Tool tips with scanning probe microscopy and/or atomic force microscopy applications
A micro-object is affixed to a mounting structure at a desired relative orientation. The micro-object may be a tool tip optimized to work with particular microscope objectives permitting the tip to be imaged along with the object surface and used to make measurements or modifications through a travel range along the microscope imaging axis equal to or nearly equal to the working distance of the given objective. The tool tip may have a lengths exceeding 80 microns, say up to several millimeters; even the longest tips can have widths of tens of microns.
System and method for controlling multicast geographic distribution
A content distribution network includes first and second controllers, and multicast enabled routers. The first controller is configured to select a multicast channel for distributing content, to determine that the content has a geographic restriction associated with a restricted area in the content distribution network, to link an exclusion policy for the content to the multicast channel while the multicast channel provides the content, and to deny a request for the content from a client system within the restricted area based on the exclusion policy. The second controller is configured to distribute the exclusion policy to the multicast enabled routers including a first router configured to store the exclusion policy, and to ignore a multicast join message from the client system within the restricted area based on the exclusion policy.
Authority changing device, generating device, and computer program product
According to an embodiment, an authority changing device includes a first determiner, a second determiner, and a changing unit. A first authority is defined by a first combination of first to third item values, and a second authority is defined by a second combination of the fourth to sixth item values. The first determiner uses a logical expression to determine whether the change from the first authority to the second authority is possible, not possible, or unknown. The second determiner uses a first table to determine the availability of change from the first authority to the second authority when the availability of the change is determined to be unknown. The changing unit changes the first authority to the second authority when the change is determined to be possible.
System, method, and computer program product for securing data on a server based on a heuristic analysis
A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with attempts to access data on a server is recorded. Additionally, the information is heuristically analyzed. Further, the data is secured on the server based on the heuristic analysis.
Systems, methods and analyzers for establishing a secure wireless network in point of care testing
A system and method for initiating and maintaining a secure wireless communication between a wireless analyzer and a target network (e.g., a hospital network connected to a LIS and/or HIS). The present disclosure provides novel processes and systems for securely networking a wireless analyzer with a Wi-Fi network without the need for an operator or user to engage in manual initiation steps on, or through, the wireless analyzer.
Executing trusted applications with reduced trusted computing base
A system for executing trusted applications with a reduced trusted computing base. In one embodiment, the system includes a processor to dynamically instantiate an application protection module in response to a request by a program to be executed under a trusted mode. The system further includes memory to store the program which is capable of interacting with a remote service for security verification. In one embodiment, the application protection module includes a processor-measured application protection service (P-MAPS) operable to measure and to provide protection to the application.
Methods, systems, and computer readable media for combining IP fragmentation evasion techniques
Methods, systems, and computer readable media for combining IP fragmentation evasion techniques are disclosed. According to one aspect, the subject matter described herein includes a method for combining IP fragmentation evasion techniques. In a packet network test device, a plurality of IP fragmentation evasion techniques are defined. An IP packet is generated and fragmented into a first set of IP packet fragments. To the first set of IP packet fragments, each of the multiple IP fragmentation evasion techniques are applied. This produces a second set of IP packet fragments, which are transmitted to the device under test.
Providing a malware analysis using a secure malware detection process
In certain embodiments, a computer-implemented system comprises a boundary controller and a first malware detection agent. The boundary controller is operable to implement a security boundary between a first computer network environment and a second computer network environment. The second computer network environment has a security classification level that is more restrictive than a security classification level of the first computer network environment. The boundary controller is operable to receive from the first computer network environment a file. The first malware detection agent is positioned in the second computer network environment and is operable to receive via the boundary controller the file and apply a first malware detection process on the file. The first malware detection process is subject to the security classification level of the second computer network environment.
Automatic analysis of security related incidents in computer networks
Solutions for responding to security-related incidents in a computer network, including a security server, and a client-side arrangement. The security server includes an event collection module communicatively coupled to the computer network, an event analysis module operatively coupled to the event collection module, and a solution module operatively coupled to the event analysis module. The event collection module is configured to obtain incident-related information that includes event-level information from at least one client computer of the plurality of client computers, the incident-related information being associated with at least a first incident which was detected by that at least one client computer and provided to the event collection module in response to that detection. The event analysis module is configured to reconstruct at least one chain of events causally related to the first incident and indicative of a root cause of the first incident based on the incident-related information. The solution module is configured to formulate at least one recommendation for use by the at least one client computer, the at least one recommendation being based on the at least one chain of events, and including corrective/preventive action particularized for responding to the first incident.
Verifying certificate use
A method, system, and computer usable program product for verifying certificate use are provided in the illustrative embodiments. A secure data communication is directed to a certificate use verification application. A test certificate that may be stored in a data storage associated with a data processing system is presented to an originator of the secure data communication. The test certificate includes an identity, and the identity identifies an entity other than the intended party to the secure data communication as being the holder of the test certificate. A determination is made whether the originator responds to continue the secure data communication when presented with the test certificate. If the originator responds to continue the secure data communication, a report is made that the originator does not perform a verification of the identity from the test certificate.
Storage device with internalized anti-virus protection
An approach to handling connection errors between an external antivirus server and a storage device is disclosed. The storage device is equipped with an internal antivirus server. Antivirus metadata that describes the antivirus scan is stored in an antivirus metadata repository on the storage device. The connection between the external antivirus server and the storage device is monitored. The external antivirus server executes the antivirus scan on the storage device. If the connection fails, control of the antivirus scan is passed from the external antivirus server to the internal antivirus server. The internal antivirus server determines where to begin based on the antivirus metadata. When the connection is restored, control is passed back to the external antivirus server.
System and method of detecting malicious traffic while reducing false positives
A system comprises a traffic analysis device and a network device. The traffic analysis device is configured to analyze network traffic received over a communication network and duplicate at least select network communications within the network traffic having characteristics associated with malicious traffic when determined through heuristic analysis to satisfy a heuristic threshold. The network device comprises a controller in communication with one or more virtual machines that are configured to (i) receive the duplicated network communications from the traffic analysis device, (ii) monitor a behavior of a first virtual machine of the one or more virtual machines in response to processing of the duplicated network communications within the first virtual machine, (iii) identify an anomalous behavior as an unexpected occurrence in the monitored behavior, and (iv) determine, based on the identified anomalous behavior, the presence of the malicious traffic in the duplicated network communications.
Transaction-based intrusion detection
Systems and methods are provided for intrusion detection. The systems and methods may include receiving transaction information related to one or more current transactions between a client entity and a resource server, accessing a database storing a plurality of transaction groups, analyzing the received transaction information with respect to information related to at least one of the plurality of transaction groups, and based on said analyzing, determining a possibility of an occurrence of an intrusion act at the resource server. The transaction groups may be formed based on a plurality of past transactions between a plurality of client entities and the resource server. Identity information of a user associated with the one or more current transactions may also be received along with the transaction information. The user may be associated with at least one of the plurality of transaction groups.
Method and apparatus for identifying phishing websites in network traffic using generated regular expressions
According to an aspect of this invention, a method to detect phishing URLs involves: creating a whitelist of URLs using a first regular expression; creating a blacklist of URLs using a second regular expression; comparing a URL to the whitelist; and if the URL is not on the whitelist, comparing the URL to the blacklist. False negatives and positives may be avoided by classifying Internet domain names for the target organization as “legitimate”. This classification leaves a filtered set of URLs with unknown domain names which may be more closely examined to detect a potential phishing URL. Valid domain names may be classified without end-user participation.
Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis
Methods and apparatus are provided for detecting unwanted traffic in one or more packet networks utilizing string analysis. Unwanted traffic received by a target victim, such as a malicious attack, is detected by maintaining a rule base identifying one or more string expressions; analyzing one or more error entries in a log file, the log file comprising one or more requests received by the target victim; determining if the one or more requests include a string that matches one or more of the string expressions in the rule base; and sending a denunciation message to a central filter if the one or more requests include a string that matches one or more of the string expressions in the rule base. The string expressions may comprise, for example, a string or a regular expression and can represent one or more resources that an attacker may attempt to access.
Protecting computers using an identity-based router
A router is placed between a protected computer and devices with which the computer communicates, including peripherals and other computers. The router includes a list of authorized devices that are permitted to send data to the protected computer, against which requests to send data are checked. The router also communicates with a remote authentication service to authenticate devices requesting such permission. The authentication service may be a cloud-based identity service.
Load balancing in a network with session information
Methods and systems for balancing load among firewall security devices are provided. According to one embodiment, a switch maintains a session table the session entries of which represent established traffic sessions between a source and a destination and form an association between the traffic session and a particular firewall security device (FSD). Responsive to receiving a packet of a first traffic session on a first port, a determination is made whether there exists a matching session entry. Responsive to a negative determination, a load balancing function is performed to select an FSD with which to associate the first traffic session and a corresponding reverse second traffic session. After processing of the packet by the selected FSD and receipt of the packet at a second port, a session entry is installed within the session table for the second traffic session and which associates the selected FSD with the second traffic session.
Method, a system, and an apparatus for content security in computer networks
The present invention relates to a method, a system, and an apparatus for protecting data in a computer network. A device is placed on a network edge in such a way, that all outgoing data has to pass through it. Separately, a set of protected files that are not allowed to leave the network is defined. The device checks the passing data for the presence of the data from the defined set (protected data). If a threshold amount of the protected data is present, the device interrupts the connection or takes another appropriate action.
Secure connection systems and methods for vehicles
A communication system of a vehicle includes a mode determination module and a connection control module. The mode determination module sets a mode of operation to one of a first mode and a second mode based on a comparison of a common name (CN) of a root certificate with first and second predetermined CNs associated with operation in the first and second modes, respectively. The connection control module selectively transmits a request to one of a first server and a second server to establish a secure wireless connection between the connection control module and the one of the first and second servers. The first and second servers are different, and the first and second predetermined CNs are different.
Secure dynamic authority delegation
In a communication network wherein a first computing device represents a resource owner and a second computing device represents a resource requestor, the resource owner detects an occurrence of an event, wherein the event occurrence represents a request to access one or more resources of the resource owner stored in a resource residence. The resource owner sends an authorization token to the resource requestor in response to the event occurrence, the authorization token serving as a proof of authorization delegated by the resource owner to be presented by the resource requestor to the resource residence so as to permit the resource requestor to access the one or more requested resources stored in the resource residence.
Access authorizing apparatus
An access authorizing apparatus includes a receiving unit, a first transmitting/receiving unit, a token issuer and a transmitting unit. A receiving unit receives first approval information indicating that access to the resource in the device has been approved by an access approver, from the first application via the network. A first transmitting/receiving unit transmits an access approval request including the first approval information to the access approving apparatus, and receives access enable/disable information indicating whether the access to the resource by the first application is permitted, from the access approving apparatus. A token issuer, when the access enable/disable information indicates that the access to the resource is permitted, issues token information that gives authority to access the resource to the first application. A transmitting unit transmits the token information issued by the token issuer, to the first application.
Method and apparatus to scale authenticated firewall traversal using trusted routing point
A Trusted Routing Point (TROP) generates a signaling message that includes an authorization token used to authorize a firewall to open a pinhole. The signaling message contains a first indicator that indicates whether a data field in the signaling message represents a source address of a media flow. The signaling message also includes a second indicator that indicates whether the firewall should derive the source address of the media flow from the data field. The authorization token is generated using a one-way hash function over information that may be included in the signaling message, including the first indicator and the second indicator.
Authentication of a server by a client to prevent fraudulent user interfaces
Protecting a user against web spoofing in which the user confirms the authenticity of a web page prior to submitting sensitive information such as user credentials (e.g., a login name and password) via the web page. The web page provides the user with an identifiable piece of information representing a shared secret between the user and the server. The user confirms the correctness of the shared secret to ensure the legitimacy of the web page prior to disclosing any sensitive information via the web page.
Secure enterprise service delivery
A device receives enterprise information associated with enterprises supported by a network, and determines enterprise identifiers for one or more enterprises identified in the enterprise information. The device also receives information associated with devices and subscribers of the network, and determines security key parameters based on the information associated with the devices and the subscribers of the network. The device further generates, based on the security key parameters, a security key for each of the enterprise identifiers.
Common data format in knowledge-based authentication
An improved technique involves converting facts from multiple fact sources to a common data format. Along these lines, for each fact source having a source-specific format, a KBA system provides an adaptor that converts incoming facts in the source-specific format to the common data format prior to generating questions. The KBA system stores the facts in the common format in a database for subsequent access. In response to an authorization request, the KBA system then builds questions based on the facts from multiple sources in the common data format stored in the database.
Authentication management services
Disclosed are various embodiments for authentication management services, where authentication services of network sites may support authentication management clients associated with different authentication management services. An authentication request is obtained by way of an authentication protocol from an authentication management client executed in a client computing device. The authentication request specifies a security credential associated with a user account. The user account at the client computing device is authenticated for access to at least one secured resource of a network site in response to the authentication request and in response to the authentication management client being supported.
Multifactor authentication for programmatic interfaces
Systems and methods provide logic that validates a code generated by a user, and that executes a function of a programmatic interface after the user code is validated. In one implementation, a computer-implemented method performs a multifactor authentication of a user prior to executing a function of a programmatic interface. The method includes receiving, at a server, a user code through a programmatic interface. The server computes a server code in response to the user code, and compares the user code to the server code to determine that the user code corresponds to the server code. The server validates the user code and executes a function of the programmatic interface, after the user code is validated.
Wirelessly accessing broadband services using intelligent cards
The present disclosure is directed to a system and method for wirelessly accessing broadband services using intelligent cards. In some implementations, a broadband service card includes a physical interface, a communication module, secure memory, and service module. The physical interface connects to a port of a consumer host device. The communication module wirelessly receives RF signals from and transmits RF signals to a wireless broadband network. The secure memory stores user credentials used to securely authenticate the card and access a service foreign to the consumer host device through the wireless broadband network independent of the consumer host device. The user credentials are associated with a broadband service provider. The service module accesses the foreign service using the user credentials in response to at least an event and transmits a service request to the broadband service provider using the wireless broadband core network.
Remote desktop access
A method of accessing a first computing device from a second computing device using a remote desktop service is disclosed. The first and second device register are authenticated and registered with a remote access gateway. In some embodiments, the remote access gateway stores a copy of the first computer and changes made to the copy are synchronized with the actual first computer when it access the remote access gateway. A virtual operating system experience on the second computer is virtually the same as the real operating system experience on the first computer.
Method, system and apparatus for accessing a visited network
The embodiments of the present invention disclose a method for accessing a visited network. The method includes: a user selects a visited network and initiates an access request to a user information application apparatus; when the user information application apparatus detects that the visited network has changed, it obtains a list of authorized visited networks from a user information storage apparatus and checks whether the user is authorized to access the visited network; or the user information storage apparatus checks whether the user is authorized to access the visited network; if the user is authorized to access the visited network, the user information application apparatus returns an access accept response to the user, allowing the user to access the visited network. The embodiments of the present invention also disclose systems and apparatuses for accessing a visited network. The embodiments of the present invention make it possible to accurately check whether the user is authorized to access a visited network.
Methods for authenticating and authorizing a mobile device using tunneled extensible authentication protocol
Methods for authenticating and authorizing a mobile device using tunneled extensible authentication protocol are provided. The methods include evaluating an inner user identifier against a policy engine to determine a home AAA server to route an access request for inner user authentication. Instead of having a static route configured based on an outer identifier/roaming identity, the policy engine can have multiple rules and actions for routing the request. The evaluation can be based on the conditions of the inner user identifier and or other AAA attributes received in the request. The request is transmitted within a secure communication tunnel. There are several embodiments of evaluating an inner user identifier against a policy engine.
Digital social network trust propagation
A trust propagation system is disclosed that propagates trust data based on established trust relationships. The trust system may automatically propagate trust data between parties A and C based on trust relationships with a common party B. Trust data may include authentication data such as biometric data, encryption data, passwords, etc. that may be used to conduct exclusive communications.
Unlimited access to media and applications over wireless infrastructure
Methods, systems, and apparatus are presented for providing unlimited access to either or both of media content, such as music, and applications. A media server environment can be provided, which maintains an instance of each subscriber account, a central archive of media content, and an application catalog. Selected media content can be downloaded to, and stored locally at, a subscriber device, such as on a secure storage device. Also, selected applications can be locally installed on the subscriber device. Access to the local media content and locally installed applications can be controlled through the media server environment based on the status of the subscriber's account. If the subscriber's account becomes inactive, access to the downloaded media content and installed applications can be disabled. Once the subscriber's account is reactivated, access to the downloaded media content and applications can be restored.
Security memory access method and apparatus
Various embodiments comprise apparatuses and methods to allow access to a memory device by an external device. A method includes receiving, at the memory device, a request from the external device to access a storage area of the memory device and performing an unlock procedure of the storage area. The unlock procedure includes sending a first code from the memory device to the external device, and receiving a second code at the memory device from the external device. The second code is to be generated by a first encryption process performed on the first code to obtain the second code. The storage area is temporarily unlocked to allow the external device to access the storage area based on a determination that the received second code has a predetermined relationship to the first code. Additional apparatuses and methods are described.
Disposable browsers and authentication techniques for a secure online user environment
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.
Method and system for secure access policy migration
A method for deploying a directory server that includes receiving a new version of the directory server on a server to replace a prior version of the directory server, wherein the new version of the directory server uses a new version of an access policy and the prior directory server uses a prior version of the access policy, and configuring the new version of the directory server to use both the prior version of access policy and the new version of the access policy, wherein the new version of the directory server maintains compatibility between the new version of the access policy and the prior version of the access policy.
High definition video extender and method
An apparatus and method for extending high definition multimedia signals from a source to a display over long distances (e.g., up to 300 feet) using a single cable medium having a plurality of twisted pair conductors contained therein. The extender transparently supports HDMI and/or DVI signaling, which allows encrypted video content to be displayed at the remote display (or other sink device). Display data channel control (DDC) information is sampled and transferred in packet from the local unit to a remote unit to comply with high-bandwidth digital content protection (HDCP).
Systems and methods for video processing in network edge devices
The present invention provides systems and methods for video processing, such as transcoding, storage, quality testing, and the like, in network edge devices. The present invention embeds various video processing capabilities within a network to provide advantages, such as superior per-user video handling, reduced network bandwidth, increased service offerings, and the like.
Content distribution system, content distribution server, content distribution method, and content distribution program
A content distribution system is provided, in which time-shift viewing among a plurality of devices can be realized. The system includes, a device group management unit which manages a group to which audio-visual devices capable of realizing time-shift viewing mutually belong; a viewing state management unit which acquires viewing information of a content by the audio-visual device, and a time shift control unit which transmits permission information for viewing the content in a time-shifted manner and the viewing information of the content acquired by the viewing state management unit, to the audio-visual device included in the group managed by the device group management unit, in response to a time shift request issued by the audio-visual device.
Cloud-based cross-platform video display
A request is sent from a client device to a host device hosting an application. A display associated with execution of the application on the host device may include a video portion and one or more non-video portions. Information may be sent from the host device to the client device over the communication network. Such information may include display information for the video portion as described by raster data and information for the non-video portions as described by vector data. Such information may be used by the client device to generate a display corresponding to the host display. The video portion of the client display may be based on the raster data, and the non-video portions of the client display may be based on the vector data.
File system index table for a remote storage digital video recorder that handles multiple bitrate content
A remote storage digital video recorder (RS-DVR) system is disclosed. The RS-DVR system includes a network interface to communicate data between the RS-DVR system and a subscriber system via a network, a file system module coupled to the network interface, an ingest agent coupled to the file system module to receive encoded media segments that represent media content files encoded at a plurality of different bitrates; and a storage architecture coupled to the file system to store the encoded media segments, resulting in stored media segments. The RS-DVR carries out a number of functions and operations to service multiple subscribers and associated subscriber systems, such as various storage device management operations, file structure techniques, assignment of recorded media to subscribers, file system indexing, and supporting shared and per-subscriber content rights.
Implementation method and system for a media-on-demand frame-spanning playing mode in a peer-to-peer network
The present invention discloses a method for implementing a cross frame playing mode in media-on-demand in a peer to peer network, comprising the following steps of: (a) partitioning a requested media file into blocks and encapsulating the blocks into a media content file, and recording a number of a block where each media key frame is located so that a frame index file is formed; (b) distributing said media content file and said frame index file in the peer to peer network; (c) when requesting a media, a client acquiring said frame index file and media blocks in said media content file from a source node; (d) when cross frame playing is required, the client calculating the number of a block where a next key frame is located according to said frame index file, and acquiring a corresponding media block to de-encapsulate, decode and play. The present invention also provides a system for implementing a cross frame displaying mode in media-on-demand in a peer to peer network, comprising a source node device and a target node device. The method conveniently satisfies the demand for VCR operations of a media being watched by the user in a P2P network,
Source device change using a wireless home entertainment hub
A method of registering a device with a wireless home entertainment hub in a home entertainment system includes broadcasting by a wireless home entertainment hub a request for a reply from at least one unregistered device. The reply is received from at least one of the unregistered devices and a list of the at least one unregistered device is presented to a user for the purpose of the user selecting a device to register. An indication of the registration of the device selected by the user for registration is stored, and the selected device is removed from the list of unregistered devices after the indication of the registration is stored.
Mobile TV system and method for synchronizing the rendering of streaming services thereof
An Internet Protocol (IP)-based mobile TV system and a method for synchronizing the rendering of a streaming service are provided. In the IP-based mobile TV system, a plurality of mobile terminals receives a streaming service from network equipment, along with both a sequence of Network Time Protocol (NTP) time stamps corresponding to the streaming service and a synchronization clock. Each mobile terminal recovers an NTP reference clock for rendering the received streaming service according to both the synchronization clock and a synchronization time difference value, and then renders the received streaming service according to both the recovered NTP reference clock and the received NTP time stamps. Accordingly, the plurality of mobile terminals in the IP-based mobile TV system is able to render the received streaming service synchronously.
Digital broadcasting system and method of processing data in digital broadcasting system
The present invention provides a data processing method, the data processing method including receiving a broadcasting signal where mobile service data are multiplexed with main service data, extracting transmission-parameter-channel signaling information and fast-information-channel signaling information from a data group within the received mobile service data, parsing first program table information describing virtual channel information of an ensemble and a service provided by the ensemble using the fast-information-channel signaling information, the ensemble corresponding to a virtual channel group of the received mobile service data, obtaining information representing that second program table information, which includes a descriptor describing event information of the mobile service data, is received, from the first program table information, parsing the second program table information, and storing the event information and displaying service guide information including the event information.
Networked video devices
A collaborative information system.
Scheduler apparatus employing a gopher agent for use in a television receiver
In a television system in which at least program title information for programs which are to be transmitted in the future is transmitted in advance to form a channel guide listing, apparatus is provided for searching the listing for specific user-entered information, and upon successful conclusion to the search, the apparatus schedules the tuning of the desired program, or in the alternative, notifies the viewer of the availability of the program. In those instances where descriptive text accompanies the program listing, apparatus of the invention performs a search of the text for a particular text string which may relate to the title, the star, the director, or the context of the program, among other search criteria.
Digital television signal, digital television receiver, and method of processing digital television signal
A digital television (DTV) signal for use in a DTV receiver includes an extended text table (ETT) which includes a header and a message body. The header includes a table identification extension field which serves to establish uniqueness of the ETT, and the message includes an extended text message (ETM). If the ETT is an event ETT, the table ID extension field includes an event identification which specifies an identification number of an event associated with the ETT. On the other hand, if the ETT is a channel ETT, the table identification extension field includes a source identification which specifies a programming source of a virtual channel associated with the ETT. A section-filtering unit included in the DTV receiver is able to use table identification extension fields of a plurality of ETTs for section-filtering a pertinent event or channel ETT from the ETTs.
Single digital wallet across multiple payment platforms
The present disclosure involves a method of conducting a transaction. In one aspect, the method includes: displaying a media program on a media display device; indicating, while the media program is being displayed, an item associated with the media program is available for purchase; receiving authentication information of a prospective purchaser of the item; and completing a purchase of the item in response to the authentication information. In another aspect, the method includes: receiving, from a media display device, a user authentication request that contains user login credentials; granting the user authentication request in response to the user login credentials; and sending an authentication permission to the media display device; wherein the receiving and the sending are each performed such that the user login credentials and the authentication permission are sent through one or more intermediate hops without being inspected by any of the intermediate hops.
Differentiated PSIP table update interval technology
An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT.
Differentiated PSIP table update interval technology
An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT.
Method of television program suggestion and apparatus therefor
A method and apparatus provide a television viewer with relevant program suggestions while the viewer browses an electronic program guide (EPG). A viewer profile is used in conjunction with the viewer's usage of the EPG as a basis for program suggestions. In this way, relevant program suggestions may be provided, and optionally displayed within a picture-in-picture window on the screen of a television.
Client-server based interactive television guide with server recording
An interactive television program guide system is provided. An interactive television program guide provides users with an opportunity to select programs for recording on a remote media server. Programs may also be recorded on a local media server. The program guide provides users with VCR-like control over programs that are played back from the media servers and over real-time cached copies of the programs. The program guide also provides users with an opportunity to designate gift recipients for whom programs may be recorded.
Remote controller with multimedia content display and control method thereof
Provided are a remote controller and a method of controlling the remote controller, wherein the remote controller is operable to be in one of a first operating mode or a second operating mode, and which is connectable to a docking station, the remote controller including: an internal display screen, which displays at least one digital image; and a controller which may be operable to change between the first and second operating modes, wherein if the remote controller is connected to the docking station and if the remote controller is in the second operating mode, the controller controls the remote controller to change to the first operating mode to provide predetermined multimedia content.
Displaying an information ticker in association with a personalized video mosaic in a television services network
A video source associated with an information ticker may be captured, and the associated information ticker may be broadcast and displayed below or near an array of simultaneously broadcast video sources being broadcast in a mosaic of video sources. The displayed information ticker may be broadcast in association with one or more of a plurality of simultaneously broadcast video sources in the mosaic of video sources.
System and method for selecting and delivering ads based on cross-platform activity
A cross-platform advertising system utilizes viewing data, browsing data, and telephone call data to establish subscriber account profile and, optionally, user profiles for users at the subscriber account. An ad selection processor selects ads based on subscriber account profile and, optionally, the user profile. An ad delivery processor delivers the selected ads to a device associated with the subscriber account.
Method and system for automatic content recognition protocols
Systems, methods and/or techniques for automatic content recognition protocols are described. A method may be executed in a media device having an automatic content recognition application programming interface. The method may include generating one or more video fingerprints that correspond to video content that displays on the media device. The method may include communicating the one or more video fingerprints to an automatic content recognition backend system. The automatic content recognition backend system compares the one or more video fingerprints with one or more stored video fingerprints and determines whether a match occurs. If the match occurs, one or more event identifiers associated with the one or more video fingerprints may be received from the automatic content recognition backend system. The one or more event identifiers may be communicated to an application server, and one or more interactive events may be received from the application server.
Interactive service device metering systems
A metering system meters usage of on-line and local services by way of interactive service devices. An example metering system includes a first data acquisition module configured to copy usage data associated with a first interactive service device and a second data acquisition module configured to copy usage data associated with a second interactive service device different than the first interactive service device. Each of the data acquisition modules is configured to distinguish between on-line communications associated with access to an on-line service and local communications associated with a local application program. In addition, each data acquisition module is configured to extract the usage data based whether an on-line communication or a local communication is identified.
System and method for evaluating audience reaction to a data stream
A computer readable medium is disclosed containing a computer program useful for performing a method for estimating an audience reaction to a data stream, the computer program comprising but not limited to instructions to send data containing a plurality of filter objects data to a plurality of filtered sensors associated with end user devices, instructions to receive response data from the filtered sensor in response to the data stream in accordance with the plurality of filter objects and instructions to estimate an audience reaction to the video data from the response data. A system is disclosed including a processor for performing a method for estimating an audience reaction to video data. A data structure is disclosed for containing data useful for performing the computer program and method.
Personal media channel apparatus and methods
Network content delivery apparatus and methods based on content compiled from various sources and particularly selected for a given user. In one embodiment, the network comprises a cable television network, and the content sources include DVR, broadcast, nPVR, and VOD. The user-targeted content is assembled into a playlist, and displayed as a continuous stream on a virtual channel particular to that user. User interfaces accessible through the virtual channel present various functional options, including the selection or exploration of content having similarity or prescribed relationships to other content, and the ability to order purchasable content. An improved electronic program guide is also disclosed which allows a user to start over, record, view, receive information on, “catch up”, and rate content. Apparatus for remote access and configuration of the playlist and virtual channel functions, as well as a business rules “engine” implementing operational or business goals, are also disclosed.
Exchanging data using data transformation
A computer implemented method, apparatus, and computer-usable program product for exchanging data using data transformation are provided. A first data binding component receives data from a function selector. A set of data bindings capable of invocation by the first data binding component is available. The function selector determines a content type associated with the data. The first data binding component receives the data and the content type from the function selector. The first data binding component invokes a data binding corresponding to the content type from the set of data bindings to transform the data into a data object. The data object has an object name. A target application is determined based on the object name, and the data object is then routed to a target application.
Dynamic native binding for managed assemblies
A method, apparatus, system, article of manufacture, and computer readable storage medium provides the ability to dynamically bind a native assembly from a managed assembly. A managed assembly (e.g., a dynamically linked library (DLL)) is obtained. In the managed assembly, native application program interface entry points are identified. For each of the entry points, intended platform(s) and associated correct native assembly(ies) are specified in the managed assembly. The managed assembly is deployed onto a computer. For example, the single collection of managed and native assemblies can be deployed to all targeted computers, which consist of varying platform environments. During runtime execution, the executing platform of the application is determined. Based on the executing platform, an intended platform is selected and the entry points are bound to the correct native assembly.
Methods for operating system identification and web application execution
Methods to execute operating system dependencies for web applications are provided. A particular method includes receiving an operating system independent function call at a web server. The operating system independent function call may be initiated at a web-based application. The method further includes determining a particular operating system used by the web server and selecting a command based on the particular operating system. The method further includes executing the selected command.
File system independent content aware cache
A server supporting the implementation of virtual machines includes a local memory used for caching. During I/O intensive processes, a “content aware” cache filter component of the server first accesses a cache structure in a content cache device to determine whether data blocks have been stored in the cache structure prior to requesting the data blocks from a networked disk array via a standard I/O stack of the hypervisor.
Operating system distributed over heterogeneous platforms
An illustrative operating system distributes two or more instances of the operating system over heterogeneous platforms of a computing device. The instances of the operating system work together to provide single-kernel semantics to present a common operating system abstraction to application modules. The heterogeneous platforms may include co-processors that use different instruction set architectures and/or functionality, different NUMA domains, etc. Further, the operating system allows application modules to transparently access components using a local communication path and a remote communication path. Further, the operating system includes a policy manager module that determines the placement of components based on affinity values associated with interaction relations between components. The affinity values express the sensitivity of the interaction relations to a relative location of the components.
Mobile terminal and method of operating the same
A mobile terminal and a method of operating the same are disclosed herein. The method may include executing applications in a multitasking environment, detecting an event that requires a termination the applications, and saving a task list that includes a list of the active applications and their corresponding operational states, and terminating execution of the applications. The method further includes restoring the applications to their respective states prior to termination based on the task list.
