Cleaning station for atomic force microscope
A cleaning station for thoroughly cleaning the AFM component surfaces that are exposed to fluid during imaging of a sample supported in a fluid medium is disclosed. The cleaning station is designed to selectively expose the AFM component surfaces to cleansing agents, such as soap/detergent and water, plasma cleaning, etc., and cleaning tools, such as brushes, while protecting fluid sensitive components from exposure to the cleansing agents. The preferred embodiments are particularly beneficial for scanners in which the fluid sensitive components (actuator, sensor, connector, etc.) are integrated in the same device to which the cantilever holder is attached.
Scanning probe microscope having support stage incorporating a kinematic flexure arrangement
A scanning probe microscope (SPM) has a piezoelectric actuator-based tube scanner to which a probe is attached and which is moveable in three planes by the application of a voltage to the piezoelectric tube. A set of flexures flex with the displacement of the tube and strain gauges attached to the flexures measure the flex of the flexures to provide feedback as to the displacement of the tube during the scanning of an object. The strain gauges and flexures form a kinematic sensing frame or arrangement in which a single constraint is provided for each degree of freedom and in which the constraints are at least substantially orthogonal to one another.
Methods and apparatus for secure document printing
A secure document printing system is provided. A policy server is used to define access rules for a document, and select individual users and/or groups that will have access to the document. The policy server stores the access rules along with a document decryption key. The policy server's name and address are packed in the document, and then encrypted and sent to a print server which stores it for later access. A recipient is notified that the document resides on a particular print server. The print server retrieves the specified document, contacts the policy server named in the document, and requests the document decryption key and access rules for the user, print server, and document from the policy server which replies with the related decryption key and access rules. The print server decrypts the document and prints the document based on the access rules.
System and method for authenticating code executing on computer system
A code authentication architecture is used to sign code by adding one or more digital signatures to it. The digital signatures identify what authority signed the code, what the code contains, what type of program the code is, or other identifying information. When the signed code is later executed on a computer system, its identity is obtained by accessing encrypted information of the code stored on disk. The architecture then determines whether the identity satisfies at least one requirement imposed on the code for some purpose. If the code has been altered from when it was signed or it fails to satisfy a requirement imposed, the code will not have a valid identity. In addition to verifying the identity of the code, the architecture also validates executing code immediately responsible for managing the code and additional executing code in a chain of hosts responsible for managing one another.
Content usage managing apparatus, content usage managing method and program
There is provided a content usage managing apparatus including a memory unit to store the first relation between a POP and one or more contents included in the POP and the second relation between the POPs linked via a content in a package which includes two or more POPs, a selection unit to select the first content out of contents included in the first POP of the package, a specifying unit to specify the first webpage including the first content, and an examination unit to examine whether the first POP and one or more contents included in the first POP satisfy the first relation and to examine whether the first POP and the second POP linked to the first POP via the second content satisfy the second relation on at least any one of the first webpage or one or more webpages linked to the first webpage.
Method and system for detecting when an outgoing communication contains certain content
A method and system for detecting whether an outgoing communication contains confidential information or other target information is provided. The detection system is provided with a collection of documents that contain confidential information, referred to as “confidential documents.” When the detection system is provided with an outgoing communication, it compares the content of the outgoing communication to the content of the confidential documents. If the outgoing communication contains confidential information, then the detection system may prevent the outgoing communication from being sent outside the organization. The detection system detects confidential information based on the similarity between the content of an outgoing communication and the content of confidential documents that are known to contain confidential information.
Method and system for providing a REL token
The embodiments relate to a method for providing at least one REL (Rights Expression Language) token, the REL-token or tokens being provided in a message by a MIME (Multipurpose Internet Mail Extension) protocol.
Securing stored content for trusted hosts and safe computing environments
Techniques for protecting content to ensure its use in a trusted environment are disclosed. A trusted security component provided for a device can verify the internal integrity of the stored content and the host before it allows the content to come in contact with the host. As a counter part, a trusted security component provided for the host can verify and attest to the integrity of the host and/or specific host computing environment that can be provided for the content stored in the device. The trusted security component provided for a device effectively verify the host integrity based on the information attested to by the trusted security component provided for the host. If the trusted security component trusts the host, it allows the trusted host to provide a trusted host computing environment trusted to be safe for the content stored in the device.
Detecting secure or encrypted tunneling in a computer network
A computer assisted method for detecting encrypted tunneling or proxy avoidance is presented. The method may include electronically receiving information from a proxy server, extracting information regarding a CONNECT function of Hyper Text Transport Protocol (HTTP) from the electronically received information, determining at least one destination to which the extracted information regarding the CONNECT function of HTTP corresponds and attempting to negotiate a standard HTTPS session with each of the at least one destination. Further, the computer assisted method may further include, for each of the at least one destination, determining whether the destination is hosting an encrypted tunneling or proxy avoidance application, wherein such a determining may be based on characteristics of an Secure Socket Layer (SSL) certificate associated with the destination or a response received from the destination over a TCP/IP connection.
Systems and methods for detecting malware on mobile platforms
A computer-implemented method for detecting malware on mobile platforms may include (1) identifying an application on a mobile computing platform subject to a malware evaluation, (2) transmitting the application to a security server, (3) providing emulation information to the security server, the emulation information relating to emulating the mobile computing platform, (4) receiving a result of the malware evaluation as performed by the security server, the malware evaluation including the security server using the emulation information to execute the application within an emulation of the mobile computing platform, and (5) performing a security action based on the result of the malware evaluation. Various other methods, systems, and computer-readable media are also disclosed.
System, method and computer program product for rendering data of an on-demand database service safe
In accordance with embodiments, there are provided mechanisms and methods for rendering data of an on-demand database service safe. These mechanisms and methods for rendering on-demand database service data safe can enable embodiments to alleviate any security risk that would otherwise be posed by such data. The ability of embodiments to provide such additional safety may lead to improved security in the context of an on-demand database service.
Computer system with risk-based assessment and protection against harmful user activity
A computer system is protected against harmful activity of a privileged user. A risk agent is deployed which is communicatively coupled to a risk engine, the risk engine being operative in response to queries to perform model-based risk assessments of activities and to provide responses conveying risk assessment results. The risk agent monitors computer system activity of the privileged user to detect initiation of a sensitive operation, and formulates and sends a query to the risk engine requesting risk assessment. The risk agent takes an appropriate control action based on a risk assessment result in a response to a query. The control action may be one of allowing the sensitive operation to proceed; preventing the sensitive operation from proceeding; issuing a notification that the sensitive computer operation is proceeding; and obtaining further confirmation as a condition to allowing the sensitive operation to proceed. By this method, security of the computer system is enhanced, especially against inadvertent or intentional harmful activity of a privileged user.
System for reclassification of electronic messages in a spam filtering system
A method for indicating probability of spam for email comprises tracking network traffic characteristics for the email, and comparing the tracked characteristics for the email to characteristics for email from trusted or known spam sources.
Hierarchical organization of data associated with events
Methods, data structures, systems and computer program products are provided for organizing security data. A triggering security event is hierarchically related to at least one additional security event based on a possible relationship between the triggering security event and the at least one additional security event in a computer database environment.
Use of synthetic context-based objects to secure data stores
A processor-implemented method, system, and/or computer program product secures data stores. A non-contextual data object is associated with a context object to define a synthetic context-based object. The synthetic context-based object is associated with at least one specific data store in a data structure, where the specific data store contains data that is associated with data contained in the non-contextual data object and the context object. An ambiguous request is received from a user for data related to an ambiguous subject-matter. The context of the ambiguous request from the user is determined and associated with the synthetic context-based object that is associated with said a specific data store, where that specific data store contains data related to the context of a now contextual request from the user. The user is then provided access to the specific data store while blocking access to other data stores in the data structure.
Secure session capability using public-key cryptography without access to the private key
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server. During the handshake procedure, the server receives a premaster secret that has been encrypted using a public key bound with a domain for which the client device is attempting to establish a secure session with. The server transmits the encrypted premaster secret to another server for decryption. The server receives the decrypted premaster secret and continues with the handshake procedure including generating a master secret from the decrypted premaster secret and generating one or more session keys that are used in the secure session for encrypting and decrypting communication between the client device and the server.
Multi-session secure tunnel
A method of communicating data over a network is provided. A secure tunnel may be implemented through the network between two computers. Performance limitations of the secure tunnel with a single session can be alleviated by establishing multiple sessions for the tunnel.
Real-time industrial firewall
Providing for employing a real time firewall to secure components of an automation control network from unauthorized communication to or from such components is disclosed herein. A monitoring component can inspect at least a portion of an instance of communication directed toward or originating from a component of the automation control network. Such inspection can, e.g., be a deep packet inspection based on information received from a communication request and/or response protocol. A filtering component can selectively admit or deny propagation of the instance of communication based on the inspection and a predetermined security criterion. In such a manner, the subject innovation can provide for limited access to network components from office network machines and for securing components of an automation control network from influence by unauthorized entities.
Systems and methods for managing security during a divestiture
Methods and systems for managing security during a divestiture may involve, for example, differentiating divested assets and employees from non-divested assets and employees and identifying non-divested assets which divested employees are permitted to access. In addition, divested employee access to the non-divested assets which divested employees are not permitted to access is locked down, and a separation firewall is deployed between divested networks and non-divested networks.
Upgradable security module
The aim of the present invention is to provide a security module capable of supporting the different functions of the latest and the previous generations, by avoiding any possible attack due to this adaptability. This aim is attained by a security module comprising first communication means to a host device, first storage means and first decryption means, characterized in that it includes a state module and second communication means and physical activation or deactivation means of said second means, such activation or deactivation being managed by the state module.
Building data security in a networked computing environment
In general, embodiments of the present invention provide an approach for providing a multi-tenant/customer partition group separator and securer in a shared cloud infrastructure (e.g., as an extension to DB2®, Label-Based Access Control (LBAC), and/or an independent tool). Among other things, embodiments of the present invention provide cloud administrators with an easy to use customizable, configurable security constraint builder/tool with a built-in multi-tenant/customer enabled security model. Moreover, embodiments of the present invention enable cloud administrators to set up, configure, and manage tenants/customers and their private shards with their own security constraints. The output of this tool greatly eases the time to create an invisible (e.g., software) wall of separation for multiple tenants/customers in a shared cloud infrastructure.
Generating authentication challenges based on preferences of a user's contacts
Generating user authentication challenges based in part on preferences of one or more contacts of a user includes receiving an authentication request from a user. One or more contacts of the user associated with the authentication request are determined. One or more preferences of the close contact or contacts are determined. An authentication challenge based on the one or more preferences of one or more of the user's contacts is generated. The authentication request is allowed or denied based on the completion on the authentication challenge.
Identification and access control of users in a disconnected mode environment
The present invention provides identification and access control for an end user mobile device in a disconnected mode environment, which refers generally to the situation where, in a mobile environment, a mobile device is disconnected from or otherwise unable to connect to a wireless network. The inventive method provides the mobile device with a “long term” token, which is obtained from an identity provider coupled to the network. The token may be valid for a given time period. During that time period, the mobile device can enter a disconnected mode but still obtain a mobile device-aided function (e.g., access to a resource) by presenting for authentication the long term token. Upon a given occurrence (e.g., loss of or theft of the mobile device) the long term token is canceled to restrict unauthorized further use of the mobile device in disconnected mode.
Systems and methods for selecting an authentication virtual server from a plurality of virtual servers
The present invention provides a system and method for dynamically selecting an authentication virtual server from a plurality of authentication virtual servers. A traffic management virtual server may determine from a request received from a client to access content of a server that the client has not been authenticated. The traffic management virtual server can identify a policy for selecting an authentication virtual server to provide authentication of the client. Responsive to the identification, the traffic management virtual server can select, via the policy, an authentication virtual server of the plurality of authentication virtual servers to authenticate the client. Responsive to the request, the traffic management virtual server may transmit a response to the client The response includes an instruction to redirect to the selected authentication virtual server.
Online service access controls using scale out directory features
Embodiments provide application and/or resource access control features of an online computing environment, but are not so limited. In an embodiment, a computer-implemented method provides access control features for an online application environment based in part on the use of a number of directory service instances isolated from direct customer access and deployed in a defined datacenter architecture. In one embodiment, a computing environment uses web-based access control features and a number of directory service instances having organizational units and corresponding mappings to maintain a support infrastructure as part of providing features of online application services to customers. Other embodiments are included and available.
Detection of unauthorized wireless access points
A public wireless network has authorized wireless access points through which users connect to the network. A system for detecting the unauthorized access points comprises a monitoring client simulating a user and detecting available access points. The system further comprises an authentication server that maintains a configuration file with an identifier associated with each authorized access point. The system is adapted to compare the identity of any available access point(s) to those maintained by the authentication server to detect unauthorized access points.
Managing API authorization
Multiple variants of an API can coexist through API management by using metadata in a pre-processing and post-processing system to weed out requests to which a client does not have permission and return parameters that do not belong with the API request variant. Metadata is added to request objects such that an instance of a request object may be examined to determine a request handler to properly inspect the request object and recommend further processing or rejection of the instance. Metadata may also be added to a response object created as a result of processing the request object such that a response handler may be identified to ensure the fields match the proper response to the request object. The API may be dynamically managed at the point of request and also at the point of return rather than a statically coded whitelist checked multiple times within the code itself.
Communication apparatus, authentication apparatus, communication method and authentication method
A communication apparatus transmits an authentication frame to an authentication apparatus and receives a response frame for response to the authentication frame from the authentication apparatus so that an authentication process is performed for the communication apparatus by the authentication apparatus. In the communication apparatus, a transmitting section transmits an authentication frame to the authentication apparatus using a multicast address as a transmission destination address, and if a reception determining section determines that the response frame is not received from the authentication apparatus, a transmission destination address changing section changes the transmission destination address from the multicast address to a broadcast address, and the transmitting section transmits the authentication frame that has the transmission destination address changed to the broadcast address to the authentication apparatus.
Method and system for updating an interaction document
User interactions with an interactive media program are defined by an interaction document, such as a SMIL document, that may be downloaded by a user before playing or viewing of the associated media program. In the case of live events that are recorded by the user for later viewing, the interactions that may have taken place during the original scheduled broadcast of the event may no longer be valid. In this case, a method and apparatus is provided to allow the user downloading an interaction document for a media program to receive updated versions of the interaction document that can be used when viewing a recording of the media program. In one exemplary embodiment, the media playback system sends a request for an interaction document to an interaction document server responsive to the recording of the interactive media program. The interaction document server may send the updated interaction document to the media playback system responsive to the request if one is available.
Method for signalling time-slicing parameters in the service information
A terrestrial digital video broadcasting (DVB-T) network is used to transmit IP datagrams to receiving devices using multiprotocol encapsulation (MPE). MPE datagram sections and, if forward error correction (FEC) is used, MPE-FEC datagram sections are transmitted in time-sliced bursts. Time slicing parameters specifying a minimum time between bursts and bit rate output of a receiving device time slicing buffer can be used to help improve power saving and improve quality of service.
