Method for examining a measurement object, and apparatus
The invention relates to a method for examining a measurement object (2, 12), in which the measurement object (2, 12) is examined by means of scanning probe microscopy using a measurement probe (10) of a scanning probe measurement device, and in which at least one subsection (1) of the measurement object (2, 12) is optically examined by an optical measurement system in an observation region associated with the optical measurement system, wherein a displacement of the at least one subsection (1) of the measurement object (2, 12) out of the observation region which is brought about by the examination by means of scanning probe microscopy is corrected in such a way that the at least one displaced subsection (1) of the measurement object (2, 12) is arranged back in the observation region by means of a readjustment device which processes data signals that characterize the displacement.
Privileged document identification and classification system
A litigation discovery document system is provided to help identify documents that might be privileged. In particular, a system is described in which documents within a document set are compared against one or more data sources which store data that indicate whether a particular document is privileged or potentially privileged. Human reviewers can confirm whether such determinations are accurate. Analytic reports can be provided which characterize the underlying methodology used to make such determinations. Related apparatus, systems, techniques and articles are also described.
System and method for user to verify a network resource address is trusted
A system, method and computer program product for a user to verify that a network resource address is trusted. At least one entity registration is stored at a server. Each entity registration comprises an identity of an entity and entity addressing information associated with the identity of the entity. The existence of at least one entity whose identity is included in the at least one entity registration is confirmed. A query comprising a target addressing information is received from a client. If the target addressing information matches the entity addressing information, the identity of the entity associated with the entity addressing information is determined and a result comprising the identity of the entity associated with the entity addressing information matching the target addressing information is transmitted to the client. If no entity addressing information matches the target addressing information, an indication of such is transmitted to the client.
Proxy gateway anti-virus method, pre-classifier, and proxy gateway
The present invention discloses a proxy gateway anti-virus method, a pre-classifier, and a proxy gateway. The method includes: receiving a resource obtaining request for obtaining a to-be-transmitted resource; sending a pre-detection request to a network element that stores the to-be-transmitted resource, to obtain attribute information of the to-be-transmitted resource; judging, based on an anti-virus policy and according to the attribute information, whether the to-be-transmitted resource needs anti-virus scanning; if yes, performing anti-virus scanning on the to-be-transmitted resource that is subsequently obtained; and if no, transparently transmitting the to-be-transmitted resource that is subsequently obtained. The present invention provides a technical solution to pre-detecting whether a to-be-transmitted resource needs anti-virus scanning according to attribute information, and a resource that needs no anti-virus scanning can be transmitted transparently and directly before the resource is sent to a proxy layer, thereby implementing an anti-virus function, improving transmission efficiency, and reducing the waste of resources.
System and method for detecting malware by transforming objects and analyzing different views of objects
A method in one example implementation includes generating a plurality of transformed views of an object in a network environment and generating a plurality of filtered information sets. The method further includes detecting a suspect correlation based on an analysis of at least some of the plurality of transformed views and of at least some of the plurality of filtered information sets. In a more specific embodiment, the analysis includes an original view of the object. Other more specific embodiments include applying filters to selected views of the object, where each of the filters is associated with a different obfuscation type. Applying the filters includes transforming obfuscation elements in the plurality of transformed views, where the object contains the one or more obfuscation elements.
System and method for securing wireless transmissions
A system and method for securing wireless transmissions is provided. A method for transmitting secure messages by a transmitter includes encoding a message with a secrecy code to produce L output codewords, where L is an integer value greater than one. The secrecy code includes a first security code and a second security code. The method also includes transmitting one of the L output codewords to a communications device when a channel quality of a channel between the transmitter and the communications device satisfies a criterion, and repeating the transmitting for any remaining L−1 output codewords.
Alert passwords for detecting password attacks on systems
Detecting attacks on secured computer resources, including gathering user security data for a user having a user password protecting resources on a computer system; generating an alert password that is easier to crack than the user password; and deploying the alert password on the computer system for use in detecting password attacks on the protected resources. Generating an alert password that is easier to crack than the user password in some embodiment further comprises: generating an alert password having a cracking difficulty; attempting to crack the alert password and the user password until one cracks; and if the user password cracks first, repeatedly carrying out the following steps so long as the user password continues to crack first: generating an alert password having a reduced cracking difficulty; and attempting to crack both the alert password having a reduced cracking difficulty and the user password until one cracks.
Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway device. The data packets constitute at least a part of a file being addressed to a client machine coupled to the gateway device. The gateway device forwards an identification of the file to a remote datacenter in parallel with forwarding the data packets to the client machine. The datacenter performs signature matching on the identification and returns a result of the signature matching to the gateway device. The gateway device determining whether to block the file from the client machine based on the result of the signature matching from the datacenter.
System and method for spammer host detection from network flow data profiles
A system and method for spammer host detection from network flow data profiles comprises constructing one or more cluster profiles and detecting spammer hosts. Construction cluster profiles comprises observing network flow data from one or more hosts; for each host, representing the network flow data associated with the host as a multidimensional vector; clustering the vectors of the hosts into the plurality of cluster profiles; annotating each cluster profile using at least one of black lists and white lists; and calculating a confidence in each cluster profile annotation. Detecting spammer hosts comprises observing the network flow data from a new host; representing the network flow data associated with the new host as a multidimensional vector, and placing the new multidimensional vector of the new host into one cluster profile of the one or more cluster profiles.
Techniques for identifying suspicious applications using requested permissions
Techniques for identifying suspicious applications are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for identifying suspicious applications comprising determining one or more clusters of applications in an identified category of applications based on requested permissions of each of two or more applications in each of the one or more clusters of applications, determining a center application of each of the one or more clusters, and determining, using at least one computer processor, a similarity score for an application being evaluated based at least in part on a distance between the application being evaluated and the center application of a closest cluster of the one or more clusters.
Clock roll forward detection
Method and apparatus to detect clock roll-forward attacks in a computing device or similar system. This protects against hackers who tamper with the system clock of, for instance, a digital media playback device in order to access a content item which has been rented for a limited time. By detecting clock roll-forward tampering, the present method and system prevent such hackers from accessing the content item outside its authorized rental time period.
Instant message scanning
A method, system, computer program product, and/or a computer readable medium of instructions for detecting a malicious message for an instant messaging service. In one form, the method comprises: receiving a message in a first processing system; analyzing the message to determine if the message is malicious; and in response to detecting that the message is malicious, restricting the message from threatening: the first processing system; and a second processing system in data communication with the first processing system. In another form, the method comprises receiving, in a first processing system, input data indicative of an instruction to transfer a message to a second processing system; analyzing the message to be transferred to determine if the message is malicious; and in response to detecting that the message is malicious, restricting the message from being transferred to the second processing system.
Method and apparatus to authenticate a user to a mobile device using mnemonic based digital signatures
A user device comprising a processor configured to enable a mnemonic based digital signature scheme for user authentication that is based on a combination of one or more secrets and one or more actions implemented on the user device and associated with the secrets, and a device input system coupled to the processor and configured to detect the actions implemented on the user device. Also disclosed is an apparatus comprising a processor configured to implement a mnemonic based digital signature for authenticating a user, a device input system configured to enable the mnemonic based digital signature, and a memory unit configured to store input data that is used to recognize the mnemonic based digital signature, wherein the mnemonic based digital signature comprises a secret, an action associated with the secret and implemented using the device input system, and a cue associated with the action.
Systems and methods for detecting undesirable network traffic content
A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received electronic data, sending the checksum value to a processing station, the processing station being a second host that is different from the first host, and receiving a result from the processing station, the result indicating whether the electronic data is associated with a content desired to be detected. A method of detecting a content desired to be detected includes receiving electronic data at a receiving station, and determining whether the received electronic data is associated with a content desired to be detected, wherein the receiving station does not include content detection data for identifying the content desired to be detected.
Virtual private network node information processing method, relevant device and system
A Virtual Private Network (VPN) node information processing method and a VPN node information processing device are provided, in which the method comprises: receiving an access request message sent by a node, in which the access request message at least carries authentication information, a current real Internet Protocol (IP) address, a node name and information indicating whether to accept extranet connection of the node; allocating a virtual IP address for the node when the authentication information of the node is correct; and registering the current real IP address, the node name, the information indicating whether to accept the extranet connection, and the virtual IP address of the node as registration information. Through the method and the device, when a node is added into a VPN, configuration of other nodes does not need to be adjusted.
Method and trusted service manager for providing fast and secure access to applications on an IC card
A method for providing fast and secure access to MIFARE applications installed in a MIFARE memory being configured as a MIFARE Classic card or an emulated MIFARE Classic memory, comprises: keeping a repository of MIFARE memories and user identifications assigned to said MIFARE memories as well as of all MIFARE applications installed in the MIFARE memories, wherein, when a new MIFARE application is to be installed in a MIFARE memory identified by a user identification the present memory allocation of said MIFARE memory is retrieved, an appropriate sector of said MIFARE memory is calculated, a key is calculated for said MIFARE application and the MIFARE application together with the assigned sector and key are linked to the user identification and are stored in the repository.
Unified access control system and method for composed services in a distributed environment
A system, a computer device implemented method, and a computer readable article of manufacture for executing a computer implemented method for a unified access control for a plurality of composed services in a distributed computing environment without requiring repeated input of security certification. The method includes the steps of: acquiring a first role of a user in a first composed service; sending an invoking request by a processing unit of the first composed service to a second composed service; receiving the first role of the user in the first composed service and predefined role-role mapping relationships, and determining a second role of the user in the second composed service by a role determining component; and then sending the determined role in the second composed service by a role sending component to the second composed service, thereby providing unified access without requiring repeated input of security certification.
Computer based method and system for registering a user at a server computer system
The invention provides a method for registering a user at a server computer system. A first interface is transmitted from the server computer system to a user computer system, the first interface having a field for entering a mobile telephone number. A mobile phone number entered into the field for the mobile phone number is received from the user computer system at the server computer system. A password is generated and transmitting from the server computer system to a mobile device having a mobile phone number corresponding to the mobile phone number received from the user computer system and a second interface is transmitted from the server computer system to the user computer system, the second interface including a field for entering the password. A follow-up message is transmitted from the server computer system to the mobile device if the password is not received from the user computer system at the server computer system within a predetermined period of time.
Full spectrum cyber identification determination process
A full spectrum cyber identification determination process for accurately and reliably determining and reporting any identification determination from a full spectrum of possible cyber identification determinations.Utilizing cyber resources and predetermined criteria for providing cyber identification determinations for at least one unidentified subject of an observation, the process:provides identification determinations for any possible subject of an observation;provides for the utilization of any selected attainable level of accuracy, up to, and including 100% accuracy;provides for single, intermittent, and constant identification determinations;utilizes any available cyber resources;interacts with utilized cyber resources to provide any possible function and/or observation;recognizes characteristics from observations and then utilizes recognized characteristics for comparing and/or determining;provides and utilizes a standard set of designations for representing all aspects of the process;utilizes useful information and/or outcomes from comparing for making identification determinations; and,reports on any aspect of the process at any time.
Authenticated home directory
Methods and systems for home directory management are described. In one embodiment, a computing system receives a user login request, and in response, bind mounts a temporary directory on a local file system of the computing system. The temporary directory does not require authentication. The computing system prompts the user for user credentials and authenticate the user using the user credentials. In response to a successful authentication, the computing system mounts a non-native directory in the temporary directory.
Systems and methods for establishing cloud-based instances with independent permissions
A method and system for facilitating management of cloud-based service instances, the system including one or more computing systems configured to communicate with at least one multi-tenant computing cloud, and configured to establish a cloud-based service instance hosted in the multi-tenant computing cloud and an access entity with permissions to access the established cloud-based service instance. The system can receive a request for the cloud-based service instance, the request authenticated as originating from a requestor; consult a set of access controls associated with the cloud-based service instance; determine, responsive to the consulting, if the request is allowable by the requestor; and enable, responsive to determining that the request is allowable by the requestor, the requestor to complete the request using a restricted access credential associated with the access entity.
Digital content authentication system, image display apparatus applied to the same, and digital content authentication controlling method of the same
A digital content authentication system, an image display apparatus applied to the system, and a digital content authentication controlling method of the system are provided. The image display apparatus includes an interface section which demands authentication results from a plurality of source providing apparatuses through a bus and receiving responses to the demanding for the authentication result and an output section outputting the authentication results by the received response. Accordingly, the image display apparatus can recognize the authentication states of the source providing apparatuses.
Monitoring method and device
The method of the invention comprises: a step of receiving a message (M1) sent by a user (T-B) of the first network, said message containing an access rule authorizing a user of a second network to access at least one multimedia content, said content being indexed with a content server (MS-B2) of the first network; a step of sending a first notification message (M2) to a trusted entity (PFS) managing the interface between the first network (NW-B) and the second network (NW-A), the first notification message (M2) containing a remote access rule (RAD) authorizing said user of the second network to access multimedia contents belonging to said user of the first network; and a step of commanding a gateway (HGW-B) of the first network (NW-B) by means of a local access rule configuring said gateway, such that said gateway transmits a catalog of contents to which said user of the second network is authorized to access on reception of an access request relating to said catalog coming from said user of the second network via said trusted entity (PFS).
User sensitive filtering of network application layer
In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of a different node in the network and an authenticated user ID of a user of the different node. Resource profile data is retrieved based on the user ID. The resource profile data indicates all application layer resources on the network that the user is allowed to access. The particular network address is associated at the local node with the resource profile data for the user. A request from the particular network address for a requested application layer resource on the network is blocked based on the resource profile data associated with the particular network address.
Systems and methods for validating ownership of deduplicated data
A computer-implemented method for validating ownership of deduplicated data may include (1) identifying a request from a remote client to store a data object in a data store that already includes an instance of the data object, (2) in response to the request, verifying that the remote client possesses the data object by (i) issuing a randomized challenge to the remote client, the randomized challenge including a random value which, when combined with at least a portion of the data object, produces an authentication token demonstrating possession of the data object and, in response to the randomized challenge, (ii) receiving the authentication token from the remote client; and, in response to receiving the authentication token from the remote client, (3) storing the data object in the data store on behalf of the remote client. Various other methods and systems are also disclosed.
Remote control of dialysis machines
This disclosure relates to remote control of dialysis machines. In certain aspects, a method includes receiving a request for a network connection from a dialysis machine and establishing the network connection with the dialysis machine. The method also includes receiving, from a client device, a request to access the dialysis machine, authorizing the client device to access the dialysis machine, receiving, from the dialysis machine, information pertaining to an operation of the dialysis machine, and providing, to the client device, the received information.
Access control utilizing indirect authentication
Techniques are provided for granting authorization to restricted content on a display device from an authorizing device. In one embodiment, the display device may operate in a display mode where only unrestricted content is accessible. To access restricted content, the display device may transmit an authorization request signal to the authorizing device. The authorizing device, having received the authorization request, prompts an authorized user to enter an authentication input, such as a password or gesture, on the authorizing device. Upon verification of the authentication input, the authorizing device is authenticated. An authorization signal is transmitted to the display device, and the display device may operate in an authorized mode, having access to otherwise restricted content or functions.
Grouping multiple network addresses of a subscriber into a single communication session
An apparatus includes a processor, an interface, and a memory. The interface is operable to receive a request from a subscriber to access network services, wherein the request includes a subscriber address from the set comprising: an IP address and a media access control (MAC) address. The processor is operable to generate a query requesting an address associated with the subscriber address. The interface is further operable to communicate the query to the subscriber address, and receive a response to the query, wherein the response includes an address associated with the subscriber address, wherein the associated address is from the set comprising: an IP address and a MAC address. The memory is operable to store the subscriber address and the received associated address.
Method and apparatus for secure authorization
A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.
Key storage and retrieval in a breakout component at the edge of a mobile data network
Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. These services may require the use of keys. Keys are stored and retrieved from a non-volatile key storage in a way that assures subsystems that need the keys have access to the keys. The keys retrieved from the non-volatile key storage are stored in a shared memory in the requesting subsystem, which allows any applications that requires access to the keys to directly access the keys in the shared memory.
Distance-modified security and content sharing
In one aspect of the invention, a system for sharing resources in an ad-hoc peer-to-peer network is presented. The ad-hoc peer-to-peer network includes a host device that is associated with a resource. A security application of the host device allows the user of the host device to share the resource with other devices in the network. The security application also allows the user to establish access policies for certain known devices within the network. An access policy established for a known device specifies what rights the known device has with respect to accessing the resource. The access policy has the characteristics of inheritance. Thus, when a device requests to access the resource, the security application of the host device determines an access policy for the device based on access policies of one or more of the known devices.
Airport security system
A method, apparatus, and system for managing network security at an airport. A threat level for the airport is identified. A number of policies for a network data processing system is identified at the airport based on the threat level identified for the airport in response to identifying the threat level for the airport. Enforcement of the number of policies is initiated in the network data processing system.
Systems and methods for evaluating a password policy
Systems, methods and articles of manufacture for evaluating a password policy are disclosed. The password evaluation system receives password policy data regarding a password policy, including a password constraint. The system analyzes the password policy data to determine a usability index and a password strength index for the password policy, and also determines a usability index and password strength index for a plurality of modified password policies having password constraints different from the password policy. The system then provides a graphical representation of the usability index and the password strength for the password policy and the modified password policies, thereby allowing a password designer to optimize the tradeoffs between usability and security of a password policy.
System and method for enforcing role membership removal requirements
System and method for enforcing role membership removal requirements are described. In one embodiment, the method includes, responsive to receipt of a removal request, performing a role evaluation of the removal request to generate a policy request; performing a policy evaluation of the policy request; generating a policy response in accordance with the policy evaluation; and enforcing the policy response.
Apparatus and method for managing set top boxes
A system that incorporates teachings of the present disclosure may include, for example, a set top box having a controller to eliminate a scheduled recording of a targeted media program, where the scheduled recording is a redundant recording of the targeted media program that is determined based upon monitoring of recordings of media programs by a group of set top boxes in communication with each other over a network, where another set top box of the group of set top boxes is designated as a host set top box to record the targeted media program, and where the controller is provided access to the targeted media program by the host set top box. Other embodiments are disclosed.
System and method for content transmission network selection
A content transmission selection system is disclosed. The content transmission selection system receives requests from viewers for specific video content items. Using characteristics of the designated content item, the content transmission selection system determines whether to transmit the content item over a broadcast network or a broadband network.
Video compression system and method for reducing the effects of packet loss over a communication channel
A system and method are described below for reducing the effects of packet loss in a video communication system. For example, one embodiment of a computer-implemented method comprises: logically subdividing each of a sequence of images of a video stream into a plurality of tiles, each of the tiles having a defined position within each of the sequence of images; and packing the tiles into a plurality of data packets to maximize the number of tiles which are aligned with boundaries of each of the data packets; and transmitting the data packets containing the tiles over a communication channel from a server to a client.
Fast channel change on a bandwidth constrained network
In one embodiment, a buffering server transfers a dynamic burst transfer of data encoded using an inter-coded compression technique. The dynamic burst transfer is timed so that an initial transfer rate is reduced to a remaining transfer rate at the same time or before a decoding endpoint joins a corresponding data stream. The decoding endpoint merges the video stream and the dynamic burst transfer to decode and quickly reconstruct a displayable video frame.
System and method to create a media content summary based on viewer annotations
A computer implemented method includes receiving, at a media server, a request from a first viewer to create a media content server including select segments of media content for display at a display device. The computer implemented method includes accessing a media content analyzer generated based on viewer annotation data associated with media content. The viewer annotation data is received from viewers other than the first viewer. The computer implemented method includes identifying segments of the media content using the media content analyzer. The computer implemented method includes selecting at least one segment of the identified segments of the media content for inclusion in a media content summary. The computer implemented method includes sending the media content summary including the at least one selected segment of the media content to the display device.
Method and apparatus for managing broadcast for portable terminal
A method and an apparatus for managing a broadcast for a portable terminal receiving supplementary information related to the broadcast are provided. The method includes tuning a broadcasting receiver of the portable terminal to a frequency from among a plurality of frequencies of a broadcasting channel, receiving, by the broadcasting receiver, a broadcasting signal on the tuned frequency, determining whether a moving speed of the portable terminal is equal to or more than a predetermined speed when a broadcasting receiver is tuned to the frequency and is receiving a broadcasting signal, measuring a field strength of the received broadcasting signal when the moving speed of the portable terminal is equal to or greater than the predetermined speed, and controlling the broadcasting receiver to be tuned to another frequency in order to receive the broadcasting signal of the broadcasting channel when the measured field strength is less than a predetermined threshold.
Systems and methods of processing programming wish list data
Systems and methods to process program wish list data are provided. A system includes a media receiver adapted to receive media content from a media distribution system and a recording module responsive to the media receiver. The system also includes a program guide module to receive a published program guide identifying media content available to be distributed via the media distribution system. The system further includes a wish list module to generate wish list data including identifying information associated with at least one program. The at least one program is not listed in the published program guide when the wish list data is generated. The system also includes a reporting module to report information related to the wish list data to a remote network element.
Meta channel based media system control technology
Meta-channels identify content entries and indicate an order with which to experience the content entries. The meta-channels may include a multi-source meta-channel that includes at least a first content entry that relates to first content broadcast by a first content provider at a specific time and a second content entry that relates to second content made available, over a network, by a second content provider in response to user requests. A selection of a meta-channel is received and the selection of the meta-channel is mapped to a content entry defined by the selected meta-channel. A media system is controlled to render content based on a content entry mapped to by the selected meta-channel.
Meta channel based media system control technology
Meta-channels identify content entries and indicate an order with which to experience the content entries. The meta-channels may include a multi-source meta-channel that includes at least a first content entry that relates to first content broadcast by a first content provider at a specific time and a second content entry that relates to second content made available, over a network, by a second content provider in response to user requests. A selection of a meta-channel is received and the selection of the meta-channel is mapped to a content entry defined by the selected meta-channel. A media system is controlled to render content based on a content entry mapped to by the selected meta-channel.
Method of providing user interface in data broadcasting receiver
A method of providing a user interface in a data broadcasting receiver is provided. The method of providing a user interface in a data broadcasting receiver comprises selecting one of a plurality of search factor information transmitted together with video information through data broadcasting and displaying selection options for selecting one of a plurality of video information comprising a part of the video information corresponding to the selected search factor. Therefore, the user can simply search for various information while viewing a movie, a TV program, a sports, etc provided through data broadcasting.
Method and system for advertising based on the content of selected channels or broadcasted programs
An advertisement is selected based on a demographic profile that is determined based on a second set of categories of broadcasted programs. The second set is a set to which a category from a first set of categories of broadcasted programs has been added in response to either a selecting of the category from the first set, or a broadcasted program viewing device being tuned, for a period of time at least equal to a first predetermined threshold, to at least one broadcasted program predetermined to be in the category from the first set. The advertisement may be displayed with an interactive programming guide.
System and method to obtain content and generate modified content based on a time limited content consumption state
Methods and systems to obtain content and generate modified content based on a time limited content consumption information is disclosed. In one embodiment, content may be obtained from a content source and modified based on the time limited content consumption information. In one embodiment, such modified content is stored in a memory of a content modification system and subsequently delivered to a target consumer.
Targeted advertisement based on face clustering for time-varying video
A method and apparatus for providing targeted advertisements is provided herein. In particular, targeted advertisements are provided to users based on face clustering for time-varying video. During operation video is continuously obtained of users of the system. Users' faces are detected and measured. Measurements of users' faces are then clustered. Once the clusters are available, advertisements are targeted at clusters rather than individual users.
Deploy anywhere framework for heterogeneous mobile application development
A system, method, and computer program product are provided for developing a portable software application. The method includes the steps of defining a project, adding a screen to the project, the screen being defined as a generic screen or a platform-specific screen, adding a component to the screen, the component being defined as a generic component or a platform-specific component, redefining the screen as a platform-specific screen when it is defined as a generic screen and one or more platform-specific components have been added to the screen, and defining an application flow from the screen to one or more additional screens.
Event handling system
A service that determines what event has occurred and provide a list of actions that the service can be performed in order to help the user through a hectic time period is disclosed. In one example, one or more modules can identify one or more events and transmitting an indication of the at least one event to a mobile device. Then, one or more modules can receive an indication that a mobile device has selected at least one of the at least one event, and determine at least one action to perform, wherein the at least one action can be associated with the at least one selected event.
System and method for interprocess communication in electronic devices
In an electronic device, a method of enabling a first application to employ an action/data handler of a second application includes registering the handler of the second application, receiving an incoming request for the handler from the first application, matching the handler in the request to the handler registered by the second application, delivering the request to the second application for execution and returning a result of execution to the first application. An electronic device comprises an operating system supporting i) an application layer that includes one or more applications having action/data type handlers. The electronic device also includes ii) an exchange manager interfacing with the application layer to provide a central location for registry of the handlers of the one or more applications, and iii) transports coupled to the application layer and exchange manager and adapted to receive incoming requests to employ the handlers of the one or more applications.
Reply queue management
A method, system, and medium are provided for optimizing assignment of threads to queues within a messaging-middleware environment. Embodiments of the present invention evaluate the number of threads assigned to each individual queue and then assign a new thread to an appropriate queue based on current thread assignments. Different rules may be used to assign threads depending on the number of threads assigned to each queue. For example, initially any queue with less than a low threshold amount of active threads may be assigned threads until the low threshold is met. A different assignment methodology may be used once the low threshold is met. For example, once the low threshold is met, active queues having more than the low threshold, but less than a high threshold, may be assigned threads in a round robin fashion.
Graphical programming system enabling data sharing from a producer to a consumer via a memory buffer
A graphical program execution environment that facilitates communication between a producer program and a consumer program is disclosed. The producer program may store data in a memory block allocated by the producer program. A graphical program may communicate with the producer program to obtain a reference to the memory block. The graphical program may asynchronously pass the reference to the consumer program, e.g., may pass the reference without blocking or waiting while the consumer program accesses the data in the memory block. After the consumer program is finished accessing the data, the consumer program may asynchronously notify the graphical program execution environment to release the memory block. The graphical program execution environment may then notify the producer program that the block of memory is no longer in use so that the producer program can de-allocate or re-use the memory block.
System and method for maximizing data processing throughput via application load adaptive scheduling and context switching
The invention enables dynamic, software application load adaptive optimization of data processing capacity allocation on a shared processing hardware among a set of application software programs sharing said hardware. The invented techniques allow multiple application software programs to execute in parallel on a shared CPU, with application ready-to-execute status adaptive scheduling of CPU cycles and context switching between applications done in hardware logic, without a need for system software involvement. The invented data processing system hardware dynamically optimizes allocation of its processing timeslots among a number of concurrently running processing software applications, in a manner adaptive to realtime processing loads of the applications, without using the CPU capacity for any non-user overhead tasks. The invention thereby achieves continuously maximized data processing throughput for variable-load processing applications, while ensuring that any given application gets at least its entitled share of the processing system capacity whenever so demanded.
System for adaptive lot sizing in cellular manufacturing for balancing workloads across multiple cells using split-then-merge operations and earliest completion route algorithm
The present application presents a new and improved system and method of enhanced Lean Document Production (LDP), which employs cellular manufacturing concepts. The LDP process incorporates an auto-splitting algorithm and/or an earliest completion route algorithm to generate an operation schedule.
Scheduling scheme for load/store operations
A method and apparatus are provided to control the order of execution of load and store operations. Also provided is a computer readable storage device encoded with data for adapting a manufacturing facility to create the apparatus. One embodiment of the method includes determining whether a first group, comprising at least one or more instructions, is to be selected from a scheduling queue of a processor for execution using either a first execution mode or a second execution mode. The method also includes, responsive to determining that the first group is to be selected for execution using the second execution mode, preventing selection of the first group until a second group, comprising at least one or more instructions, that entered the scheduling queue prior to the first group is selected for execution.
Business event processing
Techniques for business event processing are presented. Methods and apparatuses disclosed herein may operate to receiving a request to perform an operation on a listing previously published by an online marketplace; to identify at least one additional listing having certain characteristics in common with the listing from a plurality of previously published listings including the listing; and to automatically perform the operation on the at least one additional listing. The operation may include performing an inventory check on the at least one additional listing.
Providing virtual machine high-availability and fault tolerance via solid-state backup drives
The present invention is directed to a virtualization system using a solid-state drive for disaster recovery.
Measuring CPU utilization in a cloud computing infrastructure by artificially executing a bursting application on a virtual machine
Novel techniques are provided to determine concurrent hardware resource usage as expressed in activity performed by hardware processors. A cloud computing consumer can verify the level of the quality of service provided by the physical infrastructure of a cloud, thereby allowing the consumer the ability to request a transfer of the hosting physical infrastructure to a less burdened physical machine.
Migrating a virtual machine that owns a resource such as a hardware device
A computing device has first and second virtual machines (VMs) and a resource assigned to the first VM. Each access request for the resource is forwarded thereto until the first VM is to be saved or migrated. Thereafter, each access request is forwarded to a holding queue. When the resource has acted upon all access requests forwarded thereto, the resource is reassigned to the second VM, and each access request at the holding queue is forwarded to the second VM and then the resource. Thus, all access requests for the resource are acted upon by the resource even after the resource is removed from the first VM and assigned to the second VM, and the save or migrate of the first VM can thereafter be completed.
Fixed-function consumer-electronics device providing general-computing functions with virtual machines
A universal appliance combines the benefits of a fixed-function CE device with the generality of a PC. The universal appliance includes a host environment for supporting fixed functions and virtual machines that can provide general computing capabilities (e.g., a Windows® OS). The user can select fixed functions and virtual machines for operation on the universal appliance. In some implementations, software environments, including the fixed functions and virtual machines, can be delivered by a universal appliance service provider over a network or other communication medium. The software environments for fixed functions and virtual machines can also be delivered by a removable or portable medium (e.g., a USB flash drive, compact disk, media player, mobile phone). Twenty-four hour server functions can be provided with the universal appliance to allow for automatic data backup, remote access to personal data and an Internet telephone that can accept calls 24 hours a day.
Remote firmware upgrade device mapping
A networked firmware management system is operable to manage firmware in one or more target devices by receiving one or more firmware target specifications from one or more target devices, the firmware target specifications each identifying a firmware target in the target device. The server stores the one or more received firmware target specification, associated with the one or more firmware targets in the target device. When the server receives a firmware update, the server matches a firmware attribute of the received firmware update against the one or more firmware target specifications stored in the server, and sends the received firmware update to any firmware targets in the target device having a firmware target specification that matches the received firmware update attribute.
Calendar aware adaptive patching of a computer program
Embodiments of the present invention provide a method, system and computer program product for calendar aware adaptive patching of a computer program. In an embodiment of the invention, a method for calendar aware adaptive patching of a computer program has been provided. The method includes selecting a patch for updating a computer program and accessing a calendar of events corresponding to an end user of the computer program. The method additionally includes restricting a time for installation of the patch according to events scheduled in the calendar of the identified end user. For instance, the installation of the patch can be restricted from a time from during which a meeting has been scheduled for the end user or from a time during which a presentation has been scheduled for the end user and when the computer program is associated with presentation management.
Ensuring determinism during programmatic replay in a virtual machine
Aspects of an application program's execution which might be subject to non-determinism are performed in a deterministic manner while the application program's execution is being recorded in a virtual machine environment so that the application program's behavior, when played back in that virtual machine environment, will duplicate the behavior that the application program exhibited when originally executed and recorded. Techniques disclosed herein take advantage of the recognition that only minimal data needs to be recorded in relation to the execution of deterministic operations, which actually can be repeated “verbatim” during replay, and that more highly detailed data should be recorded only in relation to non-deterministic operations, so that those non-deterministic operations can be deterministically simulated (rather than attempting to re-execute those operations under circumstances where the outcome of the re-execution might differ) based on the detailed data during replay.
Generating a common symbol table for symbols of independent applications
A common symbol table is generated, which includes symbols of a plurality of independent applications. The symbols included in the common symbol table are common symbols of the applications. The bulky information associated with the common symbols are stored in the common symbol table, and stubs used to locate the common symbols are stored in local tables of the applications.