Agent management framework
Various embodiments implement agents as dynamically linked libraries to run within host processes controlled by an executable agent manager. The agent manager runs as a service or daemon continuously after being loaded into the memory of a computer system. Information concerning agents that are configured to carry out tasks on the computer system is stored in a database accessible to the agent manager. When a task that a particular agent is configured to carry out needs to be done, the agent manager assigns an executable host process to run the agent. The agent manager then sends start and stop commands to the host process to load and halt the agent, respectively.
Send-side matching of data communications messages
Send-side matching of data communications messages includes a plurality of compute nodes organized for collective operations, including: issuing by a receiving node to source nodes a receive message that specifies receipt of a single message to be sent from any source node, the receive message including message matching information, a specification of a hardware-level mutual exclusion device, and an identification of a receive buffer; matching by two or more of the source nodes the receive message with pending send messages in the two or more source nodes; operating by one of the source nodes having a matching send message the mutual exclusion device, excluding messages from other source nodes with matching send messages and identifying to the receiving node the source node operating the mutual exclusion device; and sending to the receiving node from the source node operating the mutual exclusion device a matched pending message.
Task prioritization based on users' interest
Systems, methods and computer readable media are disclosed for prioritizing tasks associated with a group of users based on number of times the users have monitored the status of a task. In addition to the general system, systems, methods and computer readable media for task prioritizing, the tasks may be prioritized based on the number of users associated with a task, the importance of each user associated with a task, and the way the task was identified.
Microprocessor operation monitoring system
A microprocessor operation monitoring system whose own tasks are constituted by associating beforehand the task number of the task that is next to be started up, for each of the tasks constituting the program, and abnormality of microprocessor operation is detected by comparing and determining whether or not the announced task and the task to be started up match.
Techniques for utilizing computational resources in a multi-tenant on-demand database system
In accordance with embodiments, there are provided techniques for utilizing computational resources of a multi-tenant on-demand database system. These techniques for utilizing computational resources of a multi-tenant on-demand database system may enable embodiments to provide great flexibility to a tenant of the architecture to perform desired functions on content of the database without unduly consuming the resources of the system.
Managing task execution on accelerators
Execution of tasks on accelerator units is managed. The managing includes multi-level grouping of tasks into groups based on defined criteria, including start time of tasks and/or deadline of tasks. The task groups and possibly individual tasks are mapped to accelerator units to be executed. During execution, redistribution of a task group and/or an individual task may occur to optimize a defined energy profile.
Methods and systems for batch processing in an on-demand service environment
In accordance with embodiments disclosed herein, there are provided mechanisms and methods for batch processing in an on-demand service environment. For example, in one embodiment, mechanisms include receiving a processing request for a multi-tenant database, in which the processing request specifies processing logic and a processing target group within the multi-tenant database. Such an embodiment further includes dividing or chunking the processing target group into a plurality of processing target sub-groups, queuing the processing request with a batch processing queue for the multi-tenant database among a plurality of previously queued processing requests, and releasing each of the plurality of processing target sub-groups for processing in the multi-tenant database via the processing logic at one or more times specified by the batch processing queue.
Real-time distributed monitoring of local and global processor resource allocations and deallocations
Processes, devices, and articles of manufacture having provisions to monitor and track multi-core Central Processor Unit resource allocation and deallocation in real-time are provided. The allocation and deallocation may be tracked by two counters with the first counter incrementing up or down depending upon the allocation or deallocation at hand, and with the second counter being updated when the first counter value meets or exceeds a threshold value.
Methods and structure for near-live reprogramming of firmware in storage systems using a hypervisor
Methods and structure for reprogramming firmware in a storage controller using a virtual machine management (VMM) environment. A storage process (current firmware) in the storage controller operates in a current virtual machine (VM) under control of a hypervisor. Reprogrammed (new) firmware is loaded into a new virtual machine under control of the hypervisor. The new firmware initializes and directs the current firmware to quiesce its processing. The new firmware also requests the hypervisor to map data in the memory space of the current virtual machine into the memory space of the new virtual machine and to transfer ownership/control of devices and network addresses from the current virtual machine to the new virtual machine. The new firmware operating on the new virtual machine then takes control of the storage controller and resumes processing of requests.
System and method for providing evidence of the physical presence of virtual machines
In accordance with some embodiments of the present disclosure a method for providing evidence of a physical location of a virtual machine comprises launching, by an information technology (IT) resource, a virtual machine from a virtual machine image. The method further comprises generating, by the IT resource, a chain entry in a physical presence chain of the virtual machine image, the chain entry including an identifier of the IT resource indicating that the IT resource launched the virtual machine.
Flexible access control for a virtual computer device, virtual computer system, and virtual computer program, and method for controlling the same
Lack of freedom in the operation of terminals has been a problem. On the other hand, there has been concern that allowing freedom of operation would negatively impact systems. A virtual computer device is provided with a memory unit and a CPU. The CPU executes an access program, which has the CPU input from or output to the memory unit in accordance with a received input/output request, and a VM monitor which implements a virtual computer in the CPU. Under the control of the VM monitor, the CPU executes a VM program which sends a input/output request to the access program, and via the access program, has the CPU input from or output to the storage device.
Distributed virtual machine monitor for managing multiple virtual resources across multiple physical nodes
A management capability is provided for a virtual computing platform. In one example, this platform allows interconnected physical resources such as processors, memory, network interfaces and storage interfaces to be abstracted and mapped to virtual resources (e.g., virtual mainframes, virtual partitions). Virtual resources contained in a virtual partition can be assembled into virtual servers that execute a guest operating system (e.g., Linux). In one example, the abstraction is unique in that any resource is available to any virtual server regardless of the physical boundaries that separate the resources. For example, any number of physical processors or any amount of physical memory can be used by a virtual server even if these resources span different nodes.
Address aligned resource set allocation in a memory space
Method and apparatus for aligning addresses of resource sets in a memory space used by a software system. The resource sets are accessed by multiple layers of a software system and are each provided with a respective alignment requirement preferably comprising a power of two. A table preferably includes entries for each of the resource sets, and the table is sorted to provide a decreasing sequence beginning with the resource set having the greatest alignment requirement and ending with the resource set having the smallest alignment requirement. The resource sets are thereafter placed in the memory space in accordance with the decreasing sequence at localized addresses that align with the respective alignment requirements of the resource sets. Each resource within each resource set uses a localized, base address. The actual address within the memory space is preferably stored at a specified offset within a global structure.
Systems and methods for software support
This invention relates to methods and a system for supporting software. In one embodiment, a method for providing an updated version of a software program includes receiving an indication of a fault in a software program, distributing the faulty software program to a distributed community of programmers, receiving updated versions of the faulty software program from a subset of the distributed community of programmers, and determining a preferred updated software program from the received updated versions of the software program. In another embodiment, a system for providing an updated version of a software program includes a communication server for communicating faulty software programs and updates of the programs to and from the distributed community of programmers, a component storage module for storing the faulty software program, and a software testing module for determining a preferred updated version of the faulty software program.
Protection for unauthorized firmware and software upgrades to consumer electronic devices
A firmware or software update, patch, or upgrade image is authenticated by forcing its checksum to match a pre-determined value. The pre-determined value is known by a consumer electronic device in advance of propagating the image for installation. Upon propagation, the device determines a checksum value of the received imaged, and compares the checksum value to the pre-determined expected authenticity value. If they match, the image is installed. In an optional feature, the image is executed by the device and modifies the pre-determined checksum value to a next value, which is also shared or known by the image server. In this variation, no two images have the same expected value, and unauthorized images may be rejected for installation.
Determining support criteria for shared libraries based on their priority levels
A mechanism for determining support criteria for shared libraries based on their priority levels is described. A method of embodiments of the invention includes extracting interface provisioning detail relating to interfaces associated with shared libraries provided by an operating system running on a computer system. The interfaces include application binary interfaces (ABIs). The method further includes detecting interface usage detail associated with the interfaces. The interface usage detail is based on a frequency at which one or more interfaces are used by one or more third-party software programs running on the operating system. The method further includes comparing the interface provisioning detail with the interface usage detail to determine an importance level of each shared library, and analyzing comparison results obtained from the comparison. The analyzing includes assigning a priority level to each shared library based on its importance level.
Manipulating resources embedded in a dynamic-link library
Embodiments of the present invention provide computer program products, methods, and systems for extracting and revising data for a resource embedded in a dynamic-link library (DLL) assembly. In various embodiments, the DLL assembly is loaded and data for a resource is extracted from the assembly. In particular embodiments, a manifest is created that includes a path for the extracted data extracted. This path includes information on placing the data for the resource into the assembly to construct a necessary DLL structure compatible with the program application. After the extracted data has been edited to create replacement data, in various embodiments, the replacement data is imported into the assembly based on the path for the extracted data and the assembly is compiled to create a revised DLL that may be read by the program application in place of or in addition to the original DLL assembly to utilize the replacement data.
System and method of software execution path identification
A method and system for creating uniquely representative execution path identifiers of software program. The method comprises the steps of running the software program, continuously accessing execution information of the software program, identifying execution sequences of the execution information, and creating a unique execution path identifier of each of the execution sequences by summing the execution information when the execution information is within a functional boundary thereof so as to create an execution path identifier representing a unique execution sequence of the execution information. The system comprises an execution path identification creator continuously receiving and accessing execution information of the software program, identifying execution sequences of the execution information and creating the unique execution path identifier of each of the execution sequences.
Virtual execution environment for software delivery and feedback
A method and system for testing and logging execution events of software delivered to a user. The user can launch and run the software product while having the support and a necessary input from the product developer. A software product is provided from a first remote server and executed on a user computer, while execution statistics are collected and analyzed by a second remote server. The software product is used in a virtual execution environment. The software product is executed on a Guest Operating System (GOS) also installed on the user computer. A hypervisor-level monitoring of tested software products and GOSs is implemented.
Software configuration control wherein containers are associated with physical storage of software application versions in a software production landscape
According to some embodiments, a source version of a software product may be established in connection with a software production landscape. A first container, representing a first uniquely addressable physical location in the software production landscape, may then be associated with the source version. An executable derivative version of the software product may be built from the source version, and a second container, representing a second uniquely addressable physical location in the software production landscape, may be associated with the executable derivative version. Software configuration information may then be automatically provided to a user based at least in part on a relationship between the first and second containers at a given point in time.
Configurator with embedded firmware for offline instrument user settings implementation
A system for the customization of user settings on a target instrument includes a configuration module configured for the customization of user settings on a target instrument, and a representation module communicably coupled to the configuration module. The representation module includes a duplicate of firmware from the target instrument. A method of production of a system for the customization of user settings on a target instrument, includes configuring a configuration module for the customization of user settings on a target instrument, communicably coupling the configuration module to a representation module; and disposing a duplicate of firmware from the target instrument in the representation module.
Scripting language processing engine in data leak prevention application
A data leak prevention application that categorizes documents by data type is provided, a data type being a sensitivity classification of a document based on what data the document contains. A scripting language processing engine is embedded into the data leak prevention application, the scripting language forming part of the application as hard code. A user configures interaction of the scripting language processing engine with the application. The configuring may include modifying or adding code or setting criteria for when code portions of the scripting language processing engine activates. The scripting language processing engine is activated to enhance an accuracy of an existing data type or so as to detect a new data type. Upon enhancing the accuracy of the data type, documents may be re-categorized.
Integration of structured profiling data with source data in the eclipse development environment
A computer-implemented system and method including receiving an output file from a profiling utility by an integrated development environment component. The output file is used to generate an interactive presentation of data by a computer system to visually organize profiling data automatically. Corresponding source code is displayed in response to a user selection of a data point of the interactive presentation within the integrated development environment.
Method and apparatus for managing components of application enablement suite
A method of managing components of an AES includes: a) providing an application developer with access to a workflow designer engine via a developer portal, wherein the workflow designer engine and developer portal are in operative communication with an AES; b) activating a network application manager of the workflow designer engine in response to the application developer selecting a manage network application function via the user device in conjunction with a graphical user interface (GUI) controlled by the developer portal; and c) creating a new network application using archetypes of the workflow designer engine and repositories of the developer portal in response to the application developer defining at least some parameters for the new network application in conjunction with the GUI. An associated apparatus includes a workflow designer engine server with a workflow designer engine module; and a developer portal server with a developer portal module.
Method and system for task modeling of mobile phone applications
A system for task modeling interactive sequential applications for one or more mobile devices has a software tool for defining a generic meta-model of the target applications. The generic meta-model has a static model of application components, and a dynamic model of identifiers of application screens and connections; a passive Task Model database for storing the generic meta-model for future reuse, which further comprises static instances of the generic meta-model specifically generated for a variety of mobile devices; a tracker module for real-time monitoring and creating unique identifier for each application's screen visited by the user of the mobile device, wherein created identifiers are used for generating active models of the user actual use; and an active Task Model database for storing the active models, wherein data transferring and storing is minimized to screen identifier numbers.
Post facto identification and prioritization of causes of buffer consumption
Some embodiments of the present invention provide systems and techniques for collecting task status information. During operation, the system can receive a status update for a task from a task manager through a GUI. Next, the system can determine whether the first status update for the task indicates that the task is delayed. If the status update indicates that the task is delayed, the system can request the task manager to indicate the help needed to resolve the task delay. Next, the system can receive a help needed descriptor from the task manager. Subsequently, the system can receive another status update for the task from the task manager, wherein the status update indicates that the help specified in the help needed descriptor is no longer required. Next, the system can determine an amount of delay associated with the help needed descriptor.
Delay defect testing of power drop effects in integrated circuits
Aspects of the invention provide for a method of delay defect testing in integrated circuits. In one embodiment, the method includes: generating at least one test pattern based on a transition fault model type; evaluating a dynamic voltage drop for the at least one pattern during a capture cycle and generating a voltage drop value for the at least one test pattern; performing a static timing analysis, using the voltage drop value for the at least one test pattern; evaluating a plurality of paths in the at least one pattern; and masking each path that fails to meet a timing requirement.
Program binding system, method and software for a resilient integrated circuit architecture
The exemplary embodiments provide a program binder for a resilient integrated circuit. An exemplary IC comprises a plurality of composite circuit elements, a state machine element (SME), and a plurality of communication elements. Each composite circuit element comprises an element interface and a selected circuit element which may vary by element type, and which may be configurable. An exemplary program binding method includes assigning a first action to a first computational element having a first type; assigning a second action to a second computational element having a second type; and establishing a first data routing, through a selected communication element, between the first computational element and the second computational element. In the event of detection of a fault with a composite circuit element or a communication element, the various actions may be re-assigned and new data routings established.
Support device of three-dimensional integrated circuit and method thereof
To provide a design support device of a three-dimensional integrated circuit capable of, in the case where a placement position of a through-via changes in the design phase of a three-dimensional integrated circuit composed of a plurality of semiconductor chips in layers, avoiding change of respective placement positions of other parts as much as possible. A design support device includes a TSV placement unit that determines respective placement positions of through-vias on one semiconductor chip, the through-bias each penetrating to connect to another semiconductor chip, a TSV reserved cell placement unit that determines, based on the respective placement positions of the through-vias, respective placement positions of reserved cells as respective spare placement positions of the through-vias, and a mask data generation unit that generates layout data that includes the respective placement positions of the through-vias and the respective placement positions of the reserved cells.
Using entire area of chip in TDDB checking
A method for checking for reliability problems of an integrated circuit that includes determining a total MOS transistor gate area for an entire integrated circuit. Based on the total MOS transistor gate area, a time dependent dielectric breakdown lifetime (TDDB) is calculated.
Software debugging of synthesized hardware
A method is provided for synthesizing an HLL program. For one or more variables to observe and/or control in a function of the HLL program, a first code segment is added to the function in the HLL program. For each of the one or more variables a respective second code segment is also added to the HLL program. In response to encountering the first code segment during synthesis of the HLL program, a memory is instantiated in a synthesized design. In response to encountering the second code segment during synthesis of the HLL program, a respective interface circuit is instantiated in the synthesized design. Each interface circuit is configured to replicate a state of the corresponding variable in the memory during operation of the synthesized design. A table is generated that maps names of the one or more variables to respective memory addresses in the memory.
Computer-aided design system to automate scan synthesis at register-transfer level
A method and system to automate scan synthesis at register-transfer level (RTL). The method and system will produce scan HDL code modeled at RTL for an integrated circuit modeled at RTL. The method and system comprise computer-implemented steps of performing RTL testability analysis, clock-domain minimization, scan selection, test point selection, scan repair and test point insertion, scan replacement and scan stitching, scan extraction, interactive scan debug, interactive scan repair, and flush/random test bench generation. In addition, the present invention further comprises a method and system for hierarchical scan synthesis by performing scan synthesis module-by-module and then stitching these scanned modules together at top-level. The present invention further comprises integrating and verifying the scan HDL code with other design-for-test (DFT) HDL code, including boundary-scan and logic BIST (built-in self-test).
Correcting for overexposure due to overlapping exposures in lithography
A method includes receiving a layout file for a reticle used to pattern a first die location in a computing apparatus, the layout file defining a plurality of kerf features. A flare map calculation area for the first die location covering at least a portion of a kerf region surrounding the first die location is defined in the computing apparatus. Features in the layout file into the region corresponding to the flare map calculation area that are associated with the patterning of die locations neighboring the first die location are copied in the computing apparatus to generate a modified layout file. A flare map of the portion of the kerf region included in the flare map calculation area based on the modified layout file is calculated in the computing apparatus.
Expectation assisted text messaging
In one exemplary embodiment, a text message may be sent in which eye-tracking data is used to associate information with a portion of the text message. A text message input by a user may be displayed, with eye-tracking data from the user indicating an expectation associated with a portion of the text message. The expectation may cause information related to the portion of the text message to be associated with the portion of the message.
Multi-contextual delta navigation in a compare view
Embodiments of the present invention address deficiencies of the art in respect to comparing artifacts and provide a novel and non-obvious method, system and computer program product for multi-contextual navigation of deltas in a hierarchy. In one embodiment of the invention, a method for multi-contextual navigation can include rendering objects for an artifact utilizing a default contextual view of the objects, selecting an object in the default contextual view and directing an inward navigation to a different object in the default contextual view. Notably, responsive to the directing of the inward navigation to the different object, a different contextual view can be provided for at least a portion of the objects defined by the different object.
Presentation of search results
Various embodiments are described that are related to displaying search requests on an interactive display device. For example, one disclosed embodiment provides a method including receiving a search request input via a search request control displayed on the interactive display device, spawning a search result label spaced from the search request control, the search result label being a moveable element, and displaying the search result, the search result being spatially tethered to the search result label so that the search result moves to follow a movement of the search result label.
Method of controlling display properties and priorities of windows
A method of controlling a display includes displaying a first window on the display, setting the first window to receive commands, and displaying a second window on the display. When the second window is displayed, a portion of the first window is kept being displayed, and the first window is kept being set to receive commands.
Integrated graphical runtime interface for process control systems
An integrated graphical runtime interface that provides a secure, highly available environment for process control systems is disclosed. In one example, a method for displaying process control information via a graphical user interface instantiates a runtime workspace application to operatively interpose between an operator station operating system and a user. The example method displays a plurality of panels via the graphical user interface and displays a portion of the process control information associated with a runtime application in at least one of the plurality of panels via the runtime workspace application.
Methods, systems and computer readable media for modifying parameters of a configuration file
Disclosed is a method of configuring a medical device through utilization of a computing device that includes a user interface, a processor and memory. The method includes the steps of determining whether a configuration file contains a focal modified parameter, displaying the focal modified parameter, prompting a manual re-entry of the displayed focal modified parameter, receiving through the user interface the manual re-entry of the displayed focal modified parameter, and utilizing the processor to automatically determine whether the manual re-entry of the displayed focal modified parameter matches the displayed focal modified parameter.
Assigning Z-order to user interface elements
Various embodiments related to assigning z-order to a plurality of user interface elements are disclosed. One disclosed embodiment provides a method of assigning a z-ordering to a user interface element displayed on a multi-user interactive display based upon an interaction state of the user interface element, the interaction state being dependent upon how a user interacts with the user interface element. The method comprises detecting a change in the interaction state of the user interface element. If the change is an initiation of a movement of the user interface element on the display, the user interface element is moved to a first predetermined position within the z-ordering. If the change is an initiation of a user interaction with content contained within the user interface element, the user interface element is moved to a second predetermined position within the z-ordering.
Method for operating execution icon of mobile terminal
Functional applications (e.g., widgets) in the form of an icon are implemented to be merged or demerged, and a method for displaying, operating, and managing the widgets in a mobile terminal is provided. The concept of UI-wise merging and demerging is applied to simple widget functions to update the widget functions. Also, widgets can be effectively managed through various widget operations. The mobile terminal includes an input unit configured to detect a received input, a display unit configured to display a plurality of widgets and a controller configured to merge a plurality of widgets into an integrated widget based on the received input and to execute an integrated function related to a selected widget of the plurality of widgets merged into the integrated widget.
Attraction-based data visualization
A plurality of digital resources are identified in a set of digital resources. An indication of a user selection of at least one criteria is received, the user selection received through a user interface. A degree of correlation is determined between each digital resource in the plurality and each of the criteria. Data is sent that is configured for use in presenting, in a window of the user interface, a plurality of graphical resource objects and at least one graphical attractor object, each graphical resource object representing a digital resource in the plurality of digital resources and each graphical attractor object representing one of the criteria. Each resource object is presented a distance from each attractor object, the distance based at least in part on the corresponding degree of correlation between the digital resource represented by the resource object and the criteria represented by the attractor object.
Collage display of image projects
Techniques are described for displaying projects of images as “collages”. Collages differ from conventional thumbnail displays of projects in that collages display an entire project as if the project were a single image. Consequently, collages better convey the characteristics of projects as a whole, while de-emphasizing the distinctiveness of individual images within the projects. When displayed as collages, side-by-side comparisons may be readily performed between projects as a whole. For example, a single display may include collages for multiple projects, thereby allowing viewers to quickly tell how the projects differ in a variety of ways, including but not limited to size of shoot or density of shoot, dominant color, mood, time of day, bracketed shots or bursts, location and subject matter. The content of the collage for a project is based on the individual images that belong to the project. However, details of the individual images on which the project image is based may not be readily discernible from the collage. In addition, not all individual images that belong to a project may be used in a collage. Techniques for selecting which individual images of a project to include in the project are also described.
Automatic categorization of entries in a contact list
Entries within a participant list of an electronic communications system may be categorized automatically into one or more groups based on attributes of users represented in the participant list. Categorizing users includes maintaining a list of identifiers that are selected by a first user and for which online presence information is made perceivable through the list. The list includes one or more categories into which the identifiers are categorized. At least one attribute associated with an identifier for which online presence information is to be made perceivable through the list and attributes stored relative to at least one of the categories are accessed. The attributes associated with the identifier are compared to the stored attributes. Based on results of the comparison, at least one category within the list that corresponds to the identifier is identified, and the identifier is categorized into the identified category.
Data sharing software program utilizing a drag-and-drop operation and spring-loaded portal
Embodiments include a program for transferring of data from a source computer to a location on a target computer utilizing a drag-and-drop operation and a spring-loaded portal. I/O devices are monitored for mouse input that includes coordinates of a mouse pointer. Whether an end-user is utilizing the mouse pointer to perform the drag-and-drop operation is determined. The spring-loaded portal is expanded from a closed position to an open position. A screen snapshot image of the location on the target computer is retrieved and overlaid on the spring-loaded portal. The transferring of data from the source computer to the location on the target computer is executed, wherein the location on the target computer is previewable at the source computer through the spring-loaded portal. Whether to abort the transferring of data is determined. The spring-loaded portal is minimized from the open position to the closed position.
Synchronization of advertisment display updates with user revisitation rates
Techniques for displaying advertisements on web pages are provided. A revisitation rate for views of a web page by a user population is determined. A refresh rate for an advertisement space on the web page is synchronized with the determined revisitation rate. An advertisement is selected to be displayed at the advertisement space at a particular refresh time of the synchronized refresh rate. The advertisement is selected based at least on a difference between a content of the web page at the particular refresh time and a content of the web page at a previous refresh time of the synchronized refresh rate.
Methods and systems for interactive evaluation of policies
A system for interactive evaluation of policies includes a first graphical user interface element and a second graphical user interface element. The first graphical user interface element enumerates at least one resource. The second graphical user interface element receives an identification of a characteristic of at least one client and displays a result of an application of at least one policy associated with the at least one resource to the at least one client, the at least on policy applied responsive to the received identification of the characteristic.
System and method for remote application configuration management on multifunction peripherals
The invention relates to multifunction peripherals (MFPs). More particularly, the invention relates to remote application configuration management of MFPs. A remote application configuration manager may extract configuration information from custom applications, organize a user interface based on the respective configuration information, and receive and store parameter values with which the respective custom applications may be executed.
Automatic selection of user-oriented web content
A toolbar is provided, which may be downloaded and installed in a user's web browser. The toolbar uploads the user's browsing history to a server. The server determines, based on the browsing history, which sites the user visits frequently. Additionally, the server determines, based on an analysis of web content, which categories of content, and which concepts, the user is interested in based on the concepts and categories that occur frequently in the user's browsing patterns. The server identifies content of interest to the user—where such content may comprise frequently-updated content, such as news or RSS feeds—and provides a custom web page that shows or identifies the selected content.
System for monitoring and reporting deviations of real-time analytics data from expected analytics data
Machine-implemented methods for providing a graphical user interface for displaying web site traffic information are provided. In one aspect, a method includes acquiring low latency web site traffic data for a web site and historical web site traffic data for the web site, and calculating a historical average web site traffic value for the web site based on the historical web site traffic data. The method also includes comparing the low latency web site traffic data with the calculated historical average web site traffic value, and providing information on a variation in the low latency web site traffic data based on the comparison of the low latency web site traffic data with the calculated average web site traffic value. Systems and machine-readable media are also provided.
Systems and methods for audience-enabled access to presentation content
A system and method for accessing content provided by a presenter during a presentation is described. The system and method includes a presentation module used by a presenter to display presentation materials to audience members during a presentation. Also included is a selection module that allows a display of a representation of the presentation materials that have been displayed. When activated, the selection module enables an audience member to select for redisplay by the presentation module a particular one of the presentation materials.
Systems and methods for creation of a schematic user interface for monitoring and predicting the real-time health, reliability and performance of an electrical power system
A system for automatically generating a schematic user interface of an electrical system is disclosed. The system includes a data acquisition component, a power analytics server and a client terminal. The data acquisition component acquires real-time data output from the electrical system. The power analytics server is comprised of a virtual system modeling engine, an analytics engine, a machine learning engine and a schematic user interface creator engine. The virtual system modeling engine generates predicted data output for the electrical system. The analytics engine monitors real-time data output and predicted data output of the electrical system. The machine learning engine stores and processes patterns observed from the real-time data output and the predicted data output to forecast an aspect of the electrical system. The schematic user interface creator engine is configured to create a schematic user interface that is representative of the virtual system model and link the schematic user interface to the data acquisition component.
System and method for managing dynamic document references
Document fragments are managed by the use of fragment objects. Fragment objects contain a reference to a portion of a source document. Referencing documents contain a reference to a fragment object which delivers the content of the fragment of the source document to the referencing document. The source document can be directly updated through updating the fragment of the source document contained in the referencing document via the use of the fragment object. Source document deletion is controlled by storing the references to the source document by fragment objects so that no fragment object has a reference to a nonexistent source document. A process for organizing document fragments within a document management system wherein source documents comprise duplicates of the document fragments includes replacing a duplicate fragment with a reference to a single fragment object the fragment object including a reference to a fragment of a source document and an object class method for deletion of the fragment object including instructions to remove the reference to the fragment object from the metadata of the source document to which the fragment object refers.
Guided natural language interface for print proofing
A guided natural language interface, a method for guiding a user in specifying a color problem with a document image, and a set of templates for use in the interface and method are provided. The interface includes computer readable memory which stores a set of issue description templates, each template being configured for guiding a user in formulating a problem statement characterizing, in natural language, a problem related to color identified in an input document. A natural rendering engine receives information input by a user and/or information input from an associated problem detector, and instantiates one of the templates in response thereto. The natural language rendering engine is configured for presenting the problem statement to the user as it is refined and communicating information based on the refined problem statement to an associated problem corrector.
Information processing apparatus computer readable medium, and information processing method for maintaining consistency between stored target document information and a formed image
An information processing apparatus includes: a storage that stores document information; an image formation processor that receives an instruction to form an image corresponding to target document information selected from the document information stored in the storage, and that performs an image formation processing with respect to the target document information; a recording unit that records first information, which indicates that the image formation processing is performed, and associates the first information with the target document information; and a controller that controls, in a case where a request for processing with respect to the document information associated with the first information is received, to restrict the requested processing.
Layout-based page capture
Techniques for layout-based page capture. A user selection performs a selection defining an area of interest based on the layout of an electronic document. The program retrieves electronic documents based on the defined area of interest. The selection can be performed visually on a rendering of the electronic document thereby providing the user with visual feedback as to what content has been selected. The selection can be applied across multiple electronic documents.
Processing web pages based on content quality
Computer-implemented methods of processing web pages based on content quality are provided. In one aspect, a method includes receiving a request for a web page. The method includes determining the content quality of the requested web page based on whether it is a parked web page, a content farm web page, or a link farm web page. The method includes providing for display, based on the content quality of the requested web page, a graphical component providing options to proceed to the requested web page or to an alternate web page relevant to the request for the web page. The method includes receiving an indication of a selection of an option from the graphical component to proceed to the requested web page or to an alternate web page. The method further includes providing, based on the received indication, the requested web page or an alternate web page.
Creating, updating, saving, and propagating customized views of table and grid information
Systems, methods, and computer products that create, update, save, and propagate customized views of table and grid information, including spreadsheets. The embodiment of the invention comprises associating at least one column as a first view of the table, associating at least one column as a second view of the table; and combining the first view with the second view, thereby efficiently creating a third view. Further, the combining includes dragging the second view; and dropping the dragged second view into the first view. The combining also includes creating a thumbnail image representing the first view or the second view. It also comprises updating columns that are shared between views. Additionally, the views may be stored, and new views may be propagated from the stored views.
Systems and methods for alert management
Systems and methods for alert management in accordance with embodiments of the invention are disclosed. In one embodiment, a computing device includes a processor, an operating system configuring the processor to create a computing environment, an alert platform application, an alert pop up page file stored within the storage and containing instructions written in the rendering language to render a pop up page, and an alert history database containing alert data including an alert ID, display metadata, and application data, wherein the alert history database is configured to be queried to retrieve alert data, wherein the alert platform application is configured to query the alert history database to retrieve alert data, and wherein the alert platform application is configured to inject at least a portion of display metadata from alert data into the instructions from the alert pop up page file and render an alert pop up page.
Methods and apparatus for computing soft data or log likelihood ratios for received values in communication or storage systems
Methods and apparatus are provided for computing soft data or log likelihood ratios for received values in communication or storage systems. Soft data values or log likelihood ratios are computed for received values in a communication system or a memory device by obtaining at least one received value; identifying a segment of a function corresponding to the received value, wherein the function is defined over a plurality of segments, wherein each of the segments has an associated set of parameters; and calculating the soft data value or log likelihood ratio using the set of parameters associated with the identified segment. The computed soft data values or log likelihood ratios are optionally provided to a decoder.