Hybrid all digital fiber to CATV cable system and method
Producing advanced HFC CATV cable systems while easing the burden of backward compatibility. The system improves CATV data carrying capacity by moving RF QAM modulators from the cable head end to various individually or group addressed optical fiber nodes supplying neighborhood CATV cables, and sending data from the cable head IP backbone to the nodes over optical fiber as IP data packets. For high backward compatibility, the system digitizes legacy RF waveforms, or demodulates legacy QAM waveforms to QAM symbols, also transmits these over the optical fiber as IP data packets, and then reconstitutes back to original waveforms as needed. The system is thus able to easily handle legacy NTSC, FM, QPSK waveforms and do partial (QAM symbol level) compression of legacy QAM waveforms to and from multiple nodes without requiring additional optical fiber wavelengths. The system may use non-standard upstream/downstream CATV frequency splits, filter bank receivers, and FPGA/DSP/ASIC methods.
Closed captions for live streams
Systems and methods of processing closed captions for live streams are disclosed. For example, a media server may receive closed captioning data associated with a live video stream, where the closed captioning data is represented in a first format. The media server may convert the closed captioning data from the first format to a platform-independent format and convert the closed captioning data from the platform-independent format to a second format. The media server may transmit the closed captioning data in the second format to a destination device.
Infrastructure for interactive television applications
Methods and apparatuses for selectively displaying a video program are disclosed. A system for selectively displaying a video program in accordance with the present invention comprises a transmission station, including a server for attaching information to the video program, a plurality of satellites receiving at least an uplink signal which includes the information and the video program from the transmission station and producing a downlink signal based on the uplink signal, an antenna, the antenna receiving the downlink signal, and at least one receiver, coupled to the antenna, for receiving the downlink signal and interpreting the information in the downlink signal, wherein the at least one receiver selectively displays the video program based on at least the interpreted information.
Mobile terminal, television receiver, and communication system including the mobile terminal and the television receiver
According to one embodiment, a communication system includes a transmitter and a switch. The transmitter transmits, to a television receiver, an address used to access a server on a network used by a mobile terminal. The switch automatically switches, after the address is transmitted, the display of the mobile terminal to an operation display that displays an operation element suitable for the operation state of the television receiver.
Entertainment system with network of docking stations
An entertainment system comprising a media server networked with a plurality of docking stations is presented. The media server and docking stations can be networked together into a looped daisy-chained network to provide for content distribution to docked media players. The looped daisy-chained network retains connectivity or continuity when media players are undocked or when a connection is broken. In preferred embodiments, the entertainment system can be deployed within an aircraft as an in-flight entertainment system.
Systems and methods for encoding multimedia content
An interactive video/multimedia application (IVM application) may specify one or more media assets for playback. The IVM application may define the rendering, composition, and interactivity of one or more the assets, such as video. Video multimedia application data (IVMA data may) be used to define the behavior of the IVM application. The IVMA data may be embodied as a standalone file in a text or binary, compressed format. Alternatively, the IVMA data may be embedded within other media content. A video asset used in the IVM application may include embedded, content-aware metadata that is tightly coupled to the asset. The IVM application may reference the content-aware metadata embedded within the asset to define the rendering and composition of application display elements and user-interactivity features. The interactive video/multimedia application (defined by the video and multimedia application data) may be presented to a viewer in a player application.
Satellite television network and near real-time method for downloading and verifying a subscriber remote record request
Near real time downloading and verifying of a subscriber's remote record request is provided to control a DVR using the existing satellite network. The insertion of the programming request into the continuous broadcast stream enables near real time processing of the request by a subscriber IRD to accommodate same day and even last minute remote programming requests. The use of a back channel to verify the request provides the subscriber with assurance that the request has been processed successfully and flexibility to change services on the fly.
Differentiated PSIP table update interval technology
An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT.
Information descriptor and extended information descriptor data structures for digital television signals
According to an aspect, there is provided a digital television (DTV) data stream including program and system information protocol (PSIP) data associated with content of the DTV data stream, the PSIP data including a virtual channel table (VCT) and an event information table (EIT), the EIT comprising: a source identification field identifying a source of an associated event in a DTV data stream; an event identification field indicating an identification of the event; a start time field indicating a star time of the event; a title field indicating a title of the event; and a descriptor comprising: a descriptor tag identifying the descriptor as a genre descriptor; a descriptor length indicating a total length of the descriptor; and at least one category code for an associated event in a DTV data stream, each category code specifying genre, program type, or category information of the associated event, wherein the at least one category code specifies at least one of a set of basic categories.
Program guide interface systems and methods
Exemplary program guide interface systems and methods are disclosed herein. An exemplary method includes a mobile device presenting a program guide interface by way of a touch screen, detecting a pinch gesture provided in relation to the program guide interface, and presenting, in response to the pinch gesture, a plurality of graphical objects representative of a plurality of media programming channel groups. Corresponding methods, systems, and devices are also disclosed.
System and method for providing improved channel mapping
Improved channel mapping is provided wherein both virtual channel information associated with the currently-tuned channel, as well as physical channel information associated with this same channel is added to a television system's channel map. User inconvenience associated with errors in the virtual channel information may be mitigated since the television system's channel map will contain, not only the standard virtual channel information provided by broadcast stations in their broadcast signals, but also the corresponding physical channel information for the broadcast station in question. In other embodiments, multiple channel maps may be maintained and be user-selectable.
The present disclosure includes a system and methods for providing advertising. In some implementations, a method includes associating a plurality of ad spaces of at least two different types as a unit. The unit is offered to one or more advertisers for purchase.
Method and apparatus for recommending media programs
A method, system, and computer program product provide the ability to recommend, to a first viewer, alternative programming during playback of a first media program. The first media program is played. A second media program of potential interest to the user is identified. During an advertising break, an interface is presented to the user that identifies the second media program. An indication of interest in the second media program is received from the user. If the indication indicates that the user is interested in the second media program, a reference to the second media program is saved as a viewer recommendation for later playback. If not interested, additional input may be received from the user indicating why the user is not interested.
Time shifted targeted advertisements based upon user profiles
Methods and systems for time shifting advertising to provide enhanced advertisement targeting are presented. An exemplary method of time shifting advertising of a video service comprises generating a private profile based upon a private play history of a receiver and receiving one or more predetermined advertisements, each of the one or more advertisements including meta data. The profile can be generated by a profiler within a receiver unit. The predetermined advertisements are selected and stored based upon the meta data and the private profile. A program is received and a targeted advertisement is selected from the subset of the predetermined advertisements based upon the meta data and the private profile and played with the program. Management of the advertisements (e.g. selecting and storing predetermined advertisements and selecting targeted advertisements) can be facilitated by an advertisement controller within the receiver.
Multi-platform digital television
A multi-platform television comprises at least one television signal interface to receive premium television services from at least two different television service providers. The television further comprises a programmable conditional access system to enable conditional access to the premium television services received by the at least one television signal interface from the at least two different service providers.
Method for generating a favorite channel list and related device thereof
A method for generating a favorite channel list, where a device for generating the favorite channel list includes a receiver and a processor, is disclosed. The method includes receiving a signal of a first channel of a television signal by the receiver; clearing channels stored in the favorite channel list by the processor before the receiver receives the television signal according to the television signal; and adding the first channel to the favorite channel list by the processor when the signal of the first channel is switched from a first program to an advertisement.
Method and device for collecting audience information
Various embodiments provide a method for collecting audience information of a group of users in an audience measurement. The method may include each user dividing its private information into a private portion and a predetermined number of exchange portions; each user transmitting each of its exchange portions to a respective user of the predetermined number of users selected from the group of users; each user aggregating its private portion and exchange portions received from other users of the group of users, thereby producing randomized information; and aggregating the randomized information of the group of users, thereby producing aggregated private information for the group of users.
Detecting periodic activity patterns
A method of detecting periodic activity patterns associated with the viewing of audio video content is described. The method includes: recording activity data in an activity log; suppressing the activity log one or more times to suppress non-relevant activity data thereby producing one or more sets of suppressed activity data; passing the one or more sets of suppressed activity data through a signal processing function to convert the one or more sets of suppressed activity data to one or more frequency responses; and analyzing the one or more frequency responses to detect the periodic activity patterns. Related apparatus and methods are also described.
A disc device which takes out a disc stored in a magazine and conveys the disc to any disc drive, in which the magazine comprises a tray which stores a plurality of discs, and a case which has a substantially rectangular parallelepiped shape and which stores the tray. The case has an opening at front face into which the tray can be inserted into or taken out therefrom. The tray has an outer shape being substantially rectangular in planar view. The tray is provided with cut portions formed at corner portions positioned on the back side of the case being cut off. The disc device further comprises a picker which holds the tray and draws out the tray from the case. The picker rotates the tray when the cut portion passes through the opening.
System and method for communication between portal applications and portlet containers
This disclosure provides various embodiments for providing a communication layer between a portal application and a separate and independent portlet container. In one embodiment, a computer program product comprising computer readable instructions is operable when executed to expose an application programming interfaces (APIs) associated with methods permitting a portal application to invoke a portlet via the portlet container, where the portlet is run inside the portlet container. The computer program product exposes one or more service provider interfaces (SPIs) providing services implemented and used by the portlet container to obtain information about the portlet to be invoked. The computer program product further exposes an interface providing methods facilitating communications between the portal application and the portlet container during runtime of the portal application. The portal application running in combination with the portlet container implements the API, SPI, and interface during the portal application's runtime to allow for portal execution.
Control apparatus, control method, and recording medium
A control apparatus, a control method and a computer program are provided that are capable of shortening the developmental process and reducing the developmental load by enabling control that flexibly handles various required specifications and improving the reusability of programs. Functions implemented in an application layer and a platform layer are implemented by constructing a function framework which is an aggregate of components that implement detailed functions related with attributes such as a function or a role. The attribute information may be provided in a plurality of pieces, and when a function framework is constructed, a function framework conforming to various specifications can be constructed according to the selection of the attribute information.
Event processing using existing computer event capture modules
Embodiments disclosed herein provide systems and methods for processing events using existing computer event capture modules. In a particular embodiment, a method provides a primary event module communicating with an operating system to detect application events generated by user input and processing the application events to determine if a primary event has occurred. The method further provides a secondary event module communicating with the primary event module to obtain an indication of the application events detected by the primary event module and processing the application events to determine if a secondary event has occurred.
Methods and platforms for highly available execution of component software
A method for executing component-based software includes creating a first relation between a first identifier identifying a first software component and an interface for a first container created for the first component, starting a second component defined as a substitution component for the first component when a replacement condition is met, creating a second relation between a second identifier identifying the second component and an interface for a second container created for the second component when starting the second component, changing the first identifier to the second identifier in the first relation and the second identifier to the first identifier in the second relation when starting the second component, using the first component to process requests to the first component received prior to completion of starting the second component, and using the second component to execute requests to the first component newly received after completion of starting the second component.
Computing system and job allocation method
A computing system includes a plurality of computing apparatuses, a job allocation information storage unit, a position information storage unit, and a job allocation unit. The job allocation information storage stores job allocation information indicating job allocation status of each of the plurality of computing apparatuses. The job allocation status is one of in an active state and in an inactive state. The position information storage unit stores position information indicating relative positions of the plurality of computing apparatuses. The job allocation unit refers to the job allocation information and the position information, selects a candidate inactive computing apparatus on the basis of a distance between each pair of an inactive computing apparatus and an active computing apparatus, and allocates a job to the candidate inactive computing apparatus.
Real-time scheduling of task sets and determination of task sets based on verified weight, cache hit radio of the tasks and available processing cores
A central processing unit (CPU) and a real-time scheduling method applicable in the CPU are disclosed. The CPU may determine a first task set and a second task set from among assigned tasks, schedule the determined first task set in a single core to enable the task to be processed, and schedule the determined second task set in a multi-core to enable the task to be processed.
Information processing system and related method thereof
An information processing system includes a first electronic device, a second electronic device and a processing module. The first electronic device processes a first task. The second electronic device processes a second task. The processing module, controls, without utilizing an operating system, the second electronic device to process the second task for a first specific time period during which the first electronic device does not process the first task which was being processed before the first specific time period.
Automatic load balancing for heterogeneous cores
A system and method for efficient automatic scheduling of the execution of work units between multiple heterogeneous processor cores. A processing node includes a first processor core with a general-purpose micro-architecture and a second processor core with a single instruction multiple data micro-architecture. A computer program comprises one or more compute kernels, or function calls. A compiler computes pre-runtime information of the given function call. A runtime scheduler produces one or more work units by matching each of the one or more kernels with an associated record of data. The scheduler assigns work units either to the first or to the second processor core based at least in part on the computed pre-runtime information. In addition, the scheduler is able to change an original assignment for a waiting work unit based on dynamic runtime behavior of other work units corresponding to a same kernel as the waiting work unit.
Tuning of work to meet performance goal
Techniques are provided for tuning work. In response to identifying a trigger for a work, automatic tuning is invoked. The trigger indicates that a performance goal for the work has been missed. The work is analyzed. A tuning operation is selected for the work based on a tuning history. The selected tuning operation is implemented for the work.
Virtual image overloading for solution deployment
At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.
Reconfiguration of computer system to allow application installation
A method and apparatus for installing an application on a computer are disclosed. Following receipt of a request to install an application, a software state, comprising the new application and several of the applications installed on the computer, is derived. Then, the method determines whether the software state can be implemented on the computer. If the software state cannot be implemented on the computer, then the method derives another software state. This is repeated until the derived software state can be implemented on the computer system, or until determining that no software state exists which can be implemented on the computer system.
Associating program execution sequences with performance counter events
Software performance may be improved by collecting and correlating performance counter events and program execution state information. On each successive callback of performance counter data, a statistical exponential moving average association matrix may be updated until particular performance counter events and program execution states may be correlated.
Partitioning operator flow graphs
Techniques for partitioning an operator flow graph are provided. The techniques include receiving source code for a stream processing application, wherein the source code comprises an operator flow graph, wherein the operator flow graph comprises a plurality of operators, receiving profiling data associated with the plurality of operators and one or more processing requirements of the operators, defining a candidate partition as a coalescing of one or more of the operators into one or more sets of processing elements (PEs), using the profiling data to create one or more candidate partitions of the processing elements, using the one or more candidate partitions to choose a desired partitioning of the operator flow graph, and compiling the source code into an executable code based on the desired partitioning.
Search suggestions for static code analysis
Embodiments of the present invention provide a method, system and computer program product for heuristically generated suggestions in static code analysis. In an embodiment of the invention, a method for heuristically suggesting an asset transition in a code analysis tool can include receiving from an end user a request to select an asset of a computer program subject to static code analysis by a code analysis tool and selecting in response and contemporaneously to the request, an asset from amongst many assets during static code analysis of a computer program in a code analysis tool. The method further can include determining a set of assets amongst the many assets historically selected by other users of the code analysis tool during static code analysis subsequent to a selection of the contemporaneously selected asset. Finally, the method can include displaying to the end user a suggestion of a next asset for selection that had been frequently selected by the other users of the code analysis tool during static code analysis of the assets of the computer program subsequent to a selection of the contemporaneously selected asset.