Systems and methods for automated support for repairing input model errors
Systems and associated methods for automated repair support for input model faults are described. Embodiments automate generation of fault repair support by producing one or more repair action suggestions for a given input model containing faults. Responsive to an indication of one or more faults within the model, embodiments utilize a fault index to ascertain the nature of faults within the model and to compile one or more repair action suggestions. Users can review the repair action suggestions, and preview the impact each of these suggestions will have on the model if implemented, and select an appropriate repair action for repairing a model containing faults.
Semantic intensity based decomposition of software systems
A computer-implemented technique for analysis of software, is carried out using a semantic intensity calculation module, a coupling calculation module, and a software decomposition module. Software elements are identified in a computer program code, and respective roles of the software elements established. With the semantic intensity calculation module respective semantic intensity metrics are calculated for the software elements according to the roles thereof. With the coupling calculation module semantic intensity metrics are calculated to determine coupling factors between different software elements. With the software decomposition module the software elements are organized into distinct software components according to the coupling factors therebetween. Then, an optimized computer program code is generated from the software components.
Detecting race conditions with a software transactional memory system
A dynamic race detection system is provided that detects race conditions in code that executes concurrently in a computer system. The dynamic race detection system uses a modified software transactional memory (STM) system to detect race conditions. A compiler converts portions of the code that are not configured to operate with the STM system into pseudo STM code that operates with the STM system. The dynamic race detection system detects race conditions in response to either a pseudo STM transaction in the pseudo STM code failing to validate when executed or an actual STM transaction failing to validate when executed because of conflict with a concurrent pseudo STM transaction.
Identification and translation of program code executable by a graphical processing unit (GPU)
A device receives program code, and receives size/type information associated with inputs to the program code. The device determines, prior to execution of the program code and based on the input size/type information, a portion of the program code that is executable by a graphical processing unit (GPU), and determines, prior to execution of the program code and based on the input size/type information, a portion of the program code that is executable by a central processing unit (CPU). The device compiles the GPU-executable portion of the program code to create a compiled GPU-executable portion of the program code, and compiles the CPU-executable portion of the program code to create a compiled CPU-executable portion of the program code. The device provides, to the GPU for execution, the compiled GPU-executable portion of the program code, and provides, to the CPU for execution, the compiled CPU-executable portion of the program code.
Dynamic optimization of mobile services
A method, system, and article of manufacture are disclosed for transforming a definition of a process for delivering a service on a specified computing device. This service process definition is comprised of computer readable code. The method comprises the steps of expressing a given set of assumptions in a computer readable code; and transforming the definition by using a processing unit to apply the assumptions to the definition of the process to change the way in which the process operates. The definition of the process may be transformed by using factors relating to the specific context in or for which the definition is executed. Also, the definition may be transformed by identifying, in a flow diagram for the process, flows to which the assumptions apply, and applying program rewriting techniques to those identified flows.
Node computation initialization technique for efficient parallelization of software analysis in a distributed computing environment
A method for verifying software includes determining an initialization path condition of a received software verification job, determining a termination path condition of a computing node, and initializing the execution of the received software verification job on the computing node based on the initialization path condition and the termination path condition. The initialization path condition includes a sequence of program predicates for reaching a starting state of software to be verified. The received software verification job includes an indication of a portion of the software to be verified. The termination path condition includes an indication of the last state reached during the execution of a previous software verification job on the computing node. The computing node is assigned to execute the received software verification job.
Universal causality graphs for bug detection in concurrent programs
A system and method for predictive analysis includes generating an execution trace on an instrumented version of source code for a multithreaded computer program. Interleavings which potentially lead to a violation in the program are statically generated by performing a static predictive analysis using a Universal Causality Graph (UCG) to generate alternative interleavings that might lead to an error. The UCG includes a unified happens-before model for the concurrent program and a property being analyzed. The interleavings are symbolically checked to determine errors in the program.
Systems and methods for debugging in a multiprocessor environment
A method, system and apparatus for debugging in a multiprocessor environment. The system includes a principal processor which remotely debugs target programs running on a plurality of different target processors. The different types of target processors differ with respect to their instruction sets. The principal processor debugs the target programs and is configured to provide a plurality of debugging instructions specific to each instruction set, determine the type of target processor executing a target program to be debugged, select among the debugging instructions specific to each instruction set based upon the identified type of target processor, and insert the selected debugging instructions into the target program.
System for managing lifecycles for virtual image assets
Lifecycles of virtual image assets are managed as follows. A set of assets including a set virtual image assets and a set of software bundle assets are analyzed. At least a portion of relationship data between one or more of the virtual image assets and one or more of the software bundle assets is determined. The at least a portion of relationship data is stored in a memory. At least one of one or more virtual image assets and one or more software bundle assets are determined to be associated with a set of changes. At least one virtual image asset that is related to the one or more virtual image assets and/or one or more software bundle assets associated with the set of changes is identified. The at least one virtual image asset that has been identified is updated based on the set of changes.
Method for updating data in accordance with rights management policy
Disclosed is a computerized system and method for dynamically applying a rights management policy to a message by allowing an administrator to associate certain rights management policies with certain senders and recipients of messages, with groups of users possessing certain common criteria which define the users and groups of users, with certain attributes of the message, and with certain environmental attributes. In some embodiments, an administrator is allowed to automatically update a rights management protected message as it passes through a message transfer agent. The administrator may determine either on a regular interval or an ad-hoc basis that the message transfer agent scan the messages stored to determine whether or not the content has expired. If the content has indeed expired the administrator may take steps to have the expired content deleted entirely, refreshed with more current content, or replaced with a tombstone indicating that the original content has expired.
Method for encapsulating components hierarchically composed functions
A method is provided for operating a first computer device, in which a source program code is generated which contains a functional model that is hierarchically composed of functions which are hierarchically composed of components, the visibility of the components within the functional model being determined by the hierarchy. Placeholders are used within the hierarchy for determined components and executable program code is generated, the placeholders being replaced by the determined components via a correspondingly executed mapping rule before executable program code is generated. This method allows the locality principle to be maintained, for example on experimental hardware.
Component composing apparatus and method using virtual components in component-based robot software development
A component composing apparatus using virtual components in component-based robot software development, includes a component repository configured to store a plurality of components having at least one port; and an application diagram generation unit configured to create an application diagram by selecting the components stored in the component repository. Further, the component composing apparatus includes an information repository configured to store the components within the application diagram and port information of the components within the application diagram and port connection information between the components within the application diagram; and a virtual component processing unit configured to create the virtual components for components selected by a user among the components within the application diagram.
Automating a governance process of optimizing a portfolio of services in a governed SOA
Modeling a governance process of optimizing a portfolio of services in a governed SOA and generating, in dependence upon the modeled governance process, one or more automation modules, each automation module including a module of computer program instructions that supports performance of one or more steps of the modeled governance process, where the modeled governance process includes determining whether a collection of service artifacts matches one or more service artifacts stored in a service registry; if no service artifacts stored in the service registry match the collection of service artifacts, initiating creation of a service in accordance with the collection of service artifacts; if one or more service artifacts stored in the service registry match the collection of service artifacts: selecting, in dependence upon predefined action selection criteria, a service administration action to perform; obtaining approval of the selected service administration action; and initiating the selected service administration action.
Physical on demand
A software system that performs the creation of compact discs (CDs) containing full product files (executables, binaries, etc.) is described. This system allows clients to produce, on demand, software CD's as required for purchases and avoid maintenance of stock of product. A method of providing software CD's also is described.
Aggregation of multiple headless computer entities into a single computer entity group
A group of headless computer entities is formed via a local area network connection by means of an aggregation service application, operated on a headless computer entity selected as a master entity, which propagates configuration settings for time zone, application settings, security settings and the like across individual slave computer entities within the group. A human operator can change configuration settings globally at group level via a user interface display on a conventional computer having a user console, which interacts with the master headless computer entity via a web administration interface. Addition and subtraction of computer entities from a group are handled by an aggregation service application, and interlocks and error checking is applied throughout the group to ensure that no changes to a slave computer entity are made, unless those changes conform to global configuration settings enforced by the master headless computer entity.
Method of performing circuit simulation and generating circuit layout
A method of generating a circuit layout of an integrated circuit includes generating layout geometry parameters for at least a predetermined portion of an original netlist of the integrated circuit. A consolidated netlist including information from the original netlist and the layout geometry parameters is generated. Then, the circuit layout is generated based on the consolidated netlist.
Method, system and software for accessing design rules and library of design features while designing semiconductor device layout
Provided is a system and method for designing the layout of integrated circuits or other semiconductor devices while directly accessing design rules and a library of design features by interfacing with a GUI upon which the design layout is displayed. The design rules may be directly linked to the design features of the pattern library and imported into the device layout. The design rules may be directly accessed while designing the layout or while conducting a design rule check and the design features from the pattern library may be used in creating the layout.
Producing electrical circuit patterns using multi-population transformation
A method for producing an electrical circuit includes providing a substrate having a first pattern of features and defining a second pattern comprising a net of interconnected circuit elements. Different respective transformation rules are specified for different ones of the circuit elements. The second pattern is modified by applying the respective transformation rules to the circuit elements so as to align the circuit elements with the features in the first pattern, and the modified second pattern is applied to the substrate.
Timing closure in chip design
Disclosed are a method and system for improving timing closure in chip design. The method comprises: identifying a critical timing path in a chip design pattern, wherein a timing window of the critical timing path is smaller than a predetermined timing window; determining a variation of each segment of the critical timing path, wherein the variation indicates uncertainty of delay of a device and/or a wire caused by one or more factors; and changing at least one segment of the critical timing path based on the variation of each segment of the critical timing path to enlarge the timing window of the critical timing path. The method and system may enlarge a timing window of a critical timing path by reducing the variation thereof, thereby achieving timing closure in the chip design pattern.
System and method of crossover determination in differential pair and bondwire pairs to minimize crosstalk
A system is provided for use with circuit layout design data having a set of differential pairs and a set of bond wire pairs. A layout portion can receive the circuit layout design data. A crosstalk calculating portion can determine a first amount of crosstalk in a circuit corresponding to the circuit layout design data. A modifier can modify the circuit layout design data into modified circuit layout design data such that one of the set of differential pairs and the set of bond wire pairs includes a crossover. The crosstalk calculating portion can further determine a second amount of crosstalk in a circuit corresponding to the modified circuit layout design data. An optimizer can compare the first amount of crosstalk with the second amount of crosstalk to generate optimized circuit layout design data. A layout designer can output the optimized circuit layout design data.
Method and system for utilizing hard and preferred rules for C-routing of electronic designs
An improved approach for implementing C-routing is described. Cost-based analysis is performed to balance the different rule requirements, to optimize the assignment of objects and nets during C-routing.
Implementation design support method and apparatus
The disclosed method includes: identifying a first reference component from among first components defined in a first constraint condition that is a reference designated from among constraint conditions regarding a position relationship between plural components on a printed circuit board; identifying a second reference component from among second components defined in a second constraint condition that is to be compared with the first constraint condition and included in the constraint conditions; and identifying a fourth component that is a component other than the second reference component among the second components and has a correspondence with a third component, based on position relationships with the third component and an attribute of the third component, wherein the third component is a component other than the first reference component among the first components.
Metal density aware signal routing
Methods and apparatus for routing signal paths in an integrated circuit. One or more signal routing paths for transferring signals of the integrated circuit may be determined. A dummy fill pattern for the integrated circuit may be determined based on the one or more metal density specifications and at least one design rule for reducing cross coupling capacitance between the dummy fill pattern and the routing paths. The signal routing paths and/or the dummy fill pattern may be incrementally optimized to meet one or more timing requirements of the integrated circuit.
System and process for automatic clock routing in an application specific integrated circuit
Embodiments of the claimed subject matter are directed to methods and a system that use a standardized grid of clock buffers to automatically route clocks according to a uniform clock grid throughout an ASIC of a non-uniform arrangement of non-uniformly sized logic partitions. According to one embodiment, clock sources and sinks are mapped to grid point locations and a novel grid routing process is performed to link them together. A clock routing macro is assigned to a corresponding partition and associated with the corresponding partition or logic unit according to a partition hierarchy. The underlying routing structure and resources of a clock routing macro are automatically renamed to correspond to the local partition in a script or schedule of programmed instructions, or a routing map. The position of blockages within a partition may also be detected and alternate routes for traversing the blockage may be preemptively determined as well.
Parasitic extraction for semiconductors
Parasitic extraction is a useful tool for analyzing and improving timing and other characteristics of semiconductor chips. Parasitic resistance and capacitance values are determined and stored in arrays. The parasitic values are extracted for multiple corners with a single analysis of the layout. Multi-corner analysis is performed using the parasitic values thereby optimizing the timing across various temperature and process operating points.
High-end fault-tolerant computer system and method for same
The present invention provides a high-end fault-tolerant computer system and an implementation method. The system includes N single junction prototype verification systems and M crossbar-switch interconnection router chipsets. Each crossbar-switch interconnection router chipset is used to achieve the interconnection among the N single junction prototype verification systems. Switching is not performed among all crossbar-switch interconnection router chipsets, and both M and N are positive integers greater than or equal to 2. The single junction includes: a computer board, which is 4-path tightly-coupled computer board, and a junction controller for controlling 2 paths of CPUs on the computer board. The present invention can effectively realize the global memories sharing, balance the system transmission bandwidth and delay, and solve the problem of the integration reliability of multi-path CPU system.
Register-transfer level (RTL) design checking for exploring simulation and/or synthesis mismatches and ambiguous language semantics using categorization
The present disclosure teaches a system and method for register-transfer level (RTL) design checking for exploring mismatches and ambiguous language semantics that occur during the simulation and synthesis phases of the circuit design. In particular, the present disclosure utilizes identified patterns of design violations that occur as a result of these mismatches to create rule objects. The rule objects are then used to identify circuit design violations relating to mismatches between designer intent and ambiguous language. The rule objects are also categorized into different categories so as aid in the analysis of design rule violations and to identify the major impacts to the design qualities and to provide a confidence level of the overall design quality.
Method, system, and computer program product for preparing multiple layers of semiconductor substrates for electronic designs
Disclosed is an improved method, system, and computer program product for preparing multiple levels of semiconductor substrates for three-dimensional IC integration. Some embodiments utilize the process and design models to check and fabricate the insulating dielectric layer (IDL) separating the first and the second film stacks on separate substrates and then prepare the surface of the IDL to receive an additional layer of semiconductor substrate for further fabrication of the chips. Yet some other embodiments further employ the design and process models to ensure the IDL and the semiconductor substrate are sufficiently flat, or are otherwise satisfactory, so the three-dimensional integrated circuits meet the reliability, manufacturability, yield, or performance requirements. Yet some other embodiments further employ design and process models to place the vias connecting the multiple film stacks.
Circuit design simulation
In one embodiment, a method is provided for processing a circuit design having first and second sets of ports configured to couple to respective first and second sets of ports of a device on a hardware platform. In a data-acquisition mode, the circuit design is simulated using a user-selectable plug-in that couples the ports of the circuit design to an interface circuit. During the simulation, the interface circuit communicates data between respective ports of the circuit design and ports of the device. In a deployment mode, the circuit design is implemented in the hardware platform, in which the first and second sets of ports of the circuit design are respectively coupled to the first and second sets of ports of the device.
Method for determining mask operation activities
A method and system arrangement for controlling and determining mask operation activities. Upon obtaining chip physical layout design data and running resolution enhancement technology on the chip physical layout design to generate mask features which may include any sub-resolution assist features, a placement sensitivity metric is determined for each of the generated mask features or edge fragments. In one alternative embodiment an edge placement sensitivity metric is determined for each edge of the generated mask features or edge fragments. The determined sensitivity metrics for each feature are classified and applied to subsequent mask operational activities such as post processing, write exposure and mask repair. The types of decisions based on the sensitivity metric may include minimizing or maximizing OPC processing; e-beam exposure adjustment in mask write; and selection of which mask features to repair as well as what repair criteria to then apply, and adjusting quality requirement criteria for manufacturing assessment.
Multi-input gesture control for a display screen
Improved multi-input gesture control for a display screen is enabled by using a first screen input to determine control operations that result from a second screen input that is followed by a gesture. A gesture that corresponds to a path traced on a display screen may define a new screen input or manipulate existing screen objects depending on some specific feature of the path or the entirety of the path.
System and method for allocating digital graffiti objects and canvasses
The subject specification provides a system, method, and computer readable storage medium directed towards allocating digital canvasses for digital graffiti. The specification discloses receiving data corresponding to digital graffiti formed from a gesture undergone by a device. The specification also discloses identifying a digital canvas corresponding to the digital graffiti as a function of the received data.
Method of reactive targeted advertising
In one inventive aspect, a method of reactive targeted advertising provides for display of advertising, via the internet, to computers of users. In a particular example, a plurality of keywords are stored in a memory. The method comprises determining whether one or more of those keywords are used in a web page, and for any keywords determined to be used, an advertisement is selected using those keywords. The advertisement is for display on the computer of the user who is accessing the web page. A request is received for the selected advertisement, and the advertisement is provided, from an advertising server and over the internet, for display on the computer of the user.
Methods and system for displaying pedigree charts on a touch device
The present invention discloses an air fan turbine positioned horizontally or vertically in close proximity to the exhaust fan system of air handler systems. These turbine units catch the exhausted air flow from the exhaust ports of these air handler units to drive the turbine blades which are attached to a generator. As the propellor blades spin, they generate electricity. Thus, the man made air flow known as exhaust from the air handler systems is used to produce electricity. This invention not only uses man made air flow, but also repositions the air turbine 90° from a horizontal position to a vertical position to receive wind air from the atmosphere. When the air handler unit is turned off, a signal is sent to mechanically move the air turbine to the vertical position to redirect itself to then catch natural wind airflow on both roof top and ground mounted units.
Adaptive UI regions for enterprise applications
An adaptive region system can include an adaptive region module and a display module. The adaptive region module can include a mini region button panel module capable of generating a mini region button panel having multiple mini region buttons, a view panel module capable of generating a view panel having multiple view buttons, and a region panel module capable of generating a region panel having multiple mini regions. The display module can visually display the mini region button panel, the view panel, and the region panel.
Method and system for a browser module
In general, the invention relates to a method for capturing information from a web site. The method includes accessing the web site using a browser with a browser module, where the web site comprises a number of web pages having information in a first format, and obtaining a profile corresponding to the web site, where the profile defines a manner to capture information in a first format from the web site. The method further includes capturing information, by the browser module, from at least one of the number of web pages based on the profile and sending the information captured by the browser module to a destination application, where the destination application is external to the browser and where the destination application is configured to use the information in a second format.
Methods and systems for generating a combined display of taskbar button group entries generated on a local machine and on a remote machine
The present disclosure features methods and systems for updating a taskbar, generated and displayed by a local computer, with a user interface element representative of a remote application executing on a remote computer and application output generated by the remote application. These methods and system include a local client receiving application output generated by a remote application and remote window configuration information, generating an application output window comprising local taskbar grouping configuration information, and updating a taskbar responsive to the local taskbar grouping configuration information.
Graphical user interface for a media-editing application with a segmented timeline
Some embodiments provide a computer readable medium storing a media editing application for creating multimedia presentations. The application includes a graphical user interface (GUI). The GUI includes a composite display area for displaying a portion of a timeline to which multimedia clips are assigned to create a composite media presentation. The timeline is divided into user-defined segments. The GUI includes an outline window for displaying a list of selectable items representing the user-defined segments, the selectable items for use in applying various operations to the user-modifiable segments. In some embodiments, the various operations include operations to insert a new segment into the timeline, to merge at least two segments into one segment, to hide a particular segment from view, to focus on a particular segment or group of segments in the composite display area, as well as other operations.
System, method and computer program product for a multifunction toolbar for internet browsers
A system, method and article of manufacture provide a multifunction toolbar for a web browser. A toolbar is displayed over a web browser. The toolbar is linked to a portal of a user. The portal is for aggregating content selected by the user. A bucket is presented on the toolbar. The present invention recognizes when the user selects content on a website, which is displayed on the web browser, and drops the content in the bucket. The selected content is added to the portal.
Pointing help system
Embodiments of the present invention address deficiencies of the art in respect to the help function and provide a method, system and computer program product for a pointing help system. In one embodiment of the invention, a method for pointing help in a GUI can include receiving a help event in association with a GUI control in the GUI, generating a help message for placement in a portion of the GUI statically configured to present different help messages, and visually coupling the GUI control with the help message through pointing help. In particular, in one aspect of the embodiment, visually coupling the GUI control with the help message through pointing help can include generating an arrow shell in a window separate from the GUI; and superimposing the arrow shell over the GUI to visually couple the GUI control with the help message.
Reduced glyph font files
Documents that are created using a particular font often do not include all glyphs defined for the font. Accordingly, to reduce the amount of bandwidth needed to obtain the font used to create the document over a network, a font file may be created that includes a reduced set of glyphs. In one or more examples, the font file might only include the glyphs used in the document being viewed. Reduced glyph font files may be generated on-the-fly and/or cached for quick retrieval at a later time.
Selection-based resizing for advanced scrolling of display items
A device may receive a selection of a first one of portions of a document, changing sizes of at least some of the portions based on the selection, determining a first location of an index button in an index bar, identify one of the portions based on the determined first location of the index button, and display the identified portion.
Method for compressing XML documents into valid XML documents
A method comprising compressing a first XML document into a binary stream, converting the binary stream into a compressed valid XML document, and associating at least one XML tag with the compressed valid XML document in order to identify the document as a compressed XML document.
Accelerating view transitions
A method includes rendering content to provide rendered content including a first content segment and a second content segment, wherein the second content segment includes an indicator of computing device activity; outputting a first view of the rendered content for presentation at a display device, and receiving, at the one or more processors, event information. In response to the event information, the method includes applying at least one hardware accelerated transform to define a second view of the rendered content, where the second content segment, but not the first content segment, is viewable in the second view of the rendered content when the rendered content is presented at the display device, modifying the first content segment, and applying at least one hardware accelerated transform to define a third view of the rendered content subsequent to modifying the first content segment.
Animation control methods and systems
Animation control methods and systems. In one embodiment, a method to control animations includes receiving data representing content of a page (e.g. a web page), detecting, from the data, whether the page includes animated content, determining whether to halt execution of the detected animated content, and halting execution of the animated content if a determination to halt was made. In one implementation, the content can be configured into a document object model (DOM) and decisions to halt or not to halt can be made on a node-by-node basis within the DOM. In one implementation, the animated content can be allowed to execute for a shortened duration (e.g. in order to allow a user to see it) and then is halted.
Embedding macros in web pages with advertisements
The present disclosure is directed to a system and method for embedding macros in Web pages with advertisements. In some implementations, a method includes receiving a snippet embedded in a remote Web page. Rules for embedding one or more macros in the snippet are identified. The one or more macros are associated with archiving user actions associated with an advertisement presented in the Web page. A format of the snippet is determined from a plurality of identifiable formats based, at least in part, on the rules. The one or more macros are automatically embedded in the snippet in accordance with rules associated with the snippet format.
Calibration and annotation of video content
Various embodiments provide techniques for calibrating and annotating video content. In one or more embodiments, an instance of video content can be calibrated with one or more geographical models and/or existing calibrated video content to correlate the instance of video content with one or more geographical locations. According to some embodiments, geographical information can be used to annotate the video content. Geographical information can include identification information for one or more structures, natural features, and/or locations included in the video content. Some embodiments enable a particular instance of video content to be correlated with other instances of video content based on common geographical information and/or common annotation information. Thus, a user can access video content from other users with similar travel experiences and/or interests. A user may also access annotations provided by other users that may be relevant to a particular instance of video content.
Content display monitor
The invention can enable monitoring of the display of content by a computer system. Moreover, the invention can enable monitoring of the displayed content to produce monitoring information from which conclusions may be deduced regarding the observation of the displayed content by an observer. The invention can also enable monitoring of the display at a content display site of content that is provided by a content provider site over a network to the content display site. Additionally, the invention can enable the expeditious provision of updated and/or tailored content over a network from a content provider site to a content display site so that the content provider's current and appropriately tailored content is always displayed at the content display site. Aspects of the invention related to transfer of content over a network are generally applicable to any type of network. However, it is contemplated that the invention can be particularly useful with a computer network, including private computer networks (e.g., America Online™) and public computer networks (e.g., the Internet). In particular, the invention can be advantageously used with computer networks or portions of computer networks over which video and/or audio content are transferred from one network site to another network site for observation, such as the World Wide Web portion of the Internet.
System for configuring modular telemetry transponders
A system for configuring telemetry transponder cards uses a database of error checking protocol data structures, each containing data to implement at least one CCSDS protocol algorithm. Using a user interface, a user selects at least one telemetry specific error checking protocol from the database. A compiler configures an FPGA with the data from the data structures to implement the error checking protocol.
Method and apparatus for error management
To derive a Hamming code to manage data errors a set of at least four parity bit positions is selected for parity bits which will protect a set of data bits (where each data bit has a data bit position in the data bit set). A syndrome is determined for each data bit position. This involves selecting a unique sub-set of at least three parity bit positions. The unique sub-set shares at least one parity bit position with at least one other unique sub-set of at least three parity bit positions. A parity bit value may then be calculated for each parity bit position based on the determined syndromes. The header of a packet may be provided with a word which defines the length of the packet and an error management code generated utilizing this word so that errors in the word may be detected and, possibly, corrected.
Optimizing error floor performance of finite-precision layered decoders of low-density parity-check (LDPC) codes
Systems and methods are provided for selecting precisions during iterative decoding with a low-density parity check (LDPC) decoder in order to maximize LDPC code's performance in the error floor region. The selection of the precision of the messages may be done in such a way as to avoid catastrophic errors and to minimize the number of near-codeword errors during the decoding process. Another system and method to avoid catastrophic errors in the layered (serial) LDPC decoder is provided. Lastly, a system and method that select precisions and provide circuitry that optimizes the exchange of information between a soft-input, soft-output (SISO) channel detector and an error correction code (ECC) decoder for channels with memory is provided.
System and method for assigning code blocks to constituent decoder units in a turbo decoding system having parallel decoding units
A system for, and method of, assigning code blocks to constituent decoding units in a turbo decoding system having parallel decoding units. In one embodiment, the method includes: (1) representing the turbo decoding system as a resource diagram rectangle, (2) representing the code blocks as code block rectangles, (3) mapping the code block rectangles into the resource diagram rectangle and (4) assigning the code blocks to the constituent decoding units based on the mapping.
Inter-sequence permutation turbo code system and operation methods thereof
A high performance real-time turbo code system is proposed. The proposed system exploits cooperative coding architecture and a proper decoding scheduling to achieve low error rate within a constrained latency. Permutation schemes and hardware embodiments utilizing the cooperative coding are also shown. Various memory saving techniques are provided to reduce memory usage in both encoder and decoder. The proposed system is compatible with 3rd generation mobile standards and cost of designing new parts exclusively for the proposed system can be minimized. This invention can provide substantial coding and system capacity gains for real-time applications in a wireless environment.
Encoding method, decoding method, encoder, and decoder
An encoding method generates a parity bit sequence by encoding an information sequence with feed-forward LDPC convolutional codes based on a plurality of parity check polynomials each having a coding rate of (n−1)/n, then performs an interleaving process and an accumulation process. The accumulation process is an exclusive OR operation performed on bits of the interleaved parity bit sequence and on bits of a delayed accumulated parity bit sequence. A coded sequence is then generated from the information sequence and the accumulated parity bit sequence.
Apparatus, method, and system for IP address negotiations
A wireless communications device for IP address negotiations is provided and comprises a wireless module, a connection device, and a processing unit. The wireless module provides wireless communications from and to a service network. The connection device is coupled to the terminal device. The processing unit is coupled to the connection device and the wireless module, receiving an IP address request message from the terminal device via the connection device, and requests an IP address and a DNS address from the service network via the wireless module in response to an IP address request message from the terminal device. Also, the processing unit determines whether allocated IP address and DNS address have been received from the service network, and sends a rejection message to the terminal device to trigger the terminal device to resend the IP address request message in response to determining that the allocated IP address and DNS address have not been received from the service network.
Debugging system using optical transmission
A debugging system using optical transmission comprises a sending side and a receiving side. The sending side comprises a debugging-data-generation unit, a modulation unit, and an optical-transmission apparatus. The debugging-data-generation unit generates debugging data according to an operation of the sending side. The modulation unit modulates the debugging data to generate a modulation signal. The optical-transmission apparatus coupled to the modulation unit converts the modulation signal into a first light and transmits the first light. The receiving side comprises an optical-receiving apparatus, a demodulation unit and a data storage device. The optical-receiving apparatus receives the first light and converts the first light into the modulation signal. The demodulation unit is coupled to the optical-receiving apparatus and demodulates the modulation signal into the debugging data. The data storage device receives and saves the debugging data.
Dynamic detection and identification of the functional state of multi-processor cores
Exemplary embodiments include a sequential and concurrent status detection and evaluation method for multiple processor cores, including receiving data from a plurality of processor cores, for each of the plurality of processor cores, simultaneously running a built-in self test to determine if each of the plurality of cores has failed, checking the data for a dominant logic state and recording a subset of the plurality of processor cores that have failed.
Multiple-capture DFT system for detecting or locating crossing clock-domain faults during self-test or scan-test
A method for providing ordered capture clocks to detect or locate faults within N clock domains and faults crossing any two clock domains in an integrated circuit or circuit assembly in scan-test or self-test mode, where N>1, each clock domain having one capture clock and a plurality of scan cells, each capture clock comprising a plurality of capture clock pulses; said method comprising: (a) generating and shifting-in N test stimuli to all said scan cells within said N clock domains in said integrated circuit or circuit assembly during a shift-in operation; (b) applying an ordered sequence of capture clocks to all said scan cells within said N clock domains, the ordered sequence of capture clocks comprising at least a plurality of capture clock pulses from two or more selected capture clocks placed in a sequential order such that all clock domains are never triggered simultaneously during a capture operation; and (c) analyzing output responses of all said scan cells to locate any faults therein.
System and method for evaluation of a field programmable gate array (FPGA)
A method for evaluation of a field programmable gate array (FPGA), the method includes: configuring the FPGA to execute, in parallel, an evaluation program and an additional program; wherein an execution of the additional program is being evaluated by the evaluation program; and executing, by the FPGA the evaluation program and the additional program; wherein the executing includes receiving, by a memory controller of the FPGA, captured signals from multiple points of interest of the FPGA; and transferring, by the memory controller of the FPGA, at least a portion of the captured signals to at least one memory space of a memory block via memory channels of the FPGA.
Using built-in self test for preventing side channel security attacks on multi-processor systems
A data processing system having a first processor, a second processor, a local memory of the second processor, and a built-in self-test (BIST) controller of the second processor which performs BIST memory accesses on the local memory of the second processor and which includes a random value generator is provided. The system can perform a method including executing a secure code sequence by the first processor and performing, by the BIST controller of the second processor, BIST memory accesses to the local memory of the second processor in response to the random value generator. Performing the BIST memory accesses is performed concurrently with executing the secure code sequence.
Memory architecture and associated serial direct access circuit
The present invention provides a memory architecture and associated serial direct access (SDA) circuit. The memory architecture includes a memory of a parallel interface and a serial direct access (SDA) circuit. The SDA circuit includes an enable pin, a serial pin and an auto-test module. The enable pin receives an enable bit, wherein the SDA circuit is selectively enabled and disabled in response to the enable bit. When the SDA circuit is enabled, the serial pin sequentially relaying a plurality of serial bits, such that each of the serial bits is associated with one of parallel pins of the parallel interface; in addition, the auto-test module can perform a built-in test of the memory associated with the serial bits.
Multi-writer in-memory non-copying database (MIND) system and method
Embodiments of the invention relate to memory management methods and systems for object-oriented databases (OODB). In an embodiment, a database includes a plurality of memory-mapped file segments stored on at least one nonvolatile memory medium and not in main memory. An application program connects to the database with a plurality of writing processes to simultaneously write to an in-memory database, each writing process updating its own disk-based logfile, such that the effective disk writing speed is substantially increased and lock conflicts reduced.
Apparatus and method for monitoring a computer system
An apparatus and method for monitoring a computer system operable for alerting an operator to failures associated with critical resource consumption and comprises: a resource monitoring component for monitoring resource consumption; a threshold setting component for setting a threshold of resource consumption between an average resource consumption value and a critical resource consumption value; a diagnostic data collection component; and a threshold crossing detection component; wherein the diagnostic data collection component is operable, in response to the threshold crossing detection component detecting a threshold crossing, to start or stop diagnostic data collection.