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction. Other embodiments are described and claimed.
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction. Other embodiments are described and claimed.
Terminal apparatus and response signal transmitting method
A terminal apparatus and a response signal transmitting method wherein the system transmission efficiency can be improved by devising a bundling rule. In a terminal (200), a PDSCH receiving unit (208) receives first and second code words, which comprise code word block (CWB) groups to be mapped to the respective ones of a plurality of downstream unit bands, and detects errors of the CWBs; and an A/N bundling unit (216) transmits, based on a bundling rule in which each CWB is associated with any one of first and second bundling groups, a single bundle of response signals into which the error detection results are bundled for each bundling group. According to the bundling rule, at least one of the first and second bundling groups includes both the CWB belonging to the first code words and the CWB belonging to the second code words.
Orthogonal frequency division multiplexing symbol diversity combiner for burst interference mitigation
The invention disclosed in this application describes a diversity combiner that operates as a maximal ratio combiner (MRC) when no interference is detected and as a selection combiner when Orthogonal Frequency Division Multiplexing symbol errors are detected with high probability by using a symbol error detection method based on computing a symbol by symbol path error metric.
Memory system and operation method thereof
A memory system includes: a first non-volatile memory used for storing data to be accessed in block units; a second non-volatile memory used for storing data to be accessed in word units in random accesses to the second non-volatile memory; and a control section configured to control operations of the first and second non-volatile memories, wherein error correction codes to be applied to data stored in the second non-volatile memory are held in the first non-volatile memory.
Transparent recovery from hardware memory errors
A method is provided for recovering from an uncorrected memory error located at a memory address as identified by a memory device. A stored hash value for a memory page corresponding to the identified memory address is used to determine the correct data. Because the memory device specifies the location of the corrupted data, and the size of the window where the corruption occurred, the stored hash can be used to verify memory page reconstruction. With the known good part of the data in hand, the hashes of the pages using possible values in place of the corrupted data are calculated. It is expected that there will be a match between the previously stored hash and one of the computed hashes. As long as there is one and only one match, then that value, used in the place of the corrupted data, is the correct value. The corrupt data, once replaced, allows operation of the memory device to continue without needing to interrupt or otherwise affect a system's operation.
Systems and methods for hardware flexible low density parity check conversion
The present inventions are related to systems and methods for data processing, and more particularly to systems and methods for data encoding.
Data processing system with failure recovery
Various embodiments of the present invention provide systems and methods for a data processing system with failure recovery. For example, a data processing system is disclosed that includes a data processing circuit operable to process a block of data from an input and to yield a plurality of possible results based on the block of data, and an error detection circuit operable to test the plurality of possible results for errors and to report to the data processing circuit whether the plurality of possible results contain errors. The data processing system is operable to output any of the possible results in which the error detection circuit found no errors.
Lane specific CRC
A method of data validation is provided. In one implementation, the method includes performing a cyclic redundancy check (CRC) on data transmitted over a channel having L lanes. In one implementation, the performing includes performing the CRC using n CRC bits and a CRC polynomial, where n is an integer equal to or greater than one and where L is an integer equal to or greater than one and represents the number of lanes in the channel. Further, in one implementation, the CRC polynomial is selected based on L. In one implementation, the method includes: performing a CRC on data, where the performing includes performing the CRC using n CRC bits, where n is an integer equal to or greater than one; and performing a checksum on the data, where the performing the checksum includes performing the checksum using m checksum bits, where m is an integer equal to or greater than one, where n plus m bits are allocated for validating the data. In one implementation, the performing the CRC and the performing the checksum are implemented by a hardware device.
Methods and structure for correlating multiple test outputs of an integrated circuit acquired during separate instances of an event
Methods and structure for correlating multiple sets of test output signals in time are provided. The structure includes an integrated circuit comprising a block of circuitry that generates internal operational signals. The circuit also comprises a test multiplexer (MUX) hierarchy that selects subsets of the internal signals and applies the subsets to a testing element. A clock generator generates a clock signal for the selected signals. A test logic timer receives the clock signal and increments a counter value, and applies the counter value to the testing element. An event detector resets the counter value upon detection of an event, such that a first subset of the internal signals acquired from the test MUX hierarchy acquired responsive to detection of a first instance of the event may be correlated in time with a second subset of the internal signals acquired responsive to detection of a second instance of the event.
Methods and graphical user interfaces for granting access to digital items on a per item basis
A user may make a digital item available to other users of a computer network, such as an instant messaging system, a chat environment, or a subscription-based computer network. Examples of digital items that may be shared with other users include digital representations of graphic images, photographs, audio segments, songs, video segments, movies, and text (such as lists of favorites (e.g., a list of favorite books, a list of favorite movies, and a list of favorite places to visit)). On-line presence information is provided to indicate the on-line presence of users with whom a digital item has been shared, may be shared or is being shared. For instance, an indication of the on-line or offline status of a user with whom an item has been shared or is being shared may be presented.
Method of and an arrangement for automatically measuring electric connections of electronic circuit arrangements mounted on printed circuit boards
A method of and an arrangement for determining electric connections at a printed circuit board between boundary-scan compliant circuit terminals of one or more boundary-scan compliant devices. An electronic processing unit retrieves properties of the or each boundary-scan compliant device and a list comprising boundary-scan cells operable as a driver and/or sensor. Based on this list, a boundary-scan cell connected to a circuit terminal is operated as a driver, and at least one other boundary-scan cell connected to another circuit terminal is operated as a sensor. Data from the boundary-scan register, comprising the driver and sensor data, is stored in a storage device. The steps of operating boundary-scan cells as driver and sensor are repeated for a plurality of cells. The data stored are analyzed for determining electric connections. A result of the analysis is presented.
Shared fuse wrapper architecture for memory repair
A memory repair mechanism for the memories clustered across the multiple power domains and can be switched on and off independent of each other, thereby enabling low power operation. Enhancements in the shared Fuse Wrapper Architecture enable sharing of a plurality of parallel links connecting the memory blocks of each power domains to the Shared Fuse Wrapper architecture.
Method and apparatus for transmitting data between timing controller and source driver, having bit error rate test function
Embodiments of the present invention provide a method and apparatus for transmitting data between a timing controller and a source driver. In some embodiments, the method includes a bit error rate test (BERT) function for sensing an error rate in real time when data is transmitted and received between the timing controller and the source driver.
Dynamic link library integrity checking for handheld medical devices
A method of checking the integrity of a dynamic link library (DLL) file called by an application being executed on a handheld medical device is described. The method includes loading a DLL from a read only memory (ROM) to a random access memory (RAM) beginning at a fixed location in the RAM. The DLL includes a first routine for performing a safety critical function of the handheld medical device and a second routine for performing a cyclical redundancy check (CRC) once the DLL is loaded to the RAM. The method includes selectively executing the first routine from the RAM. The method includes selectively executing the second routine from the RAM including: calculating a check value based on the DLL; comparing the check value with a predetermined check value; and indicating that an error is present when the check value is different than the predetermined check value.
Device and method for coordinating automatic protection switching operation and recovery operation
The present invention relates to a device and a method for coordinating an APS operation and a recovery operation. The device includes a working channel detection unit, a protection channel detection unit, a protection protocol unit and a recovery protocol unit. The method comprises: when the working channel of current service fails, the working channel detection unit reporting a working channel alarm to the protection protocol unit and a recovery protocol unit of current node; the recovery protocol unit starting up a timer after receiving the working channel alarm, and the protection protocol unit determining whether the recovery operation needs to be started up immediately after receiving the working channel alarm, and if yes, the protection protocol unit notifying the recovery protocol unit to start up the recovery operation immediately; the recovery protocol unit starting up the recovery operation immediately after receiving the notification. The present invention reduces the damage time of the service in the case of the APS function failure.
Method and system for using a standby server to improve redundancy in a dual-node data storage system
A standby server, a first main server, and a second main server to control shared input/output (I/O) adapters in a storage system are provided. The standby server is in communication with the first main server and the second main server, and the storage system is configured to operate as a dual node active system. The standby server is activated in response to receiving a communication from the first main server of a fail mode of the second main server. Systems and physical computer storage media are also provided.
Heterogeneous recovery in a redundant memory system
Providing heterogeneous recovery in a redundant memory system that includes a memory controller, a plurality of memory channels in communication with the memory controller, an error detection code mechanism configured for detecting a failing memory channel, and an error recovery mechanism. The error recovery mechanism is configured for receiving notification of the failing memory channel, for performing a recovery operation on the failing memory channel while other memory channels are performing normal system operations, for bringing the recovered channel back into operational mode with the other memory channels for store operations, for continuing to mark the recovered channel to guard against stale data, for removing any stale data after the recovery operation is complete, and for removing the mark on the recovered channel to allow the normal system operations with all of the memory channels, the removing based on the removing any stale data being complete.
Sequential on-chip clock controller with dynamic bypass for multi-clock domain testing
A controller includes a clock control unit configured to provide a first output to test circuitry and a bypass unit configured to provide a second output to a further controller. The controller is configured to cause the bypass unit to output the second output and to optionally cause the clock control unit to output the first output.
Device and method for preventing lost synchronization
A method for synchronizing two connection nodes by a reception node of the connection nodes with a clock data recovery circuit that generates a synchronization clock from input data. The method includes performing a synchronization process to establish synchronization between the connection nodes based on the synchronization clock, performing a connection failure process when the synchronization is not established when a first time elapses after receiving the input data, correcting the clock data recovery circuit when the synchronization is not established when a second time elapses after receiving the input data, wherein the second time is shorter than the first time, and performing a resynchronization process to establish synchronization between the connection nodes based on a synchronization clock, which is generated by the clock data recovery circuit that has been corrected, before the first time elapses and after the second time elapses.
Method and system for precise temperature and timebase PPM error estimation using multiple timebases
Methods and systems for precise temperature and timebase ppm error estimation using multiple timebases may comprise measuring a coarse reading of a temperature corresponding to the plurality of timebases. The frequencies of the timebases may be compared to generate a fine reading of the temperature based, at least in part, on the coarse reading and the comparison of the frequencies with respect to models of temperature dependencies for each of the timebases. The timebases may be calibrated utilizing the generated fine reading. The plurality of timebases may comprise different order temperature dependencies. The models of temperature dependencies of each of the plurality of timebases may be updated based, at least in part, on the fine reading of the temperature corresponding to the plurality of timebases. A global navigation satellite system (GNSS) clock signal may be utilized periodically to improve the accuracy of the calibration of the plurality of timebases.
Transferring state information between electronic devices
Some embodiments enable a first electronic device (e.g., a notebook computer) to obtain state information directly from another electronic device (e.g., a smartphone) so that the first electronic device may replicate a state of content of the other computing device. This is useful when a user of an electronic device desires to switch between one device and another device such that the user may continue an activity (e.g., playing a video game) on another device without having to restart the activity. This is also useful when a user of a first electronic device attempts to replicate the state of the activity on a second device from another user such that both users may participate in the same activity. In some embodiments, a user of a device may obtain content from a server and state information from another device to replicate the state of content on the other device.
Method and apparatus to boost mass memory performance given power supply availability
Reliability of a power supply is assessed, such as for example considering one or more of the following: whether a host device is experiencing fast acceleration; whether a portable power supply has sufficient energy to meet current needs; whether a battery or removable memory cover is in place; and whether a software failure within the host device is imminent. In dependence on the assessed reliability, there is a selection made between a first mode and a second mode for operating a mass memory. The first mode comprises better data retention than the second mode for the case that the power supply is interrupted, and the second mode comprises faster data transfer than the first mode for the case that the power supply is not interrupted. In one embodiment the first and second mode buffers write data utilizing respective non-volatile (flash) and volatile (DRAM) memory.
Information processing device, power supply control method and storage medium
An information processing device includes: a power-off detection unit for detecting a signal relating to a power-off operation of a user; an application program termination unit for terminating a predetermined application program when the power-off operation is performed; and a control unit for passing control, after the termination of the application program, to a state in which normal execution can be started faster than normal power-off, and power consumption is lower than in the normal execution.
Dynamic information adaptation for a computing device having multiple power modes
A computing device is described that can detect a change to a power mode of the computing device and responsive to detecting the change, identify, from among a set of elements that each specify respective content in accordance with a markup language, one or more elements that each have at least one respective attribute associated with the power mode of the computing device. The computing device can modify, based on the change to the power mode, at least a portion of the respective attribute of each of the identified one or more elements to associate the respective content specified by each of the identified elements with a set of presentation properties. The computing device can render, for display in accordance with the set of presentation properties, the respective content specified by each element from the set of elements.
Circuit configuration having a transceiver circuit for a bus system and nodes for a bus system
A circuit configuration for a node of a bus system includes a transceiver circuit and a control circuit connected to the transceiver circuit. The transceiver circuit has an idle mode, in which it has a reduced power consumption in comparison with at least one operating mode, and the transceiver circuit is supplied with power in the at least one operating mode via a power supply unit integrated into the transceiver circuit. The control circuit is connected to the power supply unit to supply the control circuit with power in the idle mode, and the circuit configuration has a controllable voltage regulator which is coupled to the transceiver circuit in such a way that the voltage regulator is deactivated in the idle mode to reduce the power consumption and activated in the operating mode to supply power to the transceiver circuit and the control circuit.
System and method for enabling turbo mode in a processor
The systems and methods described herein may enable a processor core to run at higher speeds than other processor cores in the same package. A thread executing on one processor core may begin waiting for another thread to complete a particular action (e.g., to release a lock). In response to determining that other threads are waiting, the thread/core may enter an inactive state. A data structure may store information indicating which threads are waiting on which other threads. In response to determining that a quorum of threads/cores are in an inactive state, one of the threads/cores may enter a turbo mode in which it executes at a higher speed than the baseline speed for the cores. A thread holding a lock and executing in turbo mode may perform work delegated by waiting threads at the higher speed. A thread may exit the inactive state when the waited-for action is completed.
Method in a controller controlling a dynamic compensator, a controller, computer programs and computer program products
A method in a controller controlling a dynamic power compensator. The dynamic power compensator is arranged to provide active and reactive power to an electric power system, the dynamic power compensator including a battery energy storage. The method includes the steps of: monitoring a state of charge of the battery energy storage; detecting a voltage level in the electric power system requiring increased delivery of the reactive power to the electric power system; and controlling the battery energy storage in dependence on the monitored state of charge and detected voltage level. The invention also relates to a controller, computer programs and computer program products.
Using historic load profiles to dynamically adjust operating frequency and available power to a handheld multimedia device processor core
A technique is provided for use in a handheld multimedia device that uses the historical load profile statistics of a particular multimedia stream to dynamically scale the computational power of a computing engine, depending upon the complexity of the multimedia content and thereby reduce the power consumption for computationally less intensive content and consequently reduce the power consumption by a significant amount over a duration of time.
System and method for dynamically controlling a plurality of cores in a multicore central processing unit based on temperature
A method of controlling power within a multicore central processing unit (CPU) is disclosed. The method may include monitoring a die temperature, determining a degree of parallelism within a workload of the CPU, and powering one or more cores of the CPU up or down based on the degree of parallelism, the die temperature, or a combination thereof.
Counteracting memory tracing on computing systems by code obfuscation
Method and apparatus for obfuscating computer software code, to protect against reverse-engineering of the code. The obfuscation here is on the part of the code that accesses buffers (memory locations). Further, the obfuscation process copies or replaces parts of the buffer contents with local variables. This obfuscation is typically carried out by suitably annotating (modifying) the original source code.
Digital content management and delivery
Methods, systems, and apparatus for digital content management and distribution are provided. In an example, a plurality of unique keys can be provide, wherein each unique key corresponding to one or more docks for accessing digital content. A selection of at least one item of digital content can be received from a user and an indication of a dock corresponding to the user can also be received. A unique key can be selected from the plurality of unique keys corresponding to the dock of the user, and the at least one item of digital content can be encrypted based on the selected unique key.
Protecting the security of secure data sent from a central processor for processing by a further processing device
A data processing apparatus comprising: a data processor for processing data in a secure and a non-secure mode, said data processor processing data in said secure mode having access to secure data that is not accessible to said data processor in said non-secure mode, and processing data in said secure mode being performed under control of a secure operating system and processing data in said non-secure mode being performed under control of a non-secure operating system; and a further processing device for performing a task in response to a request from said data processor, said task comprising processing data at least some of which is secure data; wherein said further processing device is responsive to receipt of a signal to suspend said task to initiate: processing of said secure data using a secure key; and storage of said processed secure data to a non-secure data store; and is responsive to receipt of a signal to resume said task to initiate: retrieval of said processed secure data from said non-secure data store; and restoring of said processed secure data using said secure key; wherein said secure key is securely stored such that it is not accessible to other processes operating in said non-secure mode.
System and method for encrypting secondary copies of data
A system and method for encrypting secondary copies of data is described. In some examples, the system encrypts a secondary copy of data after the secondary copy is created. In some examples, the system looks to information about a data storage system, and determines when and where to encrypt data based on the information.
Secure password generation
A secure password generation method and system is provided. The method includes enabling by a processor of a computing system, password translation software. The computer processor generates and stores the random translation key. A first password is received and a second associated password is generated. The computer processor associates the second password with a secure application. The computer processor stores the random translation key within an external memory device and disables a connection between the computing system and the external memory device.
Enterprise-specific functionality watermarking and management
A method, system and non-transitory computer-readable medium product are provided for enterprise-specific functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to perform at least one function of a user device associated with an enterprise and identifying at least one watermark template associated with an enterprise. The method further includes applying the at least one watermark template associated with the enterprise to at least one function of the user device associated with the enterprise and authorizing the request to perform the at least one function of the user device associated with the enterprise.
Personalized biometric identification and non-repudiation system
A system and a method for providing a personalized biometric identification system to facilitate in securing critical transactions have been disclosed. The system includes a server which captures pre-designated biometric prints of a user, personalizes them and registers them on a bio print reader, owned by the user, over a unidirectional non-Internet based channel. The system overcomes the challenges involved in employing biometrics as a part of non-repudiation process for authorizing Internet based critical transactions for multiple entities by assuring the safety of the biometric prints of the users and eliminating additional hardware requirements.
ElGamal signature schemes
In a method of generating a digital signature of a message m, a signature component s of the digital signature is calculated by first masking the long-term private key d using a single additive operation to combine the key d with a first value. The masked value is then multiplied by a second value to obtain component s. The first value is calculated using the message m and another component of the digital signature, and the second value is derived using the inverse of a component of the first value. In this way, the signature component s is generated using a method that counters the effectiveness of side channel attacks, such as differential side channel analysis, by avoiding a direct multiplication using long-term private key d.
Received message verification
A method of verifying the validity of a message received by a telecommunications terminal (8) having a processor (30) and which is operable in a boot mode and a runtime mode is disclosed. In the embodiments the message is a SIM unlock message, for removing or modifying a restriction of the types of subscriber identity module (SIM) with which the mobile terminal may be used. In response to reception of the SIM unlock message when the terminal (1) is in the runtime mode, the processor 30 of the terminal (1) causes the terminal to enter the boot mode and verify the validity of the message during the boot mode. Because the validity of the message is checked during the boot mode, the check can be performed with greater security.
Simple non-autonomous peering environment, watermarking and authentication
A Secure Non-autonomous Peering (SNAP) system includes a hierarchical digital watermarking scheme, a central licensing authority, licensed fabricators and assemblers.
Self-validating authentication token
Systems, methods, and computer-readable media provide a requesting device with access to a service. In one implementation, a server stores a token decryption key for validating an encrypted token. The server receives the encrypted token and a digital signature generated using a signature creation key from a client device, and decrypts the token with the token decryption key. The server extracts a signature validation key from the token, and validates the digital signature using the signature validation data. The system provides the client device with access to the service, based on whether the digital signature is validated.
In one implementation, a credential associated with a user identifier and a location is stored at a client device. A request to output a representation of the credential in a manner that enables a credential authority to validate the representation is received. Responsive to receiving the request to render the representation of the credential, a location of the client device is obtained and a determination that the location of the client device is within a predefined distance of the location associated with the credential is made. Responsive to determining that the location of the client device is within the predefined distance of the location associated with the credential, data indicating that the user has entered the location associated with the credential is stored in a memory of the client device.
Computer security system and method
A method is provided for protecting a computer system, comprising creating an isolated process, then assigning a first process group to the process; creating an additional group process within the first process group; performing a first determination by an application programming interface (API) that the additional group process is within the first process group, and as a result of the first determination, causing the additional group process to inherit and duplicate a handle of the process. Process communications and control within isolated groups is permitted freely, whereas process control by an isolated process for non-isolated processes or isolated processes in different groups is constrained or prohibited.
Method of and system for encryption and authentication
The invention provides a method of and system for networked security, involving multiple clients and servers. Rather than relying on single server based authentication and/or single stream based data transmission, the invention breaks apart information before if leaves the User's computer so that intercepting any single electronic message does not provide the hacker with sufficient information to gain access. The invention splits the values (i.e. password, User name, card number for authorization; encrypted text for encryption, etc.) at the point of sender/external authorization client. These split values are encrypted with different keys and transmitted to multiple external authorization servers. The invention can be applied to any secure transmission, storage or authentication of data over a data network.
System and method for secure messaging between wireless device and application gateway
A method and system for secure messaging between a wireless device and an application gateway provides for connecting a device to an application mapping layer via a secure socket and exchanging encryption keys for effecting asymmetric encryption between the device and the application gateway. The encryption has a first set of keys for encrypting messages to the device and decryption a second set of keys for decrypting messages from the device. Accordingly, the present patent disclosure provides an entire solution from end-to-end. Combining a variety of security patterns and technologies in a specific manner to provide a highly secure form of protecting data in a messaging style format between two endpoints on a network. The present patent disclosure provides an optimized strength of encryption on the paths from application mapping layer to wireless device and vice versa. And is able to change in nature to suit the dynamic nature of the payload sizes and transmission rates in the mobile market.
Multi-mode data card and calibrating method thereof
A multi-mode data card includes at least two mode modules, and also includes an external interface module and an interface control module. The external interface module connects to the interface control module. The external interface is configured to connect with computer for data interaction; the interface control module is equipped with at least two channels, and said at least two channels connects to said at least two mode modules respectively. The interface control module is configured to: when the multi-mode data card is calibrated, connect the external interface module with the channel corresponding to the mode module to be calibrated, and switch the multi-mode data card to the mode to be calibrated. A method for calibrating multi-mode data card is also provided in the present invention.
Boot caching for boot acceleration within data storage systems
Technologies are described herein for boot caching to accelerate boot access in a data storage system providing boot consolidation. Boot caching may be provided to improve boot access for multiple clients concurrently booting from a common storage server. Boot statistics may be collected per user or client. The boot statistics can determine common patterns within the boot procedures of the clients and may be used to compute boot caching tables. These tables may then be used during boot caching to accelerate booting of clients. A boot caching mechanism can be implemented to support improved booting performance by caching data blocks common to multiple booting volumes. This approach can leverage the condition that much of the data loaded by clients at boot time may be substantially identical, because booting can involve loading the same operating system components into each client.
Intelligent boot device selection and recovery
Techniques for recovering virtual machine state and boot information used to boot an installed guest operating system on systems where the information has either been lost or is not present are described.
System for multi-boot of a central processing unit using internal registers that direct an operating system to boot into disjoint memory spaces
A central processing unit capable of multi-boot using disjoint memory spaces. The central processing unit comprises a plurality of internal registers communicably coupled to each of a plurality of disjoint memory spaces. The internal registers may be configured to designate one or more of the memory spaces as an active memory space or a standby memory space.
Use of a helper thread to asynchronously compute incoming data
A set of helper thread binaries is created from a set of main thread binaries. The helper thread monitors software or hardware ports for incoming data events. When the helper thread detects an incoming event, the helper thread asynchronously executes instructions that calculate incoming data needed by the main thread.
Techniques for sourcing immediate values from a VLIW
Sourcing immediate values from a very long instruction word includes determining if a VLIW sub-instruction expansion condition exists. If the sub-instruction expansion condition exists, operation of a portion of a first arithmetic logic unit component is minimized. In addition, a part of a second arithmetic logic unit component is expanded by utilizing a block of a very long instruction word, which is normally utilized by the first arithmetic logic unit component, for the second arithmetic logic unit component if the sub-instruction expansion condition exists.
Method and apparatus for performing enhanced read and write operations in a FLASH memory system
Methods and apparatus for enhanced READ and WRITE operations in a FLASH-based solid state storage system that includes a logical to physical translation table where the logical to physical translation table can include entries associating a logical block address with one or more data identifiers, where each data identifier is associated with a data string.
Keeping file systems or partitions private in a memory device
Disclosed is a method and apparatus for allowing a user to select, from a plurality of partitions on a memory device, which partitions may be visible to hosts connecting to the memory device.
Information processing apparatus and method of controlling the same
A first nonvolatile storage device has a higher access speed in a continuous access than a random access and a second nonvolatile storage device has a higher access speed in the random access than the continuous access. The information processing apparatus selects a first storage method in which an amount of continuous data is larger than an amount of random data if data stored in a volatile storage device is saved in the first nonvolatile storage device, and selects a second storage method in which an amount of random data is larger than an amount of continuous data if the data stored in the volatile storage device is saved in the second nonvolatile storage device, and saves the data stored in the volatile storage device into the specified nonvolatile storage device using the selected storage method when a predetermined condition is satisfied.
Redundant data assignment in a data storage system
The present invention provides techniques for assignment and layout of redundant data in data storage system. In one aspect, the data storage system stores a number M of replicas of the data. Nodes that have sufficient resources available to accommodate a requirement of data to be assigned to the system are identified. When the number of nodes is greater than M, the data is assigned to M randomly selected nodes from among those identified. The data to be assigned may include a group of data segments and when the number of nodes is less than M, the group is divided to form a group of data segments having a reduced requirement. Nodes are then identified that have sufficient resources available to accommodate the reduced requirement. In other aspects, techniques are providing for adding a new storage device node to a data storage system having a plurality of existing storage device nodes and for removing data from a storage device node in such a data storage system.
Frequency and migration based re-parsing
Example apparatus and methods associated with frequency and migration based re-parsing are provided. One example data de-duplication apparatus includes a migration logic and a parsing logic. The migration logic may be configured to perform a data transfer according to an access frequency to the data. The parsing logic may be configured to re-parse the data based on the access frequency to the data. In different examples, parsing the data may be performed in response to migrating the data. In one example, parsing the data may be performed during or after the migration. Additional examples illustrate parsing the data to balance performance against reduction in light of access frequency to the data block.
Trust zone support in system on a chip having security enclave processor
An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory.
Method of verifying integrity of data written by a mainframe to a virtual tape and providing feedback of errors
A virtual tape emulator (VTE) that performs data integrity read back verification at host sync points. The VTE first flushes data that it may have buffered to a backend storage subsystem such as a disk array. The VTE then reads all data that was written to the backend storage array between a prior sync point and the current sync point. During this feedback verification, integrity checks can be performed. An error detected during read back verification is returned to the host operation that triggered the sync operation.
Virtual memory management apparatus and memory management apparatus
A virtual memory management apparatus of an embodiment is embedded in a computing machine 80 and is provided with an application program 21, an operating system 22, a volatile memory 11, and a nonvolatile memory 12. The volatile memory 11 is provided with a plurality of clean pages. The nonvolatile memory 12 is provided with a plurality of dirty pages and a page table memory unit 51. The operating system 22 is provided with a virtual memory management unit 23 which includes a page transfer unit 25.
Aggressive reclamation of tier-1 storage space in presence of copy-on-write-snapshots
Reclamation of storage space in presence of copy-on-write snapshot. In one embodiment, a reclamation command is generated. In response to generating the reclamation command, first data held within one storage device is copied to another storage device via a communication link. One or more first physical memory regions of the one storage device, which stores the first data, is allocated to a first region of a data volume. The other storage device is configured to store a copy-on-write snapshot of the data volume. In response to copying the first data, de-allocate the one or more first physical memory regions from the first data volume region.
Demand based memory management of non-pagable data storage
Management of a UNIX-style storage pools is enhanced by specially managing one or more memory management inodes associated with pinned and allocated pages of data storage by providing indirect access to the pinned and allocated pages by one or more user processes via a handle, while preventing direct access of the pinned and allocated pages by the user processes without use of the handles; scanning periodically hardware status bits in the inodes to determine which of the pinned and allocated pages have been recently accessed within a pre-determined period of time; requesting via a callback communication to each user process to determine which of the least-recently accessed pinned and allocated pages can be either deallocated or defragmented and compacted; and responsive to receiving one or more page indicators of pages unpinned by the user processes, compacting or deallocating one or more pages corresponding to the page indicators.
Resolving ownership deadlock in a distributed shared memory
Systems and methods for implementing a distributed shared memory (DSM) in a computer cluster in which an unreliable underlying message passing technology is used, such that the DSM efficiently maintains coherency and reliability. DSM agents residing on different nodes of the cluster process access permission requests of local and remote users on specified data segments via handling procedures, which provide for recovering of lost ownership of a data segment while ensuring exclusive ownership of a data segment among the DSM agents detecting and resolving a no-owner messaging deadlock, pruning of obsolete messages, and recovery of the latest contents of a data segment whose ownership has been lost.
System and method for high performance, power efficient store buffer forwarding
The present disclosure describes a system and method for high performance, power efficient store buffer forwarding. Some illustrative embodiments may include a system, comprising: a processor coupled to an address bus; a cache memory that couples to the address bus and comprises cache data (the cache memory divided into a plurality of ways); and a store buffer that couples to the address bus, and comprises store buffer data, a store buffer way and a store buffer index. The processor selects the store buffer data for use by a data load operation if a selected way of the plurality of ways matches the store buffer way, and if at least part of the bus address matches the store buffer index.
Memory system including first and second caches and controlling readout of data therefrom
According to one embodiment, a memory system includes a chip including a cell array and first and second caches configured to hold data read out from the cell array; an interface configured to manage a first and a second addresses; a controller configured to issue a readout request to the interface; and a buffer configured to hold the data from the chip. The interface transfers the data in the first cache to the buffer without reading out the data from the cell array if the readout address matches the first address, transfers the data in the second cache to the buffer without reading out the data from the cell array if the readout address matches the second address, and reads out the data from the cell array and transfers the data to the buffer if the readout address does not match either one of the first or second address.
Efficient cache management
A method of managing memory of a computing device includes providing a first memory that can be allocated as cache memory or that can be used by a computing device component. A first memory segment can be allocated as cache memory in response to a cache miss. Cache size can be dynamically increased by allocating additional first memory segments as cache memory in response to subsequent cache misses. Cache memory size can be dynamically decreased by reallocating first memory cache segments for use by computing device components. The cache memory can be a cache for a second memory accessible to the computing device. The computing device can be a mobile device. The first memory can be an embedded memory and the second memory can comprise embedded, removable or external memory, or any combination thereof. The maximum size of the cache memory scales with the size of the first memory.
System and method for enhanced application performance with tiered storage in an information handling system
An information handling system includes a memory controller coupled to a first and a second storage device. The memory controller stores information on the first storage device based upon an access count related to the information, stores other information on the second storage device based upon a another access count related to the other information, and stores access data including the access counts. The information handling system also includes a processing system coupled to the memory controller. The processing system obtains the access data from the memory controller, and determines to perform an operation on the data based upon the access count, and to not perform the operation on the other data based upon the other access count.