Profiler for executing computer program
A technique for comprehensively acquiring calling-context information at a low cost. Call site IDs are held for each thread as a call history and used as context information. At the time of calling a method, the call history existing in a current frame is shifted left, and stacked in a new frame, with the call site ID of the call site put in the lower bits. At the time of returning from the method, the value of the original call history is returned by returning the frame. At the time of performing a virtual call, call history information is recorded into a call position profile table used to identify a method to be inlined at the time of performing JIT compiling, in addition to determined jump destination information and the number of calls.
Dynamic arrays and overlays with bounds policies
Systems and methods are provided for writing code to access data arrays. One aspect provides a method of accessing a memory array. Data is provided within a one-dimensional array of allocated memory. A dimensional dynamic overlay is declared from within a block of statements, and the declaration initializes various attributes within an array attribute storage object. The data is accessed from within the block of statements as a dimensional indexed array using the array attribute storage object. Another aspect provides a method of creating and accessing a dimensional dynamic array. A dimensional dynamic array is declared from within a block of statements, and memory storage for the array is dynamically allocated. A dynamic overlay storage object is also provided and its attributes are initialized from the dynamic array declaration. The data is accessed as a dimensional indexed array from within the block of statements using the array attribute storage object.
Processing reified generics in object-based programming environments
A system processes a reified generic. The system includes a memory device to store programming code in a first language, the programming code including a definition and an invocation of an interface method. The system also includes a processor to translate the programming code from the first language to a second language, generate a definition of a general dispatch method, generate definitions of special dispatch methods, each of the special dispatch methods corresponding to each primitive return type of the interface method, and generate an invocation of either the general dispatch method or one of the special dispatch methods based on a return type of the interface method.
Apparatus and method for translating open vector graphic application program interface
Provided are an apparatus and method for OpenVG API translation, a mobile terminal comprising the translation apparatus, and a record medium storing the translation program. The apparatus comprises a data parsing unit, an OpenVG API script creating unit, and a raster image data output unit. The data parsing unit parses SVG format data depending on a data attribute. The OpenVG API script creating unit extracts an OpenVG API format syntax and creates an OpenVG API script. The raster image data output unit creates and outputs raster image data associated with the created OpenVG API script.
System, method, and computer program product for simulating at least one of a virtual environment and a debugging environment to prevent unwanted code from executing
A system, method, and computer program product are provided for simulating at least one of a virtual environment and a debugging environment to prevent unwanted code from executing. In use, at least one of a virtual environment and a debugging environment is simulated. Additionally, unwanted code is prevented from executing as a result of the simulation.
Failsafe mechanism for dynamic instrumentation of software using callbacks
A failsafe mechanism for installing and removing temporary instrumentation during a runtime of an application. Initially, an application is configured with a baseline set of instrumented components such as methods. Additional instrumentation is then deployed in the application, such as to diagnose a performance problem. The failsafe mechanism ensures that the additional instrumentation is automatically removed, even when there is an interruption in a communication link to the application, a computing device failure, a software failure, or some other type of failure, which renders it impossible to manually roll back the instrumentation from a remote user interface. The failsafe mechanism can be provided using callbacks between the computing devices which detect when a connection is unexpectedly lost or closed. Termination of one callback can cascade to one or more other callbacks. The instrumentation rollback can involve reloading un-instrumented byte code of the application.
System and method of identifying and tracking software pattern metrics
This disclosure relates to software patterns, and more particularly, to the tracking of software pattern metrics. A system or method may query a software environment to determine the type of use of, and identify, at least one software pattern. The system or method may also collect at least one software pattern metric, and determine the impact of the at least one software pattern within an environment. The system or method may also store software pattern information and recall software pattern information.
Contract failure behavior with escalation policy
An error handling system is described herein that provides a facility for controlling the behavior of software when the software violates a contract condition. The system provides configurable runtime behavior that takes place when a contract fails. The error handling system provides an event that a hosting application or other software code can register to handle and that the system invokes upon detecting a contract failure. The application's response to the event determines how the system handles the failure. If the event is unhandled, the system triggers an escalation policy that allows an administrator or application to specify how the system handles contract failures. Thus, the error handling system provides increased control over the handling of contract failures within software code.
Methods and systems for presenting different versions of an application
Methods and systems for presenting different versions of an application are described. In one example, a selection of a version of application code is received. Such a selection may include a simultaneous selection of all versions. Information about the selected version is retrieved. A description of features contained within the selected version is presented and then a version summary for each listed feature is displayed, together with the description of features, to indicate the versions of the application code that contain the respective feature.
Standardized configuration checklists for software development
Implementations of the present disclosure include methods for generating a configuration checklist template. In some implementations, methods include retrieving one or more source code files, each of the one or more source code files corresponding to a software product, scanning the one or more source code files to generate one or more configuration check building blocks, receiving first user input, processing the one or more configuration check building blocks and the first user input to generate one or more check definitions, receiving second user input, processing the one or more check definitions and the second user input to generate the configuration checklist template, electronically storing the configuration checklist template, and transmitting the configuration checklist template to one or more computing devices associated with a customer entity over a network.
System and method for executing temporary processing agents
A method and system for managing temporary processing agents. Second executable code is selectively loaded into an empty routine which converts the empty routine to a populated routine in a first space. A super agent includes first agent code that includes first executable code, third agent code that includes third executable code and is located contiguous to the first agent code within a contiguous space within the super agent, and the empty routine consisting of non-executable code in the first space within the super agent external to the contiguous space.
Multi-mode editor for configuring process control blocks including both logical functions and arithmetic computations
A multi-editing mode LOGIC BLOCK object editor is disclosed for creating and modifying LOGIC BLOCK objects that are incorporated into control strategies for process control systems (both distributed and discrete). The editor includes an RPN text editing mode wherein logic incorporated into a LOGIC BLOCK is represented by a list of text instructions. The editor also includes a graphical function block diagram editing mode wherein LOGIC BLOCK logic is defined via instruction shapes dragged/dropped from a pallet and connected via GUI line connection actions by a user. The editor supports automated transitioning between the text and graphics modes wherein conversion of text-to-graphics and graphics-to-text is performed without user intervention. Furthermore, synchronization procedures are performed when LOGIC BLOCK objects are opened in the editor and when transitioning between editing modes to track and/or maintain synchronous status between graphical and text representations of LOGIC BLOCK logic.
Method for structuring a function plan into function plan sections
A method is disclosed for structuring a function plan into function plan sections. The function plan includes function modules. Individual function modules are connected to at least one other function module of at least one function module connection. If the function plan exceeds the predefined area of the function plan section, a first determination of the arising function module external connections in an assignment of the individual function modules to the individual function plan sections occurs for each function plan variant, and the individual function modules are assigned to the function plan sections according to the function plan variant having the least possible number of function module external connections.
Soft pin insertion during physical design
A netlist for an integrated circuit design is constrained by virtual or “soft” pins to control or stabilize the placement of logic such as an architectural logic path. One soft pin is inserted at a fixed location proximate an input net of the path and is interconnected with the input net, and another is inserted at a fixed location proximate the output net and is interconnected with the output net. Cell placement is then optimized while maintaining the virtual pins at their fixed locations. More than two virtual pins may be inserted to bound a cluster of logic. The virtual pins may lie along the input/output nets. Pseudo-net weights are assigned to pseudo-nets formed between a cell and the virtual pins, and the pseudo-net weight can be increased for each placement iteration.
Multiple level spine routing
A computer implemented method for routing a net includes generating, using one or more computer systems, a first wire associated with the net in accordance with data associated with the net including a multitude of pins and partitioning, using the one or more computer systems, the multitude of pins into at least a first group of pins in accordance with a first cost function. The method further includes connecting, using the one or more computer systems, a second wire associated with the first group of pins to the first wire, and connecting, using the one or more computer systems, a third wire from a pin of the first group of pins to the second wire.
Systems and methods for generating a higher level description of a circuit design based on connectivity strengths
Provided are systems and methods for generating a higher level description of a circuit design comprising a plurality of interface instances. One or more buckets for each source instance with respect to each destination instance included in the circuit design are generated, and then the one or more buckets are sorted based on a number of bucket entries in each bucket. One or more interface instances are generated based on the sorted buckets. The higher level description of the circuit design is generated based on the one or more interface instances.
Method, system, and program product for routing an integrated circuit to be manufactured by doubled patterning
Disclosed are a method, apparatus, and program product for routing an electronic design using double patterning that is correct by construction. The layout that has been routed will by construction be designed to allow successful manufacturing with double patterning, since the router will not allow a routing configuration in the layout that cannot be successfully manufactured with double patterning.
Generating interface adjustment signals in a device-to-device interconnection system
Described are a system and method to control interface timing and/or voltage operations of signals transmitted between devices. A processor may be coupled through one or more bus interfaces of a bus to one or more corresponding interface timing and/or voltage comparison circuits and corresponding interface timing and/or voltage adjustment circuits.
Method, apparatus, and article of manufacture for providing in situ, customizable information in designing electronic circuits with electrical awareness
Disclosed are a method, system, and computer program product for providing customizable information in designing electronic circuits with electrical awareness. The method or the system displays a portion of a physical design of an electronic circuit in a first display area. The method or the system receives or identifies a user's or a system's manipulation of the portion of the physical design of the electronic circuit. The method or the system then determines and displays an in situ response to the manipulation in the first display area. The method or the system may further display, in the first display area or in another display area, result(s) relating to the physical data of a component, electrical parasitic(s) associated with the physical data, electrical characteristic(s) associated with the physical data or the electrical characteristic(s), or other element(s) of the physical design that is impacted by the manipulation.
System for simplifying layout processing
A system and method for integrated circuit design are disclosed to enhance manufacturability of circuit layouts by applying layout processing to handle imperfections such as jogs in integrated circuit design layouts. The layout processing may be applied to jogs in the original integrated circuit design layout or jogs created post-design by process biases, as well as design rule check and Boolean processes or process compensation.
Methods, systems, and articles of manufacture for implementing a physical electronic circuit design with multiple-patterning techniques
Various embodiments identify some constraints for multiple mask designs of multi-patterning lithography processes for manufacturing an electronic design and colors multiple routing tracks in a layer of the electronic design with certain colors. These embodiments color fixed object(s) in the design with one or more of these certain colors based on coloring of the multiple routing tracks. Some embodiments further color movable object(s) based on results of coloring the fixed object(s) or coloring routing track(s). Some embodiments route the physical design with coloring of fixed object(s), coloring of movable object(s), or routing connectivity. Multiple-patterning conflicts may be detected based on the coloring of fixed object(s), coloring of movable object(s), or routing connectivity. Some embodiments route with search-and-repair strategy(ies) to improve or resolve conflict(s). Some embodiments color objects upon their creation, and the layout is thus multiple-patterning design rule clean as constructed.
Gesture recognizer system architecture
Systems, methods and computer readable media are disclosed for a gesture recognizer system architecture. A recognizer engine is provided, which receives user motion data and provides that data to a plurality of filters. A filter corresponds to a gesture, that may then be tuned by an application receiving information from the gesture recognizer so that the specific parameters of the gesture—such as an arm acceleration for a throwing gesture—may be set on a per-application level, or multiple times within a single application. Each filter may output to an application using it a confidence level that the corresponding gesture occurred, as well as further details about the user motion data.
Using gestures to schedule and manage meetings
Techniques and configurations for an apparatus are provided for creating and managing meetings using gestures. Movements of a user's hand in a three-dimensional space are detected. The hand movements in the three-dimensional space are interpreted to identify a gesture intended by the user to set up or manage a meeting among a plurality of persons. An electronic command is generated from the detected gesture to set up or manage the meeting.
Ordered multiple selection user interface
Techniques and mechanisms providing a visual indication of ordinal ranks of objects in an ordered list. When an object is selected for the ordered list, an ordinal rank for the object within the ordered list is determined and a visual indication of the ordinal rank is rendered to a user interface.
Context menu dependency on many objects of different type
A computer implemented method is represented for providing to a user a context menu with entries representing relationships. The relationships are applicable to relate objects selected from a set of objects. The method comprises following method operations: receiving a first identification of a first selected object from the set of objects, receiving a second identification of a second selected object from the set of objects, identifying object types of the selected objects in a plurality of object types, determining one or more relationship types of which one or more relationships are applicable to the selected objects by using the identified object types, and generating for the context menu an entry representing a relationship of the one or more relationship types, wherein the relationship is selectable by the user to be created between the selected objects.
Active overlay system and method for accessing and manipulating imaging displays
The present invention is directed in general to imaging technologies and more particularly to medical imaging and picture archiving and communication systems (PACS) having an image display wherein system features and functions are provided to a user via active overlays located over displayed images. A system and method are provided to imbed an ability to interact with an image by activating traditional annotations that are displayed in conjunction with an image in a PACS. Users are able to access program functionalities in an improved, quicker, accurate and more intuitive means. More specifically, the present invention relates to providing the capability to customize multiple context menus, and flatten the command hierarchy of an imaging system. The present invention also provides the ability to “overload” current text and graphic annotations that are already displayed within an image of interest.
Adjusting margins in book page images
A user interface (e.g., a browser window) includes a display area for displaying an image (e.g., a book page image). The image can be rescaled based on the dimensions of the display area and other factors. In some implementations, margins in book page images are adjusted to create additional or less display area.
Incremental feature-based gesture-keyboard decoding
In one example, a method includes outputting, at a presence-sensitive display operatively coupled to a computing device, a graphical keyboard comprising a plurality of keys and receiving an indication of a gesture to select a group of keys of the plurality of keys. The method may further include determining, in response to the indication, a candidate word based at least in part on the group of keys. The method may further include determining a group of alignment points traversed by the gesture and respective cost values for each of at least two keys of the plurality of keys. The method may further include comparing the respective cost values for at least each of at least two keys of the plurality of keys to determine a combination of keys having a combined cost value and outputting the candidate word that is based on the respective cost values.
Configurable building control system display
A system and method for displaying information on a display of a building control system. In one illustrative embodiment, a display controller is provided that includes a configuration mechanism for configuring the information that is to be displayed on the display. The configuration mechanism may include one or more user definable object description reference strings that include tokens that identify which device and/or object information to display on the display.
System, method and graphical user interface for controlling a game
A method in an electronic device includes renders a graphical user interface on the display screen being implemented on a gaming system, presenting one or more selectable graphical objects on the graphical user interface; detecting a selection of one or more of the selectable graphical objects; detecting a selection of an option associated with the selected graphical object; detecting a substantially continuous selection of areas along a path on the graphical user interface, detecting a swipe motion over the graphical user interface; and executing an action corresponding to the selected option in one or more areas along the path on the graphical user interface. The gaming system comprises a farming game, the selectable graphical objects of the graphical user interface comprise different spatial regions of a farming environment in which crops are grown, and the options associated with the selected graphical object comprise farming tools.
Display control apparatus, display control method, and storage medium
A display control apparatus specifies a position on a display screen that is specified by the user according to an instruction from the user, and displays information on the display screen that is set by the specified first position and second position and indicates data to be displayed from among a plurality of items of data on the display screen. When the user further specifies a third position, the display control apparatus determines whether an instruction from the user for specifying the third position is a specified instruction that differs from an instruction for specifying the second position. When it is determined that the instruction is the specified instruction, the display control apparatus displays data, from among the plurality of items of data, that corresponds to the information displayed on the display screen.