Compliance mode detection from limited information
Consistent with embodiments of the present disclosure, a method involves a redriver circuit with compliance test mode features. A redriver circuit is configured to process received compliance patterns for a compliance test mode. A compliance test mode is detected by a redriver circuit having a first input port and a second input port. The redriver detects the presence of a remote receiver termination on both input ports, monitors both input ports to detect received data and enters compliance test mode in response to no received data being detected on the input ports for a set period of time. Compliance patterns are tracked by monitoring for valid signal levels on the second input port. De-emphasis is controlled on at least one input port in response thereto.
Redirecting data generated by network devices
A system and method for efficiently and easily capturing data dumps generated by a network device is disclosed. In one embodiment, a storage management device is disposed between a network device and a storage device. The network device is programmed with a virtual address that is associated with the storage management device. Upon generating a data dump, the network device writes the data dump to the virtual address where the storage management device receives the data dump and redirects it to a long-term storage location. Additionally, the storage management device can generate a record of each data dump that indicates the network device that generated the data dump and where the data dump was stored.
Automatically allocating clients for software program testing
Techniques are described herein that are capable of automatically allocating clients for testing a software program. For instance, a number of the clients that are to be allocated for the testing may be determined based on a workload that is to be imposed by the clients during execution of the testing. For example, the number of the clients may be a minimum number of the clients that is capable of accommodating the workload. In accordance with this example, the minimum number of the clients may be allocated in a targeted environment so that the test may be performed on those clients. Additional clients may be allocated along with the minimum number of the clients in the targeted environment to accommodate excess workload.
Detection method for configuration of power supply units and detection system using the same
A detection method for configuration of power supply units and a detection system using the same are provided. The detection method includes: storing a production information setting about configuration of power supply units in a field replace unit, in which the production information setting includes a number setting and a location setting; sensing actual configuration number and location of the power supply units by a sensing unit so as to obtain an actual configuration information; and reading the production information setting and the actual configuration information and comparing them by a controller, in which the controller determines that the detection is passed when the actual configuration information matches the number setting and the location setting; and the controller outputs an unusual message when the actual configuration information does not match the number setting and the location setting.
Dynamic voltage and frequency scaling transition synchronization for embedded systems
Methods and apparatuses are provided that allow for the synchronization of an operating point transition in an embedded system environment. Identification of an upcoming operating point transition, operating point transition constraints, and maximum parking latency parameters is provided. Then, an ordering of seizing bus activity as well as an ordering of resuming bus activity is determined. The operating point transition is then implemented using the determined ordering. Simulation and determination of change of successfully completing operating point transition prior to initiating and while the transition is pending are also provided.
Power management system and method for peripheral devices
A peripheral power management system includes a power monitor for determining a power consumption characteristic of a computing processor and a controller for generating a reference power signal based on the power consumption characteristic. The peripheral power management system also includes a power regulator control signal generator for generating a power regulator control signal based on the reference power signal. The power regulator control signal controls a peripheral device power regulator which regulates an electrical supply power of a peripheral device. In this way, the peripheral power management system controls regulation of the electrical supply power of the peripheral device based on the power consumption characteristic of the computing processor. In some embodiments, the peripheral power management system determines the power consumption characteristic of the computing processor by monitoring communication on a serial voltage identification bus.
Method and apparatus for controlling power mode shifting of an image processing apparatus by monitoring online status of a plurality of client devices extracted to be monitored based on its position information and its usage history
Considering a position relation between client devices and an image processing apparatus, the image processing apparatus is appropriately shifted to a power saving mode. A position information storage portion stores information of a position relation between each of the client devices and the image processing apparatus, a monitored target extracting portion extracts, from among the client devices, a client device to be monitored whether or not to be online based on information including at least the information of the position relation, a status confirming portion confirms whether or not the client device extracted is online, a power saving mode shift judging portion judges whether or not to shift the image processing apparatus to a power saving mode based on a confirmation result, and a power controlling portion controls shifting to the power saving mode of the image processing apparatus based on a judgment result.
Emergency mobile device power source
In various aspects, a portable electronic device includes electrical components supported by a housing, the electrical components including a user interface coupled to a processor and a storage medium including an emergency power storage module coupled to the processor. The portable apparatus further includes one or more power storage devices configured to provide electrical energy to the electrical components, at least one power storage device operably controlled by the emergency power storage module to provide emergency electrical energy to the electronic components for an emergency communication.
Reducing power consumption in memory line architecture
A memory link architecture (MLA) comprises a multi-port memory device, a memory controller, and a nonvolatile memory. The MLA can perform a sleep switching control operation or a memory management operation to reduce power consumption based on commands received from a host processor and/or automatic control methods.
USB hub for supplying power upon determination whether a USB device is chargeable according to data transfer rate of the USB device
A USB hub and a method thereof. The USB hub supplies power to a USB device, is connected between the USB device and a USB host under a working power state, and comprises an upstream port, a downstream port, a power port, and a controller. The upstream port is coupled to the USB host. The downstream port is coupled to the USB device. The power port is coupled to a power source. The controller is coupled to the upstream port, the downstream port, and the power port, and determines whether the USB host has left the working power state, and determines whether the USB device is electrically chargeable, when the USB host has left the working power state. The downstream port provides power to the USB device from the power source when the USB device is electrically chargeable.
Power managing energy-harvesting for selectively controlling a state of individual computer based on a harvesting energy stored available
According to typical inventive practice, each inventive sensor node performs computer processing that is tri-chotomized in a progressive, power-regulating scheme of three processors, namely, a low-performance processor, a middle-performance processor (which remains in sleep mode until activated upon demand for a middle-computation function), and a high-performance processor (which remains in sleep mode until activated upon demand for a high-computation function). The low-performance processor performs low computation functions such as routine sensing functions. The middle-performance processor performs middle-computation functions such as validative sensing functions. The high-performance processor performs high computation functions such as remedial communicative functions. Each sensor node has one or more transceivers for wirelessly transmitting and receiving radio signals (e.g. remedial communication) to and from transceivers of other sensor nodes. Some transceivers may be specifically dedicated to wirelessly communicating “wake-up” signals among nodes. Inventive practice is notably efficacious in furtherance of situational awareness of damage events onboard naval ships.
Encrypting data objects to back-up
Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object of chunks to store at the server is generated. A first portion of the chunks in the data object is encrypted with the client private key and the first portion of the chunks in the data object encrypted with the client private key are sent to the server to store. A second portion of the chunks in the data object not encrypted with the client private key are sent to the server to store.
Home (e)Node-B with new functionality
A wireless communication device is configured as an in-home node-B (H(e)NB). The H(e)NB is configured to perform a locking function to control modification of carrier and user controlled parameters, and also configured to detect a change in location.
Protecting content with initialization vector manipulation
Disclosed are various embodiments for generating encrypted media content items as well as decrypting encrypted media content items. A content type is embedded in an initialization vector corresponding to an encrypted sample. Upon decryption of encrypted content, the content type is identified and an action taken based upon the detected content type.
Product authentication based upon a hyperelliptic curve equation and a curve pairing function
Disclosed is a method, system, and device to authenticate a product. A plurality of public parameters and a secret master key are selected. The public parameters include a hyperelliptic curve equation and a curve pairing function. A public product activation code and a private product activation code are generated based upon the public parameters and the secret master key. The public parameters and the public product activation code are stored with the product. Further, the private product activation code is associated with the product. The product is authenticated if the private product activation code entered to a client device satisfies a mathematical formula implemented with the public parameters and the public product activation code.
Technique for content management using group rights
A technique for content management using group rights is described. The technique facilitates a flexible management for a group of content files mainly by effecting a change of group memberships for subsets of the group and a partial update of the content files. As one aspect, a content file manager (20) is provided to create content files associated with group rights. A device (21) is also provided to process such content files. One method aspect comprises assigning a plurality of content items to a new group whose identifier is associated with a new group rights object; determining if any of the content items has been previously distributed; and for each previously-distributed content item, creating an update content file including the group identifier of the new group and excluding the previously-distributed content item itself.
License utilization management system license wrapper
The different advantageous embodiments provide a system for managing license usage comprising a license management interface and a number of storage devices. The license management interface is configured to control access to a number of applications. The number of applications is associated with a number of licenses. The number of storage devices has a number of files needed to run the number of applications. The number of storage devices is configured to be managed by the license management interface to distribute the number of files to a number of client systems approved to run the number of applications.
Computing system feature activation mechanism
Embodiments of the invention are generally directed to apparatuses, methods, and systems for a computing system feature activation mechanism. In an embodiment, a computing system receives a remotely generated feature activation information. The computing system compares the remotely generated feature activation information with a built-in feature activation mechanism. In an embodiment, a feature of the computing system is activated if the remotely generated feature activation information matches the built-in feature activation mechanism. Other embodiments are described and claimed.
Method for generating standard file based on steganography technology and apparatus and method for validating integrity of metadata in the standard file
An apparatus for validating integrity of metadata in a standard file includes: a metadata acquiring unit for acquiring metadata from a protected file; an integrity evidence value acquiring unit for acquiring an integrity evidence value from a file or a database; a secret information extracting unit for extracting secret information of a file data; and a metadata integrity validating unit for checking if the metadata is correct by using the acquired metadata, the acquired integrity evidence value, and the extracted secret information.
Providing confidential structured data
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing confidential structured data. In one aspect, a method includes creating a first data structure instance according to a protocol for creating structured and extensible data structures. The first data structure instance is serialized. The serialized first data structure instance is encrypted. A second data structure instance is created according to the protocol. The second data structure instance contains the encrypted and serialized first data structure instance. The second data structure instance is serialized.
Authentication of a user accessing a protected resource using multi-channel protocol
A user accessing a protected resource is authenticated using multiple channels, including a mobile device of the user. A user attempting to access a protected resource is authenticated by receiving a request from a mobile device of the user to access the protected resource; receiving a public key from the mobile device of the user; providing a provision token to the mobile device, wherein the provision token is used by the user to access the protected resource using a second device; and confirming the provision token to a provider of the protected resource to authorize the user to access the protected resource. The user then communicates with the provider using a second device to authorize the provisioning token. A transaction signing protocol is also provided.
Methods and systems for increasing the security of electronic messages
A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes.
Authentication apparatus and method for non-real-time IPTV system
An authentication apparatus for a non-real-time IPTV system decrypts a first encrypted value included in a contents request message received from a device using a preset session key, and then verifies the validity of the contents request message. If the verification results of the contents request message are valid, the authentication apparatus encrypts a variation between timestamps of the authentication apparatus and the device using the session key, and then generates a second encrypted value. After verification information by which the device is capable of verifying the authentication apparatus has been generated using the second encrypted value, the authentication apparatus sends verification information, together with contents corresponding to the contents request message, to the device.
System and method for variable length encryption
Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a token; encrypting the token data with a key; encrypting an authentication data with a clear text token data; and transmitting the encrypted authentication data with the encrypted token data to a remote device.
Apparatus and method for efficiently and securely exchanging connection data
An apparatus, method, and machine-readable medium are described for securely and efficiently exchanging connection data for a peer-to-peer (“P2P”) session on a network comprising. For example, in one embodiment, a connection data exchange (“CDX”) service can perform the function of a central exchange point for connection data. In one embodiment, the CDX service can perform the operations of receiving a connection data structure, sometimes referred to herein as a “ticket,” created by a matchmaker or an invitation service in response to requests from a group of mobile computing devices attempting to establish peer-to-peer (“P2P”) connections. The ticket can identify each of the group of mobile computing devices and can include encrypted NAT hole punch data associated with each of the mobile computing devices. The CDX service can authenticate the ticket and decrypt the NAT hole punch data contained in the ticket using a CDX ticket key used by the matchmaker service or the invitation service to encrypt the ticket. Once the ticket is authenticated and the hole punch data retrieved, the CDX service can send connection data to each of the mobile computing devices residing behind NAT devices using the NAT hole punch data.
Backup and restore in a secure appliance with integrity and confidentiality
A cloud deployment appliance includes a key stored internally and that is used during restore to decrypt encrypted backup images. That key is not available to an administrator of the appliance; instead, the administrator receives a “value” that has been generated externally to the appliance and, in particular, by applying a public key of a public key pair to the key. The value is possessed by the administrator, but it does not expose the key. Upon a given occurrence, such as a disk failure in the appliance, the administrator uses the value to obtain” the key, which is then used to restore an encrypted backup image. The key is obtained by having the administrator provide the value to an entity, e.g., the appliance manufacturer, who then recovers the key for the administrator (by applying the private key of the public key pair).
Identifying and enforcing strict file confidentiality in the presence of system and storage administrators in a NAS system
A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage organized as a plurality of logical volumes, and an encryption device in communication with both the file server and the physical storage.
Cloud data management
The different illustrative embodiments provide a method, computer program product, and apparatus for managing data. An encrypted file containing the data is divided into a plurality of segments. The plurality of segments are sent to a plurality of cloud computing environments for storage in the plurality of cloud computing environments. Each cloud computing environment in the plurality of cloud computing environments receives a portion of the plurality of segments. The portion of the plurality of segments is associated with a cloud computing environment in the plurality of cloud computing environments to which the portion of the plurality of segments was sent.
Method for assembling authorization certificate chains
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.
Apparatus and method for monitoring certificate acquisition
A system that incorporates teachings of the present disclosure may include, for example, a set-top-box having a controller to transmit a request to a remote management server for status information associated with a x.509 certificate intended for the STB, and receive the status information associated with the x.509 certificate from the remote management server, where events associated with the status information are received by the remote management server from at least one of the STB, a certificates proxy, an external certificate web service, and a certificate authority, and where the status information comprises at least a portion of the received events. Other embodiments are disclosed.
VPN connection system and VPN connection method
For establishing a VPN connection in the call-back type, a VPN server establishes an always-on connection through a unique protocol different from the electronic mail delivery system. A client generates a client authentication data used for the client authentication implemented by the VPN server, and establishes the relay server through the unique protocol to transmit the client authentication data. The relay server device relays the client authentication data to the VPN server through the unique protocol. The VPN server implements the client authentication based on the relayed data. The VPN server establishes the VPN connection with the client based on the result of the authentication.
Computer system and method for resetting the same
A computer system and a method for resetting the same are provided. The computer system includes a basic input output system (BIOS) chip and a keyboard controller. In the method, the BIOS chip monitors the keyboard controller to determine whether a time that the keyboard controller remains in a hang up state reaches an idle time limit. Besides, the keyboard controller monitors the BIOS chip to determine whether a time that the BIOS chip remains in the hang up state reaches the idle time limit When it is determined that the time of one of the BIOS chip and the keyboard controller remaining in the hang up state reaches the idle time limit, the computer system is reset in accordance with a hardware reset signal trigger by the other one of the BIOS chip and the keyboard controller.
Trap-based mechanism for tracking accesses of object class names
In general, the invention relates to a method. The method includes receiving notification, which includes context information, of a trap. The method further includes accessing, based at least partially upon the context information, a particular instruction that caused the trap, determining, based at least partially upon the context information, a particular address that is to be accessed by the particular instruction, updating a set of log information to indicate accessing of the particular address, causing subsequent accesses of the particular address to not give rise to a trap, after causing subsequent accesses of the particular address to not give rise to a trap, accessing the particular address, after accessing the particular address, causing subsequent accesses of the particular address to give rise to a trap, and causing the particular instruction to not be executed.
System and apparatus for group floating-point inflate and deflate operations
Systems and apparatuses are presented relating a programmable processor comprising an execution unit that is operable to decode and execute instructions received from an instruction path and partition data stored in registers in the register file into multiple data elements, the execution unit capable of executing group data handling operations that re-arrange data elements in different ways in response to data handling instructions, the execution unit further capable of executing a plurality of different group floating-point and group integer arithmetic operations that each arithmetically operates on the multiple data elements stored in registers in the register file to produce a catenated result that is returned to a register in the register file, wherein the catenated result comprises a plurality of individual results.
Mechanism for selecting instructions for execution in a multithreaded processor
In one embodiment, a multithreaded processor includes a plurality of buffers, each configured to store instructions corresponding to a respective thread. The multithreaded processor also includes a pick unit coupled to the plurality of buffers. The pick unit may pick from at least one of the buffers in a given cycle, a valid instruction based upon a thread selection algorithm. The pick unit may further cancel, in the given cycle, the picking of the valid instruction in response to receiving a cancel indication.
Very long instruction word (VLIW) processor with power management, and apparatus and method of power management therefor
A very long instruction word (VLIW) processor and an apparatus with power management and a method of power management therefor are provided in consistent with the exemplary embodiments of the disclosure. The power management method includes the following steps. Valid instruction(s) and no operation (NOP) instruction(s) of an input instruction package are rearranged to output a transcoded instruction package, wherein the transcoded instruction package by the rearrangement has its NOP instruction(s) corresponding to at least one execution unit, which is to be placed in power reduction state, of a VLIW processor. Power reduction control is selectively performed on at least one execution unit corresponding to at least one NOP instruction of the transcoded instruction package according to the transcoded instruction package.
Re-mapping memory transactions
Systems and methods for re-mapping memory transactions are described. In an embodiment, a method includes receiving a memory request from a hardware subsystem to a memory, replacing a first identifier with a modified identifier in the memory request, and transmitting the memory request to the memory through a processor complex. The method further includes receiving a response from the memory, determining that the response corresponds to the memory request, replacing the modified identifier with the first identifier in the response, and transmitting the response to the hardware subsystem. In some embodiments, a system may be implemented as a system-on-a-chip (SoC). Devices suitable for using these systems include, for example, desktop and laptop computers, tablets, network appliances, mobile phones, personal digital assistants, e-book readers, televisions, and game consoles.
Load rebalancing for shared resource
Various aspects of a data volume or other shared resource are determined and updated dynamically for purposes such as to provide guaranteed qualities of services. For example, the number of partitions in a data volume and/or the way in which data is stored across those partitions can be updated dynamically without significantly impacting the customer using the volume. The data stored to the volume can be striped or otherwise distributed across a number of logical areas, which then can be distributed across the partitions. Separate mappings can be used for the data in each logical area, and the logical areas in each partition, such that when moving a logical area only a single mapping has to be updated, regardless of the amount of data in that logical area. Further, logical areas can be moved between partitions without the need to repartition or redistribute the data in the data volume.
Map updating system and map updating program using dynamic cache memory
A map updating system includes: an update processing unit for performing update processing by reading data required in the update processing from a cache area of a memory when the data are stored in the cache area and from a map database when the data are not stored in the cache area; a cache storage unit for storing the data read by the update processing unit in the cache area; a processing memory capacity determination unit for determining a processing memory capacity, which is a capacity of the memory required as an update processing area, on the basis of the content of map data to be subjected to the update processing; and a cache capacity determination unit for determining a cache capacity, which is a capacity of the memory allocated to the cache area, on the basis of the processing memory capacity.
Memory pinning through buffer encapsulation
The present invention extends to methods, systems, and computer program products for memory pinning through buffer encapsulation. Within a managed execution environment, a wrapper object encapsulates a memory buffer that is to be shared with a native routine executing in a native execution environment. The wrapper object manages operation of a memory manager on a memory heap corresponding to the memory buffer. The wrapper object includes a first function which sets a pin on the memory buffer and returns a pointer identifying the memory buffer. Setting the pin causes the memory manager to cease moving the memory buffer within the memory heap. The wrapper object also includes a second function which releases the pin on the memory buffer.
Preemptive page eviction
A method, system, and computer program product for preemptive page eviction in a computer system are provided. The method includes identifying a region in an input file for preemptive page eviction, where the identified region is infrequently accessed relative to other regions of the input file. The method also includes generating an output file from the input file, where the identified region is flagged as a page for preemptive page eviction in the output file. The method further includes loading the output file to a memory hierarchy including a faster level of memory and a slower level of memory, wherein the flagged page is preemptively written to the slower level of memory.
Methods and apparatus for passing information to a host system to suggest logical locations to allocate to a file
Methods and apparatus for passing information to a host system to suggest logical locations to allocate to a file are disclosed. Generally, when a host system determines a need to allocate a logical location to a file, the host system sends a non-data command to a memory system. In response, the memory system sends information to the host system that includes one or more logical locations to allocate to the file. By suggesting one or more logical locations to allocate to a file, the memory system may reduce a number of data consolidation or garbage collection operations that will need to be performed in the future, thereby improving performance of the memory system.
Optimizing output vector data generation using a formatted matrix data structure
A computer system retrieves a packet that includes non-zero elements that correspond to sparse-matrix rows. Within the packet, the non-zero elements are stored in predefined fields that each correspond to one of the sparse-matrix rows. The computer system computes output values to correspond with each of the sparse-matrix rows using the non-zero elements and corresponding input values. In turn, the computer system stores the computed output values in consecutive locations within an output buffer and processes the output values accordingly.
Recording device, recording device control method, and storage medium
Managing commands in a buffer is simplified while continuing to enable immediately executing real-time commands. A control unit of a printer sequentially writes commands received from a host computer to a first buffer and sequentially reads the commands. If the read command is a real-time command, the control unit executes the command. If the read command is a normal command, the control unit writes the command to a second buffer without executing the command from the first buffer. The control unit sequentially reads and executes normal commands written to the second buffer.
Multi-port memory and operation
Multi-port memory having an additional control bus for passing commands between ports have individual ports that can be configured to respond to a command received from an external control bus or to a command received from the additional control bus. This facilitates various combinations of ports to vary the bandwidth or latency of the memory to facilitate tailoring performance characteristics to differing applications.
Memory model for hardware attributes within a transactional memory system
A method and apparatus for providing a memory model for hardware attributes to support transactional execution is herein described. Upon encountering a load of a hardware attribute, such as a test monitor operation to load a read monitor, write monitor, or buffering attribute, a fault is issued in response to a loss field indicating the hardware attribute has been lost. Furthermore, dependency actions, such as blocking and forwarding, are provided for the attribute access operations based on address dependency and access type dependency. As a result, different scenarios for attribute loss and testing thereof are allowed and restricted in a memory model.
Monitoring thread synchronization in a distributed cache
Systems, apparatus, and method of monitoring synchronization in a distributed cache are described. In an exemplary embodiment, a first and second processing core process a first and second thread respectively. A first and second distributed cache slices store data for either or both of the first and second processing cores. A first and second core interface co-located with the first and second processing cores respectively maintain a finite state machine (FSM) to be executed in response to receiving a request from a thread of its co-located processing core to monitor a cache line in the distributed cache.
Method and apparatus for achieving non-inclusive cache performance with inclusive caches
An apparatus and method for improving cache performance in a computer system having a multi-level cache hierarchy. For example, one embodiment of a method comprises: selecting a first line in a cache at level N for potential eviction; querying a cache at level M in the hierarchy to determine whether the first cache line is resident in the cache at level M, wherein M
Programmable cache access protocol to optimize power consumption and performance
A programmable cache and cache access protocol that can be dynamically optimized with respect to either power consumption or performance based on a monitored performance of the cache. A monitoring unit monitors cache misses, load use penalty, and/or other performance parameter, and compares the monitored values against a set of one or more predetermined thresholds. Based on the comparison results, a cache controller configures the programmable cache to operate in a parallel mode, to increase cache performance at the cost of greater power consumption, or in a serial mode, to conserve power at the cost of unnecessary performance. A banked cache memory that supports aligned and unaligned instruction fetches using a banked access strategy, and a cache access controller that includes a prefetch capability are also described.
Data read method for a plurality of host read commands, and flash memory controller and storage system using the same
A data read method for reading data to be accessed by a host system from a plurality of flash memory modules is provided. The data read method includes receiving command queuing information related to a plurality of host read commands from the host system, each of the host read commands is corresponding to one of a plurality of data input/output buses coupled to the flash memory modules. The data read method also includes re-arranging the host read commands and generating a command giving sequence according to the data input/output buses corresponding to the host read commands. The data read method further includes sequentially receiving and processing the host read commands from the host system according to the command giving sequence and pre-reading data corresponding to a second host read command. Thereby, the time for executing the host read commands can be effectively shortened.
Combined mobile device and solid state disk with a shared memory architecture
A mobile device includes a system-on-chip (SOC) that includes a mobile device control module, a solid state disk (SSD) control module, and a random access memory (RAM) control module. The mobile device control module executes application programs for the mobile device. The solid-state disk (SSD) control module controls SSD operations. The RAM control module communicates with the mobile device control module and the SSD control module and stores both SSD-related data and mobile device-related data in a single RAM.
Computer storage device having separate read-only space and read-write space, removable media component, system management interface, and network interface
A storage device for use with a computer is disclosed. The storage device includes a processor communicably connected to a computer through a computer interface and a system interface. The computer interface enables communications exclusively between the processor and the computer, while the system interface enables to processor to manage one or more hardware components of the computer. A network interface is also included to enable the processor to communicate over a network with select file servers to the exclusion of other file servers. A storage means is communicably connected to the processor and includes first and second designated storage sections. The processor has read-write access to both storage sections, while the computer has read-only access to the first storage section and read-write access to the second storage section. A removable media storage component is also communicably connected to the processor.
System and method to prioritize large memory page allocation in virtualized systems
The prioritization of large memory page mapping is a function of the access bits in the L1 page table. In a first phase of operation, the number of set access bits in each of the L1 page tables is counted periodically and a current count value is calculated therefrom. During the first phase, no pages are mapped large even if identified as such. After the first phase, the current count value is used to prioritize among potential large memory pages to determine which pages to map large. The system continues to calculate the current count value even after the first phase ends. When using hardware assist, the access bits in the nested page tables are used and when using software MMU, the access bits in the shadow page tables are used for large page prioritization.
Virtual tape library with the ability to perform multiple, simultaneous reads of a single virtual tape
A virtual tape library management system provides multiple, simultaneous accesses to the content stored on a single virtual tape. The virtual tape library management system receives a first request to access the content of a virtual tape. Responsive to the first request, the virtual tape library management system provides access to the virtual tape. While the virtual tape is being accessed, the virtual tape library management system receives a second request to read the same virtual tape. In response, the virtual tape library management system creates a shadow virtual tape corresponding to the virtual tape, maps the shadow virtual tape to the content of the virtual tape, and provides access to the shadow virtual tape.
Multi-port system and method for routing a data element within an interconnection fabric
A fabric interconnect system may provide a data path between nodes and/or processing elements within an interconnection fabric. Identifiers may be assigned to particular components associated with the interconnection fabric. These identifiers may uniquely identify the particular components, and may indicate a path between a root node and a particular component. In some embodiments, the identifiers include turn counts and turn values that specify a turn-based bath from the root node to a particular component. One or more identifier acceptance rules may be used in order to determine whether a given component should accept and store a particular identifier that the component receives. For example, a lower priority identifier may be discarded in favor of a higher priority identifier.
Priority arbitration of coexisting wireless topologies
A system including a first communication module to transmit or receive data via an antenna in accordance with a first communication standard; a second communication module to transmit or receive data via the antenna in accordance with a second communication standard; and an arbitration module. The arbitration module outputs a first mutual grant where both the first communication module and the second communication module are able to simultaneously transmit data via the antenna; a second mutual grant where both the first communication module and the second communication module are able to simultaneously receive data via the antenna; a third mutual grant where the first communication module and the second communication module are able to simultaneously transmit and receive data, respectively, via the antenna; and a fourth mutual grant where the first communication module and the second communication module are able to simultaneously receive and transmit data, respectively, via the antenna.
Adjustment of post and non-post packet transmissions in a communication interconnect
In a communication interconnect such as PCIe which favors post transmissions such as write requests over non-post transmissions such as read requests and completions, methods and systems for shortening the delay for non-post transmissions while maintaining fairness among the post transmissions. Undispatched non-post transmission requests are monitored on a running basis; and when a running value of the undispatched non-post transmission requests exceeds a threshold; ones of the post transmission requests are randomly dropped.
Systems and methods for detecting supported small form-factor pluggable (SFP) devices
Systems and methods for detecting supported small form-factor pluggable (SFP) devices in an adapter are provided. One system includes multiple ports, each port configured to be coupled to a SFP device, a tracking device configured to store data representing a list of supported SFP devices for the adapter, and a processor coupled to each of the plurality of ports and the tracking device. The processor is configured to scan each port at start-up, determine if any of the ports is coupled to a non-supported SFP device, and disable any ports that are coupled to a non-supported SFP device. One method includes scanning each port at start-up, determining if any of the ports is coupled to a non-supported SFP device, and disabling any ports that are coupled to a non-supported SFP device. Also provided are computer storage mediums including computer code for performing the above method.
Data transfer apparatus and data transfer method
A packet accompanying data valid information is transferred at high efficiency within an integrated circuit or between integrated circuits. A character indicating data enable information is provided and an identifier indicating a data enable character is assigned onto the packet. When the data enable information is valid in series, the data enable characters are eliminated from the packet to be transferred.
Method for high speed data transfer
A data transfer method is provided which includes: sending a stream of data elements from a source to a sink (controlled by a common clock); simultaneously with the sending of the data element stream, sending a first binary signal to the sink, where the first binary signal is low if a data element is to be ignored by the sink, and is otherwise high; simultaneously with the sending of data element stream, sending a second binary signal from the sink to the source, where the second binary signal is low if the data element is not accepted by the sink, and is otherwise high; and simultaneously with the sending of the data element stream, sending a third binary signal to the sink, where the third binary signal marks a beginning and an end of a logical group of data elements within the data element stream.
Methods and apparatus for allocating bandwidth for a network processor
In a first aspect, a first method is provided for self-adjusting allocation of memory bandwidth in a network processor system. The first method includes the steps of (1) determining an amount of memory bandwidth of a network processor used by each of a plurality of data types; and (2) dynamically adjusting the amount of memory bandwidth allocated to at least one of the plurality of data types based on the determination. Numerous other aspects are provided.
Multi-interface memory card and method of operation
A method of operating a multi-interface memory card including a first interface supporting a universal serial bus (USB) data transfer protocol and the second interface supporting an inter-chip USB (IC-USB) data transfer protocol includes; selecting either the first interface or the second interface to facilitate data communication between the multi-interface memory card and a host connected to the multi-interface memory card via a USB connection by comparing a level of a power-on voltage received from the host with a reference voltage level, and thereafter determining whether a reset signal has been received from the host.
Outpatient monitoring systems and methods
Described are computer-based methods and apparatuses, including computer program products, for outpatient monitoring. In some examples, the outpatient monitoring technology includes a system for remote monitoring and consultations of patients' state associated with automated interpretation of vital signs signals. In other examples, the outpatient monitoring technology includes a system for remote monitoring of patients' state associated with analysis of full-disclosure vital signs digital signals with reduced bit data or channel data. In some examples, the outpatient monitoring technology includes a system for remote monitoring of patients' state associated with ongoing automated analysis and transmission of full-disclosure vital signs digital signals and automatically generated signals' interpretation results and manually marked patient symptoms.
Align/notify compression scheme in a network diagnostic component
The embodiments disclosed herein relate to a network diagnostic component or device that is placed in-line between a first and second node. The diagnostic component or device is used to compress pre-specified Dwords of a network data stream. For example, the first node may communicate with the second node using a network data stream that includes a first component and a pre-specified component. In some embodiments, the network data stream may be of the SAS/SATA protocol. The network diagnostic component may receive the network data signal and associate the pre-specified component with an identifier that is represents the pre-specified component. The first component and the identifier representing the pre-specified component may then be recorded in a memory.
Converting content for display on external device according to browsing context and based on characteristic of external device
Methods and apparatuses for converting content are provided. A predetermined request signal from an external device. All or a portion of currently browsed content is converted into data that can be browsed on the external device, based on information about the external device contained in the predetermined request signal. The data is transmitted to the external device.
Method, apparatus and system to dynamically manage logical path resources
System, apparatus, and methods for dynamically managing logical path resources are provided. The logical path resources are managed by adding, removing, and establishing logic paths based on specified priority schemes associated with the logical path resources. Information associated with the logical path resources is updated in a logical path resource table.
Transport layer connection
A method identifies a network socket on a machine by assigning a non-IP address socket anchor and a port number to the network socket. A socket anchor may comprise a globally unique number. In some embodiments, a socket anchor comprises a number having a preselected number of bits. The number having the preselected number of bits may comprise a selected number associated with the machine concatenated with a number of randomly generated bits. The number of bits of the selected number plus the number of randomly generated bits is equal to the preselected number of bits. In some embodiments, the selected number associated with the machine is a Media Access Control (MAC) address of a network interface associated with the machine.
