image data storage unit (22, 38, 52, 69) that stores the image frame data output from the second image data compression unit; and an image transmission unit (20, 50, 38) that wirelessly transmits the image frame data.
Method and device for embedding a binary sequence in a compressed video stream
In a method of embedding a binary sequence in a video sequence or a compressed video stream, said stream being able to be decomposed into several types of objects, the method is applied to at least one image contained in said video sequence The method includes analyzing the video sequence in the compressed domain so as to determine one or more zones of interest, generating a watermarking map containing the image blocks available for the watermarking, excluding from the watermarking map, for the current compressed image, the blocks that are not eligible according to a defined criterion, and applying a digital watermarking function to each available block.
Three-dimensional (3D) object recognition system using region of interest geometric features
The present invention relates to a method for three-dimensional (3D) object recognition using region of interest geometric features. The method includes acts of receiving an implicit geometry representation regarding a three-dimensional (3D) object of interest. A region of interest (ROI) is centered on the implicit geometry representation such that there is at least one intersection area between the ROI and the implicit geometry representation. Object shape features are calculated that reflect a location of the ROI with respect to the implicit geometry representation. The object shape features are assembled into a feature vector. A classification confidence value is generated with respect to a particular object classification. Finally, the 3D object of interest is classified as a particular object upon the output of a statistical classifier reaching a predetermined threshold.
Objective picture quality measurement
To assess picture impairment due to the interpolation of output images from input images, for example in standards conversion, an output image detail measure is compared with an input image detail measure. One of the image detail measures is obtained by interpolation between image detail measures for at least two images.
Post processing for improved generation of intrinsic images
An automated, computerized method is provided for processing an image. The method comprises the steps of providing an image file depicting an image, in a computer memory, generating an intrinsic image corresponding to the image and modifying the intrinsic image as a function of a bi-illuminant, dichromatic reflection model.
System and method for providing multi resolution purple fringing detection and correction
A system, method, and computer program product for automatically detecting and correcting the “purple fringing” effect, typically due to axial chromatic aberration in imaging devices, are disclosed and claimed. A chromaticity score is computed, denoting the amount of false color related to a purple fringing artifact. A locality score is computed, denoting the similarity of the purple fringing region to a shape of a narrow ridge, which is typical for purple fringing artifacts. A saturation score is also computed, denoting the proximity of a pixel to saturated pixels. These scores are then combined into a detection score, denoting pixels having strong indications they share properties common to pixels of purple fringing artifacts. The detected pixels are then correspondingly corrected, e.g. by chroma suppression. The scoring and correction may be performed over combinations of image resolutions, e.g. an original version and potentially numerous downscaled versions.
Apparatus, method and computer-readable medium generating depth map
Disclosed are an apparatus, a method and a computer-readable medium automatically generating a depth map corresponding to each two-dimensional (2D) image in a video. The apparatus includes an image acquiring unit to acquire a plurality of 2D images that are temporally consecutive in an input video, a saliency map generator to generate at least one saliency map corresponding to a current 2D image among the plurality of 2D images based on a Human Visual Perception (HVP) model, a saliency-based depth map generator, a three-dimensional (3D) structure matching unit to calculate matching scores between the current 2D image and a plurality of 3D typical structures that are stored in advance, and to determine a 3D typical structure having a highest matching score among the plurality of 3D typical structures to be a 3D structure of the current 2D image, a matching-based depth map generator; a combined depth map generator to combine the saliency-based depth map and the matching-based depth map and to generate a combined depth map, and a spatial and temporal smoothing unit to spatially and temporally smooth the combined depth map.
Systems and methods for counting and processing pliable objects
Systems and methods for counting and processing pliable objects are disclosed. A vision system may capture an inspection image of a plurality of pliable objects. The inspection image may be partitioned into a plurality of windows traversing the inspection image. For each individual window of the plurality of windows, a blob extraction process is performed to determine a plurality of blobs corresponding to regions within the inspection image having substantially the second luminance value range such that the plurality of blobs correspond to the plurality of pliable objects. The blobs are counted for each window to determine a total number of pliable objects in the plurality of pliable objects.
Using optical character recognition augmented by an error correction code to detect serial numbers written on a wafer
A serial number detector is disclosed for detecting an encoded serial number written on a wafer. A scanner scans the wafer to generate a raster image representing the encoded serial number, and an optical character recognition (OCR) system detects a detected serial number comprising a plurality of detected data characters and a plurality of detected redundancy characters. A character-to-binary converter converts the detected data characters and the detected redundancy characters into codeword symbols. A syndrome generator generates a plurality of error syndromes in response to the codeword symbols, and an error corrector, responsive to the error syndromes, detects and corrects errors in the codeword symbols.