Display and management of a service composition candidate inventory
An apparatus, system, and method to facilitate the display and management of composition candidates in a service-oriented architecture (SOA). In one embodiment, the method includes receiving a user request to view one or more composition candidates from a composition candidate inventory in a SOA service model, and displaying the composition candidate inventory to the user in a user interface.
Displaying a suggested query completion within a web browser window
Systems and methods for displaying a suggested query completion in a web browser window while providing for display a first webpage within a webpage display region of the web browser window are provided. A method includes, receiving an initiation of a query within an input box in a control region of the web browser window. The method also includes providing for display a dropdown region within the web browser window in response to the initiation of the query. The dropdown region includes suggested completions to the initiation of the query. At least one of the suggested completions is associated with a second webpage. The method also includes providing for display a webpage preview of the second webpage within the dropdown region.
Video display device and menu screen display method
According to one embodiment, a video display device includes a menu screen display module. The menu screen display module displays a menu screen. The menu screen includes at least two hierarchical levels. A higher hierarchical level includes a first group formed by arranging select elements representing classifications of various functions related to video image displaying. A lower hierarchical level includes a second group formed by arranging select elements representing the functions. Upon receipt of a signal from a direct key to which one of the classifications represented by the select elements of the higher hierarchical level is assigned, the menu screen display module displays the menu screen in a state in which one of the select elements is selected. Here, the one of the select elements represents the one of the classifications to which the direct key is assigned, and the operation device includes the direct key.
Systems and methods for archiving and displaying lengthy documents based on content priority levels
A computer-implemented method for archiving and displaying lengthy documents based on content priority levels may include (1) identifying a document that is to be archived, (2) identifying at least one section of content within the document, (3) identifying a priority level associated with the section of content within the document that prioritizes access to the section of content relative to at least one other section of content within the document, (4) archiving the document based at least in part on the priority level associated with the section of content, and (5) providing prioritized access to content within the archived document in accordance with the priority level associated with the section of content in order to allow a user to access a portion of the archived document without having to access the entire archived document. Various additional methods, systems, and encoded computer-readable media are also disclosed.
Document management system and document management method which enables a document operation using a short cut template
A client device network-connected to a document management server managing a document stored in a storage and keeping at least one document managing rule, firstly edits a template which includes information for an operation performed to a document, information for a name of a menu to be registered in the device, and an identifier of a document managing rule. Then, a document managing rule specified by the identifier which is included in the edited template is obtained from the server. Then, a determination is made as to whether or not an operation which is included in the edited template is pursuant to the obtained document managing rule. Finally, a name of a menu instructing to perform the operation in the client device is registered, if it is determined that the operation included in the edited template is pursuant to the obtained document managing rule, and is not registered otherwise.
Parallel XML parsing using meta-DFAs
XML parsing (PXP) can be improved using multicore CPUs, enhancing its suitability for scientific data. One approach is to divide the XML document into equal-sized chunks, and parse each chunk in parallel. XML parsing is inherently potentially dependent on all preceding characters. The skeleton, an outline of the document generated during a fast preparse, is used to guide full parallel parsing. The preparse is a sequential phase that limits scalability, and this phase can also be parallelized using a meta-DFA mechanism. For each state q of the original preparser the meta-DFA incorporates a complete copy of the preparser state machine as a sub-DFA which starts in state q running multiple instances of the preparser simultaneously when parsing a chunk, with each possible preparser state at the beginning of a chunk represented by an instance. By pursuing all possibilities simultaneously, the meta-DFA allows each chunk to be preparsed independently in parallel.
Spreadsheet control program, spreadsheet control apparatus and spreadsheet control method
Lines drawn on a touch screen with an inputting window opened are recognized as ruled lines which are parallel with a row or column of a spreadsheet, and a square formed by the ruled lines is set to a cell in the spreadsheet when the square is formed. Consequently, it is possible to create the spreadsheet when a user of a computer simply draws a line with a fingertip or the like over the touch screen, and furthermore, it is also possible to input a value to the cell by specifying the square part drawn with the lines to carry out an operation for inputting data. Thus, there is provided a spreadsheet creating interface which makes the most of a visibility and an operability of the touch screen.
Trend-analysis scheme for reliably reading data values from memory
In one embodiment, a scheme for reliably reading data values, such as rapidly-changing counter values, from a memory location. Instead of performing a single read operation, a set of N consecutive read operations is performed to obtain a set of N samples. Since, for counter values and the like, the frequency of occurrence of out-of-sequence values is relatively low, it is expected that a majority of the N samples will be in sequence. Of these N samples, the largest subset of monotonically-increasing values is selected. The median value of this subset of monotonically non-decreasing values is returned as a reliable result of the read operation.
Semiconductor integrated circuit and drive apparatus including the same
Disclosed herein is a semiconductor integrated circuit capable of detecting an abnormality that can cause a malfunction in signal transmission via an isolation element and of issuing a stop signal to the target to be controlled. The semiconductor integrated circuit includes a transmission circuit generating and outputting a transmission signal reflecting transmission data supplied from outside, a reception circuit reproducing the transmission data based on a reception signal, an isolation element isolating the transmission circuit from the reception circuit and transmitting the transmission signal as the reception signal, an abnormality detection part detecting an abnormality that can cause a malfunction in signal transmission via the isolation element, and a control part outputting a stop signal if the abnormality detection part detects the abnormality, regardless of the transmission data supplied to the transmission circuit from outside.
Soft decoding of CRC component codes
Methods and devices are disclosed for encoding and decoding convolutional codes in a communication system. In various embodiments of the disclosure, a codeword comprises message data and parity data. A convolutional codeword is generated by multiplying the message data and the parity data with a convolutional polynomial. The convolutional codeword may be decoded by a convolutional code decoder that uses the convolutional polynomial and a maximum likelihood divisor to obtain a maximum likelihood message from the convolutional codeword.
Reed-Solomon erasure decoding with error detection for retransmission
By utilizing Reed-Solomon erasure decoding algorithms and techniques, the system is able to perform error detection for the case where the number of bytes received in error exceeds a correcting capability of a decoder. The error detection can be used, for example, to determine whether a codeword is decodable, and whether the retransmission of data is necessary. The retransmission can be accomplished by assembling a message that is sent to another modem requesting retransmission of one or more portions of data, such as one or more codewords.
Efficient re-read operations in analog memory cell arrays
A method for data storage includes storing data, which is encoded with an Error Correction Code (ECC), in a group of analog memory cells by writing respective first storage values to the memory cells in the group. After storing the data, respective second storage values are read from the memory cells in the group, and the read second storage values are processed so as to decode the ECC. Responsively to a failure in decoding the ECC, one or more of the second storage values that potentially caused the failure are identified as suspect storage values. Respective third storage values are re-read from a subset of the memory cells that includes the memory cells holding the suspect storage values. The ECC is re-decoded using the third storage values so as to reconstruct the stored data.
Non-volatile memory and methods with asymmetric soft read points around hard read points
A non-volatile memory has its cells' thresholds programmed within any one of a first set of voltage bands partitioned by a first set of reference thresholds across a threshold window. The cells are read at a higher resolution relative to a second set of reference thresholds so as to provide additional soft bits for error correction. The reference thresholds of the second set are set up to be non-uniformly distributed on the threshold window so as to provide higher resolution at designated regions. At the same time they are conducive to be read in groups for soft bits to be read bit-by-bit systematically with a simple algorithm and read circuit and using a minimum of data latches. This is accomplished by relaxing the requirement that the first set of reference threshold is a subset of the second set and that the resulting soft bits are symmetrically distributed about the hard bits.
Reproducing data utilizing a zero information gain function
A method begins by a dispersed storage (DS) processing module receiving a zero information gain (ZIG) encoded data slice and a subset of encoded data slices of a set of encoded data slices. The method continues with the DS processing module generating a set of ZIG encoded data slices using a ZIG function and corresponding ones of the subset of encoded data slices, wherein the set of ZIG encoded data slices represents additional components of recovery information of a first encoded data slice. The method continues with the DS processing module recreating the first encoded data slice from the ZIG encoded data slice and the set of ZIG encoded data slices. The method continues with the DS processing module decoding the subset of encoded data slices and the first encoded data slice using a dispersed storage error coding function to reproduce data.
Updating data stored in a dispersed storage network
A method begins by a dispersed storage (DS) processing module receiving a modified data object, wherein the modified data object is a modified version of a data object and the data object is divided into a plurality of data segments and stored in the DSN. The method continues with the DS processing module mapping portions of the modified data object to the plurality of data segments that includes creating a middle data segment of a second plurality of data segments based on a corresponding middle data segment of the plurality of data segments when a portion of the portions corresponds to middle data of the modified data object. The method continues with the DS processing module encoding the middle data segment using a dispersed storage error coding function to produce an encoded data segment and overwriting the corresponding middle data segment with the encoded data segment in the DSN.
Method and system for providing Low Density Parity Check (LDPC) encoding and decoding
An approach is provided for encoding a source signal based on a structured parity check matrix of a Low Density Parity Check (LDPC) code. The LDPC code is represented by stored information reflecting a tabular format of rows and columns, wherein each row represents occurrences of one values within a respective column of the parity check matrix, and wherein the columns of the parity check matrix are derived according to an operation based on the respective rows of the stored information. Blocks of information bits of the source signal are encoded based on the LDPC code to generate an encoded signal. Row indices of 1's in a column index of the parity check matrix are given at a respective row according to the stored information. The LDPC code is of a structure that facilitates use of a plurality of parallel engines for decoding the encoded signal.
Systems and methods for back step data decoding
Various embodiments of the present invention provide systems and methods for data processing. For example, data processing systems are disclosed that include: a data decoder circuit, a decoder log, a mis-correction detection circuit, and a controller circuit.
Systems and methods for multi-matrix data processing
The present inventions are related to systems and methods for data processing. As one example, a data processing system is discussed that includes a data decoder circuit and a matrix select control circuit. The data decoder circuit is operable to apply a data decode algorithm to a decoder input using a selected parity check matrix to yield a decoder output. The matrix select control circuit operable to select one of a first parity check matrix and a second parity check matrix as the selected parity check matrix.
Method and device for retransmission
Embodiments related to retransmission in a communication system are described and depicted. In one embodiment, a retransmission entity repeats a transmission of a data transfer unit by the device after a predetermined number of other transmitted data transfer units has been transmitted. The retransmission entity may also determine whether a measure for a time period since the first transmission of the data transfer unit by the device has exceeded a predetermined threshold and to provide a final transmission of the data transfer unit based on the determining that the measure for the time period has exceeded the predetermined threshold.
On-chip functional debugger and a method of providing on-chip functional debugging
An on-chip functional debugger includes one or more functional blocks each providing one or more functional outputs. A hierarchical selection tree is formed by one or more selectors having the output of one of the selectors as a final output and individual selector inputs coupled either to a functional output from the functional blocks or to an output of another selector. A selection signal coupled to the select input of each of the selectors to enable a selected one of its output. An output node coupled to the final output. A method of providing on-chip functional debugging is also provided. A desired functional output from one or more available functional outputs is selected and then the selected functional output is coupled to an output node.
Non-volatile memory (NVM) with imminent error prediction
A non-volatile memory system includes a memory array and a memory controller. The memory controller is configured to perform a first array integrity read operation of the array until an error is detected. The controller is also configured to determine that the error is not error correction code (ECC) correctable. A first word line voltage associated with the error is characterized as being a first threshold voltage. The controller is further configured to perform a second array integrity read operation of the array. The second array integrity read operation includes reading the array with a word line read voltage that is offset from the first threshold voltage and is based on a predetermined width offset reference value. Finally, the controller is configured to check a check sum value resulting from the second array integrity read operation to determine when an imminent failure in the memory array is indicated.
Advanced converters for memory cell sensing and methods
A counter configuration operates in cooperation with a delay configuration such that the counter configuration counts an input interval based on a given clock speed and a given clock interval while the delay configuration provides an enhanced data output that is greater than what would otherwise be provided by the given clock speed. The counter configuration counts responsive to a selected edge in the clock interval. An apparatus in the form of a correction arrangement and an associated method are configured to monitor at least the delay configuration output for detecting a particular time relationship between an endpoint of the input interval and a nearest occurrence of the selected clock edge in the given clock signal that is indicative of at least a potential error in the enhanced data output and determining if the potential error is an actual error for subsequent use in correcting the enhanced data output.
Request processing system provided with multi-core processor
One processor core of a plurality of processor cores that are included in a multi-core processor that processes a request from an external device detects a prescribed event, specifies a sub resource that is assigned to the one processor core based on the resource management information that indicates a sub resource of a plurality of sub resources that are included in a physical resource and a processor core that is assigned to the sub resource, and executes a reboot based on the specified sub resource.
Systems and methods for creating a near optimal maintenance plan
Methods and apparatus are provided for determining a lowest total cost maintenance plan. The method comprises receiving a sequence of maintenance actions in an order of a waiting time for each maintenance action, wherein one of the maintenance actions is likely to repair the failure mode. Each maintenance action has an associated cost equal to a waiting time cost, an execution time cost and a material cost, wherein the waiting time of each maintenance action is the time required to requisition and receive material required to perform the maintenance action. The method also constructs a maintenance plan comprising a primary requisition and a secondary requisition by assigning each of the sequence of maintenance actions to one of the primary and secondary requisition.
Method and system for using a standby server to improve redundancy in a dual-node data storage system
A standby server, a first main server, and a second main server to control shared input/output (I/O) adapters in a storage system are provided. The standby server is in communication with the first main server and the second main server, and the storage system is configured to operate as a dual node active system. The standby server is activated in response to receiving a communication from the first main server of a fail mode of the second main server. Systems and physical computer storage media are also provided.
A rack system is provided. The rack system includes a first rack apparatus and a second rack apparatus. The first rack apparatus includes multiple first rack internal devices and a first Integrated Management Module (IMM). The first IMM manages the first rack internal devices via a network. The second rack apparatus includes multiple second rack internal devices and a second IMM. The second IMM manages the second rack internal devices via the network. The first IMM and the second IMM are connected via the network and implement a synchronous configuration process. When the second IMM goes abnormal, the first IMM manages the first rack internal devices and the second rack internal devices via the network at the same time.
Method and system of live error recovery
A method and system of error recovery of a device attached to a platform without requiring a system reset. In one embodiment of the invention, a platform detects an error(s) of an attached device and shuts down the communication link with the attached device. The platform corrects the error(s) and automatically re-trains the communication link with the attached device. In this way, no reset of the platform is required to correct the detected error(s) in one embodiment of the invention.
Apparatus and method for delayed synchronous data reception
An apparatus that compensates for misalignment on a synchronous data bus. The apparatus includes a resistor network and a synchronous receiver disposed within a receiving device. The resistor network is configured to provide a ratio signal that indicates an amount to delay a data bit signal associated with a data group, where the data bit signal is transmitted by a transmitting device along with a data strobe signal. The synchronous receiver receives the data bit and the data strobe signals, and includes a delay-locked loop (DLL). The DLL is coupled to the ratio signal, and is configured generate a delayed data bit signal, where the DLL adds the amount of delay to the data bit signal to generate the delayed data bit signal, and where the delayed bit signal is delayed relative to the data strobe signal by the amount, thus allowing for proper reception of the data bit signal.