Contextually aware client buffer thresholds
Client buffer thresholds are dynamically adjusted to provide quick start up and smooth playback in a variety of network conditions. In some examples, multiple buffer configurations are available. An initial buffer configuration may be used in typical circumstances and will yield good behavior in most cases. A modified buffer configuration can be used when limited available network resources prevent smooth playback. In some embodiments, a client buffer configuration is continuously adapted based on network throughput and data transfer rates.
Mobile device application for automatic filtering of transmitted data content
A communications device is provided. This includes a processor adapted to receive one or more identified data sources from at least one network database. An applications component is configured to determine one or more network applications that communicate with the processor based in part on the one or more identified data sources. A filter can be configured to at least partially disable data exchanges to the one or more identified data sources during communications with at least one of the one or more network applications.
Data transfer apparatus, information processing apparatus and method of setting data transfer rate
A method of setting transfer rate for information processing apparatus having a plurality of processing apparatus including a processor outputting data and connected by one or a plurality of data transfer apparatuses for transferring the data outputted from the processor, the method includes obtaining a dividing information indicating a manner of dividing the information processing apparatus into a plurality of partitions including at least one of the plurality of processing apparatuses, and setting a transfer rate of each partition for broadcasting data to all of the processors included in the plurality of processing apparatuses in each partition based on the obtained dividing information.
Adaptive bitrate management for streaming media over packet networks
A method including providing pseudo-streaming media data to a terminal; receiving a transport control protocol (TCP) acknowledgement from the terminal; estimating one or more network conditions of a network based at least in part on the TCP acknowledgement; determining an optimal session bitrate based on the estimated one or more network conditions; and providing pseudo-streaming media data to the terminal based on the optimal session bitrate.
Scalable queues on a scalable structured storage system
A cloud computing platform contains a structured storage subsystem the provides scalable queues. The cloud computing platform monitors message throughput for the scalable queues and automatically increases or decreases subqueues that provide the operational functionality for each scalable queue. A visibility start time and cloud computing platform time are maintained for each message to provide an approximate first-in-first-out order for messages within each subqueue. A message in a subqueue may be available for processing when the current cloud computing time is greater than the visibility start of the message.
Flexible failover policies in high availability computing systems
A system for implementing a failover policy includes a cluster infrastructure for managing a plurality of nodes, a high availability infrastructure for providing group and cluster membership services, and a high availability script execution component operative to receive a failover script and at least one failover attribute and operative to produce a failover domain. In addition, a method for determining a target node for a failover comprises executing a failover script that produces a failover domain, the failover domain having an ordered list of nodes, receiving a failover attribute and based on the failover attribute and failover domain, selecting a node upon which to locate a resource.
Server initiated secure network connection
In general, the invention is directed to techniques for establishing secure connections with devices residing behind a security device. In accordance with the techniques, a managed device initiates a transmission control protocol (TCP) session to establish a TCP session with a management device such that the management device acts as the TCP server and the managed device acts as a TCP client. Once established, the managed device sends a role reversal message specifying an identity of the managed device via the TCP session. Upon receiving the role reversal message, the management device initiates a secure connection over the TCP session in accordance with a secure protocol such that the management device acts as the secure protocol client and the managed device acts as the secure protocol server. By properly establishing the secure session, each of the devices assumes the proper roles and administrators may more easily configure the devices.
Method for operating a network and a network
For allowing a high degree of resource consumption within a network a method for operating a network is claimed, wherein at least one end user device is connected to an access network, wherein the method is characterized in that the at least one end user device or an application on the end user device queries at least one network element of the access network and/or at least one network element attached to the access network about low layer parameters information for optimizing connection and/or protocol parameters after having received the queried low layer parameters information. Further, a network is claimed, preferably for carrying out the above mentioned method.
Method and system for mediating interactive services over a wireless communications network
The present invention is directed to a method and system for controlling the state of an interactive application and controlling delivery of the interactive application to one or more users. The system of the present invention is a system for delivering an interactive application to one or more users of a communications network and may comprise an interactive application adapted to the communications network; a user access device adapted to receive said interactive application; control means for establishing parameters under which said interactive application is rendered on said user access device; and mediation means for establishing terms for the interaction between the at least one user and other users and the communications network.
Method and system to monitor parameters of a data flow path in a communication system
A system and method of monitoring a dataflow path in a multilevel client server environment. A proxy is introduced into the dataflow path between a communication process on the client and the server. The proxy acts as a conduit in the data path and monitors the performance parameters of the dataflow. These parameters may then be visualized or used to adjust backend resources.
Domain name service resolver
A domain name service (DNS) resolver returns Internet protocol (IP) addresses. A connection with an Internet application or device receives domain name resolution requests that originate outside of the Internet. A direct DNS resolver identifies IP addresses without referring to the Internet or using other DNS resolvers. An address store includes a predetermined list of domain names and corresponding IP addresses specified from a point remote to the DNS resolver. The DNS resolver processes the domain name resolutions for the predetermined list of domain names differently than domain name resolutions for other domain names not on the predetermined list of domain names. At least part of the predetermined list is pushed to a destination upon receiving a resolution request for a domain name in the predetermined list of domain names, the request being of a type other than an authoritative resolution request to be performed by the direct DNS resolver.
Switching between connectivity types to maintain connectivity
Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or configure broadband connectivity between a broadband access provider and a broadband device, such as a DSL modem or a cable modem. Specifically, because narrowband connectivity does not require advance configuration or provisioning by the host system of connectivity parameters for an access-seeking device, a modem at an access-seeking device may be leveraged to establish a narrowband connection between that device and a host system and to enable an exchange or negotiation of connectivity parameters necessary to enable future broadband connectivity. Thus, once established, the narrowband connection may be used as a conduit for communicating required provisioning information between the broadband-enabling host and the access-seeking device to enable broadband connectivity by the device in the future.
Establishing a communication session
According to a first aspect of the present invention there is provided a method of operating an IP Multimedia Subsystem Application Server to facilitate a communication session between a first user and a second user at a required Quality of Service. The method comprises receiving a notification that a Policy and Charging Rules function associated with the first user has not authorized said required Quality of Service (B4), the notification including an indication of additional Quality of Service required by the first user in order to achieve said required Quality of Service, requesting authorization, from a Policy and Charging Rules function associated with the second user, for the additional Quality of Service for the first user (B11), receiving a notification that the Policy and Charging Rules function associated with the second user has authorized said additional Quality of Service (B12), and notifying the Policy and Charging Rules function associated with the first user that the additional Quality of Service has been authorized for the first user (B14).
IP network service redirector device and method
A method for redirecting specific network traffic intended for a target device on a first data network is described. The method inserts a redirector into a first network in front of a target device and intercepting a transmission from the target device. The method then configures the network characteristics of the redirector to use the network addresses of the target device. Once configured the redirector inspects the network traffic on the first network to identify specific services, and sends the network traffic associated with the specific service to a destination device on a second network.
JRuby and SIP servlets integration
A mechanism for JRuby and SIP Servlets integration is disclosed. A method of embodiments of the invention includes deploying, by a Session Initiation Protocol (SIP) Servlets application server, a JRuby application to provide Voice over Internet Protocol (VoIP) services, and associating, by the SIP Servlets application server, a deployment file in a Ruby adaptation layer of a JAVA EE application server with the JRuby application, the deployment file defining a Session Initiation Protocol (SIP) Servlets application name in a SIP configuration section of the deployment file and a name of a class that handles SIP message.
Peer-to-peer negotiation in a wireless network
When two wireless communication devices discover each other and prepare to associate with each other, they perform a negotiation with each other to decide which will act as the network controller in that association. The negotiation may include an exchange of information indicating which device is more suitable to act as a network controller.
Technique for creating print data
A print data creation device may perform a plurality of tasks in parallel. The print data creation device may be provided with a first download device, a second download device, and a sending controller. The first download device may be configured to perform a first task for downloading first data in predetermined data size units from an external device. The second download device may be configured to download second data from the external device in accordance with an address of the second data in a case where the first data having the predetermined data size includes the address of the second data. The second data may be necessary for performing a second task. The sending controller may be configured to prohibit a first download request for downloading the second data from being sent to the external device during the downloading of the first data having the predetermined data size, and to prohibit a second download request for downloading the first data having the predetermined data size from being sent to the external device during the downloading of the second data.
Software-defined network attachable storage system and method
A method for establishing a software-defined network attachable storage system includes establishing first and second sets of logical computer systems (which may be virtual computer systems) as namespace servers and dataspace servers respectively. Each namespace server is configured: (a) to store, in its memory, filesystem metadata, the metadata including file and directory names and information on where user data associated with the file and directory names resides, and to store in its storage system a dynamically updated copy of the filesystem metadata; and (b) to process storage system pathname requests, for a predetermined subset of the namespace, from at least one requesting client computer and to return in response to each request a handle for use by the requesting client computer; and (ii) each dataspace server is configured to store and retrieve user data in its storage system based on handles determined by the namespace servers.
System and method for loading web page using multiple paths in multiple interface circumstances
A system and method for loading a web page using multiple paths in multiple interface circumstances are disclosed. The web page loading system providing multiple interfaces may include an allocator to set interfaces for loading resources, for each resource, constituting a web page associated with a Hypertext Transfer Protocol (HTTP) request when the HTTP request is received from a browser. In this instance, the browser may render the web page by respectively loading corresponding resource data through the interfaces set for each resource.
Virtual testing environments
In one aspect, a first request is received at a configuration server for access to a first virtual test environment. The first request is received from a first client device over a network and specifies one or more configuration options associated with the first virtual test environment. It is determined that a user of the first client device belongs to a first group out of multiple groups. A first pool of resources is selected based on the user of the first client device belonging to the first group, wherein the first pool of resources are available to members of the first group but not available to members of a second group out of the multiple groups. A first virtual machine is provisioned using the selected first pool of resources that includes the first virtual test environment, the first virtual test environment including features associated with the one or more configuration options associated with the first virtual test environment. The first client device is provided access to the first virtual test environment.
Method, apparatus and system for processing composite service and replacing service and invoking service
The present invention relates to a method for handling and replacing a service. The method for handling a composite service may include obtaining a concrete service corresponding to a service invocation segment description in a composite service logic, wherein the service invocation segment is an abstract service invocation segment or a service template invocation segment; triggering a service replacement, requesting to replace the service invocation segment with a concrete service invocation segment of the obtained concrete service; or, triggering a service invocation, requesting to generate a service invocation based on the concrete service. Accordingly, a concrete service can be dynamically selected when the composite service logic is being executed.
First-point of entry (FPOE) method for multiple social networks and systems and methods for enabling users to interact democratically within open groups and for managing voting rights in an online social network environment
A First-Point Of Entry (FPOE) method for multiple social networks and systems & methods for enabling users to interact democratically within open groups and for managing voting rights in an online social network environment. When a user joins a new social network the FPOE system and method downloads the user's contributed information from a prior social network. The user's profile, connections and privileges from the prior social network are carried over to the new social network. Similarly, when a user updates his/her information, the new information automatically flows through the various social networks on the FPOE. Another aspect of the invention enables users to interact democratically and manage voting rights. A multilevel test is administered to new users to calculate valid points and various voting privileges are assigned accordingly.
Method and apparatus for managing communication inquiries
A system that incorporates teachings of the present disclosure may include, for example, a processor that can determine a standard inquiry message from an inquiry command captured at a first communication device of a first user. The standard inquiry message can have an importance rating based on an urgency of the inquiry command and based on behavior information associated with the first user. The processor can deliver the standard inquiry message and the importance rating to a communications management agent of a second communication device, where an inquiry indicator accompanies the delivery of the standard inquiry message at the second communication device. Other embodiments are disclosed.
System and method for modeling interdependencies in a network datacenter
The system and method described herein may include a discovery engine that scans a network datacenter to inventory resources in the datacenter and populate a configuration management database with the resource inventory. One or more destination listeners created from the resource inventory may then selectively sample monitored flows in the datacenter to model interdependencies between the inventoried resources. For example, any monitored flows originating outside the datacenter or failing to correlate with the inventoried resources may be dropped, whereby the interdependencies may be modeled from a deliberately reduced sample of the monitored flows that have information relevant to modeling relationships between resources within the datacenter. Furthermore, directionalities for the monitored flows may be determined, wherein the directionalities provide further information relevant to modeling the relationships between the resources within the datacenter.
Metering software infrastructure in a cloud computing environment
A metering tool can monitor the software resources of the cloud to meter the software utilization of the cloud. The metering tool can cooperate and communicate with a cloud management system to determine the software resources utilized by processes instantiated in the cloud and to track the duration of the utilization. The metering tool can store the tracked utilization in a record.
Remotely monitoring a data processing system via a communications network
A remote data processing system facilitates monitoring of the remote data processing system. The remote data processing system receives a data message via a communications network. The remote data processing system cascades at least a first stage software component and a second stage software component to form an installed remote software module for accepting the received data message. The remote data processing system detects the data message or a derivative at a group of logical nodes within the installed remote software module to determine flow of the data message, or a derivative thereof, between the logical nodes. The remote data processing system identifies a deficient software component of the installed remote software module as any of said software stage components that blocks or disrupts the flow of the data message between two adjacent logical nodes.
System and method for a behavior-targeted survey
An aspect of the present invention relates to tracking a computer user's behavior and providing related visual media segments with a graphical user interface for presenting a survey. In embodiments, the survey is based on the tracked user behavior. In embodiments, the visual media segments are slide-in visual media segments and the user has preemptive control over certain aspects of the visual media segments.
Constructing a logical, regular axis topology from an irregular topology
Constructing a logical regular topology from an irregular topology including, for each axial dimension and recursively, for each compute node in a subcommunicator until returning to a first node: adding to a logical line of the axial dimension a neighbor specified in a nearest neighbor list; calling the added compute node; determining, by the called node, whether any neighbor in the node's nearest neighbor list is available to add to the logical line; if a neighbor in the called compute node's nearest neighbor list is available to add to the logical line, adding, by the called compute node to the logical line, any neighbor in the called compute node's nearest neighbor list for the axial dimension not already added to the logical line; and, if no neighbor in the called compute node's nearest neighbor list is available to add to the logical line, returning to the calling compute node.
Data collection apparatus and method thereof
A data collection apparatus includes an information storing unit which stores application information collected from a server providing a service by running an application and includes detail information indicating a detail of the application, an information collecting unit which collects the application information from the server, an information identifying unit which identifies application information in which an abnormality has occurred and application information, affected by the abnormality, a first comparing unit which compares, as to the application information identified by the information identifying unit, all application information including the detail information and all application information including the detail information collected in the previous point, and extracts application information different from the application information collected in a previous point, and an information sending unit which sends the application information, extracted by the first comparing unit, to a data management apparatus which manages the application information.
System and method for policy based management for a high security MANET
A system and method for policy based management for a high security MANET comprises policy managers, each performing policy decision-making and policy enforcement using multiple policies, containers, each related to an application and each container having one policy manager, nodes, each having an infrastructure and at least one container, and dynamic community building blocks associating the containers having a same application, the containers being in different nodes, the associated containers maintained by the dynamic community building blocks on a secure network. Each container can define a security boundary around the node. Each container can be a lightweight virtual machine. The system can also have a special container having a policy manager only evaluating policies for conflicts. In one embodiment, a node can consist of multiple network devices and each network device is a container of its own.
Systems and methods for statistics exchange between cores for load balancing
Systems and methods for consolidating metrics and statistics used for load balancing by a plurality of cores of a multi-core intermediary are disclosed. A timer operating on each packet engine of each core in a multi-core system may expire. A consolidator may store, responsive to expiration of the timer, a set of counter values from each of the packet engines to a first storage location. The consolidator may send to each packet engine a message to update the set of counter values. The consolidator may, upon completion of updating the set of counter values by the packet engines, send a second message to the packet engines that includes a consolidated set of counter values determined based on the updated set of values from each packet engine. Each packet engine may establish settings and parameters for load balancing based on the consolidated set of counter values.
Systems and methods for providing DNS services
A system for providing a Domain Name System (DNS) service may include providing an agent for installation on a subscriber device. The subscriber device may be connected to the DNS service via an entry point device. The system includes receiving, from the agent, agent data indicative of a subscriber identifier and a unique identifier associated with the entry point device. The system may then determine, based on the agent data, a current Internet Protocol (IP) address associated with the entry point device and associate the unique identifier with the subscriber identifier. The system may then dynamically map the subscriber identifier to the current IP address and provide DNS service to the subscriber device based on the current IP address.
Cloud-based server computing system for and method of providing cross-platform remote access to 3D graphics applications
A server computing system in a client-server computing environment includes a virtual display driver that marshals and transmits graphics application programming interface (API) functions to a client via a network. The server may receive capability information from the client, allowing the virtual display driver to resolve differences between the APIs supported on the server and the client.
Methods and apparatus for using multiple wireless links with a wireless terminal
Mobile nodes support simultaneous OFDM links with multiple points of network attachment. A MN may simultaneously use multiple IP addresses, allowing packets addressed to the mobile to be routed over different paths. Alternatively, the MN may have a single IP address with packets corresponding to different applications, e.g., identified by packet header information, being routed over different paths. Thus packets corresponding to one application, e.g., a voice application, may be routed over one wireless link while packets corresponding to another application, e.g., a data application such as E-mail, may be routed over another wireless link, while packets corresponding to still another application, e.g., a broadcast TV service may be communicated over another wireless link. The direction of communication, latency, reliability and other QoS characteristics of the different wireless links may be considered in path selection to provide MN's user with cost effective service while still meeting minimum application requirements.
Controlling, filtering, and monitoring of mobile device access to the internet, data, voice, and applications
Systems and methods for controlling, filtering, and monitoring mobile device access to the internet are disclosed. According to an embodiment a server is responsible for controlling, filtering and monitoring internet activity. For every request, the server interacts with back-end databases that categorize requests, and based on user/carrier/corporate settings, allow or disallow access to particular content.
Document generation apparatus, document generation system, document upload method, and storage medium
A document generation apparatus includes a determination unit, an upload unit, and a transmission unit to generate a document and upload the generated document to an external service via a network. The determination unit determines whether a document generated according to a document generation request from a client apparatus can be uploaded to the external service. The upload unit uploads the document to the external service, if the determination unit determines that the document can be uploaded to the external service. The transmission unit transmits, to the client apparatus, the document and information for uploading the document from the client apparatus to the external service, if the determination unit determines that the document cannot be uploaded to the external service.
Service providing system, a virtual machine server, a service providing method, and a program thereof
A service providing system has a virtual machine server and one or more client terminals. The virtual machine server has one or more virtual machines and a virtual machine system unit which controls the virtual machines. The virtual machine system unit classifies the client terminals into groups. Each of the virtual machines provides a service to each of the terminals in a group in response to receiving a request for the service from one of the client terminals in the group of terminals.
Direct sending and asynchronous transmission for RDMA software implementations
Exemplary embodiments include RDMA methods and systems for sending application data to a computer memory destination in a direct but non-blocking fashion. The method can include posting a new work request for an RDMA connection or association, determining if there is a prior work request for the same connection or association enqueued for processing, in response to a determination that no prior work request is enqueued for processing, processing the new work request directly by sending RDMA frames containing application data referred to by the work request to the computer memory destination, performing direct sending while there is sufficient send space to process the new work request, and delegating the new work request to asynchronous transmission if a prior work request is already enqueued for processing or lack of send space would block a subsequent transmission operation.
Distributed storage network for storing a data object based on storage requirements
A distributed storage network (DSN) includes a user device and a plurality of DSN memories, wherein each of the DSN memories includes a plurality of storage units. The user device includes at least one network interface to the plurality of DSN memories and at least one processing module that is operable to determine one of the plurality of DSN memories for storing a data object based on a comparison of one or more storage requirements of the data object and one or more DSN attributes of the plurality of DSN memories.
Method and system for message thread compression
A method for compressing electronic mail messages each having a message thread for storage in a storage device, comprising: identifying one or more sections of each message thread; assigning a respective identifier to each section; storing one occurrence of each section in the storage device for retrieval using its identifier; replacing each section in each thread by its identifier to thereby compress the messages; and, storing the messages in the storage device.
Cluster server of an instant messaging system and messaging method between clusters
This disclosure discloses a cluster server and a messaging method between clusters in an instant messaging system, wherein in the cluster server, a storage unit is configured to store the first subscription information that a client user of the inner-cluster subscribes the presence state of a client user of an external cluster and the second subscription information that a client user of the external cluster subscribes the presence state of a client user of the inner-cluster; an information classification unit is configured to determine whether the communication message transmitted between the client user of the inner-cluster and the client user of the external cluster is a state-presence related message; and an information transmission unit is configured to transmit the communication messages according to the first and second subscription information when the communication message is a state-presence related message. Through the cluster server and method of this disclosure, by classifying the messages between the clusters, the objectives of effectively using the network bandwidths between the clusters and improving the messaging efficiency and the bearing capacity of the whole instant messaging system are fulfilled.
Collaborative web browsing system having document object model element interaction detection
The present invention is directed towards to computerized social networks and e-commerce and facilitating ad-hoc screen sharing and co-browsing between users of a social network. The collaborative web browsing system has document object model element interaction detection. The collaborative browsing method comprises a server computer having a Shopping With A Friend (SWAF) server engine coupled to a database, a SWAF client engine coupled to the SWAF server engine and a plurality of client computers each having a web browser program that runs the SWAF client engine. The web browser program does not include a collaboration plug-in.
Content distribution methods for a ring network and related systems and computer program products
Methods for distributing content in an entertainment system are provided. The entertainment system includes a plurality of clients connected in a bi-directional loop configuration. Each of the plurality of clients has at least one associated video display unit. The method includes deriving a content distribution plan for distributing content files to the plurality of clients based on a theoretical symmetric system where each of the plurality of clients in the symmetric system is configured to store at least a fraction of each of the content files; and applying the derived content distribution plan for distributing content files to an actual entertainment system wherein each of the content files are stored in full in at least one of the plurality of clients of the system to provide an actual content distribution plan for the actual entertainment system. Related entertainment systems and content distribution modules are also provided.
Notifications using a situational network
A method of creating a projection of a situational network includes creating, by an event node server, an event node in a multi-dimensional personal information network, where the event node corresponds to a situation. A projection of nodes of the situational network is formed using geographic locations of a plurality of devices corresponding to nodes in the multi-dimensional personal information network. An invitation is transmitted to establish a link with the event node server to the devices corresponding to each node in the projection. A response is received from at least one of the devices accepting the invitation to establish a link with the event node server. A link with each device accepting the invitation is established.
System and method for facilitating document collaboration
A system and machine-implemented method for facilitating collaboration with one or more users including receiving a request from a first user to collaborate with a social group on a collaboration object, the social group including one or more users associated with the first user at a social networking site, generating a post providing access to the collaboration object in response to receiving the request, providing the post for display at the social networking site, receiving a request to access the collaboration object from a second user in response to the second user interacting with the post at the social networking site and providing the collaboration object for display to the second user at the social networking site in response to receiving the request from the second user, wherein the second user is able to modify the collaboration object at the social networking site.
Survivable browsing in virtualized desktop environment when host connectivity is lost
Techniques are provided herein for providing survivable browsing when a client endpoint device loses contact with its host server. A Hosted Virtual Desktop (HVD) draws and communicates an HVD display image comprising a HVD browser window to the client endpoint device for display, via a virtual desktop interface (VDI) protocol. A browser (or browser extension) on the HVD works together with a browser server on the client endpoint device to synchronize browser data, and in some examples to render data such as streaming media in a client-provided frameless browser window in place of a placeholder in the HVD browser window. In response to the detection of an inactive VDI session, the browser server on the client endpoint device launches an endpoint browser instance to seamlessly switch browsing from the HVD browser window to an endpoint browser window, using the browser synchronization data.
Virtual communication techniques
Techniques for facilitating communication are provided. The techniques include using a machine-to-machine communication to facilitate communication between one or more human users of a communicator device and a compatible communicator device, wherein using the machine-to-machine communication to facilitate communication between one or more human users comprises initiating a machine-to-machine communication with a compatible communicator device if the device is within the geographic proximity, wherein the machine-to-machine communication incorporates one or more related items from a user profile of each device automatically extracted by the device initiating the machine-to-machine communication, and conducting the machine-to-machine communication in a manner in which the communication can be monitored by the one or more human users.
Control device and method, program, and recording medium
According to the present invention, a plurality of apparatuses can be synchronously controlled by a simpler operation. A synchronous control information management unit 87 stores synchronous control information including synchronous operation patterns and synchronous control conditions. In each of the synchronous operation patterns, a procedure for sequentially transmitting control commands to a plurality of apparatuses is defined using a single pattern name. In each of the synchronous control conditions, a condition for selecting one of the synchronous operation patterns is described. A control pattern analysis unit 89 analyzes a synchronous control pattern, sequentially generates control commands used to control apparatuses on the basis of the analysis result, and supplies the generated control commands to a network interface 81 or an infrared communication control unit 90. The present invention can be applied to a reproduction system for reproducing content.
Methods and devices for standalone social networking and internet protocol communication setup
Disclosed are methods and devices for a social networking device 102. The methods include calculating a value for a social networking index 460 for contacts in a contact list 103, and prioritizing a subset of contacts 462. IP addresses of contacts retrieved 468 from the Internet according to the social networking index can be preloaded 470 for the initiation of an IP based communication 474. The social networking index is generated from values of predetermined statistics 130 associated with contacts of the contact list. The statistics associated with contacts of a contact list include 464 a number of communications with a contact, a statistical value calculated from lengths of communications with a contact, a time since a last communication with a contact and a statistical value calculated from times between at least two consecutive communications with a contact. Calculating a social networking index 460 can include applying weights 466 with which to combine the values of the predetermined statistics.
Passive switched-capacitor filters conforming to power constraint
Passive switched-capacitor (PSC) filters are described herein. In one design, a PSC filter implements a second-order infinite impulse response (IIR) filter with two complex first-order IIR sections. Each complex first-order IIR section includes three sets of capacitors. A first set of capacitors receives a real input signal and an imaginary delayed signal, stores and shares electrical charges, and provides a real filtered signal. A second set of capacitors receives an imaginary input signal and a real delayed signal, stores and shares electrical charges, and provides an imaginary filtered signal. A third set of capacitors receives the real and imaginary filtered signals, stores and shares electrical charges, and provides the real and imaginary delayed signals. In another design, a PSC filter implements a finite impulse response (FIR) section and an IIR section for a complex first-order IIR section. The IIR section includes multiple complex filter sections operating in an interleaved manner.
Method for generating a challenge-response pair in an electric machine, and electric machine
A method is described for generating a challenge-response pair in an electric machine as the basis for an authentication. The electric machine has at least one stator and at least one rotor. A voltage signal or current signal which causes induction between the rotor and the stator is generated as the challenge, and a variable which is a function of the caused induction is determined as the response.
Multi-branch rate change filter
The multi-branch rate change filter of the present invention achieves higher effective output rates by processing the input sample stream in two or more parallel filter branches with offset states.
Filter auto-calibration using multi-clock generator
A filter auto-calibration system includes a multi-clock module. The multi-clock module includes a multi-clock generator that is configured to generate a clock signal with a variable frequency based on a channel setting. There is at least one filter to be calibrated. An auto-calibration control module is configured to control calibration of the at least one filter based on the channel setting. The multi-clock module is configured to supply the variable frequency clock signal to the at least one filter and to the auto-calibration control module, and the at least one filter is coupled to the auto-calibration control module.
Apparatus and method for generating random numbers
Random number generation apparatus (2) is described that comprises a threshold detector (4) and an electrical noise generator (6). The electrical noise generator (6) has at least two channels (8a-8d) and each channel is arranged to generate an electrical noise signal. The threshold detector (4), which may comprise a digital input-output (DIO) card, is arranged to periodically compare this electrical noise signal with a threshold and to provide a binary data output that indicates whether the threshold has been exceeded. Each channel of the electrical noise generator comprises at least two amplifiers (10a-10c) electrically connected in series that preferably provide a gain of 50,000 or more. Use of the random number generation apparatus (2) for quantum cryptography applications is also described.
Reproducing apparatus, reproducing method, program, program storage medium, data delivery system, data structure, and manufacturing method of recording medium
The present invention relates to a reproducing apparatus, a reproducing method, a program, a program storage medium, a data delivery system, a data structure, and a manufacturing method of a recording medium for easily handling a content file recorded on a disk and an update file recorded on a local storage. Downloaded data can be handled with a file having a path name and a file name on the local storage being different from a file having a path name and a file name on a virtual file system based on a path name specified by an src_file_name field of and a path name specified by a dst_file_name field of a manifest ( ) section. The present invention is applicable to reproducing apparatuses.
Media container file management
A media container file (1) is generated by organizing media data (2; 3) defined by a media track (12) in the file (1). Sub-track information (72, 74) identifying media data portions (4, 5; 6, 7, 8) of the media data (2; 3) is organized for each sub-track of multiple sub-tracks defined in the media track (12). At least one of the sub-tracks is assigned selection information (62, 64) defining a selective processing of the media data portion (4, 5; 6, 7, 8) defined by the sub-track in relation to other media data organized in the media container file (1). The media data (2, 3) advantageously relate to layered media or media defining multiple camera views which are organized into sub-tracks (12). The selection information (62, 64) allows selection among tracks (12) and sub-tracks when setting up a media session and switching between tracks (12) and sub-tracks during such a media session.
Operational-related data computation engine
A computation system includes a receiver, a schema generator, and a table generator. The receiver receives operational related data relating to an IT environment of an organization from remote systems. The schema generator organizes the operational related data into at least one class of IT metric-oriented data based on at least one intrinsic characteristic of the operational related data to generate a schema. The operational related data includes data tables corresponding to IT assets of the organization. The table generator processes an input table based on the schema to generate an output table. The input table includes a starting table having one or more columns. The output table identifies a subset of interrelated data included in the starting table.
Apparatus and method for expanding a shared-nothing system
A computer readable storage medium includes executable instructions to evaluate an expanded shared-nothing data store configuration. A data redistribution schedule table with specified parameters is formed. Data is redistributed within the expanded shared-nothing data store in accordance with the data redistribution schedule table.
System, method and computer program product for locking data in an on-demand database service
In accordance with embodiments, there are provided mechanisms and methods for locking data in an on-demand database service. These mechanisms and methods for locking data in an on-demand database service can enable embodiments to prevent race conditions, etc. The ability of embodiments to provide such feature may lead to enhanced data integrity when editing data.
Customized user interface for subordinate users
A user interface including one or more references to content is customized. Several user profiles are provided from which a user may be associated. Each user profile includes user profile information. The user profile associated with a user to whom a user interface will be provided is accessed. A user interface is configured for the user, based at least in part upon the user profile accessed as being associated with the user. Access to content is enabled based on user manipulation of the configured user interface.
Enhancing keyword advertising using online encyclopedia semantics
Disclosed are systems and methods for extracting semantic-based keywords through mining word semantics using an online encyclopedia's taxonomy. Described is the use a semantic bipartite graph that relates candidate keywords and topics.
System and method for identifying a component for a tire pressure monitoring system
A system and method for identifying a component, such as a sensor, for a Tire Pressure Monitoring System (TPMS) to be replaced for a vehicle of interest by performing a Quick Search or an Advanced Search of a TPMS Manager database. In the Quick Search, the user inputs year/make/model (Y/M/M) or Vehicle Identification Number (VIN). In the Advanced Search, the user inputs various physical attributes of the component to be replaced. All related superseded, alias or interchange parts with like communication or physical structure and relevant service components are determined and the results displayed to the user. A relearn procedure for the replacement TPMS component for the vehicle of interest identifies and validates scan tool compatibility. A report to the user of a cause/failure analysis of the component to be replaced can be displayed.
Relevancy-based domain classification
A domain classifier develops and maintains relevance data about specific domains based on historical relevance data and source context data. Such data may be used to classify the user's interest in attempting to visit a specific domain and thereby redirect the user to a website expected to be aligned with the user's interest. In various implementations, the historical relevance data is derived from source context data and/or post-visit user behavior collected from previous attempts to visit a specific domain. The source context data collected from the current visit may also be used as source context-factors to influence domain classification. Based on such historical and current source context factors, as well as the domain address provided in the user's navigation request, a domain classifier consults the historical relevance data and provides the user with Web content that is identified as likely to be relevant to the user's interests.