Storage apparatus and method for arranging storage areas and managing error correcting code (ECC) groups
This storage apparatus for providing a dynamically expandable virtual volume to a host system to access the virtual volume comprises an allocation unit for configuring a group with a plurality of disks for providing a storage area to be allocated to the virtual volume, and allocating the storage area respectively from a plurality of the groups to the virtual volume; and a storage area arrangement unit for rearranging the storage area in each of the groups being used by the virtual volume to become optimal among each of the groups based on external operation.
Storage system and control method of storage system
A storage system is provided with a plurality of nonvolatile semiconductor storage devices (hereafter referred to as semiconductor storage devices) and a storage controller that is coupled to the plurality of semiconductor storage devices and that provides an LU (logical unit) to an upper level apparatus. Each of the semiconductor storage devices is provided with a nonvolatile semiconductor storage medium (hereafter referred to as a semiconductor medium) and a medium controller that is a controller that is coupled to the semiconductor medium. In the case in which the medium controller receives a write command and a data unit from a storage controller, the medium controller writes the data unit to a physical storage region of a write destination of the semiconductor medium in accordance with the write command and updates the real write data amount information that is used for specifying a real write data amount that is a total amount of a data unit that is written to the semiconductor medium based on an amount of a data unit that has been actually written. The medium controller notifies the storage controller of the real write data amount information on a regular basis or on an irregular basis. The storage controller calculates a real write data amount of the LU based on the real write data amount information from each of the semiconductor storage devices.
Storing data in parallel in a flash storage device using on chip page shifting between planes
Methods and systems are disclosed herein for storing data in a memory device. Data for multiple pages is written in parallel using plane interleaving. For example, in a four plane write, a first set of four pages are written in the following sequence: 0, 1, 2, 3. A second set of four pages, after plane interleaving, are written in the following sequent: 7, 4, 5, 6. After writing the data, the pages of written data are read, page swapped if necessary, and then written into another portion of memory (such as MLC).
Hybrid drive balancing execution times for non-volatile semiconductor memory and disk
A hybrid drive is disclosed comprising a head actuated over a disk, and a non-volatile semiconductor memory (NVSM). A first execution time needed to execute commands in a NVSM command queue is estimated, and a second execution time needed to execute commands in a disk command queue is estimated. An access command is inserted into a selected one of the NVSM command queue and the disk command queue in response to the first and second execution times, and one of the first and second execution times is updated in response to an estimated execution time of the access command.
Use of RDMA to access non-volatile solid-state memory in a network storage system
A network storage controller uses a non-volatile solid-state memory (NVSSM) subsystem which includes raw flash memory as stable storage for data, and uses remote direct memory access (RDMA) to access the NVSSM subsystem, including to access the flash memory. Storage of data in the NVSSM subsystem is controlled by an external storage operating system in the storage controller. The storage operating system uses scatter-gather lists to specify the RDMA read and write operations. Multiple client-initiated reads or writes can be combined in the storage controller into a single RDMA read or write, respectively, which can then be decomposed and executed as multiple reads or writes, respectively, in the NVSSM subsystem. Memory accesses generated by a single RDMA read or write may be directed to different memory devices in the NVSSM subsystem, which may include different forms of non-volatile solid-state memory.
Methods and systems for defragmenting virtual machine prefetch data on physical storage
A computer-implemented method for defragmenting virtual machine prefetch data. The method may include obtaining prefetch information associated with prefetch data of a virtual machine. The method may also include defragmenting, based on the prefetch information, the prefetch data on physical storage. The prefetch information may include a starting location and length of the prefetch data on a virtual disk. The prefetch information may include a geometry specification of the virtual disk. Defragmenting on physical storage may include placing the prefetch data contiguously on physical storage, placing the prefetch data in a fast-access segment of physical storage, and/or ordering the prefetch data according to the order in which it is accessed at system or application startup.
Bus connecting device for connecting host with external device
A detecting unit detects a connection of an external device to a connection port and stores the connection in a bridge state storage unit. This setting is autonomously completed by a device before an initial configuration is started by a host. A data transfer unit receives initial configuration data of a link-connection bridge from the host. Data is transferred to the linked-uplink-connection bridge with reference to the bridge state storage unit, data to a bridge which is not linked up is wasted, or an Unsupported Request is returned to the host to represent the absence of the link-connection bridge.
Solid-state disk, and user system comprising same
The inventive concept relates to a user system including a solid state disk. The user system may include a main memory for storing data processed by a central processing unit; and a solid state disk for storing the selected data among data stored in the main memory. The main memory and the solid state disk form a single memory hierarchy. Thus, the user system of the inventive concept can rapidly process data.
Conversion device, peripheral device, and programmable logic controller
A D/A conversion device includes a waveform-data-string storage area that stores therein a waveform data string including a plurality of digital values, a waveform-output-control-data storage area in which operation-mode specifying data and update request data are written, a digital-value output unit that, when the operation-mode specifying data specifies an automatic control mode, while sequentially updating an address to be read in the waveform-data-string storage area for each output period set in advance, sequentially reads and outputs a digital value and that, when the operation-mode specifying data specifies a step execution mode or an output-address change mode, while updating the address to be read at a timing when the update request data is written, reads and outputs the digital value, and a D/A conversion unit that converts the digital value output from the digital-value output unit into an analog value.
Method and apparatus for source-synchronous capture using a first-in-first-out unit
A source-synchronous capture unit on a receiving circuit includes a first first-in-first-out (FIFO) unit operable to synchronize a write enable signal to generate a synchronized write enable signal that is synchronized with a first free running clock associated with a memory external to the receiving circuit. The write enable sign is generated in response to a read operation by the receiving circuit. The source-synchronous capture unit also includes a second FIFO unit operable to store data from the memory in response to the first free running clock and the synchronized write enable signal, and to output the data in response to a second free running clock associated with the receiving circuit and a read enable signal.
Read stacking for data processor interface
A gasket of a data processing device controls the number of released storage locations of a buffer where read and write access requests are stored so that more read access requests can be stored without a corresponding increase in the amount of space at the buffer to store write access requests. An interface of the gasket accepts new access requests from one or more requesting modules only when a number of released storage locations at a buffer associated with the interface (referred to as an outbound buffer) is above a threshold number. As long as the number of stored access requests at the outbound buffer are less than a threshold amount, a buffer location can be immediately released. In addition, the gasket is configured to issue read access requests from the outbound buffer without regard to whether the inbound buffer has space available.
Specific identification information management device, information processing device, and specific identification information setting method
A specific identification information management device coupled to a feature expansion device includes: a storage unit configured to store the specific identification information of the feature expansion device; a detection unit configured to detect access to the feature expansion device; and a control unit configured to transmit the specific identification information stored in the storage unit to the source of access to the feature expansion device when the access is detected by the detection unit.
SD/SDIO host controller
An SD/SDIO host controller is disclosed, which includes a control register and interrupt generation module, an internal DMA module, an SD/SDIO command interface module, an SD/SDIO data interface module, and a frequency divider and trigger/sampling enable signal generation module which is connected to an output end of the control register and interrupt generation module; the frequency divider and trigger/sampling enable signal generation module employs a frequency divider to perform frequency division on a local high-speed clock so as to obtain the operating clock of the SD/SDIO card, and simultaneously generates a trigger/sampling enable signal by the frequency divider and enables the position of the enable signal to be adjustable with respect to the operating clock of the SD/SDIO card. The present invention is capable of solving the setup/hold time issues caused by delay in digital signals.
System and method for distributing user interface device configurations
A system that incorporates teachings of the present disclosure may include, for example, a system having a controller to collect a plurality of User Interface (UI) device configurations, receive a request from a computing device to download one or more of the plurality of UI device configurations, and transmit to the computing device the one or more UI device configurations requested to configure one or more UI devices of the computing device. Other embodiments are disclosed.
Method to ensure data coherency in a scalable aggregate neighbor-device interface
A method for processing a read sub-command in a secondary storage controller is disclosed. The method includes receiving the read sub-command from a primary storage controller; retrieving data in response to the read sub-command; utilizing a write request to write the retrieved data directly to a memory accessible by a host device; issuing an additional request to the same memory after the write request; receiving an indication of completion of the additional request; and reporting a sub-completion status to the primary storage controller.
Transactional memory that performs an atomic metering command
A transactional memory (TM) receives an Atomic Metering Command (AMC) across a bus from a processor. The command includes a memory address and a meter pair indicator value. In response to the AMC, the TM pulls an input value (IV). The TM uses the memory address to read a word including multiple credit values from a memory unit. Circuitry within the TM selects a pair of credit values, subtracts the IV from each of the pair of credit values thereby generating a pair of decremented credit values, compares the pair of decremented credit values with a threshold value, respectively, thereby generating a pair of indicator values, performs a lookup based upon the pair of indicator values and the meter pair indicator value, and outputs a selector value and a result value that represents a meter color. The selector value determines the credit values written back to the memory unit.
Method, device, and system for issuing synchronization message
Provided is a device for issuing a synchronization message in a large-scaled computing system including an interconnect and a plurality of computing devices that is connected to the interconnect. The interconnect includes a plurality of switches that is connected to each other. The device sends a synchronization message for synchronizing computing processes on the computing devices to all the computing devices at same timing via the switches that are directly connected to any of the computing devices by using a protocol for a general-purpose interconnect.
Architecture for simulation of network conditions for video delivery
In one embodiment, a method includes retrieving a playlist for a video stream of video content for a client. The playlist is for portions of video content for the video stream. A traffic shaping service determines a set of rules for the playlist for a set of portions in the plurality of portions where each rule is associated with a network condition. For each rule, the method performs: dynamically allocating a port and setting a network condition to apply to the port according to the rule. During playback of the video content, the traffic shaping service receives a request for a portion from the client and determines a port associated with the request for the portion. The method then sends a traffic shaped portion through the determined port where the network condition is applied to the traffic shaped portion based on the network condition being set on the port.
System and method for message processing and routing
A message routing system that allows applications at either end of the system to run as-is without modification. The system functions in a multithreaded environment and is capable of handling complex routing rules and message transformation. It is also capable of learning and executing new routing rules and message transformations in formats previously unrecognized by the system. The system enables precise and reliable logging of messages throughout processing and supports publication of enterprise-wide broadcast messages. The system further preferably employs cooperating inbound and outbound transport processes for consuming, routing, processing, safely storing and publishing messages in batches of logical units of work to ensure that the logical units of work are not lost in system transactions. The system also preferably utilizes a replay server for preserving and replaying messages that might otherwise fail to reach their intended destinations.
Method of transmitting data including a structured linear database
A method, system and type of database for transmitting data is disclosed in which the data is organized into a structured linear database. The structured linear database includes a routing header portion, a file allocation table, a data portion and a tailbit portion. The structured linear database may be transmitted over any type of network, such as a TM-UWB system or a fiber-optic system. Once the data to be transmitted is identified, a corresponding field is identified in the field allocation table giving the location of the data within the transmission. This field is then referenced by the user to access the specific type of data desired at the given location of the transmission. this process may be repeated enabling data to be stored on transmission lines and accessed at any point at any time providing an always on network.
Method for controlling download rate of real-time streaming as needed by media player
A computer-implemented method including receiving streaming media, wherein the streaming media is requested by a media player at a mobile device; retrieving timing information from the streaming media, wherein the timing information corresponds to real-time playback rate on the media player; framing the streaming media based on the real-time playback rate on the media player; scheduling transmission of the framed streaming media based on the framing; and transmitting the framed streaming media to the media player according to the schedule.
Bandwidth and topology management device for home networks
Systems, methods, and equipment for use in the management of network topology and bandwidth for computing networks are provided. In an illustrative implementation of a device acting as a patch panel is provided. The patch panel works on both the physical wire and on the frequencies of the wire to route data to appropriate destination points. For example, both ADSL and telephony could be bridged among copper wires, using several independent busses. Home Phone Network Alliance Association (HPNA) standardized data could either be bridged among wires, or connected to an internal switching device, that would store and forward the native Ethernet packets used by HomePNA in a way similar to that done by Ethernet switches today. Additionally, an Ethernet uplink could attach the HPNA ports to a larger network or to a DSL Modem, and HPNA/ADSL could be removed from wires that might have privacy concerns or otherwise need filters to perform properly.
Apparatus and method for transparent communication architecture in remote communication
A communication apparatus for remote communication may include a local communication proxy module configured to receive streams from a local communication application module. The streams may be in a form utilizing a first transmission protocol and destined to a remote destination. The local communication proxy module may be configured to facilitate sending, utilizing a second transmission protocol, the streams in real-time over a network to a remote communication proxy module. The local communication proxy module may be configured to conceal characteristics of the network from the local communication application module. The local communication proxy module may also be configured to be transparent to the local communication application module. A machine-readable medium and a method are also disclosed.
System and method for dynamic adaptation service of an enterprise service bus over a communication platform
A method for implementing a dynamic adaptation service includes initializing a plurality of services of an enterprise service bus (ESB). At least one service of the plurality of services being initialized is a dynamic adaptation service. The method also includes receiving at the dynamic adaptation service a first request from a user requesting adaptation between a first client and a first service. The method further includes identifying a first protocol used by the first service and a second protocol used by the first client. The method additionally includes determining at least one adapter to use to adapt messages communicated between the first client using the first protocol and the first service using the second protocol. The method also includes creating a new adapter service through which the first client connects to the first service via the at least one adapter.
Optimizing client code through automated server specialization
Improved end-to-end server-client communication is achieved, wherein a thin client requests services from a server using a condensed optimized protocol. A mediator is provided on the server, which translates encoded messages from the client into standard web service request formats. Results are re-encoded at the server and returned to the client. A code generator is provided to automatically create optimized and specialized client and server code using templates, in which the code is optimized according to the characteristics of the client and the specified services. Grouped messages are supported. Bandwidth consumption is reduced by the technique, which increases the performance of resource-constrained clients, such as small wireless devices.
Control systems and methods for cloud resource management
A machine-implementable method for managing cloud-based transcoding resources available to a content delivery network includes maintaining a queue of video transcoding jobs that may be executed by internal transcoders of the content delivery network or by external transcoders of a plurality of cloud-based resources, utilizing a server of the content delivery network. The method further includes determining, at first and second times, corresponding first and second transcoder supply deviations, and a trend indicator; and determining whether to activate, deactivate, or make no change to the number of transcoders that are currently activated for transcoding, based at least on the second transcoder supply deviation and the trend indicator.
Method and system for use in coordinating multimedia devices
Some embodiments of the present invention provide methods for use in playing back content. Some of these methods access a content package comprising media content to be locally played back; detect, as defined by the content package, whether a remote secondary device is available with which a connection can be established; determine whether an authorization to establish the connection has been confirmed; establish, when the authorization is confirmed, a communication connection; determine, as instructed by the content package and when the communication with the secondary device is established, whether one or more commands are received from the secondary device; and implement, as instructed by the content package and when it is determined that the one or more commands are received from the secondary device, the one or more commands in controlling playback experience of the media content.
Method, system and apparatus for communication
A method for managing user terminal identification information is described. In response to an invitation message to establish communication between terminals, a first address identification of a terminal, included in the message, is examined. Based on the first address identification, a first number identification for the corresponding terminal is retrieved from an ENUM database. Based on the retrieved first number identification, a second number identification maintained for the user terminal is retrieved from an MNP database. It is checked whether the number identifications correspond to each other. Based on that, a second address identification corresponding the second communication number identification is retrieved from the ENUM database, and the invitation message is forwarded towards a recipient user terminal such that the second address identification is included in the message.
Method and system of interaction between entities on a communication network
A method and system of interaction between a requesting entity and a responding entity on a communication network based on the session initiation protocol (SIP). A machine-readable service description includes specifications of interaction between the requesting entity invoking a service at the responding entity and the responding entity offering the service. The specifications include at least a set of rules including abstract input/output message formats and SIP protocol binding rules so that the requesting entity may invoke the service to a SIP uniform resource identifier by means of SIP invocation message patterned according to the service description and it may interpret the response provided by the responding entity according to the service description.
Recording medium storing communication program, information processing apparatus, and communication procedure
A computer acquires correspondence data including a plurality of combinations of identifiers of selected computers, in which parallel processes are started, and identifiers of the parallel processes, wherein the selected computers are among a plurality of computers connected to a multipath network having relay devices extending over two or more hierarchies. The computer specifies a network identifier to be used for distributing communication paths among the selected computers for every selected computer that includes an identifier in the correspondence data, wherein the specified network identifiers is among network identifiers of respective communication paths in the multipath network, and the specified network identifier corresponds to each identifier of a plurality of computers, and is used for routing.
System and method for switching click to dial service to multimedia conference service
The present invention discloses a system and method for switching click to dial (CTD) service to multimedia conference service. The method comprises: a CTD service is performed between one user equipment (UE) and another; an application serve invites at least one of the UEs and makes said at least one of the UEs take media negotiation with the media server so as to carry out the multimedia conference service, wherein the application server is in charge of realizing not only the CTD service but also the multimedia conference service. The application server invites at least one of the UEs and makes said at least one of the UEs take media negotiation with the media server so as to carry out the multimedia conference service, thus the limitation that extra UEs cannot be joined in the call in the CTD service is overcome.
Facilitating mobility for a mobile station
Providing a mobility key for a communication session for a mobile station includes facilitating initiation of the communication session. A master key for the communication session is established, where the master key is generated at an authentication server in response to authenticating the mobile station. A mobility key is derived from the authentication key at an access node, where the mobility key is operable to authenticate mobility signaling for the communication session.
Method and system for managing session information in a mobile communication system and apparatus therefor
A method and apparatus are provided for managing session information of an access terminal (AT) that has moved from a source subnet to a target subnet in a mobile communication system for high-speed data transmission. The AT transmits a message with a prior universal access terminal identifier (UATI) to a target access network (AN) to perform session negotiation with the target AN of the target subnet. The target AN transmits a message with the prior UATI to a target packet control function (PCF) to request retrieval of session information of the AT. The target PCF sends a request for transmission of prior session information for the AT to a source PCF of the source subnet, found using the prior UATI. The target PCF receives the prior session information from the source PCF and retrieves the session information of the AT using the received prior session information.
System and method for managing internet protocol (IP) address space for enterprise network
Techniques for graphically organizing networks by multiple criteria for IP address management network migration are provided. In some embodiments, various techniques for an IPAM device for graphically organizing networks by multiple criteria for IP address management network migration are disclosed. In some embodiments, system, method, and/or computer program product for managing an Internet Protocol (IP) address space for an enterprise network, includes determining a first set of networks associated with a first attribute; and allocating new network addresses for assigning to each of the first set of networks, wherein the new network addresses are allocated based on a contiguous network address allocation criteria.
Discontinuous access management method using waiting ticket for resource allocation control, waiting ticket management method, and resource allocation control method
According to the present invention, it is determined whether to allocate a resource to a user having accessed without having a waiting ticket that indicates an access sequence number of the user terminal, and re-access of the user terminal after a waiting time is instructed by providing a waiting ticket and the waiting time to the user terminal if the user terminal cannot be allocated with the resource, and it is determined whether to allocate a resource to the user terminal having accessed with the waiting ticket and the resource is allocated to the user terminal if it is possible. If the resource cannot be allocated to the re-accessed user terminal, a waiting ticket and a waiting time are provided to the user terminal to instruct to access again after the waiting time has passed.
Using templates to configure cloud resources
The present invention extends to methods, systems, and computer program products for using templates to configure cloud resources. Embodiments of the invention include encapsulating cloud configuration information in an importable/exportable node template. Node templates can also be used to bind groups of nodes to different cloud subscriptions and cloud service accounts. Accordingly, managing the configuration of cloud based resources can be facilitated through an interface at a (e.g., high performance) computing component. Templates can also specify a schedule for starting/stopping instance running within a resource cloud.
Multimedia middleware apparatus using metadata, method for controlling multimedia middleware, and storage medium thereof
A multimedia middleware apparatus using metadata, a control method and a storage medium are provided which can receive metadata in multimedia middleware provided in a terminal, easily add/delete/change a service, and effectively maintain and manage middleware components. When an open multimedia terminal processes multimedia contents, a multimedia middleware service structure for expressing information of a name, configuration, version and application programming interface (API) update is configured in the form of metadata. Lists of standard and non-standard services of multimedia middleware are then generated and managed.
SNMP-based management of service oriented architecture environments
A Simple Network Management Protocol (SNMP)-based apparatus including an SNMP manager to monitor network hardware devices and define object identifiers (OIDs); a Simple SOA Performance Monitor (SSPM) manager to augment the OIDs with service-specific object identifiers to monitor services; and an SSPM agent associated with at least one service to collect details pertaining to the service, the details of the service being provided to the SSPM manager which in turn provides the details of the service to the SNMP manager. The SNMP-based apparatus may be implemented by at least one computing device. Also disclosed is a method of monitoring services and a computer program product.
Serial attached SCSI expander management and alarm reporting using SNMP
Disclosed is a Serial Attached SCSI (SAS) expander. The SAS expander is configured with an Ethernet interface and at least one SAS interface. The Ethernet interface is configured to communicate using TCP/IP protocol. The SAS expander is also configured to send an indicator of an alarm condition using Simple Network Management Protocol (SNMP). The indicator of the alarm condition is sent via the Ethernet interface. Configuration functions and status reads or writes of values stored in the SAS expander, or devices coupled to it may also be exchanged using SNMP.
System and method for counting network users
Embodiments presented herein provide methods, systems and computer program products for determining a count of network users. One method identifies one or more login access requests, from one or more server logs. Each of the one or more login access requests comprises a login cookie, and a user identifier. The method then forms one or more connected components based on the one or more login access requests. Each connected component comprises one or more user identifiers, wherein each of the one or more user identifiers is associated with one or more login cookies. The method finally determines a count of login users based, at least in part, on the user identifiers in the one or more connected components.
Method and apparatus to identify outliers in social networks
A system that incorporates teachings of the present disclosure may include, for example, a computing device having an interface for receiving seed information, and a controller to identify one or more outliers from a reduced sampling of a total population of on-line social network (OSN) users according to the seed information and at least one of a social graph or a generalization of portions of the total population of OSN users. Additional embodiments are disclosed.
Distributed frequency data collection via indicator embedded with DNS request
Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a security provider may maintain a data collection capability that is based upon receiving the DNS requests containing the information being reported. In an email application, if a data block is embedded within or attached to an email message, an algorithm is applied to the data block to generate an indicator that is specifically related to the contents of the data block. As one possibility, the algorithm may generate a hash that provides a “digital fingerprint” having a reasonable likelihood that the hash is unique to the data block. By embedding the hash within a DNS request, the request becomes a report that the data block has been accessed.
Method and system for testing variations of website content
The invention is a method and system for testing variations of website content useful to optimize website visitor conversions. The invention helps website operators create content variations, and then scientifically test and measure the impact of those variations on conversion rates. The invention includes a method of using a reverse proxy server to introduce page variations on existing website content without needing to modify the existing web server. Using the reverse proxy server, the invention automatically injects values, associated with website variations, into web page tags used with web analytics platforms. The invention makes it possible to test any number of website variations and access such data from within web analytics platforms. The invention also provides a method to automatically transform web page tags of a first web analytics platform to web page tags of a second web analytics platform to easily try new third party web analytics solutions.
Multi-tenant middleware cloud service technology
A system that includes multiple hosts, each running a plurality of virtual machines. The system may be, for example, a cloud computing environment in which there are services and a service coordination system that communicates with the hosts and with the services. The services include a middleware management service that is configured to maintain per-tenant middleware policy for each of multiple tenants. The middleware management service causes the middleware policy to be applied to network traffic by directing network traffic to a middleware enforcement mechanism. This middleware policy is per-tenant in that it depends on an identity of a tenant.
Technique for management of communication networks
A method of managing a communication network, using a multi-layer management system having at least two management layers each comprising one or more elements, which elements serving as managing entities and/or managed objects. The method comprises performing a network operation simulation at a selected management level of the system, by one or more selected managing entities, while, at the time of the simulation, comprises interrupting management communication between the one or more selected managing entities and elements in an underlying management layer.
Reactive monitoring of guests in a hypervisor environment
A system, method and computer program product for detecting and reacting to a network discrepancy within a data center network environment. The method comprises monitoring network traffic between a first computer configured as a first hypervisor inter-networked within the data center network environment and a second computer inter-networked within the data center network environment in order to detect a presence of a predetermined condition representing a presence of the network discrepancy in the data center network environment between a recorded state of the data center network environment and an observed state of the data center network environment. The monitoring includes determining the observed state of the data center network environment using one of: polling, event-based or a combination thereof. The method also comprises rectifying, upon the detection of the presence of the predetermined condition, an effect associated with the presence of the predetermined condition in the data center network environment.
Granting privileges and sharing resources in a telecommunications system
A method and an apparatus are disclosed that provide a privilege-granting technique for enabling a service-providing domain to grant a privilege to a requesting user in a service-requesting domain. A request handler in the service-providing domain, which comprises one or more service-associated resources, receives a user request to use a service and requests a token from a privilege-granting server, in accordance with the illustrative embodiment of the present invention. Upon receiving the token that specifies a granted privilege from the privilege-granting server, the request handler extends the privilege to the requesting user. Alternatively, the request handler can request a plurality of tokens in advance from the privilege-granting server; after receiving the tokens, the request handler extends a privilege to each requesting user as the handler receives requests to use one or more services.
Autonomic SLA breach value estimation
A method, system and apparatus for estimating an SLA breach value. The method can include processing resource data to identify an acceptable SLA breach value; and, displaying the acceptable SLA breach value through a user interface. The processing step can include identifying a best practices SLA breach value based upon resource data for an aggregation of customers. Alternatively, the processing step can include identifying an average SLA breach value for a specific customer. As a further alternative, the identifying step can include identifying an average SLA breach value for a specific customer for a specific resource. As yet a further alternative, the processing step can include identifying an SLA breach value trend based upon past measured historical systems management data; and, predicting a future SLA breach value based upon the trend. In all cases, the acceptable SLA breach value can be increased by a fixed proportion.
Communication device setting apparatus, communication device setting method, and recording medium
A communication device setting apparatus is arranged to register setup information in a communication device connected to the communication device setting apparatus via a communication network. In the communication device setting apparatus, a device setting unit recognizes an access from the communication device upon power up of the communication device, acquires setup information, which is specific to the communication device and contains a MAC address of the communication device, from list information pre-recorded in the communication device setting apparatus, and performs a setting process to set the acquired setup information in the communication device. A setting management unit detects an end of the setting process performed by the device setting unit, changes the list information based on the setup information having been set in the communication device after the end of the setting process, and manages the communication device according to the changed list information.
Controlling lifetime of server add-ins
System, method, computer program product embodiments and combinations and sub-combinations thereof for controlling lifetimes of server add-ins are described herein. Embodiments of the invention enable a service module, located at a first server, to externally control lifetime of one or more process add-ins located at a second server. An embodiment includes instantiating the service module at the first server and instantiating, using the service module, a controller add-in at the second server. The service module can instantiate the controller add-in to control the lifetime of (i.e. instantiate or terminate) process add-ins at the second server. In an embodiment, such lifetime control can be performed without shutting down the second server or other operations running on the second server.
Method for addressing management object in management tree and associated device management system
A method for addressing a management object in a management tree of a device management (DM) client and an associated DM system are disclosed to solve the issues encountered in the relative universal resource identifier (URI) addressing of the OMA DM protocol. The method comprises receiving a relative URI including a first part from a DM server, and identifying a root node of the management object according to the first part. The first part comprises a URI parameter for specifying a root node of a sub-tree of the management tree for finding the management object, a management object identifier, and a plurality of attribute conditions for specifying values of a plurality of leaf nodes directly under the root node of the management object.
Providing hardware updates in a software environment
A provisioning server can remotely determine target machines, requiring a hardware update, and remotely provide the hardware updates to the target machines. The provisioning server can identify hardware updates for target machines in a network it serves. The provisioning server can operate in conjunction with a network management server in order to identify the target machines, requiring the hardware update. The provisioning server can generate the hardware update for the target machines and provide the hardware update to the target machines.
Method and apparatus for localized adaptation of client devices based on correlation or learning at remote server
Techniques are disclosed for localized adaptation of client devices based on correlation or learning at a remote server. For example, a method for modifying a behavior of a client device in a data collection system, wherein the client device collects data and transmits data to a server, includes the following steps. The client device transmits data to the server. The server uses at least a portion of the data received from the client device to generate information that represents a modification to a behavior of the client device. The server device transmits the generated information to the client device. The client device subsequently alters the behavior of the client device based on the information received from the server.
Methods, systems, and computer program products for dynamic network access device port and user device configuration for implementing device-based and user-based policies
Methods, systems, and computer program products for dynamic network access device port and user device configuration are disclosed. According to one method, when a user device is connected to a port of a network access device, the type of user device is determined. The type of user device is used to locate a corresponding port configuration policy. The port to which the device is connected is dynamically configured based on the port configuration policy.
Method and apparatus for providing a web page to a call member
One problem with web-based information is that it is typically presented without being personalised or tailored to fit a particular user's needs and requirements. Another problem relates to calls such as telephone calls, video calls or other multimedia calls made between two or more call members. Here it is often required to provide detailed information during the call. By storing a plurality of web pages and associating each of those web pages with information about one or more potential calls, it is possible to select one of those web pages for provision to a particular call member. For example, a user may store a web page for provision to family members, another for customers, and another for new enquiries. Information about a call is obtained and used to select an appropriate one of the stored web pages. This selected web page is then provided to the call member which is for example a wireless terminal with a web browser arranged to display the web page. The web pages may be stored on a web server or alternatively on the terminal used by the call member to take part in the call.
System and method for converting content
Provided is a content converting method and system. The content converting method and system may extract web content elements from collected web contents, may extract domain elements from a web page including the web contents, may match the extracted elements with broadcast content elements and thus, may enable the web contents to be played in a broadcast receiving apparatus.
Mapping file fragments to file information and tagging in a segmented file sharing system
A peer-to-peer file sharing client with background file sharing is provided in a segmented peer-to-peer file sharing network. A user may elect to “tag” a torrent when a new file is submitted to the peer-to-peer system. A user may view the various tags with one or more file fragments that the user is hosting in the background. The user may view the tags for all fragments being shared in the background and search the tags. The peer-to-peer system may store metadata tags for the torrents in a central repository, such as a relational database, or in a distributed hash table.
Device and method for automation via image-based user interfaces
An apparatus, method and software enable automation in thin client and black box applications. In particular, test scripts can be run automatically in these applications.
Methods and systems for distribution of technical manuals
A method is described for providing a current version of a technical manual to a client computer system that has a prior version of the technical manual. Delta data representing a plurality of differences between the prior version of the technical manual and the current version of the technical manual is generated. The delta data are transmitted to the client computer system, and the client computer system applies the delta data to the prior version of the technical manual to produce the current version of the technical manual.