Method and system for power-efficient and non-signal-degrading voltage regulation in memory subsystems
Embodiments of the present invention are directed to a memory subsystem comprising a memory controller, multiple memory modules interconnected with the memory controller by one or more communications media, each memory module comprising a substrate to which multiple memory chips are mounted and electronically connected to the communications media, and a power-supply signal routed to two or more voltage regulators within the memory subsystem from a system power supply, the voltage regulators outputting two or more internal power signals, each power signal providing a different, regulated voltage, which are routed to each of the memory chips. Another embodiment of the present invention is directed to a memory module comprising a substrate to which multiple memory chips are mounted and two or more voltage regulators mounted to, or fabricated within, the substrate.
Power capping system and method
A system, and a corresponding method, for temporarily capping power consumption includes a mechanism for determining total power consumption by a number of components, a mechanism for disconnecting and reconnecting power to one or more of the components, and a mechanism for determining when to disconnect and reconnect power to the components.
Power supply system with a plurality of power supply units capable of powering a plurality of load units depending on the type and operation state of each load unit
A power supply system includes a plurality of power supply units that each includes an output terminal connected each other in parallel to other output terminals each included in other power supply units and connected to a plurality of load units, a power supply section that inputs an input voltage and outputs a first output voltage from the output terminal to the plurality of load units, and a shut-off control section that shuts off the output of the first output voltage from the output terminal based on an inputted stand-by signal, and a management control unit that inputs a configuration information representing a configuration of each of the plurality of load units in which the first voltage is inputted, and outputs the stand-by signal to any of the plurality of power supply units based on the configuration information.
Circuit protection system and method for a circuit utilizing chip type power supply
The present disclosure provides a circuit protection system and a circuit protection method for an electronic system. The circuit protection system includes a main chip, a power chip powering the main chip, a basic input/output system (BIOS) and a control unit. The control unit detects the potential of a PW_OK signal output from the power chip to the main chip, and gets the current state of the electronic system through the BIOS, thereby determining whether the current state of the main chip corresponds to a predetermined state for the main chip which defined in the current state of the electronic system. If not, the control unit outputs a signal to disable the main chip. The present disclosure disables the main chip instantly when the voltage provided thereto is excessive or insufficient, thereby avoiding the damage caused by excessive or insufficient voltage.
Resource-based adaptive server loading
Resource-based adaptive server loading is described. In embodiments, a current load level can be determined for a resource that is utilized by an adaptive server system to process computer-executable instructions that are a dynamic computational demand on the adaptive server system. The current load level is compared with a target load level for the resource to establish a resource load level comparison. The adaptive server system can then be reconfigured, based on the resource load level comparison, to change the current load level on the resource for resource overload protection.
Extending the number of applications for accessing protected content in a media using media key blocks
Embodiments of the invention relate to digital content protection for recordable media using encryption and decryption based on device keys in the media. The invention increases the number of extended applications supported the media key blocks and facilitates the assignment of the applications to the media key blocks. One aspect of the invention concerns a method that comprises assigning a first media key block in a protected area of the media for extended applications accessing protected content, processing the first media key block with a first device key set to generate a first media key, and for each extended application, creating a second media key block in a protected area of the media. The second media key block is processed to generate a second media key. A content-accessing device processes the first and second media keys in order to access protected content.
Securing a data segment for storage
A method begins by a dispersed storage (DS) processing module encrypting a data segment utilizing an encryption key to produce an encrypted data segment and performing a deterministic function on the encrypted data to produce a transformed representation of the encrypted data. The method continues with the DS processing module masking the encryption key utilizing the transformed representation of the encrypted data to produce a masked key, partitioning the masked key into a plurality masked key partitions, partitioning the encrypted data segment into a plurality of encrypted data segment partitions, and combining the plurality of masked key partitions with the plurality of encrypted data segment partitions to produce a plurality of combined partitions. For a combined partition of the plurality of combined partitions, the method continues with the DS processing module encoding the combined partition using a dispersed storage error coding function to produce a set of encoded data slices.
Secure storage and replay of media programs using a hard-paired receiver and storage device
A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. The method comprises the steps of receiving a data stream comprising the program material encrypted according to a first (CW) encryption key, decrypting the program material; re-encrypting the program material according to a second encryption key, and storing the re-encrypted material in a media storage device. The program material is played back by retrieving the re-encrypted material from the media storage device and decrypting the re-encrypted program material. In one embodiment, the media storage device also stores the second encryption key which has been further encrypted by a key that is unique to the device used to receive the program material.
Content protection using block reordering
An apparatus and method for protecting a content item such as a digitally encoded movie, an electronic programming guide, or the like, by reordering blocks of the content item prior to transmitting it to a receiving device. The receiving device constructs a block reordering structure which is used to access the reordered content item, to facilitate retrieval of a desired block from the original content item. The reordering may be done responsive to an identifier value of the receiving device, such as a serial number.
Method and system for transformation of logical data objects for storage
A method and system for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Encrypting the plaintext logical data object comprises creating in the storage device an encrypted logical data object comprising a header and one or more allocated encrypted sections with predefined size; encrypting one or more sequentially obtained chunks of plaintext data corresponding to the plaintext logical data object thus giving rise to the encrypted data chunks; and sequentially accommodating the processed data chunks into said encrypted sections in accordance with an order said chunks received, wherein said encrypted sections serve as atomic elements of encryption/decryption operations during input/output transactions on the logical data object.
This document discloses data security systems and methods of securing data. A cache memory can be connected between a decryption engine and a central processing unit (“CPU”) to increase security of encrypted data that is stored in a datastore. The decryption engine can retrieve the encrypted data from the datastore, decrypt the data, and store the decrypted data in the cache. In turn, the decrypted data can be accessed by the CPU. The data can be encrypted with a secret key, so that decryption can be performed with the secret key. The key can be varied based on a memory address associated with the data. The key can be protected by restricting direct access to the decryption engine by the CPU.
A semiconductor device in related art has a problem that security on confidential information stored is insufficient. A semiconductor device of the present invention has a unique code which is unique to a device and generates unique code corresponding information from the unique code. The semiconductor device has a memory region in which specific information obtained by encrypting confidential information is stored in a region associated with the unique code corresponding information. The specific information read from the memory region is encrypted with the unique code corresponding information to generate the confidential information.
Secure external buffer for hard disk drive system on a chip
A system securely buffers hard disk drive data using a host side eXlusive OR (XOR) encryption engine. A host communicates with an encryption interface interposed between the host and a client. Communicatively coupled to the encryption interface is an external buffer for the collection and processing of data. A host side XOR encryption engine, using a random seed, encrypts data originating from the host and places it on the external buffer. Once collected at the buffer and ready for transmittal to the client, the encrypted data is retrieved by the encryption interface and decrypted using the same random seed. The clear data is then encrypted once again using a robust encryption means such as Advance Encryption Standard (AES) encryption by a client side device for conveyance to the client.
Security for a personal communication device
Security is provided to a communication device configured to accept a physical key device. A public mode of operation is activated for the communication device when the physical key is not accepted by the personal communication device. The public mode of operation allows access to a first set of functions of the communication device, where the public mode of operation prohibits access to a second set of functions of the communication device. A personal mode of operation is activated for the communication device when the key is accepted by the personal communication device, where the personal mode of operation allows access to the first set of functions and the second set of functions of the communication device. A private mode may also be activated upon authentication of a user of the device, where the private mode allows access to a third set of functions.
System and method for sharing data
A system and method for sharing data is provided. A request is received from a mobile device to transfer a set of data to a recipient. The set of data is stored by a server and controlled by a user of the mobile device. The request is authenticated, and the data is encrypted. The set of data is transmitted to a recipient specified by the user via the mobile device.
Device and method for a backup of rights objects
A common backup format of a backup rights object according to embodiments of the present invention has the following features: License information that is not critical for cryptographic security of the rights object is kept in “plain text” with a well defined syntax in a first data container, license information that is critical for cryptographic security of the rights object is stored in cryptographically protected form that is specific for the originating device to which the rights object is bound to in a second data container, and the rights object is cryptographically signed by the originating device such that it may not be manipulated. The signature is stored in a third data container.
An entertainment device comprises communication means operable to receive media data from a media data source, storage means operable to store the received media data, in which the storage means limits the duration of access to the media data which was received from the media data source.
Family dwelling restricted communication system
A network comprising an authentication network limited to a family dwelling; a content source; and a content receiver. Wherein the content source is configured to transmit encrypted content to the content receiver, and the content receiver can decode the encrypted content only when both the content source and the content receiver are physically connect to the authentication network.
System and method of extending oauth server(s) with third party authentication/authorization
In accordance with various embodiments, systems and methods that provide for authorization of access to protected resources. Such a system can include a plurality of applications, executing on one or more application servers. The system can also include an authorization server which is operable to interface with one or more remote and/or non-co-located third party authentication servers. Each application can (a) receive a request for authorization to access a controlled resource; (b) redirect the request for authorization to a configurable authentication endpoint identifying a third party authentication server; (c) receive authorization information from the third party authorization server; and (d) issue an authorization code for access to the protected resource.
Secure digital communications
There is disclosed a method in a communications system for enabling authentication of a sender device and a receiver device in the communication system, wherein the sender device is associated with a self-generated first identity and a first master device, the receiver device is associated with a self-generated second identity and a second master device and wherein the authentication is enabled by utilizing the first master device and the second master device for the sender device and the receiver device to verify the identities of each other. In one embodiment, both the sender device and the receiver device are also associated with a third device ant the third device is used in addition to the master devices for verifying said identities. There is also disclosed a method In a sender device, a method in a receiver device, a method in a third device, a sender device, a receiver device, a third device, and a computer program product for the same.
Method and apparatus for securing confidential data for a user in a computer
Method and apparatus for securing confidential data related to a user in a computer is described. In one example, rules are obtained that provide a representation of the confidential data. A storage system in the computer is searched using the rules to detect a file having at least a portion of the confidential data. The file is encrypted the in-place within the storage system using symmetric encryption based on a secret associated with the user.
Enhanced privacy ID based platform attestation
As opposed to utilizing a manufacturer provisioned EK Certificate for AIK processes, embodiments of the invention utilize EPID based data. EPID mitigates the privacy issues of common RSA PKI security implementations where every individual is uniquely identified by their private keys. Instead, EPID provides the capability of remote attestation but only identifies the client computing system as having a component (such as a chipset) from a particular technology generation. EPID is a group signature scheme, where one group's public key corresponds to multiple private keys, and private keys generate a group signature which is verified by the group public key. EPID provides the security property of being anonymous and unlinkable—given two signatures, one cannot determine whether the signatures are generated from one or two private keys. EPID also provides the security property of being unforgeable—without a private key, one cannot create a valid signature.
Secure user presence detection and authentication
This disclosure relates generally to a system and method for authenticating an electronic device may comprise a server configured to transmit an encrypted object, the encrypted object having an image file format, to the electronic device, the encrypted object being encrypted based on a certificate, the electronic device operatively coupled to the server and comprising a processor registered with the server to create a secured communication link between the processor and the server, wherein the certificate corresponds to the processor, the processor having a cryptographic engine configured to decrypt the encrypted object to result in a decrypted graphic, and a user interface operatively coupled to the processor. The user interface may be configured to display the decrypted graphic and receive a user input responsive to the decrypted graphic. The server may authenticate the electronic device based, at least in part, on the user input.
Control unit for fluidic systems
Diverse requirements of fluidic applications for very different communication environments are satisfied with a control unit for fluidic systems, which can be configured in an extremely flexible manner. A universal computing module is used as a unitary stock item, which includes a programmable logic module, a clock generator, a volatile fast working memory, and a persistent memory, and which is constructed with few peripheral components on a circuit board. The unitary computing module is equipped with all of the required hardware components for the respective application by configuration file, including the functionality for the respective communication environment. Moreover, a dynamic configuration by identification of communication modules connected to the circuit board is also possible. Similarly, reconfiguration in adaptation to a varied environment can be effected.
Storage device and method for updating a shadow master boot record
A storage device and method for updating a shadow master boot record (MBR) are provided. In one embodiment, a storage device is provided having a memory with a first storage area and a second storage area. The storage device receives updated sectors of the shadow MBR from a host device and writes the updated sectors in the second storage area. The storage device determines a highest written sector in the first storage area that is occupied by the shadow MBR. The storage device copies the non-updated sectors of the shadow MBR from the first storage area to the second storage area, wherein only the non-updated sectors up to the highest written sector are copied. Accordingly, any non-updated sectors above the highest written sector are not copied from the first storage area to the second storage area. The storage device then designates the second storage area as storing a current version of the shadow MBR.
Information processing apparatus, method, and computer-readable storage medium that encrypt data in a blob based on a hash value
An information processing apparatus includes a main memory unit storing while on-power; an auxiliary storage unit functionable even off-power; a control unit performing hibernation of generating operating-state data indicating a state when the power is lost, storing the data in the auxiliary storage unit, and, when restored, reading the data from the auxiliary storage unit; and a security chip that including a configuration register, encrypts data, and storing the data in the auxiliary storage unit. The control unit includes: a first registration unit performing, when the data is generated, calculation based thereon to obtain a calculated value; a second registration unit performing, when the data is read from the auxiliary storage unit at the hibernation, calculation based on the data to obtain a calculated value to write it into the configuration register; and a verification unit performing verification at boot-up from the hibernation based on the value written.
Detecting state loss on a device
This document describes techniques for detecting state loss on a device. These techniques permit a computer connected to a device to forgo, in many cases, reinitializing the device when returning to a normal-power mode.
Branch history with polymorphic indirect branch information
A system and method for efficient improvement of branch prediction in a microprocessor with negligible impact on die-area, power consumption, and clock cycle period. It is determined if a program counter (PC) register contains a polymorphic indirect unconditional branch (PIUB) instruction. One determination may be searching a table with a portion or all of a PC of past PIUB instructions. If a hit occurs in this table, the global shift register (GSR) is updated by shifting a portion of the branch target address into the GSR, rather than updating the GSR with a taken/not-taken prediction bit. The stored value in the GSR is input into a hashing function along with the PC in order to index prediction tables such as a pattern history table (PHT), a branch target buffer (BTB), an indirect target array, or other. The updated value due to the PIUB instruction improves the accuracy of the prediction tables.
Fine-grained privilege escalation
A processor and a method for privilege escalation in a processor are provided. The method may comprise fetching an instruction from a fetch address, where the instruction requires the processor to be in supervisor mode for execution, and determining whether the fetch address is within a predetermined address range. The instruction is filtered through an instruction mask and then it is determined whether the instruction, after being filtered through the mask, equals the value in an instruction value compare register. The processor privilege is raised to supervisor mode for execution of the instruction in response to the fetch address being within the predetermined address range and the filtered instruction equaling the value in the instruction value compare register, wherein the processor privilege is raised to supervisor mode without use of an interrupt. The processor privilege returns to its previous level after execution of the instruction.