Methods and apparatuses to identify devices
Embodiments of the present invention include systems with Readers and Tags in which a Reader queries the Tags with a parameter that includes a level of probability of reply according to which the Tags individually and randomly decide whether or not to reply. In one embodiment, the Tags can switch between two states: A and B. The query command also specifies a state (A or B) so that only the Tags in the specified state can reply. After successfully sending the Tag identification data from a Tag to the Reader, the Tag switches to the other state from the specified state. In one embodiment, the operations about the two states are symmetric. In one embodiment, the Tags can remember the parameters used in a query so that a short form of query command can be used to repeat the query with the same query parameters.
Methods for managing ownership of redundant data
According to one embodiment, a method includes storing instances of a file in a first storage tier and a second storage tier of a storage system; associating each instance of the file on the first and second storage tier with a unique program identifier (UPI); receiving a request to access the file or instance thereof from a user in a group of users; searching for a UPI associated with an instance of the file that exists on the first storage tier; and providing the user requesting access to the file with remote access to the instance of the file on the first storage tier. Additional methods are also presented.
Information processing apparatus, information processing method, and storage medium
An information processing apparatus comprises: a creation unit adapted to create a query string, which is composed of a plurality of queries; a reading unit adapted to read, from the query string, a query corresponding to a hierarchy of a current node in accordance with the hierarchy; a generation unit adapted to generate a plurality of nodes having a tree structure by dividing a learning pattern set in the current node in accordance with the read query corresponding to the hierarchy; and a modifying unit adapted to modify the tree structure by putting nodes in each hierarchy together into a common node with respect to nodes up to a hierarchy corresponding to a length of the query string among the nodes having the tree structure, which have been generated by the generation unit.
Systems and methods for generating interpolated data sets converging to optimized results using iterative overlapping inputs
Embodiments relate to systems and methods for generating interpolated data sets converging to optimized results using iterative overlapping inputs. A database can store sets of operational data, such as financial, medical, climate or other information. For given data, a portion of the input data can be known or predetermined, while for a second portion can be unknown and subject to interpolation. The interpolation engine can generate a conformal interpolation function and interpolated input sets that map to a set of target output data. In aspects, to attempt to drive the set of interpolated input data and/or other results to an optimized and/or steady-state value or values, the interpolation engine can generate a set of shifts or alterations to the set of combined input data as that data exists, to create a set of iterative overlapping input data. That iterative overlapping data can be used to execute successive interpolation runs, and determine whether the interpolation results converge to a set of steady-state and/or optimized results. When convergence is detected, the interpolation results can be assumed to represent optimized, steady-state, and/or best-available values for the conditions of the original combined input data.
System and method for retrieving and normalizing product information
A method and system for retrieving and normalizing product information are described. The system retrieves product information from sources that are accessed over a network. Next, the system creates markup language based on the product information. The markup language includes a first attribute-value pair that includes a first attribute and a first value. Next, the system normalizes the markup language by translating the first attribute to a second attribute responsive to an identification of the first attribute in a list that includes a plurality of attributes that are associated with a first product and the second attribute. The second attribute is a canonical representation of the plurality of attributes respectively.
Method and system of providing verified content
A system and method for creating and utilizing content is described. Content is generated which includes a query and a response to the query. A primary query may be used to generate a plurality of variant queries which may be matched to a request. A content owner or curator may review a query, a response, and/or alternate queries, and may provide access to media which may be used to generate queries and responses.
System and method for type-ahead address lookup employing historically weighted address placement
The subject application is directed to a system and method for type-ahead address lookup employing historically weighted address placement. A prompt is generated on a display for commencement of a new search operation and search data of text entries is received via a user interface. Entries are stored in an associated database, each entry having at least one searchable text field. At least a first character of a new search received via the user interface is tested against the entries relative to the searchable field. A display is generated corresponding to a subset of the entries based upon a testing output. Selection data is received corresponding to a selected entry from the displayed subset and weighting data is generated corresponding to received selection data. Displayed entries are ordered corresponding to the subset of database entries upon subsequent re-entry of the at least a first character during a subsequent search operation.
Method and apparatus for ranking search results
One embodiment of the present invention provides a system for ranking search-results. During operation, the system receives a query, wherein the query includes one or more terms. The system subsequently searches a dataset using the one or more terms to obtain search-results. Next, the system receives an attribute-identifier, which identifies an attribute for the obtained search-results. Then, for each search-result, the system calculates a combined score based on an attribute-value for the identified attribute, and a relevance-score for the search-result. The system then ranks the search-results based on combined scores associated with the search-results. Finally, the system presents the ranked search-results to a user.
Product classification in procurement systems
Various embodiments provide solutions to assist in the classification of products in a procurement system. The tools provided by various embodiments include, without limitation, methods, systems, and/or software products. Merely by way of example, a method might comprise one or more procedures, any or all of which are executed by a computer system. Correspondingly, an embodiment might provide a computer system configured with instructions to perform one or more procedures in accordance with methods provided by various other embodiments. Similarly, a computer program might comprise a set of instructions that are executable by a computer system (and/or a processor therein) to perform such operations. In many cases, such software programs are encoded on physical and/or tangible computer readable media (such as, to name but a few examples, optical media, magnetic media, and/or the like).
System and method for providing answers to questions
Providing answers to questions based on any corpus of data implements a method that generates a number of candidate passages from the corpus that answer an input query, and finds the correct resulting answer by collecting supporting evidence from the multiple passages. By analyzing all retrieved passages and that passage's metadata in parallel, an output plurality of data structures is generated including candidate answers based upon the analyzing. Then, supporting passage retrieval operations are performed upon the set of candidate answers, and for each candidate answer, the data corpus is traversed to find those passages having candidate answer in addition to query terms. All candidate answers are automatically scored by a plurality of scoring modules, each producing a module score. The modules scores are processed to determine one or more query answers; and, a query response is generated based on the one or more query answers.
Multi level partitioning a fact table
Inputs are received. The inputs are a star schema data model comprising a non-partitioned fact table (F) comprising fields (f1, f2, . . . fn); a set of queries (Q=q1, q2, . . . qm); and a set of weights for each query in Q. Each weight defines the priority of a respective query in a workload. The inputs are pre-processed to produce a most-granular-partitioning. The most-granular-partitioning is processed to produce an initial multi-level partitioned primary index, the processing including determining the scan cost of one of the queries in Q. The initial multi-level partitioned primary index is processed to produce a final multi-level partitioned primary index, the processing including determining the query cost of one of the queries in Q. F is partitioned using the final multi-level partitioned primary index. A query from Q is run against F to produce a result. The result is stored.
Database system and method of optimizing cross database query
A database system and a method of optimizing cross-database query. The database system includes a plurality of databases. At least two of the databases are stored with one or more data collections composed of tables with the same structure. A federated view of the data collection is created on each of the databases. A request routing layer for routing, in response to a query request crossing the data collections, the query request crossing the data collections to one of the at least two databases according to a predetermined routing rule, so as to query by using the federated view of the database.
Compression of tables based on occurrence of values
Methods and apparatus, including computer program products, for compression of tables based on occurrence of values. In general, a number representing an amount of occurrences of a frequently occurring value in a group of adjacent rows of a column is generated, a vector representing whether the frequently occurring value exists in a row of the column is generated, and the number and the vector are stored to enable searches of the data represented by the number and the vector. The vector may omit a portion representing the group of adjacent rows. The values may be dictionary-based compression values representing business data such as business objects. The compression may be performed in-memory, in parallel, to improve memory utilization, network bandwidth consumption, and processing performance.
Subsegmenting for efficient storage, resemblance determination, and transmission
Transmitting or storing subsegments is disclosed. A data stream or a data block is received and broken into a plurality of segments. For at least one segment, the segment is broken into a plurality of subsegments. A previously stored or transmitted segment similar to the at least one segment is identified. A fingerprint is computed for at least one subsegment. And, using the fingerprint for the at least one subsegment, determining whether the at least one subsegment is identical to a subsegment of the previously stored or transmitted segment without directly comparing the content of the at least one subsegment with the content of the subsegment of the previously stored or transmitted segment.
Delaying database writes for database consistency
A continuous set of committed transactions can be lost without destroying the integrity of the database, by deferring the writing of the database pages stored in cache to the database on stable storage. A waypoint tracks a point in the transaction log following which transactions have not been applied to the database on stable storage and thus records after the waypoint are not needed for recovery to a consistent database. When there is a failover of an active database on Node A to a passive database on Node B, log records are compared starting with the most current and moving backwards and the point at which divergence in the log occurs is determined. When the lost portion of the log occurs after the point indicated by after the waypoint, the database is recoverable by log-based incremental reseed.
Generating and binding notes to business objects
A system and method for creating notes for business object instances are described. In various embodiments, a system includes modules to receive note data and bind notes to business object instances. In various embodiments, the system saves notes to a database via a dedicated database connection in a dedicated transaction. In various embodiments, a user interface is provided for creating and modifying notes on business content. In various embodiments, a method for creating notes in a user interface and attaching the notes to one or more positions in a user interface screen displaying business content in an enterprise information system is presented.
Using AMQP for replication
A first directory server computer system subscribes to update data published by directory servers via an advanced message queuing protocol (AMQP) server. The first directory server receives update data that indicates an update for a LDAP-based database associated with the first directory server. When the received update data is from the AMQP server, the first directory server converts the received update data into an LDAP data format and updates the LDAP-based database using the LDAP formatted update data. When the received update data is not from the AMQP server, the first directory server updates the LDAP-based database using the received update data, converts the received update data into a wire level data format, and publishes the wire level formatted update data to the AMQP server. The AMQP server allows a second directory server that subscribes to the AMQP server to obtain data representing the update.
Storage apparatus and control method of the same
A storage management system, if the required response performance of the file is added to the access request from the host computer, compares the required response performance of the file with the response performance of the pool volume assigned to the page. If the response performance of the compared pool volume does not satisfy the required response performance, the storage management system selects a pool volume whose response performance satisfies the required response performance from the pool volumes, migrates the page to the selected pool volume, and stores the data in the page to which the pool volume is assigned.
Inference pipeline system and method
A system to infer place data is disclosed that receives location data collected on a user's mobile electronic device, recognizes when, where and for how long the user makes stops, generates possible places visited, and predicts the likelihood of a user to visit those places.
Admission control in cloud databases under service level agreements
An admission control system for a cloud database includes a machine learning prediction module to estimate a predicted probability for a newly arrived query with a deadline, if admitted into the cloud database, to finish its execution before said deadline, wherein the prediction considers query characteristics and current system conditions. The system also includes a decision module applying the predicted probability to admit a query into the cloud database with a target of profit maximization with an expected profit determined using one or more service level agreements (SLAs).
Space-time-node engine signal structure
Example methods, apparatuses, or articles of manufacture are disclosed that may be implemented using one or more computing devices or platforms to facilitate or otherwise support one or more processes or operations associated with a space-time-node engine signal structure.
Method of generating an optimized, diverse population of variants
The disclosure relates to a method of generating a diverse set of variants to screen improved and novel properties within the variant population, a system for creating the diverse set of variants, and the variant peptides.
Optimal multi-class classifier threshold-offset estimation with particle swarm optimization for visual object recognition
Described is a system for multi-class classifier threshold-offset estimation for visual object recognition. The system receives an input image with input features for classifying. A pair-wise classifier is trained for each pair of a plurality of object classes. A set of classification responses is generated, and a multi-class receiver-operating-characteristics (ROC) curve is computed for a set of threshold-offsets. An objective function of classification performance is computed from the ROC curve and optimized using particle swarm optimization (PSO) to generate a set of optimized threshold-offsets. The optimized threshold-offsets are then applied to the classification responses. The resulting classification responses are compared to a predetermined value to classify each input feature as belonging to one object class or another. The tuning of the threshold-offsets with (PSO) improves classification performance in a visual object recognition system.
Computer-implemented systems and methods for forecasting and estimation using grid regression
Systems and methods are provided for estimating a value for a target variable. A plurality of known entities are assigned to cells of a grid, where the known entities are assigned to the cells based upon attribute data. A determination is made as to whether each cell has at least a threshold number of assigned known entities. When one of the cells contains fewer than the threshold number of known entities, cells are combined to form a super cell. A model is generated for each cell and super cell based upon target variable values for known entities assigned to that cell or super cell. Data for a target entity is received, and the target entity is assigned to one the cells. One of the models is selected based upon the cell assignment, and an estimate is generated for the target variable for the target entity using the selected model.
Method and apparatus for a predictive tracking device
A predictive tracking method and apparatus utilizing objective and subjective data in order to predict user states is provided herein. For example, some such embodiments may allow a user to track their mood or health symptoms in relation to retrieved data regarding their environmental in order to reveal patterns that can help forecast and proactively manage mood or health symptoms.
System and method of rating a product
For a system having a network-enabled device in communication with a computing network, a method of rating a product includes receiving a product identifier of a product from the network-enabled device, determining a product price, determining a brand entity, and defining a geographic perimeter of interest. One or more brand entity economic values attributed to the product are determined, such as a revenue received amount, a wages paid amount, a taxes paid amount, and/or a charitable contribution amount. Economic impact values are determined for the product and relate the product price to the brand entity economic value for the perimeter of interest. The method determines and outputs an economic impact rating to a user of the network-enabled device based the one or more economic impact values.
Systems and methods for applying postal rate discounts
Embodiments described herein provide a shipper a discount for each postal item that is mailed by a delivery service provider. A facilitator offers the shipper an immediate discount that is based on the shipper meeting certain requirements, e.g. purchasing a certain amount of postage value, shipping a certain number of mail items, and/or shipping a certain type of mail item such as a qualified mail piece. The facilitator will receive a rebate from the delivery service provider based on the shipper ability to meet the established requirements.
Methods for the transformation of real estate data to produce usable data
Real estate data and municipal codes and zoning rules are transformed and translated into useable data for non-land use experts. Rating systems for zoning desirability and zoning flexibility are presented with user driven weight and priority systems. Disperse data sets related to real estate are marshaled into a coherent database structure for efficient searching and organization.
Secure protocol for transactions
A secure protocol for transactions, such as electronic commerce transactions, is described that provides improved security through exploiting an independent (where this independence is logical and/or physical) communication path (e.g., between a customer and a back-end financial institution), ensuring that key financial information remains within the back-end financial institutions themselves. Hence, this protocol directly reduces cyber-crime risks through improvements to transaction security. In addition, various implementations of the secure protocol provide non-repudiation for one or more of the entities involved in the transaction.
Secondary identification for remittance delivery
There are provided a method, system and program storage device perform a remittance transaction. The method includes generating a remittance transaction to transfer funds from an account associated with a sender to a receiver; receiving a visual or audio identification of the receiver from the sender for the remittance transaction; and transmitting the generated remittance transaction, the received identification and the funds associated with the remittance transaction to a disbursement agent to selectively disburse funds to the receiver if the identification of the receiver matches the receiver.
Digital rights management provision apparatus, system, and method
Provided is digital rights management (DRM) provision technology, and more particularly, are an apparatus, system, and method which can easily provide content using one or more DRM systems. A DRM provision apparatus includes a content download unit which downloads encrypted real content and dummy content from a download server and which manages the downloaded real content and dummy content; a license management unit which manages a license issued by a license server; and a processing unit which manages the downloaded real content and dummy content and the issued license.
Vehicle and method of controlling the same
At or before time t2 when a kick-down switch was off, the higher speed a shift ratio selected by a driver is for, the smaller value a restriction rate K is set to. Consequently, driving force in a Mid-gear ratio is more restricted than driving force in a Lo-gear ratio. Further, driving force in a Hi-gear ratio is more restricted than driving force in the Mid-gear ratio. At time t2 when the kick-down switch changes from off to on, the restriction on driving force employing a restriction rate K is removed, whereupon an increment β in driving force in the Hi-gear ratio is, as it had a greater restricted amount during KD OFF, greater than an increment α in driving force in the Mid-gear ratio. A natural kick-down feeling responsive to the selected shift ratio is thus realized.
EGM authentication mechanism using multiple key pairs at the BIOS with PKI
Executable applications on a gaming machine are verified before they can be executed, for security purposes and to comply with jurisdictional requirements. Unlike in prior systems for authenticating the executable applications, embodiments allow for new executable applications to be provided and verified over time with different private and public key pairs, even after the operating code of the gaming machine is certified by the jurisdiction and deployed in the field.
Secured and selective runtime auditing services using a trusted computing device
In an embodiment, an apparatus includes a control logic to selectively audit transactions between the apparatus and a separate entity based on a type for the transactions. The apparatus also includes an encryption logic to encrypt an audit log that includes at least one attribute of one of the selectively audited transactions.
Financial transactions using a rule-module nexus and a user account registry
A method and a system for processing an online financial transaction executed at least partially by a computing device coupled to a communications network, comprising a rule-module nexus for processing an online financial transaction, an on-line verification platform, an online user account registry, wherein the on-line financial transaction comprises a payor-payee transaction, wherein the user is the payor and a merchant is the payee, and comprising at least one of the following: (a) the user and the payee are each directly and independently connected to the rule-module nexus during simultaneous logon sessions via a communication network, and wherein upon the user clicking on a website widget of the payee, the rule-module nexus transmits secure socket layer data directly to the user interface apparatus for display to the user via a pop-up window, without requiring application programming interface integration with a website of the payee and without requiring a form re-direct of the user away from the website of the payee; (b) the buyer, the seller, and the acquirer are each directly and independently connected to the rule-module nexus via a communication network, not necessarily during simultaneous logon sessions, and wherein the rule-module nexus hibernates the financial transaction pending verification the user, invocation of a rule-module, selection of the financial account, and submission of the selected financial account to the acquirer.
System and method for electronic deposit of a financial instrument by banking customers from remote locations by use of a digital image
A system and method for initiating a deposit transaction, where the depositor is a banking customer located at a remote location, and where the item to be deposited is a financial instrument, such as a paper check from a third party, payable to the depositor. The enabling system features a Remote Customer Terminal (RCT) with certain input devices, connected to a bank system. An image and/or other data of the financial instrument are transmitted from the RCT to the Bank of First Deposit (BOFD) where the data may be processed by conversion to Electronic Funds Transfer (EFT), via Electronic Check Presentment (ECP), or via check reconstruction. The deposit transaction can be accomplished without physical transfer of the financial instrument to or through the bank system. The system and method provide convenience and improved transaction processing speed compared to other deposit transactions of financial instruments.
System and method for funding a collective account
A system and method for funding a collective account such as a charitable account includes issuing a plurality of financial instruments, linking the financial instruments to the collective account, aggregating individual financial instrument usage, calculating a bonus or other reward based on the aggregate financial instrument usage and funding or distributing the reward to the collective account. According to the invention, members of a civic, charitable, political or other entity may generate collective rewards or other benefits which may be attributed to the designated organization.
Financial transaction funds collection and distribution
There is provided financial transaction funds collection and distribution methodology and system. A financial service provider assists in providing information to a third party transaction processor, who is engaged to process financial transactions such as insurance claims. Payors enroll as participants with the financial service provider, and information about the payors' banks, funding sources, or other financial institutions are linked to the payors in a database maintained by the payment system. Once a payor and the payor's financial institution are enrolled, funds may be obtained from the payor's bank by the financial service provider on behalf of the third party transaction processor, and without transaction-by-transaction involvement from the payor, significantly reducing the time, expense, and costs associated with financial transaction collection and payment.
Systems, devices, and methods for managing a payment transaction
Disclosed herein is a method for managing a payment transaction wherein a processor receives a transaction information input corresponding to a particular card type. The processor then accesses a BIN table and a rate table to calculate a fee based on the transaction information input and compares the calculated fee with alternate fees corresponding to alternate card types. A card type corresponding to a determined lowest fee between the calculated fee and the alternate fees is then outputted. The processor then completes the payment transaction by accessing transaction information corresponding to a user selected card type.
Method and system for a multi-purpose transactional platform
Methods and systems described herein can consolidate a plurality of a consumer's payment and non-payment source accounts into a consolidated platform with a customer identification or available proxy account numbers that can be assigned to source accounts. The source accounts can be, for example, credit card accounts, ATM accounts, debit card accounts, demand deposit accounts, stored-value accounts, merchant-loyalty card accounts, membership accounts, and identification card numbers. The consumer can access and modify any of the source accounts and manage funds across the source accounts by accessing the consolidated platform with a single access device or mode.
System and method for providing transactional credit
System and method for a second credit card issuer to provide transactional credit to a credit cardholder of a first credit card issuer, when the cardholder's account with the first issuer is in good standing and has an available credit balance equal to, or greater than, a proposed financial transaction with a merchant who does not accept the credit card of the first issuer, but does accept the credit card of the second issuer. The second issuer may charge a convenience fee to the customer, merchant, first credit card issuer, or any combination of them, for providing the transactional credit. Additionally, the second issuer may provide transactional credit to a customer to complete a financial transaction, via a reactivated credit card account of the second issuer, when the customer has a closed credit card account of the second credit card issuer that was closed in good standing.
System and method for optimizing loan modifications
A computer system for managing defaults that includes a loan investor platform associated with a loan servicer platform. The loan investor platform provides a loss mitigation workout type decision engine that receives from the loan servicer platform a first set of data associated with a loan loss mitigation case, determines an optimum loan workout for the loss mitigation case based on borrower criteria, prequalifies the loan for the optimum loan workout based on at least one investor set business rule and the first set of data, and communicates the loan workout that the loan is prequalified for to the at least one other computing device.
Securitization of sales participation certificates
The invention relates to financial products that provide a return that is a function of future sales/revenues, preferably gross sales/revenue, over a specified period of time. One embodiment of a method for creating such a financial product includes providing standard forms to an issuer and underwriter and standard terms to an issuer and investors. The terms to the issuer include providing capital to the issuer in exchange for a return that is a function of future sales over a specified period of time. The process further includes creating instruments representing investment in the financial product. The process creates the instruments in sufficient numbers and in appropriate denominations to facilitate trading in the financial product.
Trading interface for facilitating trading of multiple tradeable objects in an electronic trading environment
A system and method are provided for trading multiple tradeable objects. One example method includes displaying at least one combined quantity indicator representing a combined quantity associated with at least two tradeable objects, detecting an input associated with an order for a predetermined order quantity in relation to one of the combined quantity indicators, and allocating the order quantity between the at least two tradeable objects using at least one quantity allocation rule. In one example embodiment, a plurality of quantity allocation rules can be user-configurable, and different rules can be defined and applied in relation to different order types.
Collateralized lending using a central counterparty
A collateralized lending system and method using a central counterparty is disclosed. Lenders place orders to enter into long contracts with a central counterparty obligating them to lend an asset, or portion thereof. Borrowers place orders to enter into short contracts with the central counterparty obligating them to borrow an asset or a substantial equivalent thereof. The net effect acts like a lending transaction between the lender and the borrower. The central counterparty anonymously matches counter-orders from one or more borrowers and one or more lenders. Upon expiration of the loan, the central counterparty/clearing entity facilitates redemption of the loan. Thereby, the risk of loss due to borrower default is absorbed by the central counterparty encouraging lending activity by prospective lenders resulting in increased credit availability.
With respect to one order information piece in security transaction, processing of reception, transaction condition confirmation, transaction settlement and result transmission is executed serially. A transaction system is configured so as to divide a transaction including a plurality of transaction requests into predetermined units and execute resultant processing units in parallel. When such division is conducted, the sequential property is ensured. For example, the progress situation of processing is stored in a database every processing and every step. Issues, terminals, markets and servers are included as predetermined units.
System and method for automatic scalping a tradeable object in an electronic trading environment
A system and methods for automatic scalping in an electronic trading environment are presented. According to one embodiment, a trading application may display an indicator associated with a price level based on which a tradable object can be automatically traded. When a scalping application detects a fill associated with a first order, the scalping application may automatically enter a second order to offset a position created with the first order. According to one embodiment, the second order is automatically placed on the market when the inside market moves to a predetermined price level in relation to the displayed indicator.
Computer-implemented method and apparatus for adjusting the cost basis of a security
A computer-implemented method and apparatus for determining a cost basis associated with a plurality of shares of a security. In response to information identifying an issuer, the purchase date and the sale date, a list of capital events that occurred in connection with the security between the purchase date and the sale date is retrieved from a database. One or more shares held adjustment ratios are then retrieved from a database. Each of the shares held adjustment ratios corresponds to one of the capital events that occurred in connection with the security between the purchase date and the sale date. A current cost basis associated with the security may then be determined in accordance with the one or more cost adjustment ratios and the purchase price per share of the security.
System for electronic re-allocation of a transaction amount to an investment
This system may include a system for electronically reallocating any portion of a transaction by maintaining a user account at a user institution; maintaining a vendor account at a vendor institution; maintaining a user account at a trust institution; initiating a transaction for the transaction amount; electronically distributing the transaction amount from said user account to said vendor account; and electronically distributing at least a portion of the transaction amount from the vendor account to the user account at the trust institution, wherein the portion of the transaction amount in the user account at the trust institution is placed in an investment vehicle. The system of the present invention may further comprise providing an interactive information source between the user and the trust institution, whereby the trust institution can provide information (current or historical) to the user regarding the portion of the transaction amount placed in the investment vehicle.
Dynamic asset allocation using stochastic dynamic programming
A system and method are disclosed for capturing the full dynamic and multi-dimensional nature of the asset allocation problem through applications of stochastic dynamic programming and stochastic programming techniques. The system and method permit one to consider many rebalancing periods, many asset classes, dynamic cash flows, and a general representation of investor risk preference. The system and method further provide a novel and general framework for representing investor preference by representing utility by directly modeling risk aversion as a function of wealth. The system and method demonstrate how the optimal asset allocation depends on the investment horizon, wealth, and the investor's risk preference and how optimal asset allocation therefore changes over time depending on cash flow and the returns achieved. Examples of dynamic strategies for various typical risk preferences and multiple asset classes are described showing how dynamic asset allocation leads to superior results compared to static or myopic techniques.
Method and system for distribution of unactivated bank account cards
The invention comprises a method for distributing dead bank cards to customers who have not solicited a bank card or submitted an application. The dead bank card is a bank card (e.g., ATM card, debit card, check card, and the like) which contains all necessary information to be used, including a pre-assigned bank account number, and which only requires activation/approval by the prospective new bank account customer. In one embodiment, the dead bank card is distributed in connection with live credit cards issued to applicants for credit card accounts. Once operative, the bank card and the credit card may be linked together through a rebate/rewards program.
Method and apparatus for high-speed processing of financial market depth data
A variety of embodiments for hardware-accelerating the processing of financial market depth data are disclosed. A coprocessor, which may be resident in a ticker plant, can be configured to update order books based on financial market depth data at extremely low latency. Such a coprocessor can also be configured to enrich a stream of limit order events pertaining to financial instruments with data from a plurality of updated order books.
Methods and systems for estimating recoverable utility revenue
A system includes a utility analytics system. The utility analytics system includes a non-technical utility loss system configured to derive a probability of at least one utility non-technical loss, an unbilled utility system configured to calculate an expected unbilled utility service for a customer based on customer attributes and the probability of the at least one utility non-technical loss, and a revenue recoverability system configured to calculate an expected recoverable revenue based on probability of revenue recovery and of the expected unbilled utility service.
A method of using rules to execute periodic allocations of funds in a hierarchal accounting structure may include receiving an allocation rule, comprising a source account, a rule for determining a first amount, a parent account, and an allocation basis; accessing a multidimensional data cube comprising a hierarchal arrangement and aggregated balances for each level of the hierarchal arrangement; generating an allocation scenario by allocating the first amount to the aggregated balances for the one or more child accounts according to the allocation rule; generating one or more accounting journal entries corresponding to the allocation scenario; posting the one or more accounting journal entries to a general ledger associated with a relational database; and updating, using the relational database, the multidimensional data cube to reflect the allocation scenario.
User-personalized media sampling, recommendation and purchasing system using real-time inventory database
A product sampling and recommendation system uses customer profile data and/or real-time information from a point-of-sale system to tailor specific product recommendations to a customer using a sampling station.
Product-family inventory replenishment system using a composite product mix framework
In accordance with embodiments of the present disclosure, systems and methods for inventory replenishment utilize supply chain data comprising a demand mix, an inventory mix, and a composite product mix to generate a new composite product mix for at least one future period. The system geometrically discounts demand-inventory composite data. Thus, the older data carries less weight in determination of the new composite product mix percentage. Smoothing factors allow the discounting to be applied differently to demand and inventory data. The new composite product mix and an estimate of the total target replenishment quantity of a product family are used to estimate individual target replenishment quantities for each of a plurality of individual products in a product family. Replenishment quantities can be determined for an extended planning horizon. A server may provide the replenishment quantities to the user of a client computer over a computer network.
Consumer representation rendering with selected merchandise
A representation system receives a subscription for a consumer to monitor online vendors. The representations system monitors a separate inventory of merchandise items of each online vendor. The representations system detects a new merchandise item added by at least one of the online vendors to a current inventory of merchandise items. The representation system accesses a representation of the consumer specified by a selection of sizing measurements stored by the selection service. The representation system selects at least one merchandise item from among the new separate merchandise items each with a set of merchandise characteristics of a size selected to fit the selection of sizing measurements. The representation system generates an email communication to deliver to the consumer from which a rendering of the selected merchandise item on the representation according to the set of merchandise characteristics as applied to the selection of sizing measurements is accessible to the consumer.
Automated compatibility checking for hardware/software purchases at time of purchase
The present invention can include a pre-purchase method for determining computing item compatibility. In the method, configuration information associated with a computing system can be stored. A for-sale item to be used with the computing system can be detected. A compatibility between the for-sale item and the configuration information can be determined. A potential purchaser can be notified of results of the determining step before completing a purchase of the for-sale item. The method can be automatically performed by an online storefront system (e.g., a e-retailing Web site) or by in-store computing equipment, such as a cashier's register and/or an in-store kiosk.
Optimized cloud computing fact checking
A fact checking system is able to verify the correctness of information and/or characterize information by comparing the information with one or more sources. The fact checking system automatically monitors, processes, fact checks information and indicates a status of the information. Fact checking results are able to be validated by re-fact checking the fact check results.
Advertisements with multiple targeting criteria bids
An advertising system may enable an advertiser to associate multiple targeting criteria bids with an advertisement. The targeting criteria bids include a bid amount and a targeting criteria defining a group of users who may be delivered the advertisement. The cost for the advertisement is the sum of the bid amounts associated with the targeting criteria that match the user profile of the viewing user.
System and method of providing targeted advertisements from subscribers of directory services
Disclosed are systems, computer-readable medium and a method for delivering advertisements to user devices. The method includes storing first data associated with online and physical activity of plurality of customers, storing second data associated with current status of plurality of advertisers, matching a customer with an advertiser based on analysis of the first data and the second data and delivering an advertisement to a device associated with the matched customers online and physical activity. The on-line and physical activity is captured by a plurality of devices including a mobile device via a plurality of sensors.
Method and system for delivering electronic communications
A system directs a browser or browsing application associated with a user to a targeted web site after the user performs at least two activations or “clicks” of his pointing device. The first “click” is typically on a communication provided by the system, serving as an intermediary, and the second “click” is typically on a first data object or web page of the intermediary, before the browser of the user is redirected to a second data object or targeted web page, typically associated with a party unrelated to the party or entity controlling the system.
Enhanced online advertising system
The system provides an automatically targeted network for text and graphical advertising based on cost-per-action bidded pricing, wherein actions comprise any of acquisitions, purchases, downloads, registrations, donations, clicks, and impressions. Contextual, search and behavioral relevance features are integrated to optimize ad selection for advertisers, who enter action objectives, associated bids, and creatives or catalog assets. The assets are automatically analyzed and stored, and ads are automatically constructed for catalog assets. When an ad request is received from a user terminal in regard to a publisher asset, e.g. a web page, the ad request is matched to a stored contextual analysis of at least a portion the publisher asset if available, and preferably to a profile associated with the user of the user terminal. The best advertisements are determined, based upon a predicted response, and are then served, i.e. displayed, at the user terminal, based upon available ad space.