Testing a network system
A network system uses a staging server. The network system comprises an existing server and a client device that transmits session traffic comprising an HTTP request message. The HTTP request message is duplicated to form duplicated HTTP request messages. It is determined whether the HTTP request message has a first session identifier. If so, a mapping relation between the first session identifier and a second session identifier is searched for. The duplicated HTTP request messages to the existing server and the staging server, respectively, are transmitted, wherein the session identifier of the HTTP request message to the staging server is replaced with the second session identifier based on the first session identifier and the mapping relation. One embodiment may also comprise receiving an HTTP reply message from the existing server and an HTTP reply message from the staging server. The HTTP reply message from the existing server and the HTTP reply message from the staging server are compared.
Methods, systems, and computer program products for automatically adjusting a data replication rate based on a specified quality of service (QoS) level
According to one aspect, the subject matter described herein comprises methods, systems, and computer program products for automatically adjusting a replication rate based on a specified quality of service (QoS) level. The method includes providing for the specification of a QoS level associated with the performance of at least one application operating on a data storage system and determining a performance measure of the at least one application. A data replication rate of the data storage system is also determined and, based on the QoS level and the performance measure of the at least one application, the data replication rate is automatically adjusted.
Adaptive private network asynchronous distributed shared memory services
A highly predicable quality shared distributed memory process is achieved using less than predicable public and private internet protocol networks as the means for communications within the processing interconnect. An adaptive private network (APN) service provides the ability for the distributed memory process to communicate data via an APN conduit service, to use high throughput paths by bandwidth allocation to higher quality paths avoiding lower quality paths, to deliver reliability via fast retransmissions on single packet loss detection, to deliver reliability and timely communication through redundancy transmissions via duplicate transmissions on high a best path and on a most independent path from the best path, to lower latency via high resolution clock synchronized path monitoring and high latency path avoidance, to monitor packet loss and provide loss prone path avoidance, and to avoid congestion by use of high resolution clock synchronized enabled congestion monitoring and avoidance.
Systems and methods for synchronizing operations among a plurality of independently clocked digital data processing devices that independently source digital data
In a system for distributing data, distribution device is configured to distribute timestamp, offset and source location information for a digital data stream to an execution device, and the execution device is configured to seek digital data corresponding to the received information. The execution device is further configured to execute the digital data relative to a clock rate maintained by the distribution device. Related methods include receiving timestamp, offset and source location information for the digital data stream and seeking digital data corresponding to the received offset and source location information.
Device and method for user-based processing of electronic message comprising file attachments
A method for the user-based processing of electronic messages comprising file attachments is provided. According to the method, a file attachment of an electronic message is replaced by a memory location link to a selected memory location in a user file system and the file attachment of the electronic message is saved in the selected memory location of the user file system. This permits the memory capacity that is required for storing data attachments to be significantly reduced in a user-friendly system.
Mail manufacturing virtualization
Mail manufacturing virtualization is performed at a centralized routing site. This includes receiving, from at least one mailing source, electronic mailing data associated with at least one mailing and determining a mail routing distribution for the received electronic mailing data. Similarly, mail manufacturing virtualization includes routing the electronic mailing data to a plurality of output centers according to the determined mail routing distribution, where the plurality of output centers are configured to generate physical mail from the electronic mailing data and facilitating sending the physical mail to at least one respective recipient.
Upon determining that a message cell of a time line is still visible on a screen after a predefined time interval, dowloading an avatar of an author of the message cell
Method and apparatus for data transmission based on sliding detection are disclosed. The method includes: when it is detected that a TimeLine scrolls on a screen of a user device, recording, by a message client, application a Message Cell visible on the screen; and determining, by the message client application, whether the Message Cell is still visible on the screen after a predefined time interval; if the Message Cell is still visible, downloading, by the message client, data corresponding to the Message Cell from a message server. An apparatus for data transmission based on slide detection includes a detecting module, a recording module, a determining module and a downloading module. Thus, downloading is avoided for the data corresponding to Message Cells that enters into then slides out of the screen quickly. Network data traffic of users is reduced and user's experience is improved.
Changing event notification volumes
Controlling the volume of an audible alert associated with an instant messaging communications session includes rendering, on a first instant messaging user system, an instant messaging application user interface for an instant messaging communications session involving at least a first instant messaging user and a second instant messaging user, receiving notification of an event related to the instant messaging communications session, determining a characteristic of the event, accessing an audible alert to be rendered to signal existence of the event, adjusting based upon the determined characteristic of the event a volume of the audible alert corresponding to the event, and rendering the audible alert to signal existence of the event.
Methods for capturing electronic messages based on capture rules relating to online contexts of users
Managing instant messages may include receiving instant messages created by or on behalf of one or more message sources for delivery to an intended recipient. From among the received instant messages, qualifying instant messages may be identified that satisfy a capture rule, and two or more of the qualifying instant messages may be captured. The intended recipient may be informed of the captured instant messages unobtrusively, and also may be enabled to manage the captured instant messages.
Method and system for synchronizing messages across multiple digital message accounts
A system synchronizes digital messages from one user's multiple digital message accounts into one mailbox. The user identifies the message accounts from which digital messages are to be aggregated. When a new digital message arrives for one of the message accounts, a server providing the message-dependent storage sends an arrival notification to a synchronization system, or is accessed by the synchronization system at various points to check for message arrival, when notification is not forthcoming. Upon determining the arrival of a new digital message, the synchronization system retrieves the new digital message(s) and stores the retrieved message(s) in an integrated mailbox provided by the synchronization system, so that messages from various digital message accounts are collected into the integrated mailbox. This allows the user to manipulate messages in each of the individual accounts using the integrated mailbox without having to access the various accounts individually.
Communication management method and system
A communication management method and system. The method includes receiving by a computer processor, user defined data. The computer processor generates an email comprising the user defined data and retrieves an email address associated with a recipient for the email. The computer processor compares the email address to cultural data and determines a cultural region associated with the recipient. The computer processor retrieves content from the email and compares the content to cultural rules associated with the cultural region. The computer processor determines if any of the content conflicts with the cultural rules and performs functions associated with the email.
Computer readable recording medium storing linking keyword automatically extracting program, linking keyword automatically extracting method and apparatus
A character string which is unique in each transaction and a character string common to different transactions are extracted from a message log obtained when the same transaction is processed for a plurality of number of times. Then, messages stored by practically operating an information system are associated with each transaction by utilizing these character strings, and the character string common to the transactions of which execution times overlap with each other is deleted, so that the remained character strings are provided as linking keywords.
Obtaining and assessing objective data ralating to network resources
In a network comprising a plurality of network resources and at least one directory server, the directory server containing information with a predetermined level of trust about the network resources, a method for automatically providing a user device with information about a network resource in communication with the user device. The communication includes address information about the network resource. The method comprises: automatically retrieving information from the directory server about the network resource in communication; and automatically executing at least one of a set of predetermined actions based on the retrieved information.
Method and apparatus for detecting zombie-generated spam
Disclosed is a method and system for detecting a zombie attack in a network having a plurality of computers. The method and system include a network analysis module for determining, for each computer, a working set of email addresses associated with emails sent by each computer. A zombie attack is detected by determining at least one of: 1) at least one computer in the plurality is transmitting more than a threshold rate of emails, 2) that at least one of the computers is transmitting more than a first threshold number of emails to email addresses outside of its associated working set, 3) that a first threshold number of computers in the plurality are transmitting email messages to email addresses outside of their associated working set, and 4) that more than a second threshold number of computers are transmitting more than a second threshold number of emails to a recipient computer.
Methods and systems for validating real time network communications
Methods and systems for managing network communications are described. An example resource management system includes a communications manager configured to access information regarding communication protocols used by corresponding broker systems and to provide message translations based on an origin and/or destination of the message to be transmitted. A message processor is coupled to the communications manager and is configured to serialize incoming and/or outgoing broker messages and to facilitate queuing of incoming and outgoing message traffic with broker systems. A communications configurer is configured to track one or more communication attributes of broker systems and changes thereto to ensure communications between the resource management systems are broker systems are conducted in accordance with the communication attributes of the broker systems. A communications rules provider is configured to determine which broker system is to be communicated with in order to fulfill a resource request.
Cloud-connected, interactive application shared through a social network
The current patent application is directed to a class of highly functional, cloud-connected, interactive applications that are well suited for distribution and execution in social-networking contexts. When executed within the contexts of browser applications running on processor-controlled electronic devices, the class of application programs to which the current patent application is directed provides for importing images and other information from a social-networking service, developing digitally encoded and electronically stored content based on the imported images and other information, and distributing the digitally encoded and electronically stored content within a social-networking environment.
System and method for providing instant communication based customer support services using voice recognition
An approach is provided for managed instant communication (or chat)-based customer support services. Data communication is received, at a customer service platform, from a customer requesting assistance. An instant communication session is established between the customer and an agent at the customer service platform. Speech-to-text conversion operation is activated for the agent, wherein the agent corresponds during the instant communication session by speech. Agent speech correspondence is converted during the instant communication session to text data. Agent correspondence is transmitted to the customer as text data.
Correlating messaging text to business objects for business object integration into messaging
Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided. The method can include embedding a business object in message text in a messaging session provided by a messenger, and applying an action to the business object from within the messaging session of the messenger. The method further can include identifying a pronoun in the message text referencing the business object and visually distinguishing the identified pronoun in the message text to draw a correlation between the business object and the pronoun.
Methods and apparatus for automatically adding a media component to an established multimedia collaboration session
A multimedia collaboration system that facilitates more efficient, free-flowing collaboration sessions. In order to make addition of new participants, media components, and or network access device to a collaboration session more efficient, client devices associated with each participant can store endpoint address information that can be automatically obtained by the multimedia collaboration system. The endpoint address information can then be used to add the new participants, media components, and or network access device.
Document management system, document management method and recording medium
In a case where a user scans a document by a MFP or the like, a plurality of specific folders are determined based upon a storage history of the documents which the user has scanned in the past to produce shortcuts of the document scanned at this time in the plurality of determined specific folders.
Universal architecture for client management extensions on monitoring, control, and configuration
Provided are techniques for, under control of an agent: receiving a request from a first database client to access a service from a set of services, wherein the agent is associated with the service; receiving a request from a second database client to access the service, wherein the agent is shared by the first database client and the second database client; combining information from the first database client and the second database client; and sending the combined information to the service using a single physical connection in a client-side Client Management Extension (CMX) connection, wherein the first database client and the second database client share the single physical connection.
Terminal device, information processing system, request target selection method and program
The terminal device includes a processing section which performs a predetermined process; a connecting section which is configured for connection with an external apparatus capable of performing the predetermined process through a communication network; and a selecting section which selects the processing section or the external apparatus connected through the connecting section as a request target which is requested to perform the predetermined process, on the basis of a predetermined condition.
Method and apparatus for compressive sensing with reduced compression complexity
Various methods and devices are provided to address the need for reduced compression complexity in the area of compressive sensing. In one method, a vector x is compressed to obtain a vector y according to y=ΦRDx, where ΦRD=UΦRM·ΦRM is a compressive sensing matrix constructed using a second-order Reed-Muller code or a subcode of a second-order Reed-Muller code and U is a unitary matrix from the real or complex Clifford group G. In another method, vector y is decompressed to obtain vector x also according to y=ΦRDx. In some embodiments, decompression may involve computing y′=U−1y and then determining the vector x using the computed y′.
Database-based logs exposed via LDAP
A method and apparatus for maintaining logs for a Lightweight Directory Access Protocol (LDAP) directory server. The method includes receiving or detecting events or activities in the system to be logged. The events are transformed into LDAP entries and stored in an LDAP repository. The LDAP entries may then be searched and operated on using LDAP operations, thereby providing enhanced utility and functionality for log data using LDAP operations and an LDAP repository.
Global indexing within an enterprise object store file system
A file system is disclosed that includes an application wide name space instantiated in a global index (Gindex) that is used for accessing objects related to an application. Using the Gindex, a method for cache coherency includes establishing one or more appliances, each defining a storage cluster; establishing one or more tenants spanning across appliances, wherein an application stores objects in file systems associated with the appliances and tenants; establishing a Gindex including metadata relating to objects stored in association with the application; replicating the Gindex to plurality of data centers supporting the tenants; storing an original object at a first data center; storing a cached copy of the object at a second data center; aligning the cached copy using metadata for the object from a local copy of the Gindex.
Object store management operations within compute-centric object stores
Object store management operations within compute-centric object stores are provided herein. An exemplary method may include transforming an object storage dump into an object store table by a table generator container, wherein the object storage dump includes at least objects within an object store that are marked for deletion, transmitting records for objects from the object store table to reducer containers, such that each reducer container receives object records for at least one object, the object records comprising all object records for the at least one object, generating a set of cleanup tasks by the reducer containers, and executing the cleanup tasks by a cleanup agents.
In-memory data grid hash scheme optimization
Systems and methods of managing an in-memory data grid (IMDG) may involve conducting a data distribution analysis of the IMDG on a periodic basis, and selecting a hash scheme from a plurality of hash schemes based on the data distribution analysis. In one example, the selected hash scheme is used to conduct a repopulation of the IMDG, wherein the repopulation increases the distribution evenness of database records across the IMDG.
Implementation of stream algebra over class instances
Creating and executing a distributed stream processing operator graph based on a query. The operator graph includes movable stream algebra operators for processing events received from high volume data streams. The operators are partially compiled and distributed to computing devices for completion of the compilation and subsequent execution. During execution, the operators maintain minimal state information associated with received events via an expiration time assigned to each of the event instances. Additional events are generated and aggregated by the operators for communication to a service responsible for the query.
Method and system for state maintenance of a large object
A method, system and computer program product are described for state maintenance of a large object. In one approach, the method, system and computer program product perform by associating one or more buffers with a transaction involving a large object, the large object data may be accessed using the one or more buffers during the transaction, and storing data for the large object from the one or more buffers in one or more sets of contiguous blocks.In one approach, a system performs state maintenance of a large object with a cache that associates one or more buffers with a transaction involving a large object, the large object data may be accessed using the one or more buffers during the transaction, and the cache stores large object data from the one or more buffers in one or more sets of contiguous blocks in storage.
System and method for generating automatic user interface for arbitrarily complex or large databases
A software system automatically and dynamically generates a fully functional user interface (UI) based upon, and connected directly to, an underlying data model (as instantiated within a relational database management system (RDBMS)). The UI derives from an automated interrogation of the RDBMS, and comprises all mode displays (e.g., browse, search, edit, add) for all tables, and a full complement of mechanisms—integrated directly into the mode displays—for representing, navigating, and managing relationships across tables, regardless of the complexity of the underlying RDBMS schema. It utilizes a hierarchical “context stack” for suspending the working state of a particular table while “drilling down” to work with related-table information and return relevant changes to the base table. The embodiment further provides methods to enhance and extend the internal representation of table structures, constraints, relationships, and—special requirements (“business rules”) for improved revelation of the schema structure through external interrogation.
Exposing common metadata in digital images
Common metadata exposure with digital images involves making image metadata types that are common across multiple image file formats accessible via an application programming interface (API). In an example embodiment, a browser exposes an image metadata API that may be called with reference to a preselected image metadata name. The browser determines an image metadata value that is associated with the preselected image metadata name from image metadata of a targeted image. When the image metadata value is returned to a caller of the image metadata API, the caller may consume or present the image metadata value in any manner.
Dynamic presentation framework
A system in accordance with the present invention may include one or more processors, memory from which the processor may fetch instructions according to a clock operating at a frequency, a display device, and one or more programs stored in the memory, with instructions to create a structured file for storing data related to the media presentation, access the data related to the media presentation from the presentation application, organize the data related to the media presentation according to an event, and export the organized data related to the media presentation to the structured file. These instructions may also be executed as steps of a method and may be fetched during the execution of one or more programs stored in a computer-readable storage medium.
The present invention provides methods and apparatuses for obtaining selected metadata from a user device. The user device has a metadata engine that stores and accesses metadata in response to a metadata query. A metadata broker verifies the authenticity of the metadata query from a service provider and returns selected metadata if the service provider has rights to obtain the metadata. The user device has a communications interface that sends a service request that is indicative of the selected service over a communications channel and receives the metadata request that is indicative of the selected metadata. An authorization center receives a metadata request from a service provider, accesses a rule set to determine selected metadata in accordance with predetermined rights, and returns a signed metadata request to the service provider. The signed metadata request has an electronic signature of an authorizing party and is indicative of the selected metadata.
Method and system for providing path-level access control for structured documents stored in a database
An improved method and system for providing path-level access control to a structured document in a collection stored in a database, where the structured document includes a plurality of nodes is disclosed. The method includes the steps of providing an access control policy for the collection, where the access control policy comprises a plurality of access control rules, generating a path for each node of the plurality of nodes in the document, and generating for each path associated with a node a corresponding value expression based on at least one access control rule of the plurality of access control rules. According to the method and system of the present invention, the corresponding value expression is utilized during access control evaluation to determine whether a user is allowed to access a node in the structured document.
System and method for linking an address
A method and a mobile device comprising an address linking module assess a segment of text as comprising an address and create a link. The method comprises: searching a text for a segment of text having at least two character strings satisfying a proximity constraint, each character string being of a different predefined address indicator type; assessing whether or not the segment comprises an address; displaying at least a portion of the text comprising the segment on a display of a mobile device; and if the segment is assessed as comprising an address, including a link for display, the link pointing to at least one application.
Method and system of mapreduce implementations on indexed datasets in a distributed database environment
In one exemplary embodiment, a method of a distributed database system includes the step receiving a query in a query language from a client with a distributed database system. An index that matches the query is located. The index is pre-generated from a database table in the distributed database system. A map function of a MapReduce programming model is implemented using the index. A reduce function of the MapReduce programming model is implemented using the output of the map function. Optionally, a finalize function can be implemented using the output of the reduce function. The distributed database system can be a scalable NoSQL database. The reduce function can be optional when the value of the output of the map function is guaranteed to be unique.
Method and apparatus for robust input interpretation by conversation systems
One embodiment of the present method and apparatus for robust input interpretation by conversation systems includes receiving a user request containing at least one un-interpretable term. The present invention conveys the conversation system's interpretation capabilities to the user, for example by suggesting at least one alternative request in context of the un-interpretable user request, where the alternative request is phrased in a manner that is substantially fully interpretable. A user may then select a suggested alternative request or formulate a new request in accordance with knowledge of the conversation system capabilities learned from the conveyed information. In another embodiment, a method may independently (e.g., without user prompting) adapt the un-interpretable user request in accordance with learned information regarding the meaning of any un-interpretable terms in the user request.
System and method for retrieving and displaying search results without navigating from a currently displayed window
A system and method is disclosed for automatically receiving and displaying search results without navigating from a currently displayed webpage. A web browser stores is integrated with a search toolbar for receiving a search query and transmitting the query to a search engine. A search query may be transmitted and search results received and displayed without navigating from a currently displayed webpage. The toolbar causes to be displayed a search window above and at least partially overlapping the currently displayed webpage, the search window including the search results.
Efficient string matching state machine
An apparatus and a method for searching one or more documents for several different strings is described. A finite state machine receives and processes one or more search strings with a tail-first search. A matching string machine forms states based on the characters in the search string with at least one state accepting a match. The states are annotated with a pattern that indicates what the state has matched and can match. Each position within the pattern is either a character that has been matched at that point or an indicator that it is unknown.
Phone assisted ‘photographic memory’
A system and method for collecting data may include a data collection device to obtain the data from a user, an apparatus for obtaining metadata for each word of the data from the user, an apparatus for obtaining a searchable transcript of the data and a device to store the searchable transcript. The metadata may be date data, time data, name data or location data and the data collection device may include a speech recognition engine to translate speech into searchable words. The speech recognition engine may provide a confidence level corresponding to the translation of the speech into searchable words.
System and method for reducing memory usage of tree-based data structures
A system and method for reducing memory usage is disclosed. The system and method include populating a first container with original data. The first container has a tree-based data structure that includes a plurality of nodes and a plurality of pointers. A block of memory is allocated to a second container that has an array-based data structure. The original data is copied from the first container to the second container. The original data, the plurality of nodes, and the plurality of pointers may be deleted from the first container.
Method, apparatus and computer program product for providing standard real world to virtual world links
An apparatus for providing standard real world to virtual world links may include a processing element configured to receive indications of an image including an object, determine whether the object corresponds to a particular object having a predefined association based on a recognition of the object, and execute a function corresponding to the predefined association in response to the object corresponding to the particular object.
Game state synchronization and restoration across multiple devices
Technology for a method for backing up and restoring mobile game application state across multiple devices is disclosed herein. The method includes running an instance of a game application at a first electronic device, determining a backup event that occurs in the first electronic device, wherein the backup event suggests a backup of application state data and the application state data represent an application state of the game application at the backup event, and transmitting the application state data of the game application to a remote storage service, in response to the backup event. A second electronic device can retrieve the application state data from the remote storage service and restore the game application state.
Ranking of business objects for search engines
Computer-implemented methods, systems and products are provided for calculating a ranking value for business objects. Creating the ranking value for business objects may comprise calculating the number of references a business object is referenced to, mapping the business object together with the number of references of the business object into a document structure, and providing a ranking value according to the number of references.
Identifying entities using search results
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying entities using search results. One of the methods includes the actions of determining that a first search query includes a respective text reference to each of one or more predetermined attributes, wherein each attribute is associated with a first entity type; for each of a plurality of entities of the first entity type, generating a combined search query that includes the first search query and a name of the entity; obtaining search results for each of the plurality of entities using the combined search query for each respective entity; and using the obtained search results to generate combined search results to include in a response to the first search query.
Image selection for news search
A system identifies a first document that includes a number of first images, identifies a second document that includes a number of second images, and forms a cluster based on a relationship between the first document and the second document. The system identifies a first caption associated with one of the first images, identifies a second caption associated with one of the second images, selects the one of the first images or the one of the second images as a representative image for the cluster based on the first caption or the second caption, and associates the representative image with the cluster.
Systems and methods for processing an index are described. A postings list of items containing a particular term are ordered in a desired retrieval order, e.g., most recent first. The ordered items are inserted into an inverted index in the desired retrieval order, resulting in an ordered inverted index from which items may be efficiently retrieved in the desired retrieval order. During retrieval, items may first be retrieved from a live index, and the retrieved items from the live and ordered indexes may be merged. The retrieved items may also be filtered in accordance with the items' file grouping parameters.
Handling, management and creation of ice contacts
A method includes receiving input at a user equipment that designates a particular entity recorded in a user equipment contacts database as being an entity to be contacted in case of an emergency and setting an indication in a first field of a corresponding contacts database entry, where the first field is separate from a second field of the contacts database entry that stores a name of the entity.
Methods and systems for analyzing data of an online social network
Method of analyzing data from an online social network having a set of network users. The method includes obtaining topic-specific messages sent by the network users. The messages have social content provided by the networks users, wherein the messages include a marker of interest in the social content. The marker of interest is associated with a topic of the social network. The method also includes identifying the network users that sent the messages having the marker of interest in the social content as interested users of the topic. The interested users are a subset of the set of network users. The method also includes determining a topic-specific influence (TSI) value of a designated user from the interested users in the subset. The TSI value of the designated user is based on a number of the interested users that are registered to receive the messages from the designated user.
Method and apparatus for predicting object properties and events using similarity-based information retrieval and modeling
Method and apparatus for predicting properties of a target object comprise application of a search manager for analyzing parameters of a plurality of databases for a plurality of objects, the databases comprising an electrical, electromagnetic, acoustic spectral database (ESD), a micro-body assemblage database (MAD) and a database of image data whereby the databases store data objects containing identifying features, source information and information on site properties and context including time and frequency varying data. The method comprises application of multivariate statistical analysis and principal component analysis in combination with content-based image retrieval for providing two-dimensional attributes of three dimensional objects, for example, via preferential image segmentation using a tree of shapes and to predict further properties of objects by means of k-means clustering and related methods. By way of example, one of a machine component or process failure event, an intrusion event and a fire event and residual objects may be predicted and located and qualified such that, for example, properties of the residual objects may be qualified, for example, via black body radiation and micro-body databases including charcoal assemblages.
Interface to navigate and search a concept hierarchy
A method includes receiving a concept hierarchy at a computing device. The concept hierarchy identifies concepts associated with a document corpus. An interface based on the concept hierarchy is generated. The interface is operable to navigate, search, and modify the concept hierarchy. The method includes transmitting the interface for display to a display device.
Data mining across multiple social platforms
One or more devices store in a memory, customer tags originating on an external social platform and employee tags originating on an internal social platform. The one or more devices provide to a user device, keyword suggestions for new content to be published on the internal social platform. The keyword suggestions include selections from both the customer tags and the employee tags. The one or more devices receive employee metadata, for content published on the internal social platform, that includes tags selected from the keyword suggestions, and associates the tags in the employee metadata as customer-originated tags or employee-originated tags based on the stored customer tags and employee tags. The one or more devices perform data correlation to determine relationships between use of the customer-originated tags and use of the employee-originated tags in the employee metadata.
Determining core geographical information in a document
A method determines core geographical information in a document by computing a score for each geographical name found in the document. The computation of the score uses the appearance frequency of the respective geographical name and positional weights assigned to various types of appearance positions of the geographical name in the document. The system determines the core geographical information in the document based on the scores of the geographical names found in the document. The method may further compute aggregated scores of geographical regions related to the geographical names and determine the core geographical information using both the aggregated scores of geographical regions and the scores of individual geographical names to increase accuracy.
Refining a dictionary for information extraction
A method for refining a dictionary for information extraction, the operations including: inputting a set of extracted results from execution of an extractor comprising the dictionary on a collection of text, wherein the extracted results are labeled as correct results or incorrect results; processing the extracted results using an algorithm configured to set a score of the extractor above a score threshold, wherein the score threshold balances a precision and a recall of the extractor; and outputting a set of candidate dictionary entries corresponding to a full set of dictionary entries, wherein the candidate dictionary entries are candidates to be removed from the dictionary based on the extracted results.
Method for social search
System and methods for performing social searches using a social graph including nodes associated with voting values associated with items of interest. At least one rating (such as importance rating, compatibility rating, proximity rating, and/or social rank value) is obtained for each node. A web search obtains search results. A sort value (for sorting the search results) is determined for each search result in which an item is identified. The sort value may be determined for a search result by (a) identifying nodes associated with a voting value that is associated with an item identified in the search result, (b) determining a node value for each node identified based on the rating obtained for the node and the voting value associated with both the node and the item(s) identified in the search result, and (c) determining the sort value based on the node values of the nodes identified.
Method, system and controller for searching a database
A database searching system, method and controller is provided for interactively searching a database of data items in a descriptor space with a user, comprising a display for viewing by the user; a position selector for manipulation and activation by the user; a reference set selector for selecting a reference set (64a-64d) of two or more data items; a reference set coordinate obtainer for obtaining descriptor coordinates for each of the reference data items; a search results identifier for identifying a search results set of data items in the database which are close to or between one or more members of the reference set in the descriptor space; and a search results display controller for displaying the search results set on the display so that closeness on the display between particular data items is generally indicative of closeness in the descriptor space.
Adapting a context-independent relevance function for identifying relevant search results
Techniques for predicting user interests based on information known about a specific context is provided. A context-independent relevance function is generated from information gathered from many users and/or from many documents (or files). Information about a specific context (e.g., a particular user, a particular group of users, or type of content) is used to adapt the CI relevance function to the specific context. Based on a query submitted by a user, the adapted relevance function is used to identify results that the user would most likely be interested in. Results may include references to webpages and advertisements.
System and method for executing queries
There is provided a computer-implemented method of executing a query plan against a database. An exemplary method comprises accessing a first subset of rows of a database table using a direct access method for an index. The query plan may comprise the direct access method. The exemplary method also comprises determining a processing cost of accessing the first subset of rows. The exemplary method further comprises modifying the direct access method for the index in response to determining that the processing cost exceeds a specified threshold. Additionally, the exemplary method comprises accessing a second subset of rows of the database table using the modified direct access method.
Parallel, in-line, query capture database for real-time logging, monitoring and optimizer feedback
A computer-implemented method, apparatus and article of manufacture for optimizing a database query. A query execution plan is generated for the database query, which may be stored in an in-line query capture database. Execution of the query execution plan may be monitored in order to generate performance information, which also may be stored in the in-line query capture database. The data stored in in-line query capture database may be used during the initial generation of query execution plans, as well as for the re-optimization of a query execution plan, during the execution of the query execution plan.
Method for using dual indices to support query expansion, relevance/non-relevance models, blind/relevance feedback and an intelligent search interface
A method for using dual indices to support query expansion, relevance/non-relevance models, blind/relevance feedback and an intelligent search interface, the method comprising: accessing an inverted index to obtain an initial retrieval of results in response to a query, and to generate a rank list of the results, the results referring to information units (IUs) where the query occurs; and determining a number of “N” IUs in the results that are assumed to be relevant by accessing a forward index; wherein the forward index and inverted index have pointers to locations in the IUs where terms of the query occur, and the forward index retrieves a term frequency vector of the IU or a set of contexts of the IU.
Method for predicting news content
A news and/or search engine system predicts events and stories based on existing events, stories, etc., extracted from a knowledge domain. These predictions can be used for a number of different purposes, including locating new content and actual event outcomes.
Dynamic populating of contact lists with additional communication-application user identifiers
A wireless communication device (WCD) may receive a communication from an initiating party. The communication may be associated with a communication application, and may include a communication-application identifier that identifies the initiating party. The WCD may check whether a contacts list for the WCD contains user name data associated in the contacts list with the communication-application identifier. Upon determining that the contacts list does not contain such user name data, the WCD may querying a network server (NS) to request user name data associated with the communication-application identifier, receive from the NS a reply containing particular name data associated with the communication-application identifier along with additional communication-application user identifiers, each of which is also associated with the particular name data. The WCD may update the contacts list such that the particular name data is associated with the communication-application identifier along with the received additional communication-application identifiers.
Scheduler for search engine crawler
A scheduler for a search engine crawler includes a history log containing document identifiers (e.g., URLs) corresponding to documents (e.g., web pages) on a network (e.g., Internet). The scheduler is configured to process each document identifier in a set of the document identifiers by determining a content change frequency of the document corresponding to the document identifier, determining a first score for the document identifier that is a function of the determined content change frequency of the corresponding document, comparing the first score against a threshold value, and scheduling the corresponding document for indexing based on the results of the comparison.
Shape based picture search
The present application relates to a method for implementing picture search and a website server thereof. A method for implementing picture search includes: classifying, according to keywords in advance in a picture database, corresponding pictures by shape of objects in the pictures, and determining a sample picture for each shape type; wherein, after a server receives a picture search request sent from a client, the method includes: searching, by the server, in the picture database for the sample picture of several shape types classified in advance corresponding to the keywords in said search request, and returning, to the client, the searched sample picture of the several shape types; receiving, by the server, the sample picture of a certain shape type determined by the client, and searching, in the picture database for the pictures which correspond to said keywords and satisfy a predetermined request with the characteristic value of said determined sample pictures; returning, by the server, said found pictures to the client. The present application enables the user to search pictures of similar shapes according to the shape types, thereby satisfying the user's search demands.
Creating business value by embedding domain tuned search on web-sites
Domain specific topics, and optionally uniform resource locators (URLs) can be received from a user, and from those domain specific topics and URLs, domain tuned search definitions are generated for a given domain. The domain tuned search definitions are saved and the user is provided with a definition of a domain tuned search interface that is embedded on a site specified by the user. When someone reviewing the user's web site performs a search using the domain tuned, embedded search interface, a search engine is invoked which performs a search on the user's input query, and then returns domain specific search results. The search engine searches for domain specific search results over web sites in addition to the web site that the user is currently reviewing, so the search is more precise than a general web search but broader than a specific site search.