Processor to execute shift right merge instructions
Method, apparatus, and program means for performing bitstream buffer manipulation with a SIMD merge instruction. The method of one embodiment comprises determining whether any unprocessed data bits for a partial variable length symbol exist in a first data block is made. A shift merge operation is performed to merge the unprocessed data bits from the first data block with a second data block. A merged data block is formed. A merged variable length symbol comprised of the unprocessed data bits and a plurality of data bits from the second data block is extracted from the merged data block.
Vector instruction execution to load vector data in registers of plural vector units using offset addressing logic
A processor including: a first and at least a second data processing channel with enable logic for selectively enabling the second channel; logic for generating first and second storage addresses having a variable offset therebetween based on the same one or more address operands of the same storage access instruction; and circuitry for transferring data between the first address and a register of the first data processing channel and between the second address and a corresponding register of the second channel based on a same one or more register specifier operands of the access instruction. The first data processing channel performs an operation using one or more registers of the first data processing channel, and on condition of being enabled the second channel performs the same operation using a corresponding one or more of its own registers based on the same one or more operands of the data processing instruction.
Method, system and program product for storing downloadable content on a plurality of enterprise storage system (ESS) cells
The present invention takes advantage of unused storage space within the ESS cells to provide for the efficient and cost effective storage of downloadable content. Specifically, the system of the present invention generally includes a download grid manager that communicates with the ESS cells. Content to be replicated to the ESS cells, and characteristics corresponding thereto, are received on the download grid manager from a content owner (or the like). Based on the characteristics, a storage policy, and storage information previously received from the ESS cells, the download grid manager will replicate the downloadable content to unused storage space within the ESS cells.
Systems and methods for memory management for rasterization
Methods for managing a single memory pool comprising frame buffer memory and display list memory are presented. The single memory pool can comprise sub-pools including: a super-block pool comprising a plurality of super-block objects; a node pool comprising a plurality of node objects; and a block-pool comprising a plurality of blocks. The method may comprise: receiving a memory allocation request directed to at least one of the sub-pools; allocating an object local to the sub-pool identified in the memory request, if local sub-pool objects are available to satisfy the memory request; allocating an object from super-block pool, if the memory request is directed to the node-pool or block-pool and there are no available local objects in the respective sub-pools to satisfy the memory request; and applying at least one of a plurality of memory freeing strategies, if the sub-pools lack available free objects.
Apparatus to manage efficient data migration between tiers
A data storage system having a slow tier and a fast tier maintains hot data on the fast tier by migrating data from the slow tier to reserve space on the fast tier as data becomes hot over time. The system maintains a reserve space table and performs a mass migration of data from the fast tier to the slow tier. Data migration is frequently unidirectional with data migrating from the slow to the fast tier, reducing overhead during normal operation.
Storing chunks in containers
Chunks are stored in a container of a data store, where the chunks are produced by dividing input data as part of a deduplication process. In response to determining that the size of the container has reached a predefined size threshold, at least one of the chunks in the container is moved to another container.
Executing host data transfer operations during setup of copy services operations
Host input/output (I/O) operations are performed via a file stored in a non-volatile storage coupled to a storage controller while data structures are being generated in the storage controller to copy data from source logical volumes to target logical volumes. The source logical volumes and the target logical volumes are logical representations of physical storage maintained in a plurality of direct access storage devices. The contents of the file are transferred from the non-volatile storage to one or more of the plurality of direct access storage devices, after the data structures have been generated, wherein the host I/O operations are performed via the file while the contents of the file are being transferred to the one or more of the plurality of direct access storage devices. The host I/O operations to the plurality of direct access storage devices are resumed, in response to transferring entire contents of the file to the one or more of the plurality of direct access storage devices.
Cyclic point-in-time-copy architecture with data deduplication
A method for performing a write to a volume x in a cyclic point-in-time-copy architecture is described. In one embodiment, such a method includes determining whether the volume x has a child volume. The method then determines whether the target bit maps (TBMs) of both the volume x and the child volume are set. If the TBMs are set, the method finds a higher source (HS) volume from which to copy the desired data to the child volume. Once the HS volume is found, the method determines whether the HS volume and the child volume are the same volume. If the HS volume and the child volume are not the same volume, the method copies the data from the HS volume to the child volume. The method then performs the write to the volume x. A corresponding computer program product is also described.
Preserving an existing volume map in re-initializing a data storage volume
A method, system and computer-program product for re-initializing a storage volume with an previously created volume map being preserved to allow access to previously stored data sets. The invention includes creating a new volume map in an unused volume area where the new volume map has pointers to new data sets. One of the new data sets contains the previously created volume map that points to previously created data sets. Each volume map is referenced by a volume label and includes a VTOC and an optional VTOC index. The pointers in the VTOC are data set control block (DSCB) records.
Method and apparatus to prevent FIFO overflow and underflow by adjusting one of a write rate and a read rate
An apparatus and method for preventing FIFO overflow and underflow are disclosed. The apparatus includes a memory block, a write address control configured to generate a write address for writing data to the memory block at a write rate, a read address control configured to generate a read address for reading data out of the memory block at a read rate, and a management controller configured to adjust one of the write rate and the read rate to track the other rate based on a difference between the write address and the read address, for example by dynamically adjusting the read rate to the write rate. A direction in which the difference changes may also be detected. The memory block may be configured as a dual-port memory block. An audio apparatus including a digital audio input and output and a buffer is also disclosed.
Controllably exiting an unknown state of a cache coherency directory
In one embodiment, a method includes receiving a read request from a first caching agent and if a directory entry associated with the request is in an unknown state, an invalidating snoop message is sent to at least one other caching agent to invalidate information in a cache location of the other caching agent corresponding to the location of the read request, to enable setting of the directory entry into a known state. Other embodiments are described and claimed.
Systems and methods for managing cache admission
A cache layer leverages a logical address space and storage metadata of a storage layer (e.g., storage layer) to cache data of a backing store. The cache layer maintains access metadata to track data characteristics of logical identifiers in the logical address space, including accesses pertaining to data that is not in the cache. The access metadata may be separate and distinct from the storage metadata maintained by the storage layer. The cache layer determines whether to admit data into the cache using the access metadata. Data may be admitted into the cache when the data satisfies cache admission criteria, which may include an access threshold and/or a sequentiality metric. Time-ordered history of the access metadata is used to identify important/useful blocks in the logical address space of the backing store that would be beneficial to cache.
System and method for optimizing data remanence over hybrid disk clusters using various storage technologies
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to optimize data remanence over hybrid disk clusters using various storage technologies, determine one or more data storage technologies accessible by a file system, and determine secure delete rules for each of the one or more storage technologies accessible by the file system. The secure delete rules include a number of overwrites required for data to be securely deleted from each of the one or more storage technologies. The programming instructions are further operable to provide the secure delete rules to the file system upon a request for deletion of data for each of the one or more storage technologies a specific amount of times germane to secure delete data from the one or more storage technologies.
Embedded advisory framework for storage configuration management
An improved technique involves consulting a predictive model to optimize a configuration of a data storage system. A customer at a data storage system requests a configuration optimization from a customer support center by sending values of input parameters to the customer support center. Such input parameters represent a current state of the data storage system, e.g., initial configuration. The customer support center then receives configuration parameters in response to inputting the input parameters into a predictive model running on a host computer. The customer uses the configuration parameters to define the configuration state in which the data storage system runs.
Semiconductor storage device with volatile and nonvolatile memories to allocate blocks to a memory and release allocated blocks
A semiconductor storage device includes a first memory area configured in a volatile semiconductor memory, second and third memory areas configured in a nonvolatile semiconductor memory, and a controller which executes following processing. The controller executes a first processing for storing a plurality of data by the first unit in the first memory area, a second processing for storing data outputted from the first memory area by a first management unit in the second memory area, and a third processing for storing data outputted from the first memory area by a second management unit in the third memory area.
Flash boot and recovery area protection to meet GMR requirements
A system and method for protecting boot and recovery area of a flash memory in order to meet GMR requirements in radio system is disclosed. When the Core Engine Modem is installed in the factory test equipment, LOCK signal on the PoP module is logic high. At this time, the flash will be unlocked, and the boot and recovery code is written. The boot and recovery sectors will then be locked and the user area of the flash is left unlocked. When installed in the GLS DICE-T, LOCK signal on the PoP module is logic low. At this time, the flash device will ignore block lock commands, which prevent the unlocking of the protected sectors. The write enable signal from the GVA can now be utilized to enable writing to the user area of the flash despite of protecting boot and recovery areas.
Memory device and system including a memory device electronically connectable to a host circuit
A memory includes a nonvolatile memory cell array, and a memory control circuit which carries out writing of data to and reading of data from the memory cell array in access units of N bits where N is an integer equal to 2 or greater. The memory cell array includes a rewritable area in which both writing of data and reading of data are permissible, and a read-only area in which writing of data is prohibited and reading of data is permissible. The rewritable area is configured so that the N bits constituting one access unit contain both actual data and an error detection code. The read-only area is divided between an actual data area in which the N bits constituting one access unit contain actual data, and an error detection code area in which the N bits constituting one access unit contain error detection codes.
Increasing Input Output Hubs in constrained link based multi-processor systems
Methods and apparatus relating to increase Input Output Hubs in constrained link based multi-processor systems are described. In one embodiment, a first input output hub (IOH) and a second IOH are coupled a link interconnect and a plurality of processors, coupled to the first and second IOHs include pre-allocated resources for a single IOH. Other embodiments are also disclosed and claimed.
Method and apparatus for enterprise brokering of user-controlled availability
Methods and apparatus are provided for controlling an availability of a user in an enterprise environment. If an enterprise user requests to change an availability status on one or more media, a determination is made as to whether to grant the request based on one or more predefined criteria associated with the enterprise. For example, the predefined criteria may comprise resource needs or one or more policies of the enterprise. The predefined criteria may be expressed as one or more rules in a rule base.
Connector interface system for data acquisition
A data acquisition system includes a receptacle and a data acquisition device. The receptacle has a housing, sensor inputs to receive data signals from sensors coupled to an object, and a rib to block insertion of a standard Universal Serial Bus (USB) plug and facilitate insertion of a modified USB plug having a slot that mates with the rib. The data acquisition device includes circuitry to receive, store and process data, a USB plug having pins operatively coupled to the circuitry, a first subset of pins configured to receive data signals from the receptacle and a second subset of pins configured to support standard USB communication with USB-compliant devices, and a slot formed in the USB plug such that the slot facilitates interconnection of the USB plug both with standard USB-compliant devices and with the receptacle, the slot mating with the rib to facilitate interconnection.
Systems and methods for dynamic buffer allocation
A first network device including a first port to provide first data traffic to a first storage area network, a second port to provide second data traffic to a local area network, and memory shared between the first port and the second port to temporarily store the first data traffic in N first buffers and the second data traffic in M second buffers. A queue control module allocates a first memory space of the N first buffers to the first port and a second memory space of the M second buffers to the second port. An adjustment module adjusts a first amount of the first memory space and a second amount of the second memory space in response to a congestion event caused by a first data traffic. Up to all of the first memory space and the second memory space is allocated to the N first buffers.
Methods and systems for data transmission
Example methods and systems for transmitting data are presented. In one example, a plurality of streams of video data are received from at least one data source into at least one buffer of a router via multicast, each of the plurality of streams of video data representing a same video program and having a unique data rate relative to at least some other streams of the plurality of streams. A request is received from a device to transmit video data to the device. In response to the request, video data from one of the plurality of streams of video data is transmitted from the at least one buffer of the router to the device via a point-to-point connection at the data rate corresponding to the one of the plurality of streams of video data.
Information processing apparatus and control method
An information processing apparatus includes a memory and a processor coupled to the memory. The processor is configured to execute a process including acquiring control information of a first application program of which execution result is displayed, extracting a dependency relationship between the first application program and a second application program on a basis of the control information, and determining whether an access request for a device from the second application program is granted on a basis of the dependency relationship.
Intelligent building automation node
Apparatuses and methods for use in connection with a Building Automation System (BAS) are disclosed herein. In one embodiment, the present invention comprises an intelligent power node comprising a JAVA-enabled device and serial communication cable that provide a seamless open protocol and aggregation point to broadcast internet protocol communications. In another embodiment, the present invention enables energy monitoring and control of individual ports and outlets. In yet another embodiment, the present invention is a method of configuring and operating fieldbus devices.
Methods and structure for performing a rebuild of a logical volume with a serial attached SCSI expander
Methods and structure are provided for performing a rebuild using a Serial Attached SCSI (SAS) expander. The SAS expander includes an SMP target operable to receive, from a Redundant Array of Independent Disks (RAID) controller, a Serial Management Protocol (SMP) command for initiating a rebuild of a RAID volume at the SAS expander. The SAS expander also includes a control unit operable to initiate a rebuild of the RAID volume based on the received SMP command from the controller, and a Serial SCSI Protocol (SSP) initiator operable to generate SSP commands for performing the RAID rebuild based upon input from the control unit.
Notebook having secondary processor coupled by a multiplexer to a content source or disk drive
In some embodiments, a notebook including a content source (e.g., a DVD or other display data source), mass storage device (e.g., hard disk drive), auxiliary display subsystem (including an auxiliary processor), PC chipset, a multiplexer between the content source, auxiliary processor, and PC chipset, and another multiplexer between the mass storage device, auxiliary processor and PC chipset, and methods implemented thereby. The auxiliary display subsystem can be operable (without communicating with the notebook's CPU) when the notebook is in a low-power state.
Optimizing state sharing between firewalls on multi-homed networks
In one embodiment, a security device monitors for outgoing re-transmission messages indicating that an endpoint located in a multi-homed network transmitted an unanswered initial connection request. Responsive to identifying one of the outgoing re-transmission messages, the security device identifies destination address information included in the identified re-transmission message. The security device then causes another security device associated with a different link of the same multi-homed network to update its internal state table according to the identified destination address information. As a result, a response to the outgoing re-transmission can be forwarded to the multi-homed network regardless of which security device receives the response.
Address redirection for nodes with multiple internet protocol addresses in a wireless network
Systems and methodologies are described that facilitate obtaining an Internet Protocol (IP) address of a node with multiple IP addresses using address redirection in a wireless communication environment. A wireless communication component can retrieve a previously registered IP address corresponding to the node from an Authentication, Accounting, and Authorization/Home Subscriber Server (AAA/HSS). Further, a reverse query of a Domain Name Server (DNS) and a forward query of the DNS can be performed. The reverse query can be constructed based upon the previously registered IP address of the node and can resolve a name (e.g., string, . . . ). Further, the forward query can be formed based upon the name and can return a differing IP address of the node.
System and method for time-sensitive URI mapping
A system, method, and computer program for supporting legacy URIs. A method includes receiving a request for a uniform resource identifier and initializing the request with at least an expiration identifier. The expiration identifier is one of a date, NOW, and NEVER. The method also include determining a redirection type based on a current date. If the current date is less than the expiration identifier or equal to NEVER, then use a meta tag redirect; and if the current date is greater than or equal to said expiration identifier or equal to NOW, then use a status code redirect. The method also includes mapping the URI to a redirect-URI. Corresponding systems and computer-readable instructions are also discussed.