System and method for targeting customers who invite other customers to a business
A system and method is disclosed for rewarding subscribed users who invite other users to a business establishment. On receiving an indication that a subscribed user of a social group is at a business establishment, a message is sent to a plurality of users of the social group announcing that the user is at the business establishment. On receiving one or more signals, within a predetermined period, that one or more of the plurality of users entered into a purchase transaction with the business establishment, an offering is sent to the subscribed user.
Unlocking coupon offers
In an embodiment, a method comprises receiving an indication that a user selected social network data that is displayed, on a client device, concurrently with offer data that indicates a coupon offer; wherein prior to receiving the indication, the user of the client device is incapable of accessing the coupon offer; in response to receiving the indication that the user selected the social network data, allowing the user to access the coupon offer, and causing a message to be sent to each user of a plurality of users that are identified, in a social network, as connected to the user, wherein the message includes data about the coupon offer or a coupon provider that initiated the coupon offer; wherein the method is performed by one or more computing devices.
Advertising based on influence
Advertising based on influence is provided. In some embodiments, advertising based on influence includes determining an influence score (e.g., based on a given dimension) for a subject (e.g., a user), in which the subject is a potential target for an advertisement; and determining targeting of the advertisement based on criteria including the influence score of potential recipients of the advertisement. In some embodiments, the influence score is a directly estimated objective measure of influence (e.g., estimated using a social graph). In some embodiments, advertising based on influence also includes determining pricing of advertisements based on criteria including the influence score of potential recipients of one or more advertisements. In some embodiments, advertising based on influence further includes sharing advertising revenue with the subject based on criteria including the influence score of the first subject (e.g., as an incentive for the subject to view the advertisement).
System and method for facilitating the home viewing of first-run movies
The home viewing of movies currently being shown in one or more theaters is facilitated. Facilitating home viewing of first-run, feature length movies may increase the amount of money earned during the theatre run of the movies. For example, this may enable users that would not be able to view movies in the theatre, and/or that would not be willing to view at least some of the movies in the theatre, to purchase the ability to view the movies.
Music-centric advertising using supportive information
The present invention is directed toward a method of advertising on a portable media device having video and audio capabilities comprising the steps of: (a) embedding a video advertisement on the supportive identification information of a music file; (b) downloading the music file to a portable media device with a video advertise so that playing the music file generates the display of a video advertisement; (c) tracking the play count of each music file with an associated video advertisement until the play count data reaches a certain fixed number; d) recording the play count of each music file in connection with each specific video advertisement; and (f) changing the advertisement in the embedded supportive information of the music file.
System and method of delivering audio communications
A method of delivering an audio communication is disclosed and includes selectively delivering an audio message including a content portion and an advertising portion to a voice communication device. The audio message has a first available delivery format for live communication with a user of the voice communication device and a second available delivery format for communication with a voice mail system associated with the voice communication device.
Electronic toll management for fleet vehicles
Toll transaction payment processing includes accessing image data for a vehicle, the image data corresponding to at least one image of the vehicle engaging in a transaction with a toll facility. The image data is processed to determine one or more vehicle identifiers for the vehicle. A fleet vehicle company associated with the vehicle is electronically identified based on the one or more vehicle identifiers. Billing information for the transaction between the vehicle and the toll facility is electronically communicated to the fleet vehicle company.
Billing a rented third party transport including an on-board unit
A system, method, and computer readable medium for toll service activation using an on-board unit in a third party transport comprises, a third party entity, a toll rental entity, and an on-board unit communicably coupled to the third party entity and to the toll rental entity, wherein the on-board unit, receives a position signal, initiates a toll service request, converts the position signal to a toll usage, and stores the position signal, the toll service request and the toll usage.
System, method and computer readable medium for billing tolls
Billing tolls accumulated during a rental period comprises a third party entity, a toll authority, and a toll rental entity coupled to the third party entity and to the toll authority, wherein the third party entity sends a request for service to the toll rental entity, wherein the toll rental entity sends the request for service during the rental period to the toll authority, wherein the toll authority stores the request, wherein the toll authority sends toll data to the toll rental entity based on the request, wherein the toll rental entity sends toll rental data to the third party entity based on the toll data, and wherein the third party entity generates a bill based on the toll rental data.
Compass—computer system for employee evaluation and coaching
Various embodiments of the present invention provide improved computer systems for the evaluation of the performance of employees. Embodiments may use an engagement algorithm to calculate a single engagement score for each employee. Embodiments may use a second algorithm for skills to calculate a single skills score for each employee. A third algorithm may plot the employee's engagement score against the employee's skills score on a two-dimensional graph and indicate what scores are needed for a good evaluation and what scores are needed for a great evaluation. Various embodiments of the invention prescribe specific aspects of a job to coach to improve the employee's performance. Embodiments of the system archive and maintain all evaluations and scores for employees and provide access to them to subsequent supervisors.
Enterprise gamification system for awarding employee performance
Methods, computer-readable media, and systems for gathering gamification data from business applications. Common gamification data that describes a user that accesses a business software environment, and specific gamification data that describes the user and is specific to a particular computer system in the business environment are identified at a user interface of a client device in response to a request from a gamification engine. By executing gamification logic in the user interface, the common gamification data and the specific gamification data are collected at the user interface and provided to the gamification engine. For example, the gamification data can be gathered by monitoring interactions between the user and the client device that is connected to the gamification engine at the user interface, and provided to the gamification engine independent of the business computer system to which the client device is connected.
Systems and methods for analysis of legal service providers and comparative unit costs or ratio costs
Systems and methods for analyzing legal service providers and unit or ratio costs are provided. Billing data from legal services providers is analyzed to identify common tasks based on task codes. The common tasks are then analyzed to determine a unit cost or ratio cost for the tasks or a ratio cost for the tasks compared to the total costs for a matter. Analysis constraints are applied to the billing data to generate a cost model, which can be output in a variety of different graphical formats. This output, which identifying at least some of the total matter costs on a unit cost or ratio cost basis, allows for comparison of legal services provided by a number of different legal services providers. It also allows for comparing price quotes from a number of legal services providers against each other and against historical cost information.
System for transmitting syndicated programs over the internet
A system and method are provided for exposing Internet users to advertisements together with the distribution of media content in a manner which is germane to conventional syndicated broadcast agreements. The system includes a processor coupled to a memory device. The system further includes software means operable on the processor and memory device. The software means is operable on the processor for obtaining a user specific set of data prior to distributing a media package. The software means is operable for selecting a number of advertisements from a data bank containing a plurality of advertisements based on the user specific set of data. The software means is operable for combining the selected number of advertisements with a requested set of media content to form the media package. The software means is further operable for distributing the media package. In this manner a regional broadcasting station can preserve its investment in purchasing national syndicate broadcast rights by ensuring regional advertisers a penetration of their advertisements across a regional Internet audience. Methods for performing the same are similarly included.
Product space browser
A product space browser (PSB), which comprises a graphical user interface (GUI) that facilitates insight discovery through exploration and analysis of product space graphs generated by applying a product affinity engine to retailer's transaction data in a market basket context, is disclosed.
Assessment and rationalization of resiliency of data center strategies
Assessing resiliency of facility configuration strategies, in one aspect, may employ a mathematical model representation of facility configuration. Organization environment factors and one or more desired performance metrics associated with the organization may be determined. A technical model specification that defines the configuration of facilities of the organization may be received, and a mathematical model representation of the configuration may be created. The mathematical model representation is solved for steady-state characteristics, and one or more values may be estimated respectively of the desired performance metrics based on the steady-state characteristics. The resiliency may be measured based on the estimated one or more values.
Displaying an item of work in a workflow context
A user interface for use in, e.g., a healthcare computing environment, for displaying an item of work in a workflow context associated with a particular resource is provided In one embodiment, the user interface includes a first workflow context display area configured to display a current workflow state of the item of work and at least one of a past workflow state and a potential future workflow state of the item of work. The user interface may further include a selectable workflow view indicator, whereby following the selectable workflow view indicator allows a user to navigate to a second workflow context display area configured to display an identity of at least one additional resource associated with the item of work and a status of the item of work as it pertains to the additional resource.
Publisher preference system for content selection
Methods, systems, apparatus and computer program products are provided for targeting content information. A method includes defining an environment in a document, defining at least one targeting criterion for the environment, and storing in the document a request code that is configured to request content for placement in the environment based on the targeting criterion.
Systems and methods for exchanging health care credits
Systems and methods for exchanging health care credits are described. Health care credits are transferable units of value representing good health, an improvement in health, or maintenance of health by an individual. The health care credits may be bought, sold, exchanged for goods and services, gifted or otherwise conveyed from one owner to another. Also disclosed are exchanges and markets for buying, selling, and trading health care credits, as well as derivative securities. The derivative securities or products are based on either the flow of health care credits through the system, or on health care information, which may have been generated to implement health care credit awards.
Medical instrument management support apparatus for supporting scope management
The examination schedule memory unit stores an examination schedule including the starting time and the ending time of each examination. A cleaning capacity memory unit stores cleaning-capacity information that specifies the cleaning capacity of cleaning apparatuses that clean a scope used for the examination. A cleaning schedule generation unit generates a cleaning schedule for cleaning a used scope produced at the end of each examination with cleaning apparatuses having a cleaning capacity required by the cleaning-capacity information stored in the cleaning capacity memory unit. The scope shortage determination unit determines whether or not there will be a shortage of scopes to be used for each examination in accordance with both the examination starting time specified by the above examination schedule and the cleaning ending time specified by the cleaning schedule.
Medication administration and management system and method
A system, method and computer program for programming a medical device to administer a medication to a patient includes the medical device, a scanner that may be associated with a point of care (POC) system, and a medication management unit (MMU). A computer in the POC system can directly program the medical device with the permission of the MMU after a full “five rights” check or the “right patient” check can be delayed until after the pump program is downloaded. Other workflows are disclosed for programming the medical device in manual, semi-automatic and automatic modes, with safety checks incorporated at various points.
Initiating actions based on partial hotwords
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, receiving audio data; determining that an initial portion of the audio data corresponds to an initial portion of a hotword; in response to determining that the initial portion of the audio data corresponds to the initial portion of the hotword, selecting, from among a set of one or more actions that are performed when the entire hotword is detected, a subset of the one or more actions; and causing one or more actions of the subset to be performed.
Enhancing a watermark signal extracted from an output signal of a watermarking encoder
A device for enhancing a watermark signal extracted from an output signal of a watermarking encoder including an input signal portion corresponding to an input signal to the watermarking encoder and a watermark signal portion corresponding to the watermark signal includes an input configured to receive the input signal and the watermark signal, an enhancement module operatively connected to the input and configured to a) enhance the watermark signal at least in part by adjusting a gain of the watermark signal to obtain an enhanced watermark signal, and b) generate an enhanced output signal including an input signal portion corresponding to the input signal and an enhanced watermark signal portion corresponding to the enhanced watermark signal.
System and method for determining a personal SHG profile by voice analysis
According to one embodiment of the present invention a computerized voice-analysis device for determining an S, H, G profile is provided (as described herein, such an S, H, G profile relates to the strengths (e.g., relative strengths) of three human instinctive drives). Of note, the present invention may be used for one or more of the following: analyzing a previously recorded voice sample; real-time analysis of voice as it is being spoken; combination voice analysis—that is, a combination of: (a) previously recorded and/or real-time voice; and (b) answers to a questionnaire.
Background speech recognition assistant using speaker verification
In one embodiment, a method includes receiving an acoustic input signal at a speech recognizer. A user is identified that is speaking based on the acoustic input signal. The method then determines speaker-specific information previously stored for the user and a set of responses based on the recognized acoustic input signal and the speaker-specific information for the user. It is determined if the response should be output and the response is outputted if it is determined the response should be output.
Methods and systems for automated generation of nativized multi-lingual lexicons
An input signal that includes linguistic content in a first language may be received by a computing device. The linguistic content may include text or speech. Based on an acoustic feature comparison between a plurality of first-language speech sounds and a plurality of second-language speech sounds, the computing device may associate the linguistic content in the first language with one or more phonemes from a second language. The computing device may also determine a phonemic representation of the linguistic content in the first language based on use of the one or more phonemes from the second language. The phonemic representation may be indicative of a pronunciation of the linguistic content in the first language according to speech sounds of the second language.
Methods and apparatus to present a video program to a visually impaired person
Methods and apparatus to present a video program to a visually impaired person are disclosed. An example method comprises detecting a text portion of a media stream including a video stream, the text portion not being consumable by a blind person, retrieving text associated with the text portion of the media stream, and converting the text to a first audio stream based on a first type of a first program in the media stream, and converting the text to a second audio stream based on a second type of a second program in the media stream.
Multi-tiered voice feedback in an electronic device
This invention is directed to providing voice feedback to a user of an electronic device. Because each electronic device display may include several speakable elements (i.e., elements for which voice feedback is provided), the elements may be ordered. To do so, the electronic device may associate a tier with the display of each speakable element. The electronic device may then provide voice feedback for displayed speakable elements based on the associated tier. To reduce the complexity in designing the voice feedback system, the voice feedback features may be integrated in a Model View Controller (MVC) design used for displaying content to a user. For example, the model and view of the MVC design may include additional variables associated with speakable properties. The electronic device may receive audio files for each speakable element using any suitable approach, including for example by providing a host device with a list of speakable elements and directing a text to speech engine of the host device to generate and provide the audio files.
Voice search engine interface for scoring search hypotheses
A system may receive a voice search query and may determine word hypotheses for the voice query. Each word hypothesis may include one or more terms. The system may obtain a search query log and may determine, for each word hypothesis, a quantity of other search queries, in the search query log, that include the one or more terms. The system may determine weights based on the determined quantities. The system may generate, based on the weights, a first search query from the word hypotheses and may obtain a first set of search results. The system may modify, based on the first set of search results, one or more of the weights. The system may generate a second search query from the word hypotheses and obtain, based on the second search query, a second set of search results for the voice query.
Techniques for aiding speech-to-speech translation
Techniques for assisting in translation are provided. A speech recognition hypothesis is obtained, corresponding to a source language utterance. Information retrieval is performed on a supplemental database, based on a situational context, to obtain at least one word string that is related to the source language utterance. The speech recognition hypothesis and the word string are then formatted for display to a user, to facilitate an appropriate selection by the user for translation.
Speech recognition circuit using parallel processors
A speech recognition circuit comprises a memory containing lexical data for word recognition, the lexical data comprising a plurality of lexical data structures stored in each of a plurality of parts of the memory; and a parallel processor structure connected to the memory to process speech parameters by performing parallel processing on a plurality of the lexical data structures.
Speech recognition method, speech recognition apparatus and computer program
A speech recognition apparatus predicts, based on the occurrence cycle and duration time of impulse noise that occurs periodically, a segment in which impulse noise occurs, and executes speech recognition processing based on the feature components of the remaining frames excluding a feature component of a frame corresponding to the predicted segment, or the feature components extracted from frames created from sound data excluding a part corresponding to the predicted segment.
Sound encoding device and sound encoding method
A sound encoder for efficiently encoding stereophonic sound. A prediction parameter analyzer determines a delay difference D and an amplitude ratio g of a first-channel sound signal with respect to a second-channel sound signal as channel-to-channel prediction parameters from a first-channel decoded signal and a second-channel sound signal. A prediction parameter quantizer quantizes the prediction parameters, and a signal predictor predicts a second-channel signal using the first decoded signal and the quantization prediction parameters. The prediction parameter quantizer encodes and quantizes the prediction parameters (the delay difference D and the amplitude ratio g) using a relationship (correlation) between the delay difference D and the amplitude ratio g attributed to a spatial characteristic (e.g., distance) from a sound source of the signal to a receiving point.
Machine translation of indirect speech
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating direct speech messages based on voice commands that include indirect speech messages. In one aspect, a method includes receiving a voice input corresponding to an utterance. A determination is made whether a transcription of the utterance includes a command to initiate a communication to a user and a segment that is classified as indirect speech. In response to determining that the transcription of the utterance includes the command and the segment that is classified as indirect speech, the segment that is classified as indirect speech is provided as input to a machine translator. In response to providing the segment that is classified as indirect speech to the machine translator, a direct speech segment is received from the machine translator. A communication is initiated that includes the direct speech segment.
Machine translation with side information
A method of identifying and using side information available to statistical machine translation systems within an enterprise setting, the method including extracting user-specific interaction and non-interaction-based information from at least one corresponding database within the enterprise for each of a plurality of users, aggregating the user-specific interaction and non-interaction based information from a plurality of users, by using a processor on a computer, to tune and adapt background translation and language models, and updating all relevant models within the enterprise after user activity based on the tuned and adapted translation and language models.
System and method for efficient modeling of NPskew effects on static timing tests
A computer-implemented method that simulates NPskew effects on a combination NFET (Negative Field Effect Transistor)/PFET (Positive Field Effect Transistor) semiconductor device using slew perturbations includes performing a timing test by a computing device, by: (1) evaluating perturb slews in Strong N/Weak P directions on the combination semiconductor device for a timing test result; (2) evaluation perturb slews in Weak N/Strong P directions on the combination semiconductor device for a timing test result; and (3) evaluating unperturbed slews in a balanced condition on the combination semiconductor device for a timing test result. After each test is performed, a determination is made as to which evaluation of the perturbed and unperturbed slews produces a most conservative timing test result for the combination semiconductor device. An NPskew effect adjusted timing test result is finally output based on determining the most conservative timing test result.
Scheduling processes in simulation of a circuit design based on simulation costs and runtime states of HDL processes
One or more embodiments provide a load balancing solution for improving the runtime performance of parallel HDL simulators. During compilation each process is analyzed to determine a simulation cost based on complexity of the HDL processes. During simulation, processes to be executed in the same simulation cycle are scheduled using the simulation costs computed at compile-time in order to reduce the delay incurred during simulation.
Computer-implemented system and method for improving glucose management through cloud-based modeling of circadian profiles
A computer-implemented system and method for improving glucose management through cloud-based modeling of circadian profiles is provided. For each daily meal period, two sets of pre- and post-meal period data that include a blood glucose level and a diabetes medication dosing are stored into a circadian profile for a diabetic patient in a cloud computing infrastructure. Predicted blood glucose is modeled over the infrastructure and the access will be validated. A model, including expected blood glucose values and their predicted errors is created from the blood glucose levels in each profile and visualized in a log-normal distribution. Target ranges for blood glucose are determined and superimposed over the expected values. Pharmacodynamics of the medication are obtained. An incremental change in dosing of the medication is propagated over a model day and the expected blood glucose values and their predicted errors are adjusted in response to the incremental dosing change.
System for optimizing a drilling operation and method for using same
A system and method for optimizing a drilling operation is provided. The system has a drilling a drilling operation optimization unit. The drilling operation optimization unit has a base model unit for producing a base model of the reservoir and a reservoir stress unit for producing a three dimensional stress model of the reservoir. The drilling operation optimization unit has a trajectory unit for determining at least one property for at least one wellbore trajectory based on the base model and the three dimensional stress model, wherein each of the wellbore trajectories is selectable by an operator. The system has an operator station for inputting data into the drilling operation optimization unit at the wellsite and a drilling tool for forming a wellbore along at least one of the at least one selected wellbore trajectories.
Method and system for providing information from a patient-specific model of blood flow
Embodiments include a system for providing blood flow information for a patient. The system may include at least one computer system including a touchscreen. The at least one computer system may be configured to display, on the touchscreen, a three-dimensional model representing at least a portion of an anatomical structure of the patient based on patient-specific data. The at least one computer system may also be configured to receive a first input relating to a first location on the touchscreen indicated by at least one pointing object controlled by a user, and the first location on the touchscreen may indicate a first location on the displayed three-dimensional model. The at least one computer system may be further configured to display first information on the touchscreen, and the first information may indicate a blood flow characteristic at the first location.
Water erosion management incorporating topography, soil type, and weather statistics
A method of water erosion management comprises receiving a topographic datum indicating the topography of a defined area. Data is received indicating a soil composition found at the defined area. A model is created predicting a water runoff pattern for said defined area based upon the topography of the defined area and the soil composition of the defined area.
Predictive emissions monitoring using a statistical hybrid model
A method for generating a model representative of a process. The process includes a result variable representing a product of the process, and a plurality of process variables representing characteristics of the process other than the product of the process. The method includes steps of acquiring a plurality of test values of the result variable; acquiring, for each process variable of the plurality of process variables, a plurality of test values of the process variable, each test value being associated with a result variable value; providing, for each first coefficient of a plurality of first coefficients, a separate test value of the first coefficient associated with each process variable; and, for each second coefficient of a plurality of second coefficients, providing a separate test value of the second coefficient associated with each test value of each process variable. At least one of the method steps is a computer-implemented step.
Configurable enablement of operations associated with state enabled systems in a graphical environment
Exemplary embodiments allow configurable execution of operations associated with a state enabled system in a graphical modeling or graphical programming environment. In an embodiment, a state enabled system may be identified in a graphical model, or a graphical program, or both. The state enabled system may be associated with a first operation and a second operation, and may include instructions to execute the first and second operations. The state enabled system may be configured to always execute the first operation regardless of an enabling condition. The state enabled system may also be configured to prevent an execution of the second operation unless the enabling condition is satisfied.
Remaining life prediction for individual components from sparse data
Predicting the remaining life of individual aircraft, fleets of aircraft, aircraft components and subpopulations of these components. This is accomplished through the use of precomputed databases of response that are generated from a model for the nonlinear system behavior prior to the time that decisions need to be made concerning the disposition of the system. The database is calibrated with a few data points, to account for unmodeled system variables, and then used with an input variable to predict future system behavior. These methods also permit identification of the root causes for observed system behavior. The use of the response databases also permits rapid estimations of uncertainty estimates for the system behavior, such as remaining life estimates, particularly, when subsets of an input variable distribution are passed through the database and scaled appropriately to construct the output distribution. A specific example is the prediction of remaining life for an aircraft component where the model calculates damage evolution, input variables are a crack size and the number of cycles, and the predicted parameters are the actual stress on the component and the remaining life.
Real time device evaluation
A method for real time device evaluation starts a sampling tool for a sample, receives sample data from a sample data structure and sends the sample data to a target device. The method saves sample data operation results from the target device to form a sample result, and in response to determining that the sample is complete, calculates a target device transfer rate in real time using the sample result and calculates a target device overhead in real time using the target device transfer rate and the sample result, sending the target device transfer rate and the target device overhead.
Selection of display power mode based on sensor data
Methods, devices, and computer programs are presented for managing power consumption in an activity monitoring device associated with a user. One method includes an operation for analyzing sensor data acquired by sensors of an activity monitoring device to be worn on a wrist of a user, the sensor data being associated with motion of the user. In addition, the method includes an operation for determining the motion profile of the activity monitoring device based on the sensor data. The method further includes an operation for identifying display settings for a display of the activity monitoring device based on the motion profile. The display settings are associated with a rate of power consumption by the display. The display settings are applied to the display of the activity monitoring device when the identified display settings are different than the current display settings.
Apparatus and method for measurement of the film cooling effect produced by air cooled gas turbine components
A method for measurement of a film cooling effect is disclosed. Film cooling is a technique developed to protect gas turbine engine components from the extremely high temperatures created during its operation. A controlled air pressure is ducted into the hollow interior of the component and the mass rate of air flowing through the plurality of film cooling features or openings is measured. A coolant is then injected into the hollow interior of the component and allowed to flow out of a film cooling feature onto the heated outer surface of the component. The resulting infrared signature is a measure of the relative cooling effect generated by the individual film cool feature. The film cooling effect for an individual feature is quantified as the proportion of mass rate of airflow contributed by its relative individual cooling effect. The area, location and shape of the cooling effect are further classified to determine the degree of conformance to its design intent.
Estimating temperature of memory elements
The invention relates to a method for determining a temperature (T) of a plurality of memory elements (10) having a temperature-dependent probability (P) of assuming a particular bit value, the method comprising: triggering (110) the plurality of memory elements (10) to assume the particular bit value; reading out (120) the contents of the plurality of memory elements (10) to obtain read data (D), and processing (130) the read data (D) for determining a value (Vact) indicative of the temperature (T). The invention also relates to a program product comprising instructions for causing a processor to perform the method. Such computer program is advantageously used in a smartcard, which then does not need any structural modification at all. The invention further relates to a system for determining a temperature (T) of a plurality of memory elements (10). Such system is advantageously implemented in an integrated circuit, wherein the plurality of memory elements (10) forms part of an integrated memory. The invention provides that temperature (T) can be determined without the need for a separate temperature sensor. The only real requirement is the presence of a plurality of memory elements (10) having a temperature-dependent probability (P) of assuming particular bit value.
System and method for remotely configuring semiconductor functional circuits
The present invention systems and methods facilitate configuration of functional components included in a remotely located integrated circuit die. In one exemplary implementation, a die functional component reconfiguration request process is engaged in wherein a system requests a reconfiguration code from a remote centralized resource. A reconfiguration code production process is executed in which a request for a reconfiguration code and a permission indicator are received, validity of permission indicator is analyzed, and a reconfiguration code is provided if the permission indicator is valid. A die functional component configuration process is performed on the die when an appropriate reconfiguration code is received by the die. The functional component configuration process includes directing alteration of a functional component configuration. Workflow is diverted from disabled functional components to enabled functional components.
Battery-capacity supervisory control device and method thereof
A battery-capacity supervisory control device includes a DC current/DC voltage detecting loop, a microprocessor and a display unit. The DC current/DC voltage detecting loop is connected between a battery and a power inverter for detecting a first voltage value before the battery electrically discharges, and a second voltage value as well as an output current value of the battery after electrically discharging for a time unit of the battery, to calculate the available capacity of the battery and to calculate the available time of the battery under loading according to the available capacity of the battery through the microprocessor. The display simultaneously displays the available time of the battery under loading and the available capacity of the battery. Therefore, a user effectively supervises and assures the battery is in the usable state.
miRNA target prediction
The present invention relates to generation (e.g., synthesis) of proteins. In particular, the present invention provides methods to predict miRNA targets using sequence similarity and thermodynamic stability of miRNA-bridges across both 3′ and 5′ UTR. Such methods find use in research, diagnostic and therapeutic settings (e.g., to discover targets, drugs, diagnostic products, etc.).
Molecular profiling of tumors
Provided herein are methods and systems of molecular profiling of diseases, such as cancer. In some embodiments, the molecular profiling can be used to identify treatments for a disease, such as treatments that were not initially identified as a treatment for the disease or not expected to be a treatment for a particular disease.
Methods and systems of estimating formation parameters
Estimating formation parameters. At least some of the illustrative embodiments are methods including: combining a first plurality of actual logs from a first plurality of actual boreholes, at least one actual log associated with each actual borehole, and thereby creating a first equivalent log along a first equivalent path; combining a second plurality of actual logs from a second plurality of actual boreholes, at least one actual log of the second plurality of actual logs associated with each actual borehole of the second plurality of actual boreholes, and thereby creating a second equivalent log along a second equivalent path; and estimating a plurality of values of a parameter of one or more formations along a proposed borehole path, each value associated with a distinct depth along the proposed borehole path, the estimating using the equivalent logs.
System and method for maneuver plan for satellites flying in proximity using apocentral coordinate system
A technique to assist guidance techniques for a free-flying inspection vehicle for inspecting a host satellite. The method solves analytically in closed form for relative motion about a circular primary for solutions that are non-drifting, i.e., the orbital periods of the two vehicles are equal, computes the impulsive maneuvers in the primary radial and cross-track directions, and parameterizes these maneuvers and obtain solutions that satisfy constraints, for example collision avoidance or direction of coverage, or optimize quantities, such as time or fuel usage. Apocentral coordinates and a set of four relative orbital parameters are used. The method separates the change in relative velocity (maneuvers) into radial and crosstrack components and uses a waypoint technique to plan the maneuvers.
Navigational deployment and initialization systems and methods
A navigational deployment and initialization system, including: at least one personal inertial navigation module associated with at least one user and comprising a plurality of sensors and at least one controller configured to generate navigation data derived at least in part upon output of the plurality of sensors and at least one navigation routine; at least one deployment recognition device configured to directly or indirectly receive at least one of the following: user data, time data, event data, navigation data, or any combination thereof; and at least one central controller in direct or indirect communication with the at least one deployment recognition device and configured to receive at least a portion of at least one of the following: the user data, the time data, the event data, the navigation data, or any combination thereof.
Nautical license identification system
A method and apparatus for identifying a set of needed permissions for a vehicle. A travel plan is identified for the vehicle. Information is identified about the vehicle. The set of needed permissions is identified for the vehicle to travel using the travel plan.
Tour route generating device, tour route generating method, and program
A tour route generating apparatus includes a distance obtaining unit which obtains a target route distance of a tour route to be generated; a reference point obtaining unit which obtains a reference point as a start point of the tour route; a waypoint determination unit which determines a waypoint of the tour route; and a tour route generating unit which generates the tour route such that a route distance from the reference point to the reference point via the waypoint becomes the target route distance.
Stream processing based intelligent transport systems
A stream processing system for processing a routing request specifying a first location and a destination location in a network of interconnected locations includes a plurality of data processing elements, a memory connected to the plurality of data processing elements for storing a plurality of maps having different scopes, wherein each of the data processing elements is associated with one of the plurality of maps and determines a section of a path from the first location to the destination location in the network of interconnected locations, and a routing selection element for merging the sections of the path as a solution to the routing request.
Map display system and method
Provided are a computer system and methods related to a map display. A method includes but is not limited to receiving a request for the map, the map illustrating one or more locations; determining a status associated with at least one of the one or more locations on the map, the status being a function of one or more location interaction rules associated with the at least one of the one or more locations on the map; and generating a signal related to indicating on the map the status associated with the at least one of the one or more locations.
Managing fuel in aircraft
A method and apparatus for managing aircraft. Data about components for the aircraft is identified. Fuel efficiency of the aircraft is identified using the data about the components for the aircraft and a model of the aircraft. The model of the aircraft identifies fuel use. The aircraft is managed using the fuel efficiency identified for the aircraft.
Live traffic congestion detection
A user device may be configured to output, to a server device, a request for traffic congestion information, receive audio or visual information regarding an identified occurrence of traffic congestion; and present a visual representation of the occurrence of traffic congestion. The visual representation may include a selectable option to access at least a portion of the received audio or visual information regarding the occurrence of traffic congestion. The user device may further be configured to present, based on a selection of the selectable option, the at least a portion of the received audio or visual information regarding the occurrence of the traffic congestion.
Automotive-vehicle-borne miniature spectrometer having a single measurement and reference detector
A device for measuring a spectrum of a light beam, in a wavelength range chosen beforehand, the spectrum being generated by a sample to be analyzed, the optical measuring device including at least one light source, a measurement cell and a measurement detector placed on a measurement optical pathway, the measurement optical pathway being taken by a measurement optical beam emitted by the light source, and encountering the measurement cell, a self-calibration unit allowing any drift of the light sources, due to environmental conditions or conditions of use, to be taken into account independently of whether a sample to be analyzed is present in or absent from the measurement cell, the self-calibration unit including elements for creating a reference optical pathway, taken by a reference optical beam emitted by the light source, and not encountering the measurement cell, and a reference detector.
Dual gain digital engine control
An engine control system having an engine, a digital engine control, and a gain logic disposed within the digital engine control for use with an aircraft. The digital engine control is configured to receive and process inputs from systems within the aircraft. Gain logic uses the inputs to generate command data to regulate the performance of the engine so as to allow rotor speed deviations from a set point.
Device for speed control of a vehicle having a speed direct setting control element
A device for the speed control of a vehicle, containing an operator control unit, via which the driver specifies a setpoint speed to be maintained by the vehicle, and a control unit, which positions final controlling elements of the vehicle according to the driver's specification. The device provides that the operator control unit contains at least one speed direct setting control element, which is used for setting a specific setpoint speed value, and the specific setpoint speed value of the vehicle is specifiable and directly settable by a one-time operation of the speed direct setting control element, independently of the instantaneous actual speed of the vehicle.