Managing dereferenced chunks in a deduplication system
A chunk index has information on chunks in a storage space referenced in objects in the storage space. The chunk index includes a reference count for each chunk indicating a number of objects in which the chunk is referenced and a reference measurement representing a level of data object references to the chunk. One chunk is selected to remove from the storage space based on a criteria applied to the reference measurements of chunks having reference counts indicating that the chunks are not referenced in one object in the storage space.
Selecting iteration schemes for deduplication
A method is used in selecting iteration schemes for deduplication. An iteration scheme is selected. Based on the selection, sets of data are iterated. Based on the iteration, a deduplicating technique is applied to the sets of data. Based on the results of applying the deduplicating technique, the iteration scheme is changed. Based on an evaluation of a set of criteria, the iteration scheme is changed.
Device and method for generating copy of database
In a DBMS, in response to a request from application programs, a base table update function updates a base table and a recovery start point, and a log recording function records update logs for the base table. Then, at predetermined timing, a backup function outputs the content of the base table to a backup file and copies the recovery start point associated with the base table to a recovery start point. Subsequently, when a user has specified a quiesce point and the base table, a copy generation function generates a target table that is a copy of the base table at the quiesce point by updating the backup file of the specified base table with ones of the update logs from the recovery start point to the quiesce point.
Techniques to modify file descriptors for content files
Techniques to modify file descriptors for content files are described. An apparatus may comprise a processor circuit and a file descriptor application operative on the processor circuit to manage file descriptors for content files, the file descriptor application arranged to generate a file descriptor for a content file in accordance with a universal file descriptor model, the universal file descriptor model to comprise a file descriptor surface with multiple file descriptor tiles to present corresponding content parts from the content file, with at least one of the file descriptor tiles defining a content part class representing homogeneous content parts from heterogeneous content file types. The file descriptor application may also comprise a file descriptor editor component arranged to allow modifications to the file descriptor. Other embodiments are described and claimed.
File editing apparatus and file editing method
A file editing apparatus for revoking (Undo) destructive segmentation. An audio file is segmented into two files by destructive segmentation. When revoking (Undo) operation is performed after segmentation, an end portion of a preceding file is deleted, and a head of a subsequent file is deleted. A copy file, which has been generated by copying during segmentation and preserved, is inserted between the two files to thereby concatenate the preceding file with the subsequent file, whereby an original file is generated.
Retrieving historical object-related configuration data
A method for historically synchronizing configuration data of a computer network is provided. A network management server collects from a first database a first plurality of configuration tables corresponding to a plurality of entities in the computer network according to a hierarchy of the entities when an entity in the computer network has changed. The network management server identifies the entity that has changed. The network management server adds a history identifier to an entity configuration table of the first plurality of configuration tables. The entity configuration table corresponds to the entity that has changed. The network management server updates a second plurality of configuration tables in a second database with the first plurality of configuration tables.
Synchronizing an auxiliary data system with a primary data system
Techniques are disclosed for synchronizing a primary data system with an auxiliary data system that processes data for the primary data system. In one embodiment, how current the primary data system and the auxiliary data system are is determined. Requests sent from the primary data system that were not processed by the auxiliary data system are determined. The requests are resent to the auxiliary data system for processing.
Computer system architecture and method having isolated file system management for secure and reliable data processing
System, method, computer, and computer program for secure data processing of potentially malicious code and documents or other data that may contain malicious code. System, method, computer for a secure and reliable computing environment to protect against data loss and/or corruption to provide secure and reliable data processing.
Stochastic programming-based decision support tool for reservoir development planning
A stochastic programming-based decision support tool for reservoir development planning can comprise a source of input data, an optimization model, a high fidelity model for simulating the reservoir, and one or more solution routines interfacing with the optimization model. The optimization model can consider unknown parameters having uncertainties directly within the optimization model. The model incorporates the flexibility that a decision-maker has in the real world and allows the decision-maker to adjust the decisions based on new information. The model can systematically address uncertain data, for example comprehensively or even taking all uncertain data into account. Accordingly, the optimization model can provide flexible or robust solutions that remain feasible over an uncertainty space. Once the reservoir model is optimized, final development plans may be generated.
Significance evaluation program and recording medium
The program makes a computer function as a significance evaluation unit including a statistical equation storage unit which stores algorithms of a plurality of statistical methods, a significance probability calculation unit which calculates significance probability for each of the evaluation items with the algorithm read out from the statistical equation database based on an input signal indicating one statistical method selected, a significance determination unit which determines a magnitude relationship between the significance probability and a significance level which is previously set or input and gives significance information to each of the evaluation items, and an evaluation result output unit which makes a display device output a matrix table in which the same number of cells as that of the evaluation items are provided such that each cell is corresponded to each evaluation item and cells of n columns or n rows are arranged.
System and method for occupancy estimation
An occupancy estimator calculates an occupancy estimate (x) of a region based on sensor data (z) provided by one or more sensor devices and a model-based occupancy estimate generated by an occupant traffic model (f). The occupant traffic model (f) is based on predicted movement of occupants throughout a region. The occupancy estimation system includes an occupancy estimator algorithm (20) that combines the sensor data (z) and the model-based occupancy estimate generated by the occupant traffic model (f) to generate an occupancy estimate (x) for the region.
Dynamic online communities
Methods, systems, and computer programs for triggering interaction with a Dynamic Online Community (DOC) are presented. In one embodiment, a method includes an operation for monitoring online activity of a user, which includes tracking user input on a web browser. The method further includes operations for detecting that the user is interested in a subject based on the online activity, and for determining whether there is a DOC topic that is associated with the subject. The DOC has members that have shown an interest in the DOC topic. In another operation, the method assigns the user to be a member of the DOC if the determination indicates that there is a DOC topic associated with the subject. The user is automatically recommended to join the DOC. DOC related information is provided to the user after the user is assigned to the DOC. In one embodiment, the online activity of the user is searching in a search provider's website.
Methods and apparatus to model end-to-end class of service policies in networks
Methods and apparatus to model end-to-end class of service policies in operational networks are disclosed. An example method to generate a class of service model is described, including electronically generating a ruleset based on the class of service configuration associated with a router, electronically generating a flat representation of the ruleset, electronically generating a class of service model by composing the flat representation into a composed ruleset, and storing the class of service model in a computer-readable memory.
Method for producing at least one application description
An application description is generated with a plurality of application blocks. First, at least one basic document is read in and analyzed. During the analysis of the basic document, a knowledge base is constructed with knowledge elements, wherein the knowledge elements recognized are at least one data field and/or at least one component, and the knowledge elements are preferably at least to some extent flagged as assumptions. Then, at least one conflict-free knowledge partition is determined, where the at least one knowledge partition has a respective set of conflict-free assumptions. The at least one application description is produced from the at least one knowledge partition with the application blocks.
Markov decision process-based support tool for reservoir development planning
A Markov decision process-based support tool for reservoir development planning can comprise a source of input data, an optimization model, a high fidelity model for simulating the reservoir, and one or more solution routines interfacing with the optimization model. The optimization model can consider unknown parameters having uncertainties directly within the optimization model. The model incorporates the flexibility that a decision-maker has in the real world and allows the decision-maker to adjust the decisions based on new information. The model can systematically address uncertain data, for example comprehensively or even taking all uncertain data into account. Accordingly, the optimization model can provide flexible or robust solutions that remain feasible over an uncertainty space. Once the reservoir model is optimized, final development plans may be generated.
Learning method of neural network circuit
A neuron circuit in a neural network circuit element includes a waveform generating circuit for generating a bipolar sawtooth pulse voltage, and a first input signal has a bipolar sawtooth pulse waveform. For a period during which the first input signal is permitted to be input to a first electrode of a variable resistance element, the bipolar sawtooth pulse voltage generated within the neural network circuit element including the variable resistance element which is applied with the first input signal from another neural network circuit element is input to a control electrode of the variable resistance element. The resistance value of the variable resistance element changes due to an electric potential difference between the first electrode and the control electrode, the electric potential difference being generated depending on an input timing difference between a voltage applied to the first electrode and the voltage applied to the control electrode.
Method and device for synthesis of network traffic
Embodiments of the present invention provide a method and device for synthesis of network traffic. The method includes extracting a first real traffic composition parameter sequence and a second real traffic composition parameter sequence from real traffic. A first synthetic traffic composition parameter sequence is generated. Relational coefficients between first traffic composition parameters and second traffic composition parameters are obtained. A second synthetic traffic composition parameter sequence is generated and synthetic traffic is generated according to the first synthetic traffic composition parameter sequence and the second synthetic traffic composition parameter sequence.
Intelligent control with hierarchical stacked neural networks
A system and method of detecting an aberrant message is provided. An ordered set of words within the message is detected. The set of words found within the message is linked to a corresponding set of expected words, the set of expected words having semantic attributes. A set of grammatical structures represented in the message is detected, based on the ordered set of words and the semantic attributes of the corresponding set of expected words. A cognitive noise vector comprising a quantitative measure of a deviation between grammatical structures represented in the message and an expected measure of grammatical structures for a message of the type is then determined. The cognitive noise vector may be processed by higher levels of the neural network and/or an external processor.
Generating constraint-compliant populations in population-based optimization
An example system and process where some operations include determining that a plurality of values satisfy one or more constraint conditions for an optimization problem. The operations further include randomly selecting a set of one or more values from the plurality of values after determining that the plurality of values satisfy the one or more constraint conditions. The operations further include including the set of one or more values in a candidate solution for the optimization problem. The including the set of one or more values in the candidate solution causes the candidate solution to comply with the one or more constraint conditions for the optimization problem prior to running a computer based simulation for the optimization problem.
Interactive interface for object search
Editorial curation of search results includes: receiving a search results page rendered in response to a search query; receiving user edits to the search results page, the user edits including changes to objects in the search results page; and applying the user edits to the search results page.
Privacy-aware on-line user role tracking
Access is obtained to a first nonnegative factor matrix and a second nonnegative factor matrix obtained by factorizing a nonnegative asymmetric matrix which represents a set of data which tracks time-stamped activities of a plurality of entities. The first nonnegative factor matrix is representative of initial role membership of the entities, and the second nonnegative factor matrix is representative of initial role activity descriptions. At a given one of the time stamps, while holding a change in the first nonnegative factor matrix constant, a change in the second nonnegative factor matrix is updated to reflect time variance of the set of data at the given one of the time stamps, without accessing actual data values at previous ones of the time stamps. At the given one of the time stamps, while holding a change in the second nonnegative factor matrix constant, a change in the first nonnegative factor matrix is updated, to reflect the time variance of the set of data at the given one of the time stamps, without accessing the actual data values at the previous ones of the time stamps. The role membership of the entities and the role activity descriptions, at the given one of the time stamps, are updated based on the updating steps. A suitable technique for nonnegative symmetric matrices is also provided.
Adaptive user interfaces
According to various embodiments of the present invention, user performance and/or motivation for a computing system may be maximized by optimizing one or more target components of a user interface of the computing system. The target components may be aspects of the user interface that is perceived by the user. One or more input features and one or more output features may be identified, and data regarding these input and output features may be gathered. This data may be compared with the results generated by a set of candidate artificial intelligence algorithms to determine which of them provides the best fit with the data collected. Then, the selected artificial intelligence algorithm may be applied to the user interface to iteratively change the target components over time until the optimal settings for each user are discovered.
Postage metering with accumulated postage
Systems and methods which provide metering of postage value using accumulated postage information are shown. Embodiments implement an accumulated postage register in a postage security device which is incremented each time a postage indicium is generated and which is reset when a postage value settlement operation is performed. Accumulated postage may be paid for using various accounts, including pre-funded or pre-paid accounts, credit accounts, debit accounts, and billing accounts. Accordingly, embodiments may be used with respect to a post-paid metering model, a pre-paid metering model, and combinations thereof.
Flexible mail delivery system and method
The principles of the present invention provide the ability to flexibly change the delivery point and time for a mail item, while the item is en route. The recipient, sender, or mailer may flexibly change the delivery point of the item alone or in combination with each other. While an item is en route between the sending point and the delivery point, a notification is sent to indicate that the item is in transit. In response, the delivery of the item may be changed. For example, the destination specified by the sender (e.g., the delivery address written on the item) may be changed or a delivery time may be specified. The item is then delivered to the new delivery point and/or at the specified delivery time.
Combined directory of personal and enterprise application system data
Systems and methods are provided that combine private contact information and Enterprise Application System (“EAS”) data in a directory. An embodiment includes receiving private contact information regarding a first employee from a second employee, storing the private contact information regarding the first employee on an EAS server, and displaying the private contact information to the second employee upon request, wherein the private contact information is viewable only to the second employee.
Providing subscribed media content to portable media player devices associated with subscribers
Methods and apparatus for providing media content offered by media content subscription service to portable media player devices associated with subscribers of the service are described herein. In various embodiments, particular fulfillment module, request module and media player are provided to fulfillment server(s) of the subscription service, request client devices, and portable media player devices, respectively.
Printing control method, apparatus and storage medium therefor, and printing system
In a printing control apparatus and method for performing printing by a printing device based upon a print job, a password corresponding to a print job is entered and print data with the accompanying password is generated and sent from a host computer to a printer, where the print data is to be printed. The host computer is capable of setting any information for the document name and user name associated with the print job. When the printer receives and prints the print data to which the password has been appended, the printer displays the user name and document name associated with the print job and performs printing in response to entry of the corresponding password by the user.
Method and apparatus for pricing calculation
A method and apparatus for providing a competitive bid from a provider comprising receiving billing data from a user, the billing data including provider information, location, and total bill amount. The method further comprising calculating a complex usage pattern based on the billing data and statistical data for the location. The method additionally comprising calculating a competitive bid for the user, based on the complex usage pattern and a pricing structure of the provider.
Data analytics models for loan treatment
Data analytics are provided in loan treatment. Various sources of data may be used to optimize or predict value for a loan. Using machine-learning and/or statistical analysis, loans or treatment best suited for a particular borrower may be determined. Due to the large amounts of data available, borrower behavior may be learned from previous behavior of others and mapped to a predictive model. Machine-learning indicates the most relevant factors in loan treatment, providing a matrix for predicting loan value or treatment success. A given borrower may be classified into one of many classes of borrower based on credit information, property information, desired loan information, real estate market information, and/or other data. Tens, hundreds, or even thousands of variables may be used to predict the optimum treatment.
System and method for displaying market information and order placement in an electronic trading environment
A system and method are provided for displaying a trading screen and placing an order in an electronic trading environment. The system and method may be used to assist a trader in selecting an item of interest, such as the inside market (best bid and best ask) to be displayed relative to a user configured location on the trading screen, such as the center of the trading screen. In a preferred embodiment, the inside market will stay located relative to center of the trading screen and the price levels associated to the inside market will move as the market conditions fluctuate. Other features and advantages are described herein.
Process for creating reports of noteworthy securities class action lawsuits customized to show potential monetary claims resulting from the lawsuits for securities purchased or acquired by one or more financial entities and including loss chart selection
Reports are automatically created of securities class action lawsuits customized to show potential monetary claims resulting from the lawsuits for securities purchased or acquired by one or more financial entities.
Using commercial share of wallet to rate investments
Commercial size of spending wallet (“CSoSW”) is the total business spend of a business including cash but excluding bartered items. Commercial share of wallet (“CSoW”) is the portion of the spending wallet that is captured by a particular financial company. A modeling approach utilizes various data sources to provide outputs that describe a company's spend capacity. A mutual fund rating company can use this CSoW/CSoSW modeling approach to predict the performance of funds that invest in a particular industry or sector. In addition, since mutual funds often provide guidelines for selecting stocks, rating companies can use this modeling approach to predict the performance of companies in a fund's portfolio.
System and method for displaying risk data in an electronic trading environment
An example graphical interface and method for displaying risk related data are described. One example graphical interface includes a data structure comprising a plurality of data nodes and at least one risk data point associated with each node, and further comprises a display grid. The display grid includes one or more cells that are used for displaying selected data nodes and risk data points. Each cell may be associated with a single data node, and may include one or more identifiers corresponding to risk data points of the data node. In one example embodiment, the identifiers are aligned along a single axis, and risk related data corresponding to each identifier is aligned with respect to each corresponding identifier.
Method and system for determining insurance needs
A computer-implemented method for generating an assessment of insurance needs for an individual includes receiving one or more data feeds comprising personal information corresponding to the individual. The received data feeds are associated with an authorization condition requiring deletion of the received data feeds by the computer after a single use. A personal identifier associated with the individual is determined based on the received data feeds and search of a public computer network is requested for data items having an indicia of the personal identifier. In response to the search of the public computer network, an indication of a first data item is received. The first data item is automatically retrieved from a remote location in response to receiving the indication and an assessment of insurance needs for the individual is generated based at least on a portion of the received data feeds and the first data item.
Method, system, and apparatus for facilitating trust certificate management/exchange
The disclosure details implementations of apparatuses, methods, and systems directed to facilitating an entity sponsoring a trust. The sponsoring entity contributes a pool of assets (e.g., a pool of real property mortgages) to fund the trust. The system facilitates the creation of one or more classes of certificates that represent a portion of the assets held in the trust. For example, if the trust is funded by mortgages, the certificates will represent rights to different portions of principal and/or interest payments generated by the mortgages held as the asset pool. The sponsoring entity can use the system to sell all or some of the certificates to unrelated parties and to create a market in the certificates. Further, in an implementation, the sponsoring entity may also use the system to facilitate an ongoing certificate exchange program implementing a series of certificate exchange applications.
System and method for evaluating fraud suspects
A method for evaluating fraud suspects is provided that includes receiving suspect data identifying a plurality of suspects of a fraud. Monetary transaction information associated with the fraud is received for the suspects. For each suspect, a value for each of a plurality of criteria associated with the fraud is determined based on the monetary transaction information. Criteria weights are applied to the values for each suspect to generate a score for the suspect indicative of a likelihood of fraud.
System, method, and apparatus for settlement for participation in an electric power grid
Systems, methods, and apparatus embodiments for electric power grid and network registration and management of physical and financial settlement for participation of active grid elements in supply and/or curtailment of power, wherein Internet Protocol (IP)-based messages including IP packets are generated by transforming raw data content into settlement grade content. Settlement is provided for grid elements that participate in the electric power grid following initial registration of each grid element with the system, preferably through network-based communication between the grid elements and a coordinator, either in coordination with or outside of an IP-based communications network router. Messaging related to settlement is managed through a network by a Coordinator using IP messaging for communication with the grid elements, with the energy management system (EMS), and with the utilities, market participants, and/or grid operators.
Method, system, and program product for electronically validating invoices
The present invention provides a method, system, and program product for validating invoices for transactions between trading partners that occur across jurisdictional borders such as inter-country or inter-state transactions. Specifically, under the present invention, an invoice corresponding to a transaction between trading partners is electronically received for instance in an invoice processing system. Upon receipt, a purchaser tax jurisdiction and a seller tax jurisdiction corresponding to the transaction will be determined. Based on these jurisdictions and a set of categorization rules, a category of the transaction is determined. Using the category and a set of validation rules, a tax rate indicated on the invoice and other optional aspects, such as whether the invoice contains all required information will be validated. Based on this validation it will be determined whether the overall invoice is valid or invalid.
System, method, and apparatus for supply chain management
A system for managing an integrated supply chain of livestock, such as beef cattle, utilizes a networked system solution for interacting various supply chain entities via the Internet. Various livestock producers, feed yards, packers, retailers, and vendors to the livestock industry are interconnected to communicate, manage, market, and transact the livestock from birth to consumer sales at the retail level. Producers are enabled to provide source verification of their livestock to enhance the integrity of the system, and prequalify livestock for value-added retail programs. Retailers are enabled to make real-time changes to characteristics of known future supply through interactions with the decision makers during the production process.
Method and system for a hand-held device initiated search, purchase and delivery
A system and method for conducting electronic business between buyers and sellers is provided. The system and method disclose a means for at least one buyer to request and receive online bids from one or more sellers of a particular product according to a price curve or price schedule. A price schedule or curve for a product defining a product's unit price as a function of the volume of product ordered. Upon receipt of a plurality of bids from sellers, a buyer can then select a seller-supplier based at least in part on the price schedule.
Systems for automated trading and conversion of unmatched amounts into new quotes
Quotes entered into an automated trading system may comprise a visible, or primary, amount, and a linked or hidden amount. The visible amount only is shown to other traders on the system but part or all of the linked amount may be dealt if the order with the quote is match is for an amount greater than the visible amount. If, after matching and deal confirmation, all the visible amount has been dealt, but some or all of the linked amount remains, a fresh order for the remaining linked amount is generated and submitted to the trading system for matching. The new quoted may be visible only or may have a visible component up to a limit specified by the maker on submission of the original quote, with the remainder being linked. Maker quotes converted to taker quotes by an auto-match routine may be resubmitted for undealt linked amounts in the same way. In one aspect of the invention, linked amounts are matched and dealt before visible amounts.
Method and system for extending payment system architectures and legacy order processing systems to mobile commerce applications via text messaging
A text message order processing system includes: means for receiving text messages from consumers purchasing products, each of the text messages being addressed to an address selected by the consumer and including an identification of the product being purchased and an identification of a device from which the text message was sent; means for parsing each text message to extract the identification of the product and the identification of the device; means for selecting a payment instrument to be used to pay for the purchase; means for establishing payment information related to the selected payment instrument and delivery information indicating where the purchased product is to be delivered; means for generating for each received text message an order including the established payment information, delivery information and identification of the product being purchased; and, means for submitting the generated order to an order management system of the merchant.
System and method for email-based e-commerce
An electronic commerce (e-commerce) system may send advertisement emails to customers that are registered with the e-commerce system. The advertisement emails may include mailto hyperlinks. Each mailto hyperlink may be associated with a product that is being offered for sale, and each mailto hyperlink describes an email message that may be generated when that hyperlink is selected. When a mailto hyperlink is selected, the generated email message may include one or more parameters related to the product associated with the hyperlink, such as an identifier of the product. The generated email message may then be transmitted to the e-commerce system. The e-commerce system may receive the message and, based on the parameters in the received message, execute a transaction to purchase the identified product on behalf of the customer.
Third party server for verifying inventory splits
A method and system for verifying inventory splits is disclosed. A server retrieves from a memory a first inventory policy provided by a first content provider. The server retrieves from the memory a second inventory policy provided by the second content provider. The server verifies that the first inventory policy and the second inventory policy are in agreement for at least one stipulation pertaining to a percentage of compensation to the first content provider for inventory owned by the first content provider and played by the second content provider. The server transmits the first inventory policy to a placement opportunity information service (POIS) communicatively connected to the second content provider. The server transmits the second inventory policy to a placement opportunity information service (POIS) communicatively connected to the first content provider.
Preservation of scores of the quality of traffic to network sites across clients and over time
A method and system for preserving scores of the quality of traffic to network sites, so that the scores are consistent over time and/or are comparable across clients.
Systems, methods and computer readable medium for wireless solicitations
Product offering systems are provided. Product offering systems may include sending an offer to a customer that possesses a mobile computing device and has agreed to receive offers for products via the mobile computing device. Agreeing to receive offers would result in the unique data about the customer being available to offer provider. Unique customer data may include data related to the customers wireless service provider or from a financial account in a financial institution, and collecting customer data about the customer, wherein the customer data comprises financial data and personal data. Product offering systems may further include registering a wireless computing device of the customer to able the device to receive the offer, and determining opportunities to send the offer to the customer by monitoring the customer and the customer data. Product offering systems may also include sending the offer to the customer's registered device based on the determination of opportunities.
Allocating advertising budgets
Methods, systems, and apparatus for allocating advertising budgets. In one aspect, a method includes receiving a set of candidate keywords specifying targeting keywords for content items. Each targeting keyword can be a phrase to be matched for a content item to be eligible to be provided in response to a content item request. For each of the targeting keywords, a probability distribution specifying likelihoods of specified user actions occurring in response to a content item is received. Based on the probability distributions, a set of final keywords with which distribution of the content items will be controlled is selected, the set of final keywords being one or more keywords for which a likelihood of a specified outcome occurring exceeds a threshold likelihood. The set of final keywords is a set which a total cost of distributing the content items is below a specified value.
Method, computer system, and stored program for accumulating descriptive profile data along with source information for use in targeting third-party advertisements
A method of accumulating descriptive profile data uses a databank that can be contacted by profile providers who contribute profile elements about an online visitor. The method includes keeping track of which profile provider contributed which elements, so that use of particular elements in targeting electronic third-party advertisements automatically can result in compensation.
Advertising conversion attribution
An advertising attribution system determines an attribution value for a set of advertising modalities associated with a conversion event. The modalities each provided an advertisement to a user who performed the conversion event. A conversion value associated with each of a plurality of modality subsets is determined representing the value to the advertiser of providing advertisements by the modalities in each modality subset. Based on the conversion value of each modality subset, a marginal value for each modality is determined for the set of modalities associated with the conversion event.
Method and system for determining rewards
A system for facilitating reward selection and redemption for a loyalty program is disclosed. The system includes a point-of-sale (POS) device that is capable of monitoring and processing a reward redemption. The POS device informs a participant of the loyalty program as to what rewards are available for redemption. The participant is given an opportunity by the POS device to select the desired reward for redemption. Alternatively, the POS device allows the participant to defer redemption of the available rewards.
Computer-implemented method and computing system for providing advertisement content, and computer-implemented method and computing system for exposing advertisement content
A computer-implemented method and computing system for providing advertisement content and a computer-implemented method and computing system for exposing advertisement content are provided. A computer-implemented method of providing advertisement content, the method includes: receiving a bid request with respect to the advertisement content associated with digital broadcast content; determining an exposure ranking of the advertisement content using quality information of the advertisement content; and providing the digital broadcast content and the advertisement content arranged based on the exposure ranking, wherein the advertisement content is classified by an accounting method.
A method and a system that identify seller ads to potential buyers within a network-based commerce system are provided. The method and system may operate to receive a request including a product identification from a seller, and assign to the seller, based on a distance function and the product identification, a matching identification entry included in a set of identification entries. The request may also include financial metrics. The method and system may further include operations to identify one or more seller ads associated with the matching identification entry, as determined by a distance measured between the matching identification entry and at least one extracted identification entry extracted from a selected content page and included in the set of identification entries. The identification of the one or more seller ads may also be determined by a relevance function based on the financial metrics.
Sales force automation system with focused account calling tool
A sales force automation method (30), comprises providing instructions which operatively direct a computer system (100) to employ one or more predetermined input-parameters (60), wherein each input-parameter is applicable to one or more clients. Sets of input-values are operatively sorted to the input-parameters for a corresponding, individual client, and the input-values that pertain to a selected client-set (62) are operatively gathered. The computer system sorts the input-values from the client-set according to sales-parameters (64) that pertain to the selected client-set. The sorted input-values are compiled and analyzed to generate an actual sales-performance-value (84) for each sales-parameter. Upon a comparison between the sales-performance-value for a sales-parameter and a corresponding parameter-target-value or target-range, the computer system can determine an appropriate sales performance-rating. Upon such determination of the sales performance-rating, the computer system can be operatively directed to display a graphical indicator (68) that corresponds to the sales performance-rating.
Telecom environment management operating system and method
A telecommunications environment management operating system and method is provided. The system and method helps organizations achieve and sustain optimal financial, operational and technical performance in the field of telecommunications.
Hybrid prediction model for a sales prospector
Systems and methods provide a system for generating a sales prospect recommendation that uses demographic data to make a sales prospect recommendation that includes a product recommendation with a probability that the sale will close, and may include an estimated time to close the sale and projected revenue. The system imports customer data including past purchasing data and demographic data for a plurality of customers. The system can then generate a predictive model by training the model using the past purchasing data and the demographic data. When queried for a sales prospect recommendation, the system responds to the query with at least one sales prospect recommended by the predictive model.
Computing and managing conflicting functional data requirements using ontologies
In one or more embodiments of the invention, functional data analysts may use a functional data authoring module to capture functional metadata in a consistent manner. Conflict reports for the business processes may be generated for a subset of the business processes or as an overall report across all business processes. One or more embodiments of the invention may provide early detection of data usage and type conflicts from functional data requirements, automated detection of conflicts from functional data requirements, reports listing detected conflicts, conflicts resolution tracking mechanism, ongoing notification regarding changes in functional data requirements or detected conflicts, and avoidance of conflicting functional requirement in the realization phase, thereby reducing costs and project risks and avoiding project delays.
Method and apparatus for dynamic specification of a business value by a discovered resource
A method for dynamic specification of a business value by a discovered resource that includes registering or discovering a resource within a business system; specifying a business value for the resource; and then computing a business value of the entire business system, based upon the resource's business value. An apparatus and computer program product that also employs these aspects is disclosed.
System and method for improved rental vehicle reservation management
A method and system are disclosed for managing a rental vehicle reservation based at least in part on automated processing of vehicle repair data corresponding to a disabled vehicle that is related to the rental vehicle reservation. For example, a preferred method and system can automatically compute from the vehicle repair data an amount of time that is likely to be needed by a repair facility to complete repairs to the disabled vehicle, which in turn can drive more accurate management of an authorization period for the rental vehicle reservation.
System and method for processing data relating to component-based insurance coverage
A system includes an insurance component selection platform that transmits data to and receives data from an insurance product component storage unit storing one or more self-descriptive components of an insurance coverage. Each of the stored components may have associated properties defining attributes of the component and one or more values associated with the properties. The components may be selected via a graphical interface generated by the component selection platform to be included in an insurance coverage product. The components may then be combined within constraints of the properties and values of the individual components. An insurance coverage policy may then be presented based on the combination of components.
Spectral image classification of rooftop condition for use in property insurance
A method and apparatus is disclosed for applying high resolution spectral imaging (hyperspectral or multispectral) to property characterization, specifically rooftop classification of type and condition using reference data for insurance applications. The system can also be used to classify the condition of vegetation and property hazards. Classifying rooftop type and condition using remote spectral imaging greatly improves quantitative accuracy of roof inspections and decreases the cost of inspection across large geographic domains. By comparing the spatially subset spectral reflection of rooftops to a reference spectra, the rooftop type and condition can be accurately assessed. The aerial inspection produces uniform and consistent data can be ingested into property insurance evaluations for many different uses. The cost of residential property inspections and re-inspections performed via manual visual inspection is reduced and a geospatial database for the targeted residential and commercial property region that can be used for sustained property assessment is created.
System and method for categorizing occupational disabilities
An insurance claim of an insured under a disability income insurance policy is processed. The policy contemplates that the insured has an occupation in which the insured performs a first set of duties and potentially other duties. In processing the insurance claim, the system and method focus on whether the insured is unable to perform the first set of duties. A threshold test may also be applied to ensure that the amount of the activities spent engaging in the first set of duties during a time period preceding a disability exceeds a threshold.
Electronic health records in clinical trials
A method for collecting self-reported data from an individual for use in a clinical trial is provided. The method includes providing a web site allowing the individual to store, organize, and access personal health records associated with the individual and sharing selected personal health records associated with the individual with a clinical trial sponsor. A system for electronic health records includes a web server programmed to provide a secure web-based interface to the electronic health records, means to collect self-reports from an individual participating in a clinical trial, means to disseminate the self-reports from the individual to a clinical trial sponsor, and means to collect health care records from a health care provider of the individual.