Method and system for selecting a delivery method for media on demand
Computer-implemented methods, computer-readable media, and systems are disclosed. A computer implemented method includes receiving device a first connection speed of a data connection to a host including a media content delivery method based on the first connection speed and user preference information. The method requesting delivery of the media content from the host using the media content delivery method. The computer implemented method includes determining, during delivery of the media content to the receiving device, a second connection speed of the data connection. The method of delivery is determining, during delivery of the media content to the receiving device, whether to modify the media content delivery method based on the second connection speed and the user preference information.
Content server media stream management
Mechanisms are provided to manage media stream transmissions at a content server. A content server detects that a user on a device such as a mobile device has stopped playing a live media stream. The content server maintains information associating the user with the media stream and time information. When the content server detects that a user wishes to resume playing a media stream, the user can continue viewing the media stream from where stoppage occurred. In many instances, the content server stores many hours of live media stream data and allows a user to select a particular starting point.
Video mixing using video speech detection
A method for video conferencing includes receiving, at one or more computers from at least some remote clients from a plurality of remote clients, information representing a plurality of media frames. The method also includes receiving, at the one or more computers from at least some of the plurality of remote clients, a plurality of video-based speech activity signals each associated with a respective media frame from the plurality of media frames. The method further includes selecting, at the one or more computers, at least some media frames from the plurality of media frames based on the video-based speech activity signals, decoding the selected media frames, generating a mixed media stream by combining the decoded media frames, transmitting, from the one or more computers to at least some remote clients from the plurality of remote clients, the mixed media stream.
Method and system for streaming live teleconferencing feeds to mobile client devices
There is provided a system and method for streaming a live teleconference feed to a mobile client device. There is provided a method comprising receiving a live video feed from a video splitter concurrently outputting to a display device, converting the live video feed into an intermediate video stream, determining playback capabilities of the client device, transcoding the intermediate video stream into a final video stream based on the playback capabilities of the client device, and streaming the final video stream to the client device for output to a display of the client device. The live video feed may comprise a live video feed from a conventional teleconferencing system. In this manner, conventionally closed systems, such as teleconferencing systems, may be augmented to support live video streaming and collaboration with various remote client devices.
Auto-discovery of home and out-of-franchise networks
A mobile device includes a mobile network module to present media content using a public network and a home network module to present media content from a home network. The mobile device uses the mobile network module to receive a media streaming session via a broadband cellular connection and detects a local wireless connection to a device in a home network. The mobile device uses the home network module to initiate, via the local wireless connection, a home media session with the device in the home network and matches content of the home media session with content of the media streaming session. The mobile device presents, to a user and using the home network module, the matched content of the home media session and disables the media streaming session.
Auto-detection and selection of an optimal storage virtualization protocol
A means for automatic detection and selection of an optimal network storage virtualization protocol. The invention is a solution for the problem of complexity and the resulting lack of optimization in storage virtualization implementations. The invention shields the user from the complexity of network analysis and allows the engaging of multiple storage virtualization protocols—as opposed to a single protocol. The invention enables automatic detection and selection of an optimal network storage virtualization protocol on a per resource basis, which is a unique capability and something that has not been accomplished in the prior art. The net result is a simplified user experience and optimized performance when using virtualized storage.
Network visualization system and method of using same
A network visualization system is provided. The network visualization system may include a monitoring server that discovers devices in a client network, and a client application including a discovery controller and a rendering unit. The discovery controller may receive a list of discovered devices that were discovered by the monitoring server, and the rendering unit may render the discovered devices using DirectX.
System and method for authorization of segment boundary notifications
Systems and methods for processing segment boundary notifications in a digital media receiver are disclosed. One such method includes the step of registering for notification of segment boundary events associated with a first service provided to the digital media receiver. The method further includes receiving a notification of one of the segment boundary events, while tuned to a second service different than the first service; and tuning to the first service responsive to the received notification.
Apparatus and method for automatic channel setup
Provided is a device and a method for automatically setting up a channel. A method for setting up a channel in a slave node includes examining whether a Link Control Protocol (LCP) session with a master node is opened by changing a time slot within a variable range, and performing an Internet Protocol Control Protocol (IPCP) connection with the master node when the LCP session is opened.
Deterministic session load-balancing and redundancy of access servers in a computer network
In one embodiment, for each port of an access node in an access-based computer network, one access server of a plurality of access servers is configured as a preferred access server for that port. Upon receiving a session initiation message at a particular port, the access node forwards the session initiation message to one or more of the access servers based on the configured preferred access server for the particular port.
Differentiated quality of service context assignment and propagation
A method, system and article of manufacture for providing differentiated quality of service in an application server may include receiving a request and accessing pre-determined policy data in a server system. The pre-determined policy data may depend upon the particular client sending the request. A request may include identity, role, requested service, and/or time constraint information. Based upon the request and policy data, a quality of service context may be established, possibly including service class, priority, and/or deadline attributes. The quality of service context may be propagated in the server system with the request.
Split transcript view for business object integration into messaging
Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided. The method can include embedding a business object in message text in a chat session provided by a messenger, and applying an action to the business object from within the messaging session of the instant messenger. The method further can include generating a message transcript for the messaging session with a split view of the message text and the business object and applied action.
Connection manager and methods of connection management
The disclosure is directed to a connection manager that includes a dialer configured to interact with a modem to provide a connection to a service provider. The connection manager includes a graphical user interface and an advice window. The graphical user interface is configured to manipulate parameters associated with the connection. The graphical user interface includes a form component. The advice window is responsive to user actions associated with the form component.
Optimized multi-component co-allocation scheduling with advanced reservations for data transfers and distributed jobs
Disclosed are systems, methods, computer readable media, and compute environments for establishing a schedule for processing a job in a distributed compute environment. The method embodiment comprises converting a topology of a compute environment to a plurality of endpoint-to-endpoint paths, based on the plurality of endpoint-to-endpoint paths, mapping each replica resource of a plurality of resources to one or more endpoints where each respective resource is available, iteratively identifying schedule costs associated with a relationship between endpoints and resources, and committing a selected schedule cost from the identified schedule costs for processing a job in the compute environment.
Resource allocation using shared resource pools
The present disclosure describes methods and systems for managing resources, for example in connection with call admission control or other communications or transactions in a system. In particular, a plurality of resource pools are established. At least a first or priority resource is associated with a minimum resource amount, while at least a second or normal resource pool is associated with a maximum resource amount. From the system resource pools, allocations are made to each of a plurality of system servers. If a server receives a request for priority resources that cannot be satisfied from the allocation of priority resources made to that server, that server may borrow from an allocation of normal resources. Resources can also be shared between servers. Accordingly, if required resources are not available from an allocation made to a server receiving the request for resources, that server can request resources from another server. In responding to a request to share resources, a server can attempt to fill the request as if the request had originally been made to that server.
Method and apparatus for encapsulating a virtual filer on a filer
A method for operating a server first assigns a plurality of storage volumes to one or more storage devices. A plurality of sub-volumes is established within a namespace of each of the plurality of storage volumes. An instance of a virtual server is created, the virtual server having a plurality of assigned sub-volumes, the assigned sub-volumes chosen from different storage volumes of the plurality of storage volumes. A file system function is shared between the server and the instance of the virtual server, the file system function using at least one of the plurality of assigned sub-volumes.
Method and apparatus for using a command design pattern to access and configure network elements
An XML accessible network device is capable of performing functions in response to an XML encoded request transmitted over a network. It includes a network data transfer service, coupled to a network, that is capable of receiving XML encoded requests from a client also connected to the network. A service engine is capable of understanding and parsing the XML encoded requests according to a corresponding DTD. The service engine further instantiates a service using parameters provided in the XML encoded request and launches the service for execution on the network device in accordance with a command design parameter. A set of device APIs interacts with hardware and software on the network device for executing the requested service on the network device. If necessary, a response is further collected from the device and provided to the client in a response message.
On-demand global server load balancing system and method of use
A method and system for measuring performance and balancing workload of sites and servers is provided. The method includes measuring performance of one or more servers located at different sites of the network and computing a performance metric for each of the sites or one or more servers at each of the sites. The method further includes providing a bias to the performance metric and routing a request to one of the different sites or one of the one or more servers based on the biased performance metric.
Systems and methods for time-based dynamic allocation of resource management
Systems, methods, and media for method for managing requests for computing resources. Methods may include dynamically throttling requests for computing resources generated by one or more tenants within a multi-tenant system, such as a cloud. In some embodiments, the present technology may dynamically throttle I/O operations for a physical storage media that is accessible by the tenants of the cloud. The present technology may dynamically throttle I/O operations to ensure fair access to the physical storage media for each tenant within the cloud.
Timing of keep-alive messages used in a system for mobile network resource conservation and optimization
Systems and methods for timing of a keep-alive messages used in a system for mobile network resource conservation and optimization are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of detecting a rate of content change at the content source and adjusting adjusts timing of keep-alive messages sent to the mobile device based on the rate of content change. The timing of the keep-alive messages can further be determined using different polling rates for the content polls of the multiple applications on the mobile device detected by the local proxy.
System and method to prevent endpoint device recovery flood in NGN
A mechanism is provided for recovering from a catastrophic failure that results in a large number of user endpoints attempting to come on line simultaneously after an NGN is restored. In an enhanced DNS load balancer, DNS queries from the user end points relating to a particular NGN edge device are selectively dropped if a rate of queries for the particular edge device suddenly increases or exceeds a threshold. The query dropping may also be based in part on the class of service assigned to the user endpoint.
Propagating accelerated events in a network management system
This invention relates to a method, system and computer program product for a network management system comprising:a probe for intercepting a system event from a monitored system and creating event items or modifying event items associated with the system events; a collection database server collecting, in database of event items, a batch of new event items or modifications to an existing event items; a client; a replication means for periodically notifying a client of the batch of new event items or event item modification; and an acceleration mechanism for directly notifying the client of a new event item or modified event item independently of the periodic batch notification if the new or modified event item satisfies a priority condition.
System and method for managing the configuration of resources in an enterprise
System and method for managing the configuration of resources in an enterprise. Embodiments of the present invention gather, store, and maintain institutional knowledge of configurations of IT resources of an enterprise. A configuration database serves as a temporal record of the configurations of the resources. The configuration database can reflect a dimensional model of the enterprise configuration where various configuration items are linked together. A configuration change can be analyzed and approved, and then reflected in a change to a configuration item (CI) which imposes an appropriate change to other configuration items based on upstream, downstream, peer relationships and/or views. A system according to an embodiment of the invention can also include a change database, an inventory database, a problem database, and/or a service level management subsystem to ensure changes to an enterprise's configuration are consistent with service level agreements and/or operating level agreements.
Determining a model refresh rate
A computerized method for determining a model refresh rate for a model representing a list of network user identifiers includes receiving a first and a second model representing the list at a first and a second time, respectively. Similarity between the first and second model is calculated. If the similarity is less than a threshold value, the model refresh rate is a predetermined rate. If the similarity is equal to or exceeds the threshold value, the model refresh rate is decreased to a less frequent rate. A similarity between a reference model and a selected model in a same content category may be calculated. If the similarity is less than a threshold value, the model refresh rate for the selected model is a predetermined rate. If the similarity is equal to or exceeds the threshold value, the model refresh rate for the reference model is applied to the selected model.
Group operations in machine-to-machine networks using a shared identifier
In a Machine-to-Machine (M2M) network, efficient subscription of a M2M network application to a potentially very large number of device applications executing on remote devices is facilitated by the use of a shared “link-subscription identifier.” Each related device application (e.g., utility meter reading applications) includes a shared link-subscription identifier in its registration to a M2M network gateway or a M2M services capability (SC). The gateways maintain a binding between link-subscription identifiers in the device applications associated with them. To subscribe to all related device applications, a network application includes the link-description identifier in a subscription request to the M2M SC. The M2M SC, in turn, includes the link-subscription identifier in subscription requests it forwards to gateways and directly-connected remote devices. If the link-subscription identifier is one that is maintained locally by a gateway, the gateway forwards the subscription request to all remote devices executing associated device applications.
Computer system having representative management computer and management method for multiple target objects
Even when a configuration in which instances of plural kinds of storage management software having equivalent functions are arranged to cooperatively manage a large-scale storage system is adopted, to prevent occurrence of a management inoperability and configuration information inconsistency and enable the same management operation and information reference as those performed when all management target objects are managed by a single instance. In the present invention, a representative management computer serving as a representative among management computers is determined. The representative management computer collects, from storage apparatuses and host computers, information concerning the management target objects and configuration summary information including a relation type among the objects and determines, on the basis of the configuration summary information, management target objects which each of the management computers should take charge of.
System, device, and method for monitoring communication in a wind farm network
A method for monitoring communication in a wind farm network. A server is attached to one or more network nodes in a wind farm network. The server determines whether it is capable of communicating with each of the network nodes and reports the results as a network state. A graphical representation of the network state may be displayed to a user.
Distributed bootstrapping mechanism for peer-to-peer networks
Methods, apparatuses and systems directed to a distributed bootstrapping mechanism for peer-to-peer networks. In particular implementations, the de-centralized bootstrapping mechanism utilizes an allocated set of anycast addresses from the public IP space. Routing nodes or peer nodes corresponding to respective autonomous systems select an anycast address by computing a hash of an Autonomous System (AS) number (or other string) and mapping the hash value, or a portion of the hash value, to one of the anycast addresses in the allocated set. Other mechanisms for selecting anycast addresses (such as random selection) can be used. One or more of the routing nodes of the autonomous system may advertise a host route identifying the selected anycast address. When a new peer node is added to the P2P network, it may, upon initialization, transmit discovery messages using the anycast addresses from the allocated set, which may be ultimately routed to one of the peers in the P2P network. One of the responding peers in the P2P network may then be used by the newly initialized peer as a bootstrap resource to join the P2P network.
Beacon updating for video analytics
At least one of an initial probability density for a video and an initial granularity mapping for the video based upon the initial probability density are generated at an analytics server. The initial probability density is calculated according to a set of points in the video. A set of beacons is generated by the each of the plurality of the clients according to the at least one of the initial probability density and the initial granularity mapping during playback of the video based on a duration of the playback by the each of the plurality of the clients is received at the analytics server. Further, at least one of an updated probability density and an updated granularity mapping based upon the updated probability density are generated such that a quantity of beacons in the set of beacons is modified.
Information processing apparatus, information processing method, and computer program
An apparatus and method that, in transmission and playback of content between a server and a client, efficiently executes playing back part of content, such as an impressive portion, is provided. By setting index information as partial data region identification information in property information corresponding to content retained by the server, when a content request from the client includes partial playback specification information, the index information is acquired from the property information corresponding to the specified content, and the content is acquired and transmitted to the client. This configuration enables the client to enjoy playback of content of only particular partial data such as an impressive portion of content received from a server or a user's favorite portion.