Vehicle braking force control device
A vehicle braking force control device which, at a normal time, performs antilock brake control when the slip ratio of a wheel has become equal to or greater than a predetermined threshold. The control device acquires from the engine control unit an accelerator pedal position signal corresponding to an accelerator pedal position, a clutch connection signal corresponding to a state of connection of a clutch, and a power transmission signal corresponding to a state of power transmission of a transmission. When engine braking is large on the basis of the accelerator pedal position signal, the clutch connection signal, and the power transmission signal, the vehicle braking force control device changes the predetermined threshold value to an offset threshold value that makes it harder to perform the antilock brake control than at the normal time.
Control device for an automatic transmission
A transmission ECU 12 determines whether or not the conditions for executing a neutral control operation are satisfied (step S11), and measures hydraulic oil temperature if it determines that the execution conditions are satisfied (step S12). Then, the transmission ECU 12 sets a target speed ratio for a torque converter 3 corresponding to the measured hydraulic oil temperature (step S13), and performs a neutral control operation to bring the speed ratio of the torque converter 3 equal to the target speed ratio (step S14).
Drive force control for vehicle
Systems, methods and controllers for facilitating or providing a more efficient operation of a vehicle are disclosed. An accelerator input is detected from an accelerator sensor and it is determined whether the accelerator input is within a first range of values or within a second range of values. If it is determined that the accelerator input is within the first range of values, an engine is controlled to provide limited or no power to a transmission. If it is determined that the accelerator input is within the second range of values, the engine is controlled to provide a substantially constant power to the transmission.
Collision detection and mitigation systems and methods for a shovel
Systems and methods for detecting collisions. One system includes a processor configured to receive data from at least one sensor installed on a shovel, identify a plurality of planes based on the data, determine if the plurality of planes are positioned in a predetermined configuration associated with a haul truck to identify whether the plurality of planes represent a haul truck. The processor is further configured to receive a current position and a current direction of movement of a dipper of the shovel, and determine if a collision is possible between the dipper and the identified haul truck based on the plurality of planes, the current position, and the current direction of movement and without receiving any information from the haul truck. If a collision is possible, the processor is configured to alert an operator of the shovel and, optionally, augment movement of the dipper.
Method and device for controlling power output of engine for working machine
An engine control device detects the state of work of a working vehicle such as a construction machine or the like, and controls the power output capacity of an engine automatically. A determination is made as to whether excavation or uphill traveling is being performed, based upon the detection signals from a hydraulic oil pressure detector for a hydraulic cylinder of an arm, detectors for arm and bucket operation commands, a shift operation detector for a transmission, a pitch angle detector for the vehicle body, a traveling acceleration detector, and an accelerator opening degree detector. When the result of this determination is that excavation or uphill traveling is being performed, the engine is controlled to operate at a high power capacity, while at other times it is controlled to operate at a low power output capacity.
Swing automation for rope shovel
A system and method for various levels of automation of a swing-to-hopper motion for a rope shovel. An operator controls a rope shovel during a dig operation to load a dipper with materials. A controller receives position data, either via operator input or sensor data, for the dipper and a hopper where the materials are to be dumped. The controller then calculates an ideal path for the dipper to travel to be positioned above the hopper to dump the contents of the dipper. In some embodiments, the controller outputs operator feedback to assist the operator in traveling along the ideal path to the hopper. In some embodiments, the controller restricts the dipper motion such that the operator is not able to deviate beyond certain limits of the ideal path. In some embodiments, the controller automatically controls the movement of the dipper to reach the hopper.
Undazzled-area map product, and system for determining whether to dazzle person using the same
In an undazzled-area map product stored in a computer-readable storage unit, information indicative of a relationship between a boundary distance and each of a plurality of divided sections of a rectangular area to be picked up by a pickup unit is included. The pickup unit is provided in a reference vehicle with a headlight and working to pick up an image of the rectangular area ahead of the reference vehicle. The boundary distance is defined as a maximum distance between the reference vehicle and a target person such that, when a distance between the reference vehicle and the target person is within the maximum distance, the target person is estimated to be undazzled by the headlight of the reference vehicle.
Vehicle periphery monitoring device
The recognizability of a vehicle peripheral environment may be enhanced. A vehicle periphery monitoring device is to monitor the periphery of a vehicle. The vehicle periphery monitoring device includes an imaging unit that obtains a plurality of peripheral images by imaging the periphery of the vehicle, a display unit that displays the plurality of peripheral images imaged in the imaging unit, and an image control unit that controls the plurality of peripheral images displayed in the display unit. The image control unit varies a distance between the plurality of peripheral images displayed in the display unit. As a result, sensory understanding of a vehicle peripheral environment by a driver may be enhanced, thereby enhancing the recognizability of the vehicle peripheral environment.
Pedestrian protection vehicle hood hinge assembly
A vehicle hood hinge assembly comprises a first hinge member; a second hinge member; a vehicle hood mount for connecting the vehicle hood member to the second hinge member, the vehicle hood mount being movably connected to the second hinge member for movement relative to the second hinge member between an operating position and an elevated position; a releasable lock for releasably locking the vehicle hood mount to the second hinge member in the operating position; a driving member movably connected to the first hinge member on the vehicle body; and an actuator for receiving an impact detection signal and, in response to the impact detection signal, configured to move the driving member so as to release the releasable lock and move vehicle hood mount from the operating position to the elevated position.
Technique for ensuring safe travel of a vehicle or safety of an occupant therein
Vehicle with an occupant safety system includes an occupant safety system designed to reduce injury to an occupant during an accident involving the vehicle and a processor coupled to the safety system and that receives at least one inertial property of the vehicle and information about a portion of a road ahead of the vehicle in its travel direction. If the processor determines, based on the at least one inertial property and the information, that the vehicle is unlikely to safely travel that portion of the road, the processor initiates action to ensure safe travel of the vehicle or safety of the occupant. The inertial property of the vehicle may be provided by an inertial measurement unit (IMU) that measures acceleration in three orthogonal directions and angular velocity about three orthogonal axes, all at a substantially common location. The occupant safety system may include one or more inflatable airbags.
Information providing method for mobile terminal and apparatus thereof
This specification relates to an information providing method and an apparatus thereof, capable of providing information based on a user profile according to a travel state and/or a current location of a vehicle. The method includes detecting a travel state of a vehicle, detecting a current location of the vehicle; acquiring a user profile associated with the vehicle, and providing information related to the travel state of the vehicle, the current location and the user profile.
Electric vehicle supply equipment testing apparatus
A test apparatus is for electric vehicle supply equipment. The test apparatus includes an enclosure; a processor; and an interface to at least the electric vehicle supply equipment. The processor is structured to test that the electric vehicle supply equipment is functioning properly and to provide at least one of: a number of causes of failure of the electric vehicle supply equipment, an indication of how to correct the failure, automatic correction of the failure, and predictive maintenance of the electric vehicle supply equipment prior to a failure thereof.
A work machine with a boom that can be derricked, includes: a first derricking angle detector that detects a derricking angle of the boom at a base end of the boom; a second derricking angle detector that detects a derricking angle of the boom at a front end of the boom; a first flexible volume acquisition part that acquires a flexible volume of the boom based on a detected angle by the first derricking angle detector and a detected angle by the second derricking angle detector; a second flexible volume acquisition part that acquires a flexible volume of the boom based on the detected angle by the first derricking angle detector; and a switching part that switches between acquisition of the flexible volume of the boom by the first flexible volume acquisition part and acquisition of the flexible volume of the boom by the second flexible volume acquisition part.
Notification system for electrically charged vehicle
A notification system for an electrically charged vehicle having a charging system and a climate control system comprising a vehicle charging system, a display screen in communication with the vehicle charging system wherein the display screen is operable to provide a status update of the vehicle charging system wherein the status update provides information to the user regarding charging and/or pre-climate conditions. The status update is operable to provide a predetermined message to the user on the display screen regarding charging and/or pre-climate conditions within the electrically charged vehicle.
Method and system for performing calibration of an accelerometer of a telematics device during installation in a vehicle
A method for performing transform calibration of an accelerometer of a telematics device during installation in a vehicle includes placing the device in the vehicle at an initial position having a known alignment with a given frame of reference of the vehicle, moving the telematics device from the initial position to a final installation position in the vehicle with a tri-axial rate gyroscope of the device concurrently tracking and integrating the angle changes to provide a set of coordinates of the final installation position, and transform calibrating the accelerometer of the device using the set of coordinates so as to leave the device installed at the final position with its accelerometer transform calibrated with respect to the given frame of reference.
Vehicle power source device
An in-vehicle power supply device includes an electric generator, a main power supply, a DC/DC converter, a power storage unit, and a controller for controlling the DC/DC converter. The DC/DC converter stores regenerative electric power generated by the electric generator, and discharges the stored regenerative electric power to the main power supply and the load. The controller stops the DC/DC converter when a charging-status value is not larger than a predetermined lower limit value. Additionally, the controller activates the DC/DC converter when the charging-status value is larger than the lower limit value and the vehicle ends deceleration; and activates the DC/DC converter when a speed of the vehicle is not lower than a predetermined speed and an accelerator position of the engine is not larger than a predetermined accelerator position even if the charging-status value is not larger than the predetermined lower limit value.
Vehicle brake system and method of operating the same
A vehicle brake system and method designed to maximize the contributions from a regenerative braking system, yet still provide adequate safety measures that address potential regenerative braking failure. According to one embodiment, the method determines both a requested deceleration from the driver and an actual deceleration experienced by the vehicle, and uses the difference between these two values to calculate a deceleration error that can be integrated over time and compared to an error threshold. If the integrated or accumulated deceleration error surpasses the error threshold, then the method may reduce or disable the regenerative braking system until it can confirm that it is operating properly.
Article transport facility and article transporting method
An article transport facility in which movable bodies can merge into a merging portion while preventing collisions between the movable bodies. A communication relay device is provided to each of the first merging path, the second merging path, and the post-merging path. Each communication relay device includes an antenna portion, a relay device main body that associates movable body information obtained by communicating with the movable body communication devices using the antenna portion with identification information which indicates which one of the paths the antenna portion that received the movable body information is provided to, and that is capable of communicating the information thus obtained to the managing means. The managing means determines in which path the movable body exists to manage operations of a plurality of movable bodies based on said body information and identification information which are received from said main body.
Method, system and computer software code for trip optimization with train/track database augmentation
A system for providing at least one of train information and track characterization information for use in train performance, including a first element to determine a location of a train on a track segment and/or a time from a beginning of the trip. A track characterization element to provide track segment information, and a sensor for measuring an operating condition of at least one of the locomotives in the train are also included. A database is provided for storing track segment information and/or the operating condition of at least one of the locomotives. A processor is also included to correlate information from the first element, the track characterization element, the sensor, and/or the database, so that the database may be used for creating a trip plan that optimizes train performance in accordance with one or more operational criteria for the train.
Integrated avionics system
There is provided an avionics system that provides several avionics functions within a single LRU. In one embodiment, the system comprises a software-configurable RF assembly, one or more processor assemblies that are configured to provide multiple TAWS/TCAS/Mode S/ADS-B/ATC functions, interfaces to allow connections to aircraft electronics and data loaders, and multipurpose antennas. In one embodiment, a common processor architecture allows generic avionics processors to be configured to operate a number of TAWS/TCAS/Mode S/ADS-B/ATC functions without the need for multiple LRUs, and software-defined RF functions allow RF circuitry that interfaces to the processors to handle current and future communication needs.
Vehicle, communication system, and communication device
A communication device includes a first resistance circuit (RB) connected between an output of a signal generating unit (602) and a first terminal (TS1) and having a resistance value corresponding to a requested operation mode requested to a vehicle. The vehicle (10) includes: a second resistance circuit (RA) connected between a ground node (512) fed with a reference potential and a second terminal (TS2); and a vehicle control unit (508) for setting an operation mode of the vehicle. The vehicle control unit (508) detects a signal potential of a signal (CPLT) via a first signal extraction node (N1) provided on a path connecting the second terminal (TS2) and a second resistance circuit (RA) to each other, and sets the operation mode of the vehicle (10) at the requested operation mode corresponding to the resistance value of the first resistance circuit (RB).
Centralized monitoring apparatus
A centralized-monitoring apparatus, which centralized monitors a device including a storage, a temperature sensor to detect a temperature therein, and a temperature-variable device to cool or heat inside the storage such that the temperature reaches a set object-preservation temperature, comprises: an input device to be input with first information indicative of a time zone in which the temperature-variable device performing power-saving operation and second information indicative of a set temperature of the time zone; a storage device to store the first-and-second information from the input device; a timing device to measure a current time; and a control device to control the temperature-variable device, based on the first-and-second information and current time, so as to start operation of turning the temperature to the set temperature when the current time reaches a starting time of the time zone, and terminate the operation when the current time reaches an ending time thereof.
Grid frequency rate limiting system
A grid frequency rate limiting system for a droop governor is disclosed, the grid frequency rate limiting system including: a rate limit calculator for: obtaining data including at least one of: a transient power response requirement indicator, a turbo-generator power level indicator, a grid stability indicator, a fuel transfer indicator, a combustion mode timing indicator, or a temperature matching indicator; and defining rate limits according to the obtained data; a rate limiter operably connected to the rate limit calculator, the rate limiter for: obtaining a grid frequency reading associated with a grid frequency of an electrical grid; obtaining the defined rate limits; and filtering the grid frequency using the defined rate limits to provide a filtered frequency; and a droop governor operably connected to the grid frequency rate limiting system, the droop governor for: obtaining the filtered frequency; and providing a power response to the electrical grid based upon the filtered frequency.
Medium-voltage or high-voltage switchgear comprising at least one switching device
The disclosure relates to a medium-voltage or high-voltage switchgear comprising at least one switching device. The aim is to enable the associated switchgear to be functionally integrated with the greatest possible technical functional comfort. To this end, the switching device or the switching devices is/are respectively provided with a data and/or control interface, with the aid of which the same is/are linked to an electronic master terminal via a data and/or control line such that the switching devices can be triggered by the electronic master terminal and the control thereof can be integrated in a process, particularly an industrial process.
System and method for rapid reconfiguration of post-mix beverage dispenser
A beverage dispenser receives a fluid container at an installation position and includes a data reader configured to scan product indicia on an installed container. Based on data from that scan data, a controller operates a pump and a valve to mix beverage concentrate from the installed container with a diluent that corresponds to the desired beverage. The controller mixes the concentrate and diluent at a ratio that is based on the scan data. The controller may also select the correct diluent based on the scan data.
Detection of blocked air line for electric compressor at start up
Systems and methods for detecting a blocked air discharge line of an air compressor are described, which include monitoring motor current (IMTR) drawn by a compressor motor (14), and calculating a three-point moving average for a steady state current drawn by the compressor motor (14) upon the motor reaching steady state (nominal) operating speed. A current threshold (IMTR_LIMIT) (28) is calculated as a function of the three-point moving average, and a determination is made regarding whether a current drawn by the compressor motor (14) has exceeded the current threshold (28) and is consistent with a current profile (34) indicative of a blocked air line (15). If a blocked air line is detected, a compressor shut-off command is generated and transmitted to the compressor motor (14) to shut the compressor motor off prior to opening of a safety valve (21) on the compressor (12).
HVAC controller with parameter clustering
An HVAC controller is described that is configured to be more intuitive and user friendly to program and operate than convention HVAC controllers. In some instances, the HVAC controller may include a touch screen interface that provides greater flexibility in displaying information to the user and/or soliciting information from the user.
Image taking system and electronic-circuit-component mounting machine
An image taking system including: (a) a lighting device capable of changing a light emission time to various time length values; (b) an image taking device configured to take an image of a subject portion while light is being emitted by the lighting device; (c) a subject-portion moving device configured to move the subject portion relative to the image taking device, and capable of changing a movement velocity of the subject portion relative to the image taking device, to various velocity values; and (d) a control device configured, during movement of the subject portion by the subject-portion moving device, to cause the lighting device to emit the light for one of the time length values as the light emission time and to cause the image taking device to take the image, and is configured to control the movement velocity, such that an amount of the movement of the subject portion for the above-described one of the time length values is not larger than a predetermined movement amount.
System and method for directing a robotic storage system
Provided is a system and method for a robotic storage system. The system includes at least a first and second portable data element and at least a first and second data read/write device, structured and arranged to read portable data storage elements. A repository is structured and arranged to store the first and second portable data storage elements. At least one robot is structured and arranged to move a selected data storage element between the repository and a selected data read/write device. The system includes a history of prior commands, each prior command executed by a prior path selected from a group of optional paths. A receiver is structured and arranged to receive a current command for the robotic storage system, and a director is structured and arranged to direct the robotic storage system based on the current command and the history. An associated method is also provided.
Networked industrial control and method for changing of an operating mode of such an industrial control
A method according to the present invention for changing of an operating mode of at least one industrial control (1-1) of a plurality of networked industrial controls (1-1, 1-2), in particular of a robot control, comprises the steps of: sending a first packet (I-1) via a network (3) of the networked industrial controls (1-1, 1-2); receiving said first packet (I-1) by a receiving means (1-1.1) of at least one industrial control; and changing of said industrial control from a first operating mode (A) into a second operating mode (H) on basis of said received first packet (I-1) if the first packet (I-1) is addressed to said industrial control, wherein in the first opening mode (I) and in the second operating mode (II) different groups of components (1.1-1, 1-1.3, 1-1.4, 1-1.5, 1-1.6) of the industrial control (1-1) are supplied with energy.
Substrate processing apparatus and substrate processing system
To provide a substrate processing system which can cause different display portions to output different displays, and cause different operations to be carried out from different operation screens. A substrate processing system, on login information of a user being input from a main display device, refers to the login information, a user group parameter, with which is set a group to which the user belongs, and an authority parameter, which sets an authority of the group, and causes the main display device to display a main operation screen corresponding to the user, while it, on login information of a user being input from an external operating apparatus, causes an external display device to display an external parameter setting screen for setting an authority parameter of a group to which the user belongs, or to display an external operation screen corresponding to the group to which the user belongs.
Method for selecting perceptually optimal HRTF filters in a database according to morphological parameters
A method for selecting a perceptually optimal HRTF in a database according to morphological parameters. A first database includes the HRTFs of subjects M, a second database includes the morphological parameters of the subjects, and a third database corresponds to a perceptual classification of the HRTFs. The N most relevant morphological parameters are sorted by correlating the second and third databases. A multidimensional space is created, which optimizes the spatial separation between the HRTFs according to the classification thereof in the third database to obtain an optimized space. An optimized projection model MPO is calculated for correlating K optimal morphological parameters with the corresponding position of the HRTF filters in the optimized space. For any user whose HRTF is not included in the database, at least one HRTF can be selected from the database BD1 according to the parameters K of the user and the optimized projection model MPO.
System and method for generating policy-based audio
Embodiments of the invention provide a policy-based audio system. The system includes a sound application protocol interface, a configuration module and a speaker driver. The sound application protocol interface receives a set of sound samples generated by an application or event. The configuration module retrieves a first group of one or more parameters, rules and priorities applicable to the application or event. The speaker driver produces an audio output by processing the set of sound samples as a function of the group of one or more configuration parameters, rules and priorities.
Power line light controller system and method
In some examples, light controller technology includes methods and apparatuses. In other examples, the technology includes a light controller system. The system includes one or more light fixtures. Each light fixture of the one or more light fixture is electrically coupled via a power line. Each light fixture of the one or more light fixtures includes a protocol conversion module configured to convert instructions between power line communication and first remote device management communication, a communication module configured to communicate the power line communication over the power line, and a light controller configured to control one or more light emitting diodes (LEDS) in the respective light fixture based on the instructions.
Detecting and using heart rate training zone
Methods and devices for comprising: obtaining an estimated heart rate training zone for a user; measuring the pulse rate of the user; and performing a plurality of computerized talk tests, such that a higher number of computerized talk tests are performed when the measured pulse rate is more in the vicinity of the estimated heart rate training zone than outside the vicinity of the estimated heart rate training zone. Other embodiments include devices for controlling an exercise program, comprising: an interface to an element configured to play auditory signals, and an interface to an element configured to record a user's speech in accordance with the auditory signals; wherein the device is configured to provide an indication upon identifying involuntary interruptions in the user's speech.
Tissue ablation apparatus and method of ablating tissue
An apparatus and method for ablating tissue is disclosed. The apparatus comprises a source of microwave radiation (1), a probe (5) for directing the microwave radiation into tissue, one or more detectors for detecting the power and phase of the microwave radiation and an impedance adjuster (50) for adjusting impedance so as to minimize the amount of microwave radiation which reflected back through the probe. The detector or detectors use a local oscillator (230) to derive the phase information. A modulator for modulating the microwave radiation to a cutting frequency is also disclosed.
High-voltage CMOS neuroelectronic interface for a multichannel vestibular prosthesis
A multichannel vestibular prosthesis includes a sensor system and a microcontroller configured to communicate with the sensor system to receive sensor signals from the sensor system while in operation. The microcontroller is configured to provide control signals in response to the sensor signals. The multichannel vestibular prosthesis also includes a neuroelectronic interface integrated circuit configured to communicate with the microcontroller to receive the control signals, and a plurality of electrodes electrically connected to the neuroelectronic interface integrated circuit. The neuroelectronic interface integrated circuit includes a digital controller configured to communicate with the microcontroller, a plurality of digital-to-analog converters configured to communicate with the digital controller, and a plurality of analog current control circuits, each constructed to communicate with a respective one of the plurality of digital-to-analog converters. Each of the plurality of analog current control circuits can be electrically connected directly or under software control to a respective one of a plurality of electrodes for delivering electrical stimuli to at least one vestibular nerve, and the digital controller is configured to control amplitudes, frequencies, polarities and durations of currents to be delivered to any combination of the plurality of electrical leads.
Implantable subcutaneous device
Implantable subcutaneous device of biocompatible material that can receive data and energy by electromagnetic coupling with at least one external device is disclosed. The implantable device bears an airtight housing and a magnet that can hold the other external device centered with the implantable device. The housing bears a hollow crown containing at least electronic device(s) and a coil, and a bottom sealing the opening of the crown in an airtight manner. The magnet has dimensions compatible with a central housing formed by the so-called internal wall of the crown and in which it is positioned.
Signal evaluation in binaural and hybrid hearing prosthesis configurations
The present application discloses systems and methods to address situations in a binaural hearing prosthesis configuration in which each hearing prosthesis receives audio signals that have differing audio signal measures (e.g., signal to noise ratios (SNRs)). In accordance with one embodiment, a method is provided and includes receiving a first audio signal from a first transducer, receiving a second audio signal from a second transducer, evaluating the first audio signal and determining thereby a first audio signal measure, evaluating the second audio signal and determining thereby a second audio signal measure, based on the evaluating, identifying from among the first audio signal and the second audio signal a particular audio signal that has a certain quality with respect to the audio signal measures (e.g., the highest SNR), and applying stimulation to a recipient in accordance with the identified audio signal.
Methods and systems of conveying fine structure information to a cochlear implant patient
An exemplary system includes 1) a sound processor configured to divide an audio signal into a plurality of analysis channels, wherein each of the analysis channels contains information corresponding to a distinct frequency band of the audio signal, and wherein one of the analysis channels contains fine structure information corresponding to the audio signal, and 2) an implantable cochlear stimulator configured to generate electrical stimulation in accordance with the information contained within each of the analysis channels, apply the electrical stimulation to at least one stimulation site within a patient via a plurality of stimulation channels, each of the stimulation channels corresponding to one of the analysis channels and configured to convey the information contained within the analysis channels to the patient via at least one electrode, and at least partially isolate one of the stimulation channels from a rest of the stimulation channels.
Multi-frequency neural treatments and associated systems and methods
Multi-frequency neural treatments and associated systems and methods are disclosed. A method in accordance with a particular embodiment includes at least reducing patient pain by applying a first electrical signal to a first target location of the patient's spinal cord region at a frequency in a first frequency range of up to about 1,500 Hz, and applying a second electrical signal to a second target location of the patient's spinal cord region at a frequency in a second frequency range of from about 2,500 Hz to about 100,000 Hz.
Dynamic cranial nerve stimulation based on brain state determination from cardiac data
A method of treating a medical condition in a patient using an implantable medical device, comprising providing an electrical signal generator; providing at least a first electrode operatively coupled to the electrical signal generator and to a vagus nerve of the patient; sensing cardiac data of the patient; determining at least a first cardiac parameter based upon said cardiac data; setting at least a first value; declaring an unstable brain state of a patient from said at least a first cardiac parameter and said at least a first value; and adjusting the at least a first value. Also, a computer readable program storage device encoded with instructions that, when executed by a computer, performs the method. In addition, the implantable medical device used in the method.
Implantable device header and method
Systems and methods for implantable medical devices and headers are described. In an example, an implantable medical device includes a device container including an electronic module within the device container. A header is coupled to the device container. The header includes a header core including a conductive member electrically coupled to the electronic module within the device container. A header shell is disposed around the header core and attached to the device container. An antenna is coupled to the header core and electrically coupled to the electronic module. A first portion of the header is proximate the antenna. The first portion includes a first dielectric constant that is lower than a second dielectric constant of a second portion of the header.
System and method for filtering neural stimulation
Various aspects of the present subject matter provide a filter module. In various embodiments, the filter module comprises an input, an output, a signal path from the input to the output, a filter and a switch. The filter has a transfer response to attenuate a frequency of a neural stimulation signal. The switch is adapted to place the filter in the signal path when the neural stimulation signal is applied and to remove the filter from the signal path when the neural stimulation signal is not applied. Other aspects are provided herein.
Systems and methods for controlling paired pacing interpulse intervals to reduce contractility disequilibrium using an implantable medical device
Techniques are provided for use with implantable medical devices equipped to deliver paired postextrasystolic potentiation (PESP) pacing within a patient having an intact ventricle and a weakened ventricle. A first interpulse interval is determined for use with paired PESP pacing of the intact ventricle sufficient to achieve only relatively minimal potentiation within the intact ventricle. A second interpulse interval is determined for use with paired PESP pacing of the weakened ventricle sufficient to achieve relatively more significant potentiation within the weakened ventricle. Then, paired PESP pacing is delivered to the intact ventricle using the first interpulse interval while paired PESP is also delivered to the weakened ventricle using the second interpulse interval to reduce contractility disequilibrium within the heart caused by the weakened ventricle to achieve a matching of natural contractilities. In this manner, dual ventricular, independently timed, continuous PESP is provided.
Pain free defibrillation threshold estimation
A system and method for painlessly calculating an estimated defibrillation threshold, such as by using an implantable medical device and a controller. The estimated defibrillation threshold can be calculated using a delivered first energy to a first thoracic location, an electric field detected at a second thoracic location, and an electric field detected between a third thoracic location and a fourth thoracic location. The estimated defibrillation threshold represents an energy that, when delivered at the first thoracic location, can create an electric field strength in a target region of the heart that meets or exceeds a target electric field strength.
Morphology-based precursor to template matching comparison
One or more embodiments of the present disclosure relates to a method and/or system for classifying and/or treating heart rhythms. The present disclosure involves sensing electrical signals associated with depolarizations of a patient's heart. The sensed electrical signals are converted to digital values and storing the digital values. Normalizing solely a maximum and a minimum value of the stored digital values associated with a depolarization of the patient's heart without normalizing other stored digital values of the depolarization is another aspect of the present disclosure. The maximum and minimum values associated with the depolarization are compared to maximum and minimum values associated with a template derived from signals indicative of a heart depolarization of known type. A determination is made as to whether a match exists between the maximum and minimum values associated with the depolarization to the maximum and minimum values associated with a template.
Resuscitation device and method for resuscitation
A method for providing a resuscitating treatment of a human being, which has the following actions sensing human muscle activity, human breathing activity, human neural activity or human cerebral activity, determining whether the human being is in a state of developing apnoea by a processing unit based on the sensing, provoking an induced aspiration reflex by a resuscitating stimulation of a respiratory area of a human brain stem by providing a stimulus with a stimulation device to a location distant from the respiratory area of the human brain stem upon the processing unit determining the state of developing apnoea, the location being a nasal filter of the human being or a nasopharyngeal area of the human being.
Disclosed are advances in the arts with novel topical applicator apparatus for applying substances such as cleansers, cosmetic preparations and medications to the skin. The apparatus includes an applicator body having a power portion connected with an impulse portion, which in combination with an applicator head, transmits one or more various impulses to the skin supplemental to the substance applied. Exemplary preferred embodiments include configurations for providing mechanical and/or electrical or other impulses.
System and methods for performing surgical procedures and assessments
The present invention involves systems and related methods for performing surgical procedures and assessments, including the use of neurophysiology-based monitoring to: (a) determine nerve proximity and nerve direction to surgical instruments employed in accessing a surgical target site; (b) assess the pathology (health or status) of a nerve or nerve root before, during, or after a surgical procedure; and/or (c) assess pedicle integrity before, during or after pedicle screw placement, all in an automated, easy to use, and easy to interpret fashion so as to provide a surgeon-driven system.
Electrically evoked brainstem response measurements via implant prothesis
A method of measuring electrically evoked auditory brainstem responses of a patient or animal body is provided. The method includes surgically implanting an auditory prosthesis having an electrode array, the electrode array positioned either intracochlear or substantially proximate a brainstem of the body. At least one electrode is stimulated in the electrode array. Electrically evoked auditory brainstem responses resulting from said stimulation are recorded using, at least in part, an electrode in the electrode array as a negative electrode, and a positive electrode positioned substantially proximate the vertex of the head of the body.
System and method for determining atrial arrhythmia burden
A system and method for determining atrial arrhythmia burden is provided. Consecutive sets of parametric data regularly obtained from an implantable medical device through remote interrogation are centrally maintained. An atrial arrhythmia burden is determined. A cumulative atrial tachyarrhythmia (AT) duration is identified for each atrial arrhythmia episode recorded in the parametric data over a fixed look back period. One of an AT mode switch time and maximum atrial tachyarrhythmia AT duration are evaluated respectively subject to the duration between the consecutive sets being of sufficient length and a change having occurred to the maximum AT duration.
Coronary artery angiography image processing method to detect occlusion and degree effect of blood vessel occlusion to an organ
By a CPU (101) of a device (100) for processing medical image, a coronary artery region and a cardiac muscle region that are to be analyzed are extracted from angiographic images of the coronary artery obtained from X-ray CT images or the like. Next, degrees of isolation (blood vessel dependences), which indicate the effects of the coronary artery on the individual sites of the myocardium, are calculated. The calculated degrees of isolation are referred to as pixel values and displayed while superimposed on a bull's eye map of the cardiac muscle, a three-dimensional image of the heart or the like. As a result, the effect of infarction or constriction on the cardiac muscle region can be visually recognized merely by using the angiographic image data of the coronary artery without conducting a delay angiographic imaging examination or the like.
Determining and illustrating a structure
An volume of a patient can be mapped with a system operable to identify a plurality of locations and save a plurality of locations of a mapping instrument. The mapping instrument can include one or more electrodes that can sense a voltage that can be correlated to a three dimensional location of the electrode at the time of the sensing or measurement. Therefore, a map of a volume can be determined based upon the sensing of the plurality of points without the use of other imaging devices. An implantable medical device can then be navigated relative to the mapping data.
MRI-guided devices and MRI-guided interventional systems that can track and generate dynamic visualizations of the devices in near real time
An MRI-guided medical device includes an elongated sheath, an elongated dilator, and an elongated needle. The sheath has a distal end, an opposite proximal end, and a central lumen extending between the proximal and distal ends. The sheath comprises MRI-compatible material and includes a tracking member located adjacent to the sheath distal end that is visible in an MRI image. The dilator comprises MRI-compatible material and is movably disposed within the sheath lumen. A distal end of the dilator is configured to extend outwardly from the sheath distal end and dilator includes at least one tracking member that is visible in an MRI image. The needle is movably disposed within the dilator lumen and is movable between stored and operative positions relative to the dilator. An RF shield may be coaxially disposed within the elongated sheath so as to surround a portion of the sheath central lumen.
MRT interference field detection medical implant with prone posture position sensor
Allows the specificity of an automatic MRT detection to be increased in a simple manner. This is achieved using an automatically calibrating position sensor, so that the user does not have to perform additional calibration of this sensor. Incorrect sensor calibrations are thus eliminated as well.