Methods and systems for managing informed consent processes
The systems and methods provide a dynamic process for obtaining and managing informed consent documentation. In general, the dynamic informed consent process (DICP) makes use of an intermediary organization, e.g., a trusted intermediary, which: (a) provides ICFs which have been dynamically generated for a specified trial or medical procedure and based on particular state or federal requirements, if any; and (b) archives copies of signed ICFs. In certain preferred embodiments, there may also be a procedure to provide training materials, such as audio or video presentations, to be viewed by prospective participants. In certain preferred embodiments, the process also includes contacting subjects who have signed ICFs in the event that there is a change of circumstance which the subject may deem material to whether s/he would continue to consent, or whether the participant needs to provide a different type of consent to participate in particular event or trial.
Enterprise imaging worklist server and method of use
Certain embodiments of the present invention provide a networked healthcare data management system. Certain embodiments of the data management system include a healthcare data archive connected to a network wherein the archived data comprises diagnostic, therapeutic, and demographic data. Certain embodiments further include a worklist server connected to the network wherein the worklist server receives data descriptors from the healthcare data archive and compiles the data descriptors into worklists. Certain embodiments also include a client system connected to a network wherein the client system queries the worklist server and the worklist server answers the queries by providing at least the network location of the archived data.
Apparatus and method for administration of mother's milk
Apparatus and methods are described for matching of mothers' milk to the correct baby in hospitals or other institutions where mothers' milk is expressed in advance and stored for feeding to the baby at a later time. Electronically readable indicia are used to confirm the identity of the baby, the milk units, and caregivers when the mother's milk is fed to a baby. Apparatus and methods for the collection, storage, and communication of information relevant to handling of the mother's milk are detailed such that complete audit trails are recorded and guidance to the caregiver is provided in order to ensure that all required procedures are executed properly.
Integrated treatment planning and scheduling system
A system maps components of prescribed treatments to multiple appointments of a patient, tracks patient progress through a course of treatment by recording results of treatment in a clinical information system and replaces multiple manual processes to improve concurrent monitoring of a treatment plan versus actual results. A system schedules multiple appointments for a course of patient treatment. The system uses an input processor for receiving data identifying, a treatment type, a frequency of application of the treatment, a start date of the treatment and a number of applications of the treatment. An appointment processor determines validity of the received data and uses the validated received data to generate data representing a schedule of multiple appointments for receiving the treatment. An interface processor provides data representing the schedule of multiple appointments to a destination system.
System and method for performing a remote verification of a pharmacy fill utilizing an image to image comparison
The method and system provides image data of a prepared pharmacy product for review by a pharmacist located away from the prepared pharmacy product. The method and system enables the verification process to be ported to locations in which resources may be more efficiently utilized.
System and method for notification and escalation of medical data
A system and method is disclosed for executing at least one of an alarm or an alert escalation process within a healthcare environment.
System, method, and computer program product for context-based business process management
A method, and corresponding hardware and software implementations, including receiving a client login from a client user; loading contextual information including at least one contextual parameter; determining a business process according to the contextual information; and executing the business process.
Apparatus and method for generating audio subband values and apparatus and method for generating time-domain audio samples
An embodiment of an apparatus for generating audio subband values in audio subband channels has an analysis windower for windowing a frame of time-domain audio input samples being in a time sequence extending from an early sample to a later sample using an analysis window function having a sequence of window coefficients to obtain windowed samples. The analysis window function has a first group of window coefficients and a second group of window coefficients. The first group of window coefficients is used for windowing later time-domain samples and the second group of window coefficients is used for windowing an earlier time-domain samples. The apparatus further has a calculator for calculating the audio subband values using the windowed samples.
Two-wire digital audio interface
A digital audio interface may include two signal inputs to transmit audio data. A first signal line may carry digital serial audio data. The second signal line may carry a word clock signal to differentiate the serial audio data transmitted over the first signal line. In the case of stereo audio data, the word clock signal may correspond to a left-right clock signal and may differentiate audio data intended for a right channel from that intended for a left channel. The audio data may also be differentiated differently depending on the configuration, such as in the case that the transmitted audio data include audio for more than two channels. The word clock signal may be scaled to regenerate a bit clock signal used to encode the serial audio data over the first signal line. The encoding bit clock signal need not be transmitted.
Method, device, and system for voice approval
Embodiments of the present invention provide a method for voice approval, where the method includes: receiving voice approval request information sent by an enterprise application server; establishing a voice communication connection with the terminal according to the contact information of the approver terminal; sending approval content audio information corresponding to the voice approval request information to the approver terminal; receiving feedback information, and obtaining approval result information according to the feedback information; and sending the approval result information to the enterprise application server. Embodiments of the present invention also provide a device and system for voice approval. In the embodiments of the present invention, the enterprise application server and the enterprise gateway are combined and improved to enable an approver to approve, in voice mode, an approval request raised by an applicant, thereby increasing the approval efficiency.
Evaluating spoken skills
Techniques for evaluating one or more spoken language skills of a speaker are provided. The techniques include identifying one or more temporal locations of interest in a speech passage spoken by a speaker, computing one or more acoustic parameters, wherein the one or more acoustic parameters capture one or more properties of one or more acoustic-phonetic features of the one or more locations of interest, and combining the one or more acoustic parameters with an output of an automatic speech recognizer to modify an output of a spoken language skill evaluation.
Script compliance and quality assurance based on speech recognition and duration of interaction
Apparatus and methods are provided for using automatic speech recognition to analyze a voice interaction and verify compliance of an agent reading a script to a client during the voice interaction. In one aspect of the invention, a communications system includes a user interface, a communications network, and a call center having an automatic speech recognition component. In other aspects of the invention, a script compliance method includes the steps of conducting a voice interaction between an agent and a client and evaluating the voice interaction with an automatic speech recognition component adapted to analyze the voice interaction and determine whether the agent has adequately followed the script. In yet still further aspects of the invention, the duration of a given interaction can be analyzed, either apart from or in combination with the script compliance analysis above, to seek to identify instances of agent non-compliance, of fraud, or of quality-analysis issues.
Updating a voice template
Updating a voice template for recognizing a speaker on the basis of a voice uttered by the speaker is disclosed. Stored voice templates indicate distinctive characteristics of utterances from speakers. Distinctive characteristics are extracted for a specific speaker based on a voice message utterance received from that speaker. The distinctive characteristics are compared to the characteristics indicated by the stored voice templates to selected a template that matches within a predetermined threshold. The selected template is updated on the basis of the extracted characteristics.
Speech recognition process
A speech recognition process may perform the following operations: performing a preliminary recognition process on first audio to identify candidates for the first audio; generating first templates corresponding to the first audio, where each first template includes a number of elements; selecting second templates corresponding to the candidates, where the second templates represent second audio, and where each second template includes elements that correspond to the elements in the first templates; comparing the first templates to the second templates, where comparing comprises includes similarity metrics between the first templates and corresponding second templates; applying weights to the similarity metrics to produce weighted similarity metrics, where the weights are associated with corresponding second templates; and using the weighted similarity metrics to determine whether the first audio corresponds to the second audio.
Method and system for providing an automated web transcription service
A system, method and computer readable medium that provides an automated web transcription service is disclosed. The method may include receiving input speech from a user using a communications network, recognizing the received input speech, understanding the recognized speech, transcribing the understood speech to text, storing the transcribed text in a database, receiving a request via a web page to display the transcribed text, retrieving transcribed text from the database, and displaying the transcribed text to the requester using the web page.
Performing dictation correction
A method performed by one or more processing devices includes receiving data indicative of dictated speech that has been spoken by a user during speech dictation; causing speech recognition to be performed on the data to obtain units of text; selecting a unit from the units, wherein the unit selected corresponds to a portion of the data received at a time that is more recent relative to times at which others of the units are received; and generating, based on an output of the speech recognition, data for a graphical user interface, that when rendered on a display device, causes the graphical user interface to display: a visual representation of the dictated speech, wherein the visual representation includes a visual indicator of the unit selected; and a control for performing dictation correction on the unit selected in real-time during the speech dictation.
Erroneous detection determination device, erroneous detection determination method, and storage medium storing erroneous detection determination program
An erroneous detection determination device includes: a signal acquisition unit configured to acquire, from each of microphones, a plurality of audio signals relating to ambient sound including sound from a sound source in a certain direction; a result acquisition unit configured to acquire a recognition result including voice activity information indicating the inclusion of a voice activity relating to at least one of the audio signals; a calculation unit configured to calculate, for each of audio signals on the basis of the signals in respective unit times and the certain direction, a speech arrival rate representing the proportion of the sound from the certain direction to the ambient sound in each of the unit times; and an error detection unit configured to determine, on the basis of the recognition result and the speech arrival rate, whether or not the voice activity information is the result of erroneous detection.
Machine for enabling and disabling noise reduction (MEDNR) based on a threshold
The present invention provides a novel system and method for monitoring the audio signals, analyze selected audio signal components, compare the results of analysis with a threshold value, and enable or disable noise reduction capability of a communication device.
A method and computing system for suppressing noise in an audio signal, comprising: receiving the audio signal at signal processing means; determining that another signal is input to the signal processing means, the input signal resulting from an activity which generates noise in the audio signal; and selectively suppressing noise in the audio signal in dependence on the determination that the input signal is input to the signal processing means to thereby suppress the generated noise in the audio signal.
Digital voice communication control device and method
A digital audio communication control apparatus includes a first mixing unit that mixes a voice input from a voice input unit and uttered by a specific speaker with a voice input from a digital audio packet receiving unit and uttered by at least one speaker except for the specific speaker, and a second mixing unit that mixes the voices mixed by the first mixing unit with the voice of the specific speaker. The voices mixed by the second mixing unit are fed back to the specific speaker.
Adding second enhancement layer to CELP based core layer
In an embodiment, a method of transmitting an input audio signal is disclosed. A first coding error of the input audio signal with a scalable codec having a first enhancement layer is encoded, and a second coding error is encoded using a second enhancement layer after the first enhancement layer. Encoding the second coding error includes coding fine spectrum coefficients of the second coding error to produce coded fine spectrum coefficients, and coding a spectral envelope of the second coding error to produce a coded spectral envelope. The coded fine spectrum coefficients and the coded spectral envelope are transmitted.
Coding/decoding method, system and apparatus
An encoding method includes: extracting core layer characteristic parameters and enhancement layer characteristic parameters of a background noise signal, encoding the core layer characteristic parameters and enhancement layer characteristic parameters to obtain a core layer codestream and an enhancement layer codestream. The disclosure also provides an encoding device, a decoding device and method, an encapsulating method, a reconstructing method, an encoding-decoding system and an encoding-decoding method. By describing the background noise signal with the enhancement layer characteristic parameters, the background noise signal can be processed by using more accurate encoding and decoding method, so as to improve the quality of encoding and decoding the background noise signal.
System and method for computerized psychological content analysis of computer and media generated communications to produce communications management support, indications and warnings of dangerous behavior, assessment of media images, and personnel selection support
At least one computer-mediated communication produced by or received by an author is collected and parsed to identify categories of information within it. The categories of information are processed with at least one analysis to quantify at least one type of information in each category. A first output communication is generated regarding the at least one computer-mediated communication, describing the psychological state, attitudes or characteristics of the author of the communication. A second output communication is generated when a difference between the quantification of at least one type of information for at least one category and a reference for the at least one category is detected involving a psychological state, attitude or characteristic of the author to which a responsive action should be taken.
Method and apparatus for triggering the automatic generation of narratives
Artificial intelligence methods and systems for triggering the generation of narratives are disclosed. Specific embodiments relate to real-time evaluation and automated generation of narrative stories based on received data. For example, data can be tested against data representative of a plurality of story angles to determine whether a narrative story incorporating one or more such story angles is to be automatically generated.
Usage based query response
It is possible to provide meaningful responses to queries using systems which consider usage of words in the queries when analyzing those queries and determining what information is possibly relevant. This approach can be applied in online shopping systems by identification of nouns or noun phrases reflecting products available through the system.
Typewriter system and text input method using mediated interface device
Disclosed is a typewriter system and a text input method capable of accurately recognizing words by correcting words input using a mediated interface device based on a dictionary. A plurality of texts are combined by referencing a text recognition order set in which recognition results of texts are arranged according to a recognition order from texts input through the mediated interface device and the combined text is filtered using part index maps formed of part words that are an accumulated set of texts forming complete words. The part words passing through the part index maps is again filtered using a dictionary including context information formed of a set of words in a specific category, thereby making it possible to accurately recognize the words. The part words that cannot form words in a dictionary are removed in advance using the part index maps, thereby improving the recognition efficiency.
Data processing device, data processing method, and data processing program
[PROBLEMS] To provide a data processing device such as a text mining device capable of extracting characteristic structures properly even in case a plurality of words indicating identical contents or a plurality of words semantically associated are contained in input data. [MEANS FOR SOLVING PROBLEMS] Association node extraction unit (22) of a text mining device (10) extracts association nodes containing semantically associated words from a graph obtained as a result of syntax analysis. Association node joint unit (23) transforms the graph by joint of a part of or a whole of the association nodes. Characteristic structure extraction unit (24) extracts a characteristic structure from the graph transformed by the association node joint unit.
Methods and systems for sharing language capabilities
Methods and systems for sharing information on languages supported by portable electronic devices are disclosed. Some embodiments of the disclosed methods involve, for example, a first portable electronic device transmitting to a server, information identifying the first portable electronic device, and information related to one or more languages that the first portable electronic device is capable of displaying. The server stores the received information, and shares the information with electronic devices that subsequently request information on the language capabilities of the first portable electronic device.
System and method for determining characteristics of power cables using distributed temperature sensing systems
A system and method using both static and transient modeling of power cables coupled with real time measurements of distributed temperature profiles of both the cable and it's immediate environment to optimize the current loads of the power cable. The optical fibers used for measuring distributed temperature profiles can be integrated directly into the monitored power cables or be deployed alongside the power cables, including using the optical fibers deployed in optical power ground wire systems.
Methods and systems for controlling a semiconductor fabrication process
Software for controlling processes in a heterogeneous semiconductor manufacturing environment may include a wafer-centric database, a real-time scheduler using a neural network, and a graphical user interface displaying simulated operation of the system. These features may be employed alone or in combination to offer improved usability and computational efficiency for real time control and monitoring of a semiconductor manufacturing process. More generally, these techniques may be usefully employed in a variety of real time control systems, particularly systems requiring complex scheduling decisions or heterogeneous systems constructed of hardware from numerous independent vendors.
Stochastic downscaling algorithm and applications to geological model downscaling
A computer-aided method of downscaling a three-dimensional geological model by generating numerical stochastic fine-scale models conditioning to data of different scales and capturing spatial uncertainties which involves a downscaling algorithm.
Time and space scaled S-model for turbulent fluid flow simulations
The present invention comprises systems and methods for large eddy simulations using a scaled S-model, which may be scaled in both time and space. Prior large eddy simulation models require at least one special coefficient, which vary from case to case and need to be decided experimentally or empirically. In embodiments, the scaled S-model does not require any coefficient that varies case by case or needs to be decided experimentally or empirically.
Flexible modeling concept for discretely simulating and implementing, in particular, material processing and distribution systems
A method for modeling conveyance or flows of material or other functional behaviors, particularly in the form of components that generate material actions; a method for modeling a system having components, particularly a postal item distribution system, and; the generation of a discrete component-oriented simulation model based on the modelings, particularly as a basis for components and/or system implementation. Modeling of each component is carried out on the basis of a flexible component model that takes the input behavior and the functional behavior of a component into account, and that two components at a time transfer discrete events or discrete material units to one another by using a general communications model, particularly by using communication types.
Primal-dual interior point methods for solving discrete optimal power flow problems implementing a chain rule technique for improved efficiency
A solution to the optimal power flow (OPF) problem for electrical generation and distribution systems utilizes a re-configuration of the OPF problem that allows for a simplified analysis and resolution of a network-based OPF problem in a minimal number of iterations. The standard mixed integer quadratic problem (MIQP) definition is be reconfigured, using the chain rule, to a relatively compact linear system of six equations with six unknowns (the smallest reducible (atomic) problem). Advantageously, the reduction in the complexity of the problem does not require any assumptions and yields a solution equivalent to the original problem.
Method and device for designing chromatic dispersion compensation
A design method includes calculating a calculated compensation amount of a dispersion compensation module arranged on each of a plurality of wavelength paths in such a way that a residual chromatic dispersion value of each of the wavelength paths which transmits an optical signal between an initial node and a final node satisfies a tolerance condition given in accordance with a priority given to each of the wavelength paths; and deciding a decision value to be applied as the compensation amount of the dispersion compensation module based on the calculated compensation amount based on a plurality of candidate values each being prepared in advance as the candidate for the compensation amount of the dispersion compensation module.
Method and apparatus for synthesizing and analyzing patterns
Patterns (e.g., such as images, waveforms such as sounds, electromagnetic waves, or other signals, etc.) are synthesized, modulated and/or analyzed through the use of a computer programmed with a novel mathematical formula. The formula acts as a linear operator and can be used to create a variety of shapes, waveforms, and other representations. The formula greatly enhances ability in computer operations and provides a great savings in computer memory and a substantial increase in computing power.
Robot having workpiece mass measurement function
A robot (1) having a workpiece mass measurement function for measuring the mass of a workpiece that is held, includes a force measurement unit (5) that measures the force that is applied to the tip part (2) of the mechanism part of the robot (1), and a mass estimation unit (11) that estimates the mass of the workpiece that is held by the robot (1), based on information about the force acquired by the force measurement unit (5) while the robot (1) is moving.
Selecting feature types to extract based on pre-classification of sensor measurements
A processing apparatus including one or more processors and memory receives sensor measurements generated by one or more sensors of one or more devices, pre-classifies the sensor measurements as belonging to one of a plurality of pre-classifications, and selects one or more feature types to extract from the sensor measurements based at least in part on the pre-classification of the sensor measurements. The processing apparatus also extracts features of the one or more selected feature types from the sensor measurements and determines a state of a respective device of the one or more devices in accordance with a classification of the sensor measurements determined based on the one or more features extracted from the sensor measurements.
Method for the generation of analytical redundancy relations for system diagnostics
A method for generating a set of analytical redundancy relations representative of a system with which a plurality of sensors is associated for the observation of variables indicative of operating conditions and adapted to enable detection and discrimination of faults. A complete set of analytical redundancy relations of the system is built from a set of intermediate relations established between observable and non-observable variables of the system, wherein each intermediate relation is generated by combining two predetermined relations Rj, Rk, each of which is expressed in an implicit form as a tuple (i) of a subset Sj of system variables, (ii) of the set Cj of the support components for said relation, and (iii) of the set Tj of the primary relations used to derive said intermediate relation.
System and method for forest management using stand development performance as measured by LAI
A system and method for identifying stands or portions thereof that are not growing as expected. In one embodiment, a computer system compares a measured leaf area index of a stand that is determined from remotely sensed data to an expected leaf area index. The computer system identifies stands or portions of stands where the measured leaf area index is greater than the expected leaf area index and/or stands or portions of stands where the measured leaf area index is less than the expected leaf area index. In one embodiment, the comparison is used to identify stands or portions thereof where silviculture treatments may be necessary.
Course of motion determination
A computer-implemented method for determining a course of motion between an artifact (10) and device (28) for interacting with the artifact (10) that are moveable relative to each other in at least one linear (X, Y, Z) and one rotational (A1, A2) degree of freedom, the method comprising: receiving geometric data representing the artifact (10); receiving geometric data representing the device; and determining, from the geometric data, how the device (28) and artifact (10) can be oriented relative to each other along an interaction path so as to comply with one or more optimization criteria.
Cooling control calibration for thermally-isolated self-heating devices
The present invention is a method for capturing a cooling transfer function for a thermally-isolated, self-heating device. The method includes causing the device to undergo a plurality of successive heat-up cycles and cool-down cycles. The method further includes changing durations of time of the successive cool-down cycles. The method further includes deducing the cooling transfer function based upon temperature measurements for the device obtained at the end of the successive cool-down cycles (ex.—at the beginning of the successive heat-up cycles) of the device. The method thereby allows for capture of the cooling transfer function without direct observation of the cooling transfer function.
Method and apparatus for a demand management monitoring system
A demand management monitoring system including a remote measurement device including a microprocessor for calculating RMS voltage data from digital samples and a wireless communications device, and a server system including a database configured to store the RMS voltage data from the remote measurement device.
Method for determining a parameter of at least one accumulator of a battery
A method for determining a parameter such as the resistance of at least one accumulator of a battery. The method includes the following steps: measuring a first voltage (U1) when the current is substantially equal to a predetermined value; conducting the plurality of voltage and current measurements (Un; In) during a current pulse; calculating a plurality of resistance values (Rn) from the first voltage and from the plurality of voltage and current measurements; determining a resistance value as the average of the calculated resistance values and an associated standard deviation; determining an absolute uncertainty on the value of the resistance as the product of the standard deviation and of a Student coefficient; if the relative uncertainty is less than or equal to a predetermined accuracy threshold, validating the resistance value (R).
Onboard adaptive battery core temperature estimation
Methods and systems for dynamically estimating the core temperature of at least one cell in a battery. In one aspect, the method includes using a combination of estimations including one based on ohmic resistance and another based on a function of thermal energy transfer through the battery. A weighting factor may be used for each of the estimations as a way to calculating a core temperature. The estimation based on ohmic resistance may be made determined independently of a measured surface temperature of the battery or any of the cells in the battery.
Proximity sensor calibration and configuration
A user device may include a transmission power manager to control a transmission power level of a wireless transceiver based on a location of a human body proximate the user device as detected by a proximity sensor. During initiation, the user device may record proximity data. The transmission power manager may perform a statistical analysis of the proximity data to generate refined proximity data that excludes or minimizes outlier data. The modified proximity data may then be compared to preexisting proximity data to determine whether a human body is within a threshold distance from the proximity sensor. When the modified proximity data is outside a threshold from the preexisting stored proximity data, then the modified proximity data may be compared to default proximity data to determine whether a human body is within a threshold distance from the proximity sensor.
Automated decision support for associating an unknown biological specimen with a family
Three methods of predicting whether an unknown biological specimen of a missing person originates from a member of a particular family comprise an initial automated decision support (ADS) algorithm for determining a list of relatives of the missing person for DNA typing and which typing technologies of available technologies to use for a listed relative. The ADS algorithm may be implemented on computer apparatus including a processor and an associated memory. The ADS method comprises determining a set of relatives of available family member relatives for DNA typing via a processor from a stored list of family member relatives according to one of a rule base, a table of hierarchically stored relatives developed based on discriminatory power or by calculating the discriminatory power for available family relatives to type. The ADS method may further comprise comparing at least one set of DNA typing data for the unknown biological specimen to DNA typing data from biological specimens from the determined set of relatives; calculating by the processor a likelihood function that the person is related to the family; and outputting a decision whether or not the person is related to the family.
Protein aggregation prediction systems
We describe methods for identifying aggregation-prone regions in structured—that is folded—proteins. Embodiments of the method use a local propensity for aggregation (Ai) at an amino acid position, this being determined by a combination of a hydrophobicity value, an α-helix propensity value, a β-sheet propensity value, a charge value and a pattern value for the amino acid position. This is combined with local structural stability values for the amino acid positions to identify one or more regions in the amino acid sequence which, in the folded protein, are predicted to promote aggregation.
Crystals and structure of a human IgG Fc variant with enhanced FcRn binding
Provided herein are crystalline forms of a human IgG Fc variant comprising triple-mutation M252Y/S254T/T256E that provides for increased binding affinity to human neonatal Fc receptor, methods of obtaining such crystals and high-resolution X-ray diffraction structures and atomic structure coordinates. Also provided are machine readable media embedded with the three-dimensional atomic structure coordinates of the human IgG Fc variant and methods of using them.
Method for acquiring and displaying in near real time gas analysis, well data collection, and other well logging data
The method uses a gas processor, various data collection devices each having a unique device protocol to receive drilling data, calibrate the devices and graphically present the data using both time events and depth events. The method includes computer implemented steps to scale the data and form the geological-hydrocarbon executive dashboard for transmission to various client devices to obtain real time streaming data, real time calibration information, while adding and removing detection devices and sensors online without shutting down the entire monitoring and analysis system for instant display.
Utility mapping and data distribution system and method
A system and method of mapping underground utilities and other subsurface objects involves one or more of acquiring utility location data using a number of different detectors and sensors, processing the multiple detector/sensor output data to produce mapping data, storing the mapping data in a database, and providing access to and use of the stored mapping data by subscribing users on a usage fee basis.
Method and apparatus for sorting LiDAR data
A programmed computer or non-transitory computer readable storage media has instructions that are executable by a processor to identify LiDAR data points associated with items of vegetation or other objects. Each LiDAR data point is tested to determine if it lies within the value of a closed surface defined for higher LiDAR points. If so, the LiDAR point is grouped with the LiDAR points associated with a previously identified item of vegetation. If not, a new item of vegetation is identified.
Position calculating method and position calculating device
A position calculating method comprising: receiving a positioning signal; and performing a position calculating operation using the received positioning signal, the position calculating operation being a operation based on a given probability distribution model having at least a variation in previous operation result as a random variable.
Data mining in a digital map database to identify insufficient merge lanes along roads and enabling precautionary actions in a vehicle
Disclosed is a feature for a vehicle that enables taking precautionary actions in response to conditions on the road network around or ahead of the vehicle, in particular, an intersection without traffic signals and without a sufficient merge lane. A database that represents the road network is used to determine locations where roads meet without a traffic signal and without a sufficient merge lane. Then, precautionary action data is added to the database to indicate a location at which a precautionary action is to be taken about the location of the insufficient merge lane. A precautionary action system installed in a vehicle uses this database, or a database derived therefrom, in combination with a positioning system to determine when the vehicle is at a location that corresponds to the location of a precautionary action. When the vehicle is at such a location, a precautionary action is taken by a vehicle system as the vehicle is approaching a location of an insufficient merge lane.
Navigation device and method for displaying map information
Methods and devices are disclosed for providing map information to a user. The map information corresponds to a field of view. In at least one embodiment, the navigation device includes an input device to receive an input for selecting a desired destination and a display device to display map information including a route to the desired destination, a ground level and at least one icon elevated above the ground level. The at least one icon represents an object within the field of view. In at least one embodiment, a method is disclosed for providing map information to a user via a navigation device and corresponding to a field of view is disclosed. In at least one embodiment, the method includes receiving at least one of an input and selection representing a desired destination and displaying map information including a route to the desired destination, a ground level and at least one icon elevated above the ground level. The at least one icon represents an object within the field of view.
Methods, systems, and devices for condition specific alerts
Systems, devices, and methods are provided for calculating a course for avoiding user identified criteria. A navigation device with route calculation capabilities includes a processor connected to an input and a memory that includes cartographic data and user identified criteria. A route calculation algorithm can be used to calculate a course between two or more waypoints based on the predefined user criteria of the cartographic data. Performing the route calculation algorithm includes analyzing the cartographic data with a preference for providing the course that identifies and avoids the user identified criteria. A display is connected to the processor and is capable of displaying the calculated route and cartographic data. The device is also adapted to dynamically analyze an area surrounding a present location for user identified criteria to avoid and display the results of the analysis.
System and method for navigation guidance with destination-biased route display
Embodiments of a system and method for navigation guidance with destination biased route display are described. Embodiments include displaying a map at a first viewing angle on an electronic display. The map include a graphical indication of a position of a user that is traveling. Embodiments also include determining a destination of the user; and based on the user's destination, displaying the map at a second viewing angle on the electronic display. In various embodiments, this second viewing angle is biased toward the user's destination. In various embodiments, biasing this second viewing angle in this way may provide the user with useful insight into the particular location of the destination. In some cases, in addition to biasing the viewing angle, embodiments also cause obstructions (e.g., building graphics) to become translucent in order to provide the user with a better view of the destination during navigation.
Terminal aircraft sequencing and conflict resolution
Embodiments provide an advanced decision support tool to enable automated aircraft sequencing and conflict detection and resolution. The tool can be used to assist an air traffic controller (ATC) in determining merging, sequencing, and spacing resolutions; communicating the resolutions to the aircraft; and monitoring execution and compliance with the provided resolutions. According to embodiments, the tool can incorporate a broad range of inputs (e.g., surveillance data, weather information, aircraft equipage, etc.) and can be configured according to different aircraft sequencing modes of operation (e.g., one mode of operation is to minimize aircraft deviations necessary to resolve a particular conflict). In an embodiment, the tool includes a controller interface, which may be integrated within the controller interface of existing ATC systems or implemented separately. Embodiments can be implemented using software, hardware, or a combination thereof.
Vehicle control device
A vehicle control device includes: a road-to-vehicle communication device which acquires information regarding the volume of traffic in a predetermined section on a road where a vehicle travels and which transmits the traffic volume information to a determination section; a deceleration acquisition section which acquires deceleration of a vehicle in front in the predetermined section and transmits information regarding the deceleration to the determination section; the determination section which determines whether or not a lane change is necessary on the basis of the traffic volume information acquired by the road-to-vehicle communication device and the deceleration acquired by the deceleration acquisition section; and an instruction section which instructs at least either the host vehicle or a vehicle behind to change lane when the determination section determines that a lane change is necessary. Therefore, it is possible to provide a vehicle control device capable of suppressing the occurrence of a traffic jam.
Apparatus and method for lateral control of a host vehicle during travel in a vehicle platoon
An apparatus and method are described for lateral control of a host vehicle (F) during travel in a vehicle platoon. The apparatus and method include acquiring a control signal u and a lateral error ε relative to a target vehicle (L) of a preceding vehicle (T) travelling in the vehicle platoon, filtering the received lateral error ε, filtering the received control signal u, and executing via a processor a control algorithm for actuating lateral control of the host vehicle (F).
Method and system for fleet navigation, dispatching and multi-vehicle, multi-destination routing
A system and method for multiple vehicles to be dispatched and routed to multiple destinations, with or without constraints, containing a software core, which uses bounded geographic regions (“BGRs”) and Node Pairs to explicitly optimize, in two dimensions, for user desired dependent variables, by analyzing variance due to standard and user-defined independent variables. The invention stores Node Pair data, and can use error function, feedback, and ANOVA/MANOVA to create a tightly convergent dispatching and navigation solution.
Method for the injector-individual adaption of the injection time of motor vehicles
A method for the injector-individual adaption of the injection time of motor vehicles is based on linking the IIC method and the MFMA method. Before starting to drive, the IIC method is carried out, and while driving MFMA measurements are carried out. The measurement points obtained are used as subsequent measurement points for the IIC function. Thus injector-individual characteristic fields can be determined, in which deviations due to manufacturing and also aging and wear of the components during the service life are considered.
Fuel injection controller
When an engine driving condition has been changed from an idling condition to a vehicle running condition, a controller measures an idling period. When the idling period is longer than a determination time period immediately after the vehicle is started, a penetrating-force-decrease control is performed. Therefore, even when a piston temperature is relatively low and particulate matters are easily generated, it can be restricted that fuel adheres to the piston top-surface by performing the penetrating-force-decrease control. Further, in the penetrating-force-decrease control, since the fuel is injected at optimum injection timing, it can be avoided that emission and fuel economy are deteriorated.