Systems and methods for analyzing dynamic dental occlusions and making dental appliances
Systems and methods for analyzing dynamic occlusion during replicated excursions of virtual three-dimensional representations of a dental patient's occlusal complex are provided. The method may include scanning a patient's jaws and teeth configuration using a medical imaging system such as CBCT, laser scanners, or traditional dental impressions; creating a virtual three-dimensional representation of the patient's occlusal complex; replicating excursions of the virtual three-dimensional representation of the patient's occlusal complex based at least on virtual inter-condylar angles and distances; determining acceptable occlusal contacts and/or malocclusions within the virtual three-dimensional representation of the patient's occlusal complex based at least in part on virtual dynamic occlusion during the replicated excursions, and determining at least one virtual dental appliance and/or orthodontic repositioning of one or more teeth based at least in part on the one or more acceptable occlusal contacts and/or malocclusions within the virtual three-dimensional representation of the patient's occlusal complex.
Digital subtraction angiography (DSA) motion compensated imaging system
A motion compensated digitally subtracted Angiography (DSA) image processing system includes an interface for acquiring a sequence of images of patient vessels both prior to and following introduction of contrast agent into the vessels. An image data processor automatically, (a) determines a first shift vector for a first image of the sequence for compensating for shift between the first image and a first reference image of the sequence, (b) applies the determined first shift vector to the first image of the sequence to produce a shifted image, (c) subtracts the first reference image from the shifted image to produce a subtracted image enhancing vessel structure, (d) determines a second shift vector for compensating for shift between the subtracted image and a second reference image and (e) shifts content of the subtracted image relative to the second reference image in response to the second shift vector, to provide a shifted subtracted image enhancing and aligning vessel structure.
Imaging resolution recovery techniques
One embodiment is a unique method employing an improved image resolution recovery technique. Another embodiment is a unique system implementing an improved image resolution recovery technique. A further embodiment is a method including obtaining a sinogram based upon a measurement of an imaging system, processing the sinogram using a smoothing or fitting technique, deconvolving a system response function of the imaging system from the sinogram to provide a deconvolved sinogram, and constructing an image based upon the deconvolved sinogram. Further embodiments, forms, objects, features, advantages, aspects, and benefits shall become apparent from the following description and drawings.
Displaying and navigating computer-aided detection results on a review workstation
Display and navigation for multiple computer-aided detection (CAD) detections is described. A medical image is displayed to a viewer, and a request is received to instantiate CAD-assisted viewing. A timewise presentation sequence for the CAD detections is automatically computed according to a predetermined sequencing criterion. For each CAD detection, an expanded presentation window is displayed for its associated location in the medical image, the expanded presentation windows being displayed according to the timewise presentation sequence. Also described is a navigational tool comprising a plot of an operating curve onto which a computed feature associated with the CAD algorithm can be mapped, the operating curve characterizing an application of the CAD algorithm to a reference database of mammographic cases having known diagnoses. The navigational tool further comprises a plurality of CAD pointer icons spatially distributed therealong according to mappings of the computed feature for the CAD detections onto the operating curve.
Endoscopic navigation method and endoscopic navigation system
An endoscopic navigation method includes the steps of: receiving an image from an endoscopic navigation system; performing image classification to determined whether the image is usable; performing a first image process on the image to filter out dark areas of the image to produce a first processed image; performing a first determination procedure to identify the dark areas of the first processed image; producing a first result image for indicating lumen direction; performing a second image process to filter out fold curves of the image to produce a second processed image when there is no dark area in the image; performing a second determination procedure to identify the fold curves of the second processed image; producing a second result image for indicating lumen direction according to the fold curves; and outputting the first or the second result image to a display device to assist users in operating the photographic device.
Methods and systems for grouping radiological images into event markers
Certain embodiments of the present invention provide a method for radiological imaging including: viewing a study, the study including a series of radiological images interfacing with the study to allow interaction with the radiological images of the study; selecting an image from the series of radiological images to form an event marker; and grouping with the selected image at least one other neighboring image within the series of radiological images to form an event, the event ranging over a plurality of images within the series. In an embodiment, the event includes at least one of: the selected image within the series and at least one subsequent neighboring image; the selected image and at least one previous neighboring image; and the selected image, at least one previous neighboring image, and at least one subsequent neighboring image.
Real-time remote image capture system
Systems for remotely verifying the identity of an image include an identity capture device adapted to communicate with a computing device and a database. The identity capture device captures an image, and the computing device searches the database for information to authenticate and verify the image. For remotely connected computing devices, a communications network provides communication between the computing devices and the database. Other systems and methods are also provided.