Electrode fixing device
The present invention concerns a device and a method for placing and securing sensors/electrodes on the head of an individual. The device/method optimizes signal information and avoids some of the problems connected to the devices and methods in the prior art. The device comprises a rigid, fluid-proof outer layer, an elastic, fluid-proof inner layer with placement points for sensors or electrodes, and a middle layer comprising a fluid between inner and outer layers. The invention also comprises a device for regulating the pressure of the fluid. Inner and outer layers are joined together to form a cavity for receipt of the middle layer.
Device and method for identification of meconium in amniotic fluid
Disclosed are methods and devices comprising an elongated probe for the in vivo detection of meconium in amniotic fluid held in an amniotic sac based on detecting the presence of Zinc-coproporphyrin I (ZnCP). ZnCP is excited at approximately 405 nm and emits characteristic fluorescence, centered at about 580 nm and less intensely at 630 nm.
Sliding-type mobile electronic device
A sliding-type mobile electronic device that can be easily assembled and can reduce restrictions of circuit design is provided. The sliding-type mobile electronic device according to the present invention includes a first cabinet 1 in which a circuit board is incorporated, a second cabinet 2 that is slidably connected to the first cabinet, in which an electric constituent is mounted, and a flexible lead 6 drawn from the electric constituent, passed through an opening provided in the first cabinet, and connected to the circuit board 5. The flexible lead has an overlapped portion 63 in which a part of the flexible lead is folded on a predetermined region F provided on a front surface of the circuit board.
Mobile battery partitioning system and method
A device is configured to receive a request for two or more battery partitions; create the two or more battery partitions according to the received request, where each of the two or more battery partitions relate to a respective function of the device; calculate usage of the two or more battery partitions; present information regarding the usage of the two or more battery partitions; receive a request to change an allotment of at least one of the two or more battery partitions; and re-partition two or more battery partitions according to the received request to change of the allotment of the at least one of the two or more battery partitions. Additionally, the device can be configured to charge one or more battery partitions in an order of priority, re-assign one or more battery partitions to a different area, and provide notifications of usage.
Base station and method for detecting displacement of base station
A wireless base station includes a storage unit and a processor. The processor transmits to a first wireless terminal a first request for transmitting a first response including first identifiers used to identify a first base stations. The first wireless terminal is capable of receiving a signal from each of the first base stations. The processor receives the first response from the first wireless terminal. The processor stores the first response in the storage unit. The processor transmits to a second wireless terminal a second request for transmitting a second response including second identifiers used to identify second base stations. The second wireless terminal is capable of receiving a signal from each of the second base stations. The processor receives the second response from the second wireless terminal. The processor determines whether the wireless base station has been displaced based on the first identifiers and the second identifiers.
Systems and methods for RF communication between processors
Embodiments include systems and methods for integration of RF components onto a single die with functional processing circuitry. For example, one integrated circuit may comprise multiple processors that can communicate there between by way of Radio Frequency (RF) transmission. The processors may also communicate with slave devices by way of radio frequency. Transmission and reception may be at frequencies in a band hitherto unused in computing devices and their peripherals.
Method and arrangement for transmitting and receiving RF signals through various radio interfaces of communication systems
A method and arrangement for transmitting and receiving RF signals, associated with different radio interfaces of communication systems, employ a direct conversion based transceiver which substantially comprises one receive signal branch and one transmit signal branch. Mixing frequencies of the different systems are generated by a single common by use of an output frequency divider in combination with the synthesizer, and by use of filtering corresponding to a system channel bandwidth by means of a controllable low-pass filter operating at baseband frequency.
Background sound removal for privacy and personalization use
A system for background sound removal, the system may include: a noise reduction circuit arranged to apply a background sound reduction process on multiple samples of background sound and speech to provide first signals that comprise residual background sound; a background cancellation circuit arranged to remove the residual background sound from the first signals to provide second signals; and an output circuit arranged to output a mixture of the second signals and at least zero selected signals to a sound generating circuit that is arranged to output audio signals representative of the mixture.
Portable terminal with first and second sound emission portions
A portable terminal comprising a housing which incorporates a receiving speaker, an earpiece portion which allows a user to listen to an output sound from the receiving speaker, a first sound emission portion and a second sound emission portion which guide the output sound from the receiving speaker to the earpiece portion, and a sound guide space which communicates the first sound emission portion and the second sound emission portion. The first sound emission portion is opposed to the receiving speaker. The second sound emission portion is formed in plane with and near to the first sound emission portion. The second sound emission portion is located at a center of the earpiece portion.
Communication unit and method for selective frequency synchronization in a cellular communication network
A communication unit comprises a receiver for receiving radio frequency (RF) signals from at least one wireless serving communication unit, and signal processing logic module arranged to decode information within the received RF signals is the at least one wireless serving communication unit. The signal processing logic module is further arranged to decode transmit power information in a received RF signal from the at least one wireless serving communication unit, and determine from the decoded transmit power information whether a transmission from the at least one wireless serving communication unit is suitable for use as a timing reference. If it is determined that the transmission from the at least one wireless serving communication unit is suitable for use as a timing reference, the communication unit synchronizes an operating frequency to the received RF signal of the at least one wireless serving communication unit.
Method and apparatus for transmitting information about available power of terminal in mobile communication system
A method for transmitting power headroom information by a terminal in a mobile communication system, in which power headroom information is generated and transmitted if a change in power headroom is greater than or equal to a predetermined threshold and a total amount of data stored in a buffer of the terminal is greater than or equal to an other predetermined threshold.
Method and device for realizing power control on a control channel
A method and apparatus for realizing power control on a control channel including measuring the interval between the current control channel transmission and the last control channel transmission; comparing the measured interval with a preset threshold, and if the interval is larger than or equal to the preset threshold, carrying out the current control channel transmission by using the initial transmit power, or controlling the current control channel transmission by using the open loop power control and, otherwise, controlling the current control channel transmission by using the closed loop power control. When the control channel is an uplink control channel, it may be determined whether a compensation for path loss variance should be added based on the closed loop power control according to a related command, so as to enable that the power control can be provided effectively when the control channel transmission is discontinuous.
Method and apparatus for setting computer connecting mode in portable terminal
A method and an apparatus for setting a computer connecting mode in a portable terminal. The method includes checking a program executed by a user in the PC when the portable terminal is connected to a personal computer (PC); requesting the portable terminal to perform the connection to the PC using a connecting mode appropriate for a characteristic of the executed program, wherein the connecting mode is one of connecting modes to the PC; and performing the connection to the PC using the connecting mode requested by the PC.
Reception apparatus and communication system
Provided is a reception apparatus for outputting service information in an appropriate area at a suitable time so that the service information distributed has consumer attraction and a communication system in which the reception apparatus is used. A reception apparatus 100 has a reception unit 30 configured to receive service information including a display time condition transmitted from a narrow area base station 200 and identifier information of a wide area base station 300 transmitted from the wide area base station 300, a memory unit 40 configured to store the service information and the identifier information, a display unit 50 configured to display the service information, and a control unit 10, after storing the service information received by the reception unit 30 and the identifier information of the wide area base station 300 received by the reception unit 30 in the memory unit 40 in association with each other, configured to control the display unit 50 to display service information satisfying the display time condition among the service information stored in the memory unit 40 when the reception unit 30 re-receives the identifier information of the wide area base station 300 associated with the service information.
Message transmitting apparatus and method in mobile communication terminal
The present invention relates to a message transmitting apparatus and method in a mobile communication terminal and solves the problem of a message transmission being stopped when a message size exceeds a message capacity is solved. Also, memory resources of the mobile communication terminal are more efficiently utilized because an additional memory region need not be allocated to a message to be transmitted. The apparatus comprises a message generating unit for generating a message, a buffer for temporarily storing the generated message, a controller for dividing the message stored in the buffer into data blocks, wherein the controller converts a format of the data blocks into a type capable of being transmitted or received via a network and stores the data blocks into a file, and a transmitter for transmitting the message comprising the data blocks having the converted type and stored in the file to a receiving side.
Radio impacts due to group triggering and paging and solutions for group triggering and paging
A method includes transmitting a paging indicator indicating to user equipment assigned to one or more groups that the user equipment are to attempt to receive paging messages including paging information targeted to at least one of the one or more groups; and transmitting in a channel the paging information in the paging messages. Another method includes receiving a paging indicator indicating a user equipment is to attempt to receive paging messages including paging information targeted to at least one of one or more groups; and receiving from a channel the paging information in the paging messages. A method includes sending a request message to user equipment assigned to one or more groups, the request message comprising an indication to cause the user equipment to read device trigger information in a system broadcast message; and sending the device trigger information in the system broadcast message.
Wireless device and methods for use in a paging network
A wireless device includes a user interface that generates a pairing signal in response to an indication from a user to pair the wireless device to at least one remote device and generates a first location request signal in response to a second indication from a user to locate the at least one remote device. A short-range wireless transceiver communicates RF signals to pair the wireless device to the at least one remote device and that transmits a first RF paging signal to the at least one remote device in response to the location request signal.
Portable electronic device and method of providing location-based information associated with an image
A portable electronic device comprises an image sensor configured to capture at least one image. The at least one image may be output via an optical output device. A processing device is configured to retrieve geographic information associated with the at least one image, and to identify at least one contact included in a set of contacts of the portable electronic device, the at least one contact having captured at least one other image in a geographic area in which the at least one image was captured. An identifier for the at least one contact is displayed.
Application management for a wireless communication device
A wireless communication system comprises a wireless communication device and an application control system. The wireless communication device is configured to receive an application transmitted from an application server over a communication network, present application management tiers comprising individual settings for management items of access, bandwidth, and security for the application, receive a selection of one of the application management tiers for the application from the user, and transfer the selected application management tier for delivery to the application control system. The application control system is configured to process the selected application management tier with a predetermined management tier for the application to identify a discrepancy between a setting of one of the management items in the selected application management tier and a predetermined setting for a corresponding item in the predetermined management tier, and transfer feedback for delivery to the wireless communication device that identifies the discrepancy and suggests the predetermined management tier for the application.
Method and apparatus for optimizing spectrum utilization by a cognitive radio network
A technique for a secondary communication system to utilize spectrum designated to another (or primary) communication system is provided. By ranking a plurality of secondary base stations based on base station transmit power, calculated required transmit power and path loss, a set of criteria is developed for selecting a highest ranked secondary base station for operation within a primary's spectrum. The ranking may be adapted based on mobility of the secondary's subscriber; and as such the secondary system communicates within the primary's spectrum using the adaptively ranked base stations. Channel selection may also be ranked. The technique and apparatus allows a cognitive radio (CR) network to operate within an incumbent network's spectrum.
Requesting a communication resource in a wireless network
Obtaining access to a physical uplink shared channel that is shared by a plurality of mobile stations in a wireless network is disclosed. A mobile station may receive dedicated configuration information for an uplink control channel. The mobile station may send to the wireless network over the uplink control channel a request for access to the physical uplink shared channel. The mobile station receives a physical uplink shared channel allocation in response to the request.
Network of media servers and a method of dynamically routing calls over the network of media servers
A communication system including one or more end points, each end point interconnected to a wireless network. The communication system also includes a media network system, the network system contains a registration server for registering device IDs of the end points in the communication system, a database for storing device IDs, one or more media servers for routing calls between end points and a signaling server for selecting one or more media servers to route a call between end points in the communication system based on an algorithm that evaluates one or more predetermined conditions.
Method and arrangement to control a repeater in a wireless communication system
An object of the present invention is to provide a mechanism for controlling a repeater that is less costly and more flexible. The objective is achieved by a method in a control unit (150) for controlling a repeater (100) being comprised in a radio access network (110). The control unit sends a repeater control message to the repeater (100). The repeater control message is tunneled as ordinary data communication via an available radio communication channel (160) within the radio access network (110). The repeater control message is configured to control the repeater (100).
Systems and methods of bandwidth allocation during handoff
Systems and methods of uplink bandwidth allocation for a handoff are provided. A mobile station can transmit a handoff request message to a serving base station. The mobile station and the target base station can exchange synchronization messages and the mobile station can then subsequently receive an unsolicited allocation of a number of uplink sub-channels from the base station.
Changes of forward-link and reverse-link serving access points
In a communication system in which a mobile station accessing the main network via a plurality of base stations, the mobile station can freely select any of the base stations as a forward link (FL) serving station. In addition, the mobile station can also freely select another or the same base station as a reverse link (RL) serving station. The mobile station has stored in its memory a plurality of routes corresponding to the plurality of base stations, with each route dedicatedly assigned to a particular base station. During handoff of one base station to another as either the FL or the RL serving station, exchanged data packets are processed in the respective routes of the base stations involved.
Mobile phone and network connecting method and apparatus thereof
A mobile terminal as well as a network connecting method and a network connecting apparatus thereof are disclosed in the present disclosure. The network connecting method comprises the following steps of: determining whether the network connecting mode is a dual-mode mode when the mobile terminal is connecting to a network; and if it is determined that the network connecting mode is the dual-mode mode, then setting the network connecting mode of the mobile terminal into a TD preference mode and connecting to the network. In the present disclosure, when the mobile phone is not in a 3G network or when the 3G signal is weak, the mobile phone that has been switched to a 2G network can re-initiate the network business without the need of firstly logging on the 3G network. This significantly reduces the network searching time, which is very convenient for the user.
Flexible telematics system and method for providing telematics to a vehicle
A method for providing telematics to a vehicle includes the step of providing a user-removable telematics component with a Global Positioning System (GPS) device, a data pump, and a short range wireless personal area network transceiver. The telematics component is communicatively connected to an integrated communication device of the vehicle. The integrated communication device has a short range wireless personal area network transceiver and a memory storing a list that includes at least a phone number of at least one currently paired mobile communication device. At least a portion of the list is periodically received at the data pump, the portion of the list including the phone number of the at least one currently paired mobile communication device. The portion of the list is periodically transmitted out from the telematics component to an off-site telematics provider utilizing a communications path of the data pump.
Post-deployment calibration for wireless position determination
Methods and apparatuses are directed to calibrating a misconfigured wireless access point. One method may include receiving a position of mobile station(s) and wireless signal model measurements derived from packets exchanged between the mobile station(s) and a plurality of wireless access points, receiving positions and/or identities of the plurality of wireless access points used in determining the position of the mobile station(s), comparing a position of the mobile station(s) with wireless signal model measurements, and identifying a misconfigured wireless access point based upon the comparing. Another method may include receiving positions associated with a plurality of wireless access points, determining a position of a mobile station based upon a wireless signal model, comparing the position of the mobile station and the wireless signal model with the positions associated with the plurality of wireless access points, and determining whether at least one wireless access point is misconfigured.
Symbiotic system for testing electromagnetic signal coverage in areas near transport routes
A cooperative system for testing signal strength near a target area selected by a wireless provider is disclosed, using test units installed in the fleet vehicles of an unrelated service enterprise. The system in one embodiment includes an algorithm for comparing test parameters to the route data contained in the dispatch plan for the fleet vehicles, in order to identify the optimal routes on which to send test units. A computer software product for storing the parameters and executing the algorithms is also disclosed. Signal testing in a target area is accomplished through the symbiotic relationship between the testing units and the fleet vehicles, whereby the wireless provider benefits from unit carriage along routes already being traveled by the fleet vehicles for a different purpose. This Abstract is provided quickly inform a reader about the subject matter, and not for use interpreting the scope or meaning of the claims.
Interactive personal information management system
An interactive personal information management system is disclosed. The system permits a user to communicate updated information to other users of a personal information management system. The system notifies the other users of the change and automatically updates the other users' personal information management system to reflect the changed information.
Communication terminal apparatus, computer product, and incoming call processing method
A communication terminal apparatus includes a computer configured to receive an incoming call request from a caller device; identify a communication service requested by the caller device, based on the received incoming call request; retrieve from among a plurality of OSs running on the communication terminal apparatus and based on communication services processable by each OS included among the OSs, an OS capable of processing the identified communication service; and allocate the incoming call request to the retrieved OS.
Methods and apparatuses for programming user-defined information into electronic devices
A device for programming user-defined information into an electronic device is provided. The programmer allows a user to program customized information, such as user-selected audio, video, or Internet access information into his or her programmable device. Such electronic devices include wireless telephones, pagers, and personal digital assistants. The programmer allows a user to, among other things, customize the device to suit his or her particular taste.
System and associated terminal, method, and computer program product for configuring and updating service access points and providing service content in the mobile domain
Various techniques for service access point configuration for mobile terminals of wireless systems are provided. Pre-configured service access point settings may be provided on a multimedia memory card with a client application capable of configuring the service access point settings in the mobile terminal from the pre-configured service access point settings on the multimedia memory card. Over-the-air updating of service access point settings may be performed by communication between a service access point and a mobile terminal or a client application on the mobile terminal for automatically configuring service access point settings on the mobile terminal based upon information provided by the service access point. Service content specific pricing in the mobile domain is also provided. Service content specific pricing content delivery may be provided through a particular service access point configured for the service content specific pricing.
Apparatus and method for automatic call receiving and sending depending on user posture in portable terminal
A method receives a call by recognizing a posture of a user in a portable terminal. The method includes identifying whether a call reception event occurs, detecting a motion in which the user brings the portable terminal to an ear by using a posture detecting sensor, when the call reception event occurs, and connecting the call upon detecting the motion.
Communication system, radio communication terminal and display control method
A SIP server generates a second call request for calling out group talk members corresponding to a first call request on the basis of the received first call request. Prior to transmitting the generated second call request to the group talk members, the SIP server transmits call request receiving information indicating that the first call request has been received. An SMS server transmits a start-up message to the group talk members on the basis of the received call request receiving information. The start-up message is used to start up an application which executes a group talk, and includes the member identification information of the group talk.
Methods and devices for remote processing of messages, and performing user tracking and monitoring with respect to data originating from a mobile communication device
In part the invention relates to a method of providing remote access to data generated by a mobile device having a device storage element. The method includes the steps of monitoring the mobile device such that changes in local data resident in the device storage element are detected using a client application installed on the mobile device, wherein the changes in the local data accumulate during a period of time to comprise at least one change set; transmitting the at least one change set over a network; receiving the at least one change set at a remote server, the remote server having a remote storage element; and processing the at least one change set using a server application to generate user accessible remote data. Various embodiments further involve remote text message archives, positional and temporal information associated with change sets, alert generation by trigger events, and archiving with associated searchable meta-data for data mining.
Method for adaptive mobile identity
A method for adapting a mobile identity involves an application publishing different attributes when the application is in the foreground, is in a know location or is in proximity of a beacon then when it is not. The attributes can be scanned wirelessly using short wireless communication.
Apparatus and method for providing etiquette call mode in mobile device
An apparatus and method are provided to output a received call with a volume adjusted to a reference level range in the etiquette call mode. In the method for providing the etiquette call mode of a mobile device, the apparatus determines whether the etiquette call mode is activated in a call mode. When the etiquette call mode is activated, the apparatus establishes a transmission gain to a given gain value and also establishes a reception gain to a specific gain value corresponding to a minimum receiving volume level. Then the apparatus amplifies a received call by means of the established reception gain, adjusts a volume of the amplified received call to a given reference level range, and outputs the adjusted received call through a speaker.
Remote control method and system for smart card
The present invention provides a remote control method and system for a smart card. The remote control method for a smart card includes the following steps: a smart card management platform receives a request for destruction of a smart card from a user (S101); the smart card management platform carries out short message interactive processing with a terminal via a mobile network platform according to the request to make the terminal destruct the smart card (S103).
Systems and methods for automatic user-enabled account identifier association
Systems, methods, and an article of manufacturing for automatically associating an identifier of a particular mobile station with a mobile communications network account are shown and described. In some circumstances, an identifier is automatically captured from a mobile station, e.g., via over-the-air signaling to the network. Upon verification of other account details, the captured identifier is assigned to the account, e.g., with a particular directory number of the account, and the change is propagated to other systems of the mobile communications network.
System, method, and computer program for persona based telecommunication service subscriptions
A system, method, and computer program product are provided for persona based telecommunication service subscriptions. Usage of a device is detected, and one of a plurality of personas configured for the device is determined to be associated with the usage of the device. Additionally, at least one telecommunication service subscribed to by the persona is identified. Further, the usage of the device is serviced using the identified telecommunication service.
Differentiated network indication
A system and method in a cellular telecommunication network for indicating tariff-related information to an end user having the ability to access network areas with different charging tariffs. In one embodiment, a Charging Indication Data Base (CIDB) in the access network stores charging indications for different combinations of end users and cell identities, and a Rate Indication Data Base (RIDB) stores tariff information for the core network. When the end user accesses the cellular network through an identified cell, a radio network controller (RNC) retrieves a charging indication from the CIDB and sends it to a Mobile Switching Center (MSC). The MSC uses the charging indication to retrieve tariff-related information from the RIDB and sends it to the end user. The CIDB and RIDB may also be co-located in the core network.
Emergency mobile notification handling
Systems and methods for handling emergency notification messages such as Commercial Mobile Alert System (CMAS) alerts. In one example use, a mobile communications device receives a text-based message, determines that the message is an emergency alert message, and forwards at least some of the content of the message to a computer system. The computer system derives, from the content of the text-based message, data or signals that render at least some of the content of the text-based electronic message into an audio format, and transmits the data or signals to the remote communications device, which then audibly plays the message. Such a system may enable additional persons to receive emergency notifications who otherwise may not receive them, for example, persons with visual impairments, or persons using communications devices that are unable to display text.
Systems and methods for wireless communications
A personal communications device configured to communicate with a wide area network in response to an alternate mode activation signal is provided. The personal communications device also comprises a signal broker operatively connected to a monitored interface from among the one or more interfaces along a control path. The signal broker is configured to monitor signals at the monitored interface and upon observing an alternate mode activation signal at the monitored interface, inject an alternate mode signal configured to initiate the alternate communication over the wide area network. In some embodiments, the alternate communication is different from a communication that would have occurred in the absence of the injected alternate mode signal. The alternate mode signal may comprise an emergency mode signal configured to initiate an emergency communication over the wide area network. The emergency communication may comprise an SMS message, a telephone call, an HTTP command, an email, or the like.
Method for transmission of alarm messages to subscriber terminals in a radio communications system
Alarm messages are transmitted to subscriber terminals of a radio communication system by signalling the alarm presence through a control channel to the subscriber terminals by at least one base station of the radiocommunication system using at least one system information item. Upon reception of the system information item by the subscriber terminals, the subscriber terminals transmit at least one respective recorded alarm signal.
Synchronization of front-end and baseband units in wireless communications device by wirelessly transmitting clock signal therebetween
A wireless device includes a baseband unit and front-end units that are provided in individual housings. The baseband unit and the front-end units are connected to each other by wire. A transmitter for synchronization that converts a signal based on a reference clock into a radio signal and transmits the radio signal as a clock synchronization signal is provided in any one of the housings, and receivers for synchronization that receive the signal for the clock synchronization and PLLs that generate a clock synchronized with a reference clock signal which is obtained from the received clock synchronization signal are provided in the housings other than the housing having the transmitter provided therein. In order to simultaneously process a plurality of wireless devices having different symbol rates, it is preferable to provide the transmitter, the receiver, and the PLL for each reference clock.
Complex intermediate frequency mixer stage and calibration thereof
The invention relates to a complex intermediate frequency (CIF) mixer stage, methods of operation thereof, and methods of calibration thereof. The CIF mixer stage comprises numerous individual mixers driven by IF clock signals to down-convert received IF signals into a set of signals at baseband frequency which are further combined to form a lower side band signal and an upper side band signal. The IF clock signals used have a predefined phase relationship among them, which involves tuneable phase skews. By calibration of the conversion gains and the phases of the IF clock signals the gain and phase imbalance introduced in a preceding radio frequency mixer stage and/or the CIF mixer stage can be cancelled. Further, in-channel IQ leakage control can be applied to the lower side band signal and/or the upper side band signal. The CIF mixer stage can thus effectively suppress image interference and IQ leakage.
MEMS and switched capacitors configured for increased resolution switching
Certain aspects of a method and system for increased resolution switching using MEMS and switched capacitors may include a mobile terminal that includes an integrated circuit bonded to a multi-layer package. A capacitance of a first switched capacitor array in the multi-layer package may be tuned via one or more MEMS switches integrated in and/or on the multi-layer package. A capacitance of a second switched capacitor array in the integrated circuit may be tuned via one or more NMOS switches. A plurality of signals may be transmitted and/or received via one or more antennas in the mobile terminal.
One embodiment of the present invention provides a synthesizer. The synthesizer includes one or more tunable oscillators, a frequency-dividing circuit coupled to the tunable oscillators, and a multiplexer coupled to the frequency-dividing circuit. The frequency-dividing circuit includes a number of frequency dividers, and is configured to generate a number of frequency-dividing outputs. At least one frequency-dividing output has a different frequency division factor. The multiplexer is configured to select a frequency-dividing output.
Switchless band separation for transceivers
A system includes a plurality of band pass filters to pass signals in separated frequency bands to or from an antenna. A matching network provides characteristic impedances. The system is designed such that the configuration of the matching network and BPFs provides high impedance to the band pass filters for those routing paths other than the band pass path as these routing paths do not transmit or receive the signals at this particular pass band. The system is further designed such that the configuration of the matching network and BPFs provides minimal insertion loss for the band pass path of for transmission and receipt of signals at this particular pass band, where each routing path has a corresponding pass band. The matching network is for coupling to an amplifier, when frequency separation is needed at the output of the amplifier to the BPFs. In one embodiment an impedance network tunes the impedance by using varying length transmission lines.
Radio communication system, radio terminal, radio base station and radio communication method
A radio communication system (1) has: a radio terminal (UE); a radio base station (BS1) which transmits radio signals (RS1) to the radio terminal (UE) corresponding to the feedback from the radio terminal (UE); and a radio base station (BS2) which transmits, corresponding to the feedback from the radio terminal (UE), radio signals (RS2) to the radio terminal (UE) at the frequency and time identical to the frequency and time at which the radio signals (RS1) are transmitted. In the case where one transmitting antenna is used for the transmission of the radio signals (RS1) in the radio base station (BS1), the radio terminal (UE) omits the feedback to the radio base station (BS1).
Determining an uplink control path with blind decoding
In an aspect, a method assists with blind decoding of uplink control signals on a Physical Uplink Shared Channel (PUSCH) and Physical Uplink Control Channel (PUCCH). The method assists in determining the uplink control path in the event a user equipment (UE) misses an uplink grant and blind decoding occurs. It is determined whether an uplink acknowledgement, rank indicator, and/or channel quality indicator are found on a PUSCH. If not, it is determined whether a scheduling request is expected and whether special handling for the scheduling request is indicated. Depending on those determinations, and whether any decoding attempts for uplink signals are successful, either the PUSCH or PUCCH is selected as the uplink control path.
Apparatus and method for reducing interferences between base stations in wireless communication system
A method for reducing interferences between base stations in a communication system having a plurality of base stations. This method comprises the steps of: causing a user station to receive both a signal transmitted by a local-cell base station and a signal transmitted by an adjacent-cell base station, thereby measuring the SNR of the interfered link and the SNR of the leak link of the adjacent-cell base station; calculating a weighting factor of a leak power based on the measured SNR of the interfered link and the measured SNR of the leak link of the adjacent-cell base station; and determining, based on the calculated weighting factor, whether or not the leak power has to be suppressed and to what degree such suppression has to be performed.
Electromagnetic wave discrimination device, electromagnetic wave discrimination method, and electromagnetic wave discrimination program
An electromagnetic wave discrimination device according to the present invention discriminates electromagnetic waves, and includes an acquisition section, a feature quantity calculation section, a similarity calculation section, a classification section, a discrimination section, an output section, and a storage section. The acquisition section receives communication signals of a predetermined frequency, and samples waveform data of the communication signals every predetermined time to obtain sample data for each predetermined time. The feature quantity calculation section calculates amplitude feature quantities for each predetermined time, based on the sampling data for each predetermined time. The similarity calculation section calculates degrees of similarity with respect to the amplitude feature quantities for each predetermined time. The classification section classifies the communication signals for each predetermined time into clusters to obtain cluster analysis results of the communication signals for each predetermined time, based on the degrees of similarity. The discrimination section discriminates communication signals constituting one cluster for each of the clusters to obtain discrimination results, based on the cluster analysis results of the communication signals for each predetermined time. The output section outputs the discrimination results. The storage section stores the amplitude feature quantities, the degrees of similarity, the cluster analysis results, and the discrimination results.
Method and apparatus for collecting user activity in a telecommunications system
Method and apparatuses for collecting user activity information in a telecommunications system. A first telecommunications node (120) handling signaling of the terminal of a user sends a message (516) notifying a registration event (515) of the user to a second node (130) handling registration information of said user. The message comprises an information element (ACT) indicating whether the user has been involved in a service provided during a registration period comprised between a previous registration event (501) of said user and said notified registration event. At reception of the message, the second node updates registration information (430) and activity information (440) of the user. By including service usage information in registration notification messages, the operator of the telecommunications system can obtain information about the rate of service usage in the system without requiring implementation of neither new nodes nor new messages to be exchanged by new or existing nodes.
RFID beam forming system
A multi-protocol, multi-band array antenna system may be used in Radio Frequency Identification (RFID) system reader and sensory networks. The antenna array may include array elements with an integrated low noise amplifier. The system may employ digital beam forming techniques for transmission and steering of a beam to a specific sensor tag or group of tags in a cell. The receive beam forming network is optimized for detecting signals from each sensor tag. Narrow and wideband interferences may be excised by an interference nulling algorithm. Space division multiplexing may be used by the antenna system to enhance system processing capacity.
Wireless communication system, wireless communication apparatus, and wireless communication method
A wireless communication system is disclosed. The wireless communication system performs data transmission using spatially multiplexed streams from a first terminal including N antennas to a second terminal including M antennas (N and M are integers larger than or equal to 2 and N>M).
Cyclic prefix schemes
Methods and systems are proposed for transmitting data from a source (110) to a destination (130) via a relay station (120) having multiple antennae (122, 124). The relay station (120) receives from the source a message containing the data and a first cyclic prefix. It does this using each of its antennae (122, 124), so producing multiple respective received signals. In certain embodiments, the relay station (120) removes the first cyclic prefix from the received signals, replacing it with a new one. In other embodiments, the relay station (120) removes only a portion of the first cyclic prefix. In either case, the relay station (120) may apply space-time coding to generate second signals, which it transmits to the destination (130), which extracts the data. Methods are also proposed for estimating parameters of the channel, to enable the destination (130) to decode the data.
Systems and methods for producing, delivering and managing educational material
A method includes arranging a plurality of learning objectives to define a learning objective sequence of an educational material. Each learning objective from the plurality of learning objectives is associated with a content including at least one of a learning object, an assessment or a teaching strategy item. A temporal content is inserted into the learning objective sequence at a position within the learning objective sequence based on a time associated with the presentation of the temporal content to a user. The time can include, for example, a date of a holiday, a number of times the user has logged in, or the like. An educational material including the content associated with each learning objective from the plurality of learning objectives and the temporal content is produced. The content and the temporal content are arranged to define at least one learning path within the learning objective sequence.
Image forming apparatus which controls a subsequent sheet to be discharged at a same speed as a previous sheet
An image forming apparatus connected to a conveying-speed-changeable sheet post processing device includes a discharging unit which discharges a sheet in a reverse discharge mode with front and back surfaces of the image-formed sheet reversed, and a non-reverse discharge mode without front and back surfaces of the image-formed sheet reversed, and discharges the sheet at a first speed or a second speed lower than the first speed; and a control unit which controls the discharging unit to discharge the sheet at the first speed in the reverse discharge mode and at the second speed in the non-reverse discharge mode. When the sheet is discharged at the second speed, the control unit controls the discharging unit to discharge a subsequent sheet at the second speed even if the subsequent sheet is to be discharged in the reverse discharge mode.
Image forming apparatus
An image forming apparatus is provided. The image forming apparatus includes an image forming unit, a return-sheet conveyer unit to convey a recording sheet carried from the image forming unit along a return-sheet path to return to the image forming unit, an upper frame unit including a pair of side frames to support the image forming unit in a position there-between, and a pair of lower frames arranged to have a predetermined amount of clearance there-between to have the return-sheet conveyer unit in the clearance, and configured to be less rigid than the upper frame unit and to support lower sections of the pair of side frames. A vertical position of the return-sheet conveyer unit with respect to the image forming unit is defined with reference to the upper frame unit by having a part of the return-sheet conveyer unit aligned to be in contact with the upper frame unit.