Cold start engine control systems and methods
A control system includes a starter control module, a mode setting module, a throttle control module, and a fuel control module. The starter control module initiates cranking of a spark ignition direct injection (SIDI) engine in response to user actuation of an ignition switch. The mode setting module sets a mode of operation to a coldstart mode when an engine coolant temperature is less than a predetermined temperature during the cranking. The throttle control module allows a throttle valve to be biased to a predetermined open position when the SIDI engine is off and, in response to the setting of the mode to the coldstart mode, selectively closes the throttle valve relative to the predetermined open position during the cranking. The fuel control module, in response to the setting of the mode to the coldstart mode, disables direct injection of fuel for a first combustion event during the cranking.
Sensors bias detection for electronic returnless fuel system
A method for isolating an actual sensor bias in a fuel delivery system having a fuel pump includes monitoring first, second and third fuel pump parameters, detecting first and second fuel pump sensor biases based on the monitored first, second and third fuel pump parameters, modeling a fourth fuel pump modeled parameter based on the monitored second and third fuel pump parameters, and isolating the actual sensor bias in one of the detected first and second fuel pump biases based on the monitored third fuel pump parameter and the modeled fourth fuel pump modeled parameter.
Clutch torque trajectory correction to provide torque hole filling during a ratio upshift
A control system and method for controlling a multiple gear ratio automatic transmission in a powertrain for an automatic transmission having pressure activated friction torque elements to effect gear ratio upshifts. The friction torque elements are synchronously engaged and released during a torque phase of an upshift event as torque from a torque source is increased while allowing the off-going friction elements to slip, followed by an inertia phase during which torque from a torque source is modulated. A perceptible transmission output torque reduction during an upshift is avoided. Measured torque values are used during a torque phase of the upshift to correct an estimated oncoming friction element target torque so that transient torque disturbances at an oncoming clutch are avoided and torque transients at the output shaft are reduced.
Control method of hybrid vehicle
A hybrid vehicle includes an internal-combustion engine, an engine starter ISG motor, a main motor that drives rear wheels, a CVT pulley belt disposed between an engine output shaft and a front wheel shaft, a clutch connected between the output shaft of the internal-combustion engine and an input shaft of the CVT, a battery, and a hybrid controller. When the hybrid controller determines that there is a need to add a traction force of the engine from a state where the vehicle is driven by the main motor alone, the hybrid controller controls the respective components so as to start the engine by the ISG motor in a state where the clutch is disengaged, control a speed ratio of the CVT so that a CVT input speed achieves a target speed for starting clutch engagement, detects the engine rotation speed, detects the CVT input speed, and engages the clutch when a difference between those speeds falls within a predetermined range.
System for selecting a transmission economy-based shift schedule
The present invention provides a method of selecting an economy mode shift schedule for a transmission coupled to a motor vehicle. The method includes calculating vehicle acceleration and determining a change in accelerator pedal position. Also, a net tractive effort force of the vehicle is determined for a current gear range of the transmission. Also, the method includes comparing the net tractive effort force for the current gear range to a maximum tractive effort force for a desired gear range and selecting the economy mode shift schedule for the transmission based on the comparison. The method further includes controlling shifting between one or more gear ranges of the transmission according to the economy mode shift schedule.
Hydraulic management system and method based on auxiliary work tool usage
A hydraulic management system and method are provided that account for auxiliary work tool usage. The hydraulic management system automatically calculates an effective use time of a hydraulic element, such as a hydraulic fluid or hydraulic filters, by multiplying work tool usage by a desired gain factor, where the gain factor may exceed 1 for auxiliary work tools.
Shovel and method of controlling shovel
A shovel includes an engine; a hydraulic pump driven by the engine; an attachment including a boom, the attachment being driven with hydraulic fluid discharged by the hydraulic pump; a motor generator configured to assist driving by the engine; an electric power accumulating part configured to accumulate electric power generated by the motor generator; a motion state detecting part configured to detect the motion state of the attachment; and an assist control part configured to control the execution of an assist by the motor generator using the electric power accumulated in the electric power accumulating part. The assist control part is configured to cause the motor generator to assist the engine during a boom raising motion after an excavation motion.
Vehicle steering system
In normal times, a rotation angle restriction mechanism in a first state restricts a rotation angle of a steering member within a first rotation angular range. In the event of a failure, that is, when there is a malfunction in a steering angle sensor, the rotation angle restriction mechanism is switched into a second state by an electromagnetic clutch, and the rotation angle of the steering member is restricted within a second rotation angular range. A steering direction is detected on the basis of at which one of a pair of terminal ends of the second rotation angular range, the steering member is located. An ECU executes drive control on a steering system actuator on the basis of the detected steering direction.
An object of the present invention is to provide a steering system which does not cause the driver to feel the steering reactive force shock when the operation of the steering wheel is stopped, and which enables the driver to operate the steering wheel comfortably. In order to achieve the above object, there is provided a steering system in which a transfer ratio of a steering angle of a steering wheel to a turning angle of a turning wheel is changed by a variable transfer ratio mechanism, and an auxiliary power is generated during steering by an electric power steering, including: a transfer ratio variable motor for changing the transfer ratio, in which a steering angular velocity of the steering wheel is calculated, and when an absolute value of the steering angular velocity becomes equal to or less than a predetermined value, a current value flowing through the transfer ratio variable motor is set to zero.
Light-based touch controls on a steering wheel and dashboard
A system for use in a vehicle, including a steering element situated opposite a driver seat in a vehicle, the steering element including a plurality of proximity sensors encased in the periphery of the steering element operable to detect hand gestures along the outer periphery of the steering element, an interactive deck housed in the vehicle, for providing at least one of radio broadcast, video broadcast, audio entertainment, video entertainment and navigational assistance in the vehicle, and a processor housed in the vehicle, coupled with the proximity sensors and the deck, operable to identify the hand gestures detected by the proximity sensors, and to control the deck in response to thus-identified hand gestures.
Driver's feeling control apparatus
A driver's feeling control apparatus which includes: a steering detection unit which detects the amount of steering operation by a driver; a seat in which the driver sits, and which has a movable part displaceable in a perpendicular direction with respect to the longitudinal direction of a vehicle, or in a yaw direction; and a control unit which determines the amount of the displacement of the movable part in response to the amount of steering operation.
Method for operating a motor vehicle and a control device for said vehicle
A method of operating a motor vehicle having a drive aggregate, a transmission and a hydraulic system. The transmission has shift elements and, for each gear, only a portion of the elements are engaged while a remainder are disengaged. The hydraulic system has main pump driven by the drive aggregate and an auxiliary pump. The method tests the functionality of the auxiliary pump. The drive aggregate and the main pump are insufficiently driven such that the shift elements can not engage. The auxiliary pump is driven to provide required pressure such that all but one of the shift elements fully engages. The remaining shift element is then first engaged up to its engagement point and then either engaged beyond its engagement point or another unengaged shift element is engaged beyond its engagement point. The functionality of the auxiliary pump is determined based on changes in the drive aggregate's rotational speed.
Vehicle collision event announcing system and method
A vehicle collision event announcing system is provided. The system includes: a processor; an image capturing unit, coupled to the processor, for capturing vehicle images from at least a part of the vehicle; a collision sensing unit, for detecting whether the vehicle is running into a probable collision event; and a feature image comparison unit, coupled to the processor, for when the collision sensing unit detects the probable collision event, comparing the vehicle images before and after the probable collision event to determine whether the probable collision event is a real collision event which causes damage to the vehicle and/or the seriousness of the damage of the real collision event.
Distinguishing between EGR valve and oxygen sensor degradation
A diagnostic method for an engine having a valve for controlling dilution of intake air. The method comprises, during engine fueling, indicating a degradation of the valve when the valve is commanded closed but sensor output corresponds to an oxygen level below that of air. The method further comprises, absent engine fueling, indicating degradation of the sensor when the valve is commanded closed but the sensor output corresponds to an oxygen level below that of air.
Fault detector and fault detection method for attitude control system of spacecraft
Provided are a fault detector and a fault detection method for an attitude control system (ACS) of a spacecraft. The fault detector includes a first interacting multiple model (IMM) fault detection block for generating a normal model filter of the plurality of actuators and a plurality of upper level filters including fault model filters corresponding to the respective actuators, and detecting faults of the plurality of actuators using an IMM estimation technique from the plurality of upper level filters, and a second IMM fault detection block for generating a plurality of lower level filters each including a fault type model filter of the fault-detected actuator in the first IMM fault detection block, and detecting a fault type of the failed actuator using the IMM estimation technique.
Electrical system health monitor (ESHM) system and method
An engine-powered vehicle includes an engine, a battery corresponding to a battery voltage, a starter, an alternator, a plurality of switchable electrical loads, a key switch configured to control the switchable electrical loads and corresponding to a key voltage, and an electrical system health monitor (ESHM) controller. The ESHM controller is configured to monitor a plurality of voltages, to determine an operating state based on the plurality of voltages, and to determine whether an operating state is a valid operating state or a fault state. The ESHM controller is configured to set a fault alert for vehicle maintenance when the operating state is a fault state and, when the operating state is a valid operating state, to monitor a predetermined set of input parameters corresponding to the operating state, to detect certain anomalies based voltage waveforms of the plurality of voltages, and to perform a corrective action based on the anomalies.
Method for operating a hybrid vehicle
A method is provided for operating a hybrid vehicle equipped with an internal-combustion engine and an electric drive for generating vehicle propulsion. The vehicle selectively is driven in a first operating mode exclusively by the electric drive or in a second operating mode is driven by the internal combustion engine and by the electric drive, or in a third operating mode is driven exclusively by the internal combustion engine. In the first operating mode, the driver predefines a desired driving torque via a selection element. The first operating mode is maintained even if the desired driving torque is greater than a maximal driving torque that can presently be supplied by the electric motor.
Air-conditioning control device for electric vehicle
A detector detects a remaining power of a battery. A calculator calculates a demand load of air-conditioning based on at least one of a preset temperature set for air in a passenger compartment of an electric vehicle and an outside temperature of air outside of the electric vehicle. A switching portion switches a mode of air-conditioning between a battery mode and an engine mode based on the calculated demand load and the detected remaining power of the battery. The battery mode causes the battery to supply electric power for air-conditioning, and the engine mode causes an engine of the electric vehicle to supply combustion energy for air-conditioning.
Vehicle, charging cable, and charging system for vehicle
In a charging system for a vehicle for charging a power storage device, including the vehicle having the power storage device, and a charging cable for transmitting electric power supplied from an external power supply outside of the vehicle to the power storage device, charging information about charging performed by a charging device is set based on a signal generated by operation of an operation switch provided on a charging connector. This configuration can improve operability during charging.
Hybrid vehicle and method of controlling the same
A hybrid vehicle is equipped with an engine and a motor generator (MG2) serving as a power source for driving the vehicle. A catalytic converter is provided in an exhaust pipe of the engine. An HV-ECU estimates a possible EV-running distance based on an SOC of a power storage device for comparison with a traveling distance (L) to a destination set by a navigation device. When the possible EV-running distance is longer than the traveling distance (L), the HV-ECU outputs a control signal (CTL2) instructing prohibition of warm-up of the catalytic converter, to an EG-ECU.
Method for demanding safety reactions for a rail vehicle
A method for demanding safety reactions for a rail vehicle having a plurality of appliances each able to demand a safety reaction when required, namely a braking process or a traction inhibit or both for the rail vehicle, includes: a) identification of a state in which one of the safety reactions should be carried out by one of the appliances, b) demanding the safety reaction by the appliance through a data bus, and c) feeding back information to the demanding appliance that the safety reaction has been carried out or intervening in a safety loop to initiate the desired safety reaction, if the safety reaction is not carried out.
Method, system, and apparatus for takeoff rotation guidance
The present invention is directed to providing takeoff rotation guidance. A takeoff rotation guidance indicator, including an aircraft reference symbol and a guidance cue, is displayed on a HUD (Head-up Display) of a HGS (Head-up Guidance System). The guidance cue is positioned in relation to the aircraft reference symbol based on a takeoff rotation pitch guidance and a takeoff rotation roll guidance. Thus, pitch and roll guidance information is simply communicated to the pilot of an aircraft. The takeoff rotation pitch guidance and the takeoff rotation roll guidance are calculated differently at different points during takeoff. In an alternative embodiment, the takeoff rotation guidance indicator includes a slip-skid symbol. The slip-skid symbol is positioned relative to aircraft reference symbol, but is displaced by the lateral acceleration of the aircraft. Thus, slip/skid guidance information is simply communicated to the pilot of an aircraft.
Systems and methods for generating a command trajectory
A system for use in generating a command trajectory for an aircraft is provided. The system includes a natural frequency determining module configured to determine a closure rate of the aircraft to a selected flight path, compare the closure rate of the aircraft to a threshold closure rate, and calculate a natural frequency based on whether the closure rate is below the threshold closure rate. The system further includes a command processor coupled to the natural frequency determining module and configured to receive the calculated natural frequency from the natural frequency determining module, and generate a command trajectory using the calculated natural frequency.
Towbarless airplane tug
In an embodiment, a towbarless airplane tug configured for receiving a landing gear of an airplane and towing the airplane thereby at an actual speed is disclosed. The towbarless airplane tug includes a chassis configured for receiving thereon at least a portion of the landing gear, and a propulsion arrangement configured to move the towbarless airplane tug in a direction along a trajectory. The towbarless airplane tug further includes a controller configured to compare between the actual speed of the towbarless airplane tug, when towing the airplane, and a predetermined desired speed thereof, and to direct the propulsion arrangement to maintain the actual speed of the towbarless airplane tug if: the actual speed is lower than the desired speed, and the actual speed was maintained within a predefined speed range during a predefined period that preceded the comparing.
Device and method for optimization of chilled water plant system operation
A demand flow device configured to interface with a chilled water plant controller to optimize performance of one or more chilled water plant components over a range of demand conditions is disclosed. The demand flow device includes a communication device configured to receive sensor data associated with the one or more chilled water plant components, wherein the sensor data measures operational variables of the chilled water plant. The demand flow device further includes a demand flow controller in communication with the communication device. The demand flow controller is configured to utilize the received sensor data to: determine an optimal pressure setpoint as a function of a desired chilled water delta T; control a chilled water flow rate through the one or more chiller water plant components as a function of the optimal pressure setpoint and the desired chilled water delta T; and adjust, via the chilled water plant controller, the optimal pressure setpoint, in response to one or more detected triggering events, to perform a critical zone reset of the desired chilled water delta T.
Multiphase electrical power construction and assignment at minimal loss
In a multiphase electrical power construction and assignment, a processor: determines a phase and voltage configuration for bi-directional power device pairs; determines a given bi-directional power device pair is to be coupled to a given phase connection based on the configuration; determines whether the given bi-directional power devices in the given bi-directional power device pair are to be coupled to each other; confirms that the given bi-directional power device pair is not coupled to any of the plurality of phase connections; couples the given bi-directional power device pair to the given phase connections, where power signals of the given bi-directional power device pair are synchronized with a power signal of the given phase connection; and in response to determining that the given bi-directional power devices are to be coupled to each other, couples each of the bi-directional power devices to a short bus.
Method and system for reducing peak load charge on utility bill using target peak load and countermeasures
A peak load management system and method take countermeasures to reduce the risk of a spike in grid power use above a target peak load due to battery exhaustion. The countermeasures replace or at least reduce the safety margins built into target peak load peak load management systems and increase the cost savings realized from peak load management.
Device for controlling an electromagnetic valve
In a device for controlling an electromagnetic valve, input device(s) write a multitude of measured values for the current and/or the voltage into a first memory to represent a characteristic. Analysis device(s) perform a state analysis and/or a change-over-time analysis. On the basis of the state analysis and/or the change-over-time analysis, evaluation device(s) correct at least one control variable, which characterizes the control, and write it into a second memory. Control device(s) control an output stage on the basis of the control variables.
Intelligent pump system
The present invention is a controller specifically for pumps, making the benefits of variable frequency drive (VFD) technology more accessible to pump users. The present invention incorporates pump-specific system optimization software, an industrial grade drive, and a menu-driven user interface, offering protection, reliability, and ease of use not possible with other variable frequency drives.
Systems and methods for structure contour control
Systems and methods provide for the controlled application of forces to a structure during assembly, machining, manufacturing, and/or transportation operations. According to embodiments described herein, a contour control system includes a number of force control modules that are communicatively linked to a control system. The control system receives or retrieves data indicating the shape of the structure and a shape associated with a desired structure, and determines if the structure is consistent with the design specifications and any associated tolerances. The control system controls the force control modules to apply calculated forces to the structure to control the contours of the structure and/or to maintain the structure in a desired configuration. According to embodiments, the force control modules include support cradles, air cushion pads, vacuum cups, and/or other structures for selectively applying dynamic and/or static forces to the structure.
Method for allowing a manipulator to cover a predetermined trajectory, and control device for carrying out said method
In a method for allowing an end effector of a robotic manipulator to travel along a predetermined path or trajectory, wherein the manipulator has a null space with respect to the predetermined trajectory with at least two manipulator positions associated with the same end effector position, a placement of the manipulator in null space is detected and, in a processor, a process variable of the end effector is automatically modified according to the detected placement.
Robot control apparatus
According to an embodiment, a target trajectory that takes into account the hardware constraints of a robot is generated, based on results obtained by calculating, temporally interpolating, and estimating image feature amounts from a captured image.
System and method for dispensing prescriptions
An automated method for dispensing pharmaceuticals particularly tablets and capsules, and other small discrete objects, includes: receiving prescription information, selecting a container, labeling the container, dispensing the tablets or capsules into the labeled container, applying a closure to the filled, labeled container, and offloading the container to a designated location. Preferably, the tablets are dispensed with high speed dispensing bins that employ forced air to agitate and singulate the tablets. The other functions within the system are typically carried out at stations designed to offer speed, flexibility and precision to the dispensing operation.
Yield prediction feedback for controlling an equipment engineering system
A yield prediction is received by a strategy engine. The strategy engine compares the end-of-line yield prediction to a plurality of rules. The strategy engine then instructs a component of an equipment engineering system to perform an action included in a rule that corresponds to the end-of-line yield prediction.
Operation and construction of electric power consuming facilities using facility models
There is a method to model large electric power consuming facilities for power system studies. A general facility model, for example a template, is created for different types of industrial or commercial facilities. A template includes all necessary and general electric system information such as the common electric network configuration of a specific type of facilities. The template, stored in a database, is then scaled and adjusted based on the power demand level of the case-specific facility to be modeled based on facility specific parameters acquired for the facility. The result is a full, case-specific model of the facility to be modeled. The case-specific model is simplified into an equivalent model with varying details according to a user's specification. The results are the case-specific facility model of interest to the user. The model is normally included into the power system model of the utility network for power system simulation studies.
Coordinated resuscitation perfusion support
This document relates to systems and techniques for the treatment of a cardiac arrest victim via electromagnetic stimulation of physiologic tissue.
Tools, systems, and methods for inserting an electrode array portion of a lead into a bodily orifice
Exemplary insertion tools, systems, and methods for inserting an electrode array portion of a lead into a bodily orifice are described herein. An exemplary insertion tool includes a handle assembly, a retractor assembly disposed at least partially within the handle assembly, and a slider assembly disposed at least partially within the handle assembly. The retractor assembly may include a stiffening member configured to be inserted into an electrode array portion and a spring-loaded retractor member coupled to the stiffening member and configured to move from a distal position to a proximal position to at least partially retract the stiffening member from the electrode array portion. The slider assembly may be configured to selectively retain the spring-loaded retractor member and further configured to release the spring-loaded retractor member to move from the distal position to the proximal position in response to actuation by a user of the slider assembly.
Embodiments of the invention generally relate to an anchor used to secure a position of a device or component relative to internal tissue of a patient and prevent migration of the component relative to the tissue of the patient. In one embodiment, the anchor is combined with an electrode lead that is configured for implantation in a patient. The electrode lead comprises a lead body having a proximal end and a distal end, a stimulating electrode and the anchor. The stimulating electrode is attached to the lead body at the distal end. The anchor is attached to the distal end of the lead body. In one embodiment, the anchor comprises a plurality of fiber loops each including a fiber having first and second ends attached to the lead body, and an intermediate portion between the first and second ends that is displaced from the lead body.
Disassemblable far infrared knee-and-foot warming device
A disassemblable far infrared knee-and-foot warming device includes a bottom plate, a top plate, a front frame, a curved plate, a plurality of screws and an opening. By operating the screws, the bottom plate, the top plate, the front frame and the curved plate can be assembled or disassembled, and the curved plate is provided with a far infrared heating plate. Thereby, the far infrared heating plate generates far infrared thermal energy, and the warming device can be easily disassembled for saving costs related to packaging, storage and transportation, and can be easily reassembled for use.
Remote health monitoring system
A data collection system collects and stores physiological data from an ambulatory patient at a high resolution and/or a high data rate (“more detailed data”) and sends a low-resolution and/or downsampled version of the data (“less detailed data”) to a remote server via a wireless network. The server automatically analyzes the less detailed data to detect an anomaly, such as an arrhythmia. A two-tiered analysis scheme is used, where the first tier is more sensitive and less specific than the second tier. If the more sensitive analysis detects or suspects the anomaly, the server signals the data collector to send more detailed data that corresponds to a time period associated with the anomaly. The more specific second tier analyses the more detailed data to verify the anomaly. The server may also store the received data and make it available to a user, such as via a graphical or tabular display.
Cochlear implant component having a unitary faceplate
A protective faceplate (37) for an implantable component of a tissue-stimulating prosthesis, such as a prosthetic hearing implant. The faceplate (37) comprising a first or outer surface and an opposed second or inner surface. The implantable component can be removably or non-removably mountable to the second surface and adapted to extend into a cavity formed in a bone of a recipient.
Combination of tonic and burst stimulations to treat neurological disorders
The present application relates to a new stimulation design which can be utilized to treat neurological conditions. The stimulation system produces a combination of burst and tonic stimulation which alters the neuronal activity of the predetermined site, thereby treating the neurological condition or disorder.
Pain modulation systems and methods
Systems and methods of conducing a conditioning modulation of pain perception are disclosed. The system includes a power source, an impulse generator, a controller and at least one electrode for the delivery of a therapeutic stimulation.
Peripheral nerve stimulation
An apparatus for treating pain by electrical stimulation is disclosed. A lead is placed subcutaneously in the region of pain. The subcutaneous tissue is electrically stimulated to cause paresthesia. The method encompasses subcutaneous placement of an electrical lead near the region of pain and subsequent electrical stimulation of the tissue to cause paresthesia. In particular, an apparatus for treating intractable occipital neuralgia using percutaneous electrostimulation techniques is disclosed.
PCB blade connector system and method
The connector between the patient electrode pads and the base unit of an automatic external defibrillator (AED) system can be formed by capturing a printed circuit board (PCB) within a connector housing. The PCB can have conductive metal traces that serve as the contact points between the wires from the patient electrodes and the electronics within the AED base unit. The PCB in combination with the conductive metal traces can be shaped similar to a conventional two-prong or two-blade connector. Employing such a PCB-based connector may result in AED pads which are less complex and less costly to manufacture. The PCB can also support a configuration circuit that is positioned between the conductive metal traces and that allows the AED to read and store information about the attached pads. For example, the AED can use this data storage feature to check the expiration date of the pads.
Implantable neurostimulator supporting trial and chronic modes
The disclosure is directed to a chronic implantable neurostimulator that supports trial and chronic modes of operation. The implantable neurostimulator can alternatively include one or more sensors that may or may not function differently in trial and chronic modes. In particular, the device is designed to be used as both a trial neurostimulator and a permanent, or chronic, neurostimulator. A trial neurostimulation period is generally desired to evaluate the efficacy of the therapy. A percutaneous or implantable trial neurostimulator is used for the trial neurostimulation period. In most cases, the trial period is successful, in which case the trial stimulator is explanted and replaced with a permanent, i.e., “chronic,” implantable stimulator. In accordance with the disclosure, an implantable neurostimulator supports both trial neurostimulation and chronic neurostimulation in the event trial stimulation is successful. In this manner, the additional surgery ordinarily required for replacement of the trial stimulator can be avoided. Instead, the implanted neurostimulation device remains implanted and is reconfigured to transition from trial stimulation to chronic stimulation.
Method of locating the tip of a central venous catheter
Methods of locating a tip of a central venous catheter (“CVC”) relative to the superior vena cava, sino-atrial node, right atrium, and/or right ventricle using electrocardiogram data. The CVC includes at least one electrode. In particular embodiments, the CVC includes two or three pairs of electrodes. Further, depending upon the embodiment implemented, one or more electrodes may be attached to the patient's skin. The voltage across the electrodes is used to generate a P wave. A reference deflection value is determined for the P wave detected when the tip is within the proximal superior vena cava. Then, the tip is advanced and a new deflection value determined. A ratio of the new and reference deflection values is used to determine a tip location. The ratio may be used to instruct a user to advance or withdraw the tip.
Apparatus, method and computer program for determining a property of a heart
The present invention relates to an apparatus for determining a property of a heart. The apparatus comprises a catheter (5), which comprises a first property sensing unit for sensing a contraction signal indicative of a reoccurring local contraction of the heart (2) at a sensing site of the heart (2). The apparatus further comprises a first property determining unit (8) for determining the reoccurring local contraction of the heart (2) at the sensing site from the sensed contraction signal as a first property of the heart (2). The reoccurring local contraction provides information about the heart (2), which can be used for a better and/or more reliable characterization of the heart (2).
Methods for detection of vulnerable plaque with quantitative colorimetry during angioscopy
Methods are provided for detecting lipid cores underneath thin fibrous caps (LCTC) and thin-cap fibroatheromas (TCFA) in a subject in need of diagnosis for having a vulnerable plaque, a plaque at risk of disruption or thrombosis, or risk of an acute coronary syndrome, and for screening compounds for modulators of this process.
Method of infrared thermography for earlier diagnosis of gastric colorectal and cervical cancer
A device and method to diagnose an internal abnormality in a living subject by sensing a passively occurring electromagnetic radiation signal associated with the abnormality and inside an orifice of the subject. Diagnosis includes detection, imaging or identification of the abnormality. An instrument is used either to bring a sensor into the orifice or to transmit the signal to a sensor located outside of the orifice. An example of the instrument includes a prior art endoscope.
Patient-readable portable cardiac monitor
Systems and devices to gather data from a subject's heart, analyze said data to determine whether the subject is experiencing cardiac arrhythmia, and display results of said determining. Use, and display of cardiac condition information, are preferably simple and unambiguous to untrained users.
Electrocardiograph with subject contact detection based on signal difference
An electrocardiograph includes first and second induction electrodes, a signal difference generation section, an electrocardiographic detection section, a signal applying section, and a contact detection section. The signal difference generation section generates a potential difference between a signal from the first induction electrode and a signal from the second induction electrode as a signal difference. The electrocardiographic detection section detects an electrocardiographic complex of a subject based on the signal difference. The signal applying section applies a first signal to the first induction electrode and a second signal to the second induction electrode. The first signal has a property different from the electrocardiographic complex. The second signal has a property different from the electrocardiographic complex and the first signal. The contact detection section detects a contact state of the subject to the first and second induction electrodes based on the signal difference.
An electroencephalographic headset includes: a supporter that includes expanding and contracting wires each having expansion and contraction properties and is to be attached to a head of a user by expansion and contraction of each of the expanding and contracting wires; and a plurality of electrodes that are provided to the supporter in defined placement.
Cortical electrode assemblies
Cortical electrode assemblies having a first flexible electrode body and a second flexible electrode body. The first electrode body may have an array of macro electrode contacts and the second electrode body may have a micro-wire electrode array or a depth electrode structure. The first electrode body has at least one aperture and the second electrode body may have a grommet-like body structure which may be positioned in predetermined thru holes of the first electrode body with respect to the electrode grid.
System and methods for processing analyte sensor data
Systems and methods for processing sensor analyte data, including initiating calibration, updating calibration, evaluating clinical acceptability of reference and sensor analyte data, and evaluating the quality of sensor calibration. During initial calibration, the analyte sensor data is evaluated over a period of time to determine stability of the sensor. The sensor may be calibrated using a calibration set of one or more matched sensor and reference analyte data pairs. The calibration may be updated after evaluating the calibration set for best calibration based on inclusion criteria with newly received reference analyte data. Fail-safe mechanisms are provided based on clinical acceptability of reference and analyte data and quality of sensor calibration. Algorithms provide for optimized prospective and retrospective analysis of estimated blood analyte data from an analyte sensor.
Analyte monitoring device and methods of use
An analyte monitor includes a sensor, a sensor control unit, and a display unit. The sensor has, for example, a substrate, a recessed channel formed in the substrate, and conductive material disposed in the recessed channel to form a working electrode. The sensor control unit typically has a housing adapted for placement on skin and is adapted to receive a portion of an electrochemical sensor. The sensor control unit also includes two or more conductive contacts disposed on the housing and configured for coupling to two or more contact pads on the sensor. A transmitter is disposed in the housing and coupled to the plurality of conductive contacts for transmitting data obtained using the sensor. The display unit has a receiver for receiving data transmitted by the transmitter of the sensor control unit and a display coupled to the receiver for displaying an indication of a level of an analyte. The analyte monitor may also be part of a drug delivery system to alter the level of the analyte based on the data obtained using the sensor.
Device for generating a detectable signal based upon concentration of at least one substance
Utilization of a contact device placed on the eye in order to detect physical and chemical parameters of the body as well as the non-invasive delivery of compounds according to these physical and chemical parameters, with signals being transmitted continuously as electromagnetic waves, radio waves, infrared and the like. One of the parameters to be detected includes non-invasive blood analysis utilizing chemical changes and chemical products that are found in the conjunctiva and in the tear film. A transensor mounted in the contact device laying on the cornea or the surface of the eye is capable of evaluating and measuring physical and chemical parameters in the eye including non-invasive blood analysis. The system utilizes eye lid motion and/or closure of the eye lid to activate a microminiature radio frequency sensitive transensor mounted in the contact device. The signal can be communicated by wires or radio telemetered to an externally placed receiver. The signal can then be processed, analyzed and stored. Several parameters can be detected including a complete non-invasive analysis of blood components, measurement of systemic and ocular blood flow, measurement of heart rate and respiratory rate, tracking operations, detection of ovulation, detection of radiation and drug effects, diagnosis of ocular and systemic disorders and the like.
A mobile terminal having a terminal body, a window attached to the terminal body, the window having first and second regions, a display module disposed at a rear side of the first region, the display module being configured to display visible information through the first region, at least one switch disposed at a rear side of the second region, the at least one switch being configured to allow inputting of information when at least part of the second region is pressed inward, and a hook member disposed at a portion of the second region, the hook member being configured to restrict upward movement of the second region, is provided.
Mobile electronic device
According to an aspect, a mobile electronic device includes: a first housing; a second housing; a hinge portion for coupling the first housing and the second housing; and a fuel cell that is mounted to at least either one of the first housing and the second housing, and that uses liquid fuel. The hinge portion has formed thereon a fuel injection port from which the liquid fuel used in the fuel cell can be externally injected.