Gateway-assisted file transfer
A file transfer application maintains a secure connection over the Internet with a file transfer gateway. A user selects a file and the file transfer application requests a unique ticket from the gateway. The ticket is stored in both the gateway and the file transfer application. Next, the ticket is then encoded in a URL that can be sent to potential recipients of the file via conventional methods. Upon entering the URL into a web browser, the recipient will navigate to the file transfer gateway. The gateway decodes the URL to recover the ticket and looks up the ticket in the database to determine the associated application instance and file description. The gateway will then request the application instance to start encrypting and streaming the contents of the file identified by the ticket to the gateway, which then retransmits the encrypted stream to the recipient's web browser.
System for generating a site pathing report based on real-time analytics data
Machine-implemented methods for providing information to a graphical user interface for displaying web site traffic information are provided. In one aspect, the method includes acquiring low latency web site traffic data for a web site, identifying at least one path taken by at least one visitor between a plurality of web pages for the web site based on the acquired low latency web site traffic data, and providing information for a graphical representation of the identified at least one path. Systems and machine-readable media are also provided.
System for merging and comparing real-time analytics data with conventional analytics data
Machine-implemented methods for providing information to a graphical user interface for displaying web site traffic information are provided. In one aspect, a method includes acquiring low latency web site traffic data for a web site and acquiring historical web site traffic data for the web site. The method also includes combining, into combined web site traffic data, the low latency web site traffic data for the web site with the historical web site traffic data for the web site, and providing the combined web site traffic data to a graphical user interface for display. Systems, graphical user interfaces, and machine-readable media are also provided.
System for sharing and tracking review of rich content, and methods associated therewith
Methods and systems are used to share data as authorized by a provider for review by a recipient. As the recipient reviews information, information relating to the amount reviewed is tracked, and the provider is notified of whether or not the recipient has accessed the shared information and/or the extent to which the shared information was reviewed. The shared information may, in some contexts, be video data. Video may be captured and automatically uploaded to a network-accessible location. The uploaded video may then be shared with a recipient. As the recipient reviews the uploaded video, the amount viewed by the recipient can be tracked, and the provider notified of the amount viewed.
Distributed comment moderation
A distributed comment moderation service is arranged to help mediate the moderation of blog comments using a (for example) centralized moderation queue. The centralized moderation queue can be used to automatically (including semi-automatically) outsource blog comment moderation to third party resource providers. The distributed comment moderation service is optionally arranged to provide an indication of an assessment of the quality of the third party resource providers.
Enhanced message display
Informational items are displayed in a scrollable area of a message display. The informational items may be any number of type of items (e.g., RSS feeds, new items, images, application tips, and so on). A user is provided the ability to scroll forward and backward through the informational items. A user may choose the informational item (e.g., by clicking) and more detailed information about the informational item is presented to the user. Depending on the display view of the message application (e.g., InBox, conversation), different informational item types will have different probabilities of display. A user may customize the types of informational items to be displayed.
Following content item updates via chat groups
A content item hosted by a content item source (such as a weblog post of a weblog) may receive updates (e.g., comments submitted by users), and may be discussed among users in a chat group of a chat service. The content item source and the chat service may coordinate to notify users of updates to the content item, and to share content regarding the content item. When a user requests to subscribe to updates of the content item, the content item source may invite the user to join a chat group of the chat service created for discussion of the content item. Additionally, updates to the content item received by the content item source may be automatically posted as messages in the chat group, and messages posted in the chat group regarding the content item may be automatically posted as updates to the content item at the content item source.
Transferring applications and session state to a secondary device
A first device transfers a running application to a second device. A first device sends a request to transfer a running application to a second device. The second device determines whether the application is presently installed on the second device. The second device determines whether the application is an application designed to run on a platform of the second device. The second device then receives state information for the application from the first device. In response to receiving the state information, the second device executes a counterpart application utilizing the state information received from the first device.
Multi-hop MIMO system and method
Disclosed are a multi-hop MIMO system and method. The multi-hop MIMO system according to an exemplary embodiment of the present invention includes: a server including a plurality of virtual machines; one remote screen device first connected to the server through at least one virtual machine of the plurality of virtual machines, receiving screen data from the server in a unicast scheme, and driven as a multicast server; and a plurality of different remote screen devices connected to the server through the at least one virtual machine, existing on a sub network where the one remote screen device exist, operating as multicast clients, receiving the screen data from the server or the one remote screen device in a multicast scheme, wherein the one remote screen device and the plurality of different remote screen devices simultaneously output the same screen data.
Common organization estimation at registration
The registration of an individual for a service while providing protection against unintentional duplication of registration for the same organization. Upon receiving a request to register for a service from an individual over a network, it is automatically estimated as to whether the individual requesting registration belongs to the same organization as a prior registrant for the service. If so, the service notifies the individual requesting registration that they might belong to the same organization as a prior registrant. In one embodiment, it is then left to the individual as to whether they want to continue registering for the service.
Apparatus, method and system for improving application performance across a communications network by event routing
An apparatus, method and system to enable dynamic replication of Web servers across a wide area in response to access patterns by Web clients as well as in response to customer requests. The method for dynamically replicating one or more parent nodes on a network in response to a user request by a policy manager. The policy manager transmits the user request to an event module. The event module transmits the user request to a data consistency module, wherein the data consistency module maintains integrity of the data on the parent node. The event system communicates with a resource management module to ensure proper utilization of network resources, and transmits the routing request to a request routing module for appropriately balancing the network load. The request routing module is capable of providing optimal routing based on the network resources.
Notification based web applications
An interactive web application framework allows a user to define user interface and logic of a web application and publish the web application. A web application system can receive a database notification from a database server. The database notification can indicate that an update of a user interface item has occurred in a database. The database notification can be generated by the database server in response to a request from a user device. The request can be a request to receive information when any state change occurs at the database server. The web application system can initiate communication with the user device without responding to a specific request requesting the update. The web application system can generate instructions for refreshing the user interface item in a browser, and push the instructions to the user device.
Robust filters for social networking environments
Networking systems and methods according to exemplary embodiments of the present invention can provide robust filtering to enable users to customize their networking environments. A networking system can comprise a plurality of interfaces, a request unit, a management unit, and a filter unit. Each interface can include a plurality of displayable objects, each of which can represent some user of the networking system. The request unit can receive from a client a request for one of the interfaces. The management unit can manage filters, where each active filter hides one or more users from one or more other users. When an interface is requested by a client associated with a first user, the filter unit can apply the active filters to the requested interface to exclude displayable objects that represent users hidden from the first user by one or more active filters.
Enhancing browser history using syndicated data feeds
Embodiments relate to systems and methods for enhancing browsing history using syndicated data feeds. A browser contains a navigation manager that captures and tracks the URLs (universal resource locators) of the Web sites and subsections of sites that a user visits. The captured URL pathways are stored to a navigation record. In addition, the presence and identify of RSS feeds which the user has chosen to activate is also recorded. Upon return to the same Web site or other location, the navigation manager directs the user to the specific section of the Web site associated with the RSS feed, such as media lists, photography upload sections, or other portions of a Web site.
Server handoff in content delivery network
A content delivery method directs a request by a client for an object to a first server in a content delivery network (CDN), regardless of whether the first server has the requested object. If the first server has the requested object, then it is served to the client from the first server; otherwise, the first server redirects the client request to a second server in the CDN to handle the request. The second server may be a peer server of the first server. The first and second servers may be edge servers in the CDN.
Peer-to-peer electronic device handling of social network activity
Peer-to-peer electronic device handling of social network activity, in which an electronic device determines that a user profile registered for a peer-to-peer network defines one or more preferences related to handling social network activity accessible by one or more of the electronic devices connected to the peer-to-peer network. The electronic device automatically, without user input at any of the electronic devices connected to the peer-to-peer network, negotiates with the electronic devices connected to the peer-to-peer network to determine how to collaboratively handle social network activity to meet the rules specified in the user profile. Based on the negotiation, the electronic device automatically, without user input at any of the electronic devices connected to the peer-to-peer network, collaborates with at least one electronic device that is connected to the peer-to-peer network and that is unable to access the social network to handle social network activity.
Method to manage network printers and network system using the same
A management method of network printers and a network system using the same, which are capable of easily allowing a network manager to collect management information by allowing the network printers manufactured by different companies to be compatible with each other. When connections between object identifications of the network printers and object identifications of the other network printers are previously set by a user, the network manager can easily collect the management information of the network printers using the same object identification.
Method and controller for processing data multiplication in RAID system
The invention discloses a method and controller for processing data multiplication in a RAID system. Map tables are generated for all values in a field, respectively. The length of an XOR operation unit is chosen to be appropriate w bits (e.g., 332 bits or 64 bits). One or several XOR operation units form a multiplication unit of a data sector. When computing on-line, data in a disk drive of a disk array are performed with XOR operations in accordance with one of the map tables using an XOR operation unit as one unit while computing on the multiplication unit to obtain a product of multiplication. Making use of the RAID system established according to the disclosed method, only XOR operations are required to compute parity data or recover damaged user data. Moreover, several calculations can be performed simultaneously. Therefore, the efficiency of the RAID system can be effectively improved.
Random number generating method and random number generating apparatus
A mask circuit (2) masks a bit sequence of K bits by a predetermined bit pattern. An EXOR circuit (3) EXORs the masked bit sequence. An inverter (9) controls inversion/non-inversion of values of bits of a bit sequence which includes a bit value indicating the EXOR result in a result obtained by shifting the bit sequence of K bits held in a shift register (1), in accordance with a designated bit value in a pattern table (14). A bit sequence as the control result is output as a random number expressed by K bits.
Processing changes to reference counts associated with an object in reference counting systems
The present invention provides techniques that allow concurrent collection of cyclic garbage on reference counting systems. In general, candidate objects are found that may be part of cyclic garbage. Each candidate object has a reference count. Two tests are performed to determine if concurrent operations have affected the reference counts of the candidate objects. If concurrent operations have not affected the reference counts, the candidate objects are collected as garbage. Additionally, during garbage collection, the decrements to reference counts are delayed so that increments occur before decrements and so that decrements are held a predetermined time before being applied. This prevents decrementing a reference and collecting a cycle as garbage right before a reference is added to an object in the cycle.
Graphical objects bonding society system and method of operation for a game
The present inventions relates to an Internet service based on two fundamental beliefs, first that identity on the Internet and in real life is substantially based on a individual's or organization's relationship to other people, objects, places, spaces, and organizations and second that individuals or organizations themselves should create, manage and control that identity. Based on these beliefs the present invention offers the Internet's leading tools, services and ecosystem that enables individuals and organizations to intuitively create and manage their identity based on relationships, effortlessly customize their internet experience to fit that identity and empower themselves to use that identity for benefit in their real life.
Using task sequences to manage devices
Task sequences are used to manage devices. According to one aspect, a user-defined or user-selected task sequence is received. The task sequence is converted into an ordered series of steps, and the series of steps are performed, in accordance with their order, in managing a device over a network. In certain implementations, the ordered series of steps are steps for automatically deploying an operating system on the device.
Multiple system compatible database system and method
A database system and method that is compatible with multiple end-use systems, even when changes and/or updates are made to the layout, format, and/or data content in the database. The database includes a structure section and a data section. The data section includes a plurality of stored data records that have one or more features. The structure section includes a feature mask that has data stored therein that indicates whether a particular one of the data records is compatible with one or more end-user systems.
Method and system for programming at run-time and dynamic business application
A method and system for Dynamic Business Application with a run-time development environment uses Application Intelligence to reduce programming efforts and avoid the “compile-execute” cycle. The approach may be especially useful in the context of an ERP solution platform working with various database engines and multiple, including right-to-left, languages.
Method and apparatus for streaming netflow data analysis
A system and method are described for progressively efficiently filtering and gathering netflow data. Flow records are analyzed to find out which keys (addresses, conversations, protocols etc) meet defined filter parameters. The netflow data is processed and a data structure of fixed size is continually maintained in order to facilitate efficient retrieval of the gathered netflow data.
Aiding report construction based on inference of implicit application level relationships
A method of aiding report construction based on inference of implicit application level relationships is provided herein. The method may include the following steps: analyzing a model of a software application to yield data elements associated with base objects of the software application and relationships between the data elements; generating a list of reportable objects comprising the base objects and objects associated with the data elements and their relationships; ordering the reportable objects based on at least one of: content and usage of the reportable objects, to yield an ordered list; and presenting the ordered list in a form usable for building a report on the software application, wherein at least one of: the analyzing, the generating, the ordering, and the presenting, is carried out by at least one processor.
Categorization of information using natural language processing and predefined templates
A computer implemented method for generating a report that includes latent information, comprising receiving an input data stream that includes latent information, performing one of normalization, validation, and extraction of the input data stream, processing the input data stream to identify latent information within the data stream that is required for generation of a particular report, wherein said processing of the input data stream to identify latent information comprises of identifying a relevant portion of the input data stream, bounding the relevant portion of the input data stream, classifying and normalizing the bounded data, activating a relevant report template based on said identified latent information, populating said template with template-specified data, and processing the template-specified data to generate a report.
Updating dispersed storage network access control information
In a dispersed storage network where slices of secure user data are stored on geographically separated storage units, a managing unit connected to the network may seek to broadcast and update secure access control list information across the network. Upon a target device receiving the broadcast the target device creates and sends an access control list change notification message to all other system devices that should have received the same broadcast if the broadcast is a valid request to update access control list information. The target device waits for responses from the other system devices to validate that the broadcast has been properly sent to a threshold number of other system devices before taking action to operationally change local data in accordance with the broadcast.
Variant entries in network data repositories
A logical network directory database compliant with the X.500 standard for a directory data system is disclosed. The network directory database provides a source of subscriber and service data accessible by various control and management processes that require subscriber information. The network directory database may be extensible across various communications service providers and IT domain. Further, the disclosed network directory database may be applied to new and existing services, such as, IP Multimedia Subsystem, Unlicensed Mobile Access (UMA) and other IP services.
Methods and apparatus for multiple-keyword matching
One embodiment relates to a computer-implemented method for multiple-keyword matching performed using a computer including at least a processor, data storage, and computer-readable instructions. A keyword set and a text input to be searched are obtained. The keyword set is processed to create a reverse trie. A search procedure which starts from the end of the text is then applied using the reverse trie to find keyword occurrences in the text input. Other embodiments, aspects, and features are also disclosed.
Configuration information management device, distributed information management system and method
A configuration information management device includes a storage unit for storing a configuration item and an item relationship. The configuration information management device controls to cause the storage unit or the different configuration information management device to store the item relationship. The configuration information management device also controls to cause the storage unit or the different configuration information management device containing a configuration item connected to the item relationship to store a replica of the item relationship. When a search request including a series of the configuration item and the item relationship is accepted, the configuration information management device decomposes the search request such that the configuration item and the item relationship arranged in series are together treated as a unit of processing, and performs a search process for each unit of processing.
Method and system for identifying information relevant to content
A method and system for identifying information to be associated with content of a display page. The system provides a web service through which associates of a vendor can request and receive information such as product data to be displayed on the associate's display pages. The system may receive from an associate's computer a request for product data that may include content derived from a web page on which the product is to be displayed. Upon receiving the request, the system identifies a query based on popularity of the query among users, executes the query, and provides an associate with information relating to the results of the executed query.
Fresh related search suggestions
Methods, systems, apparatus, including computer program products, for providing fresh related search suggestions in response to a user submitted query are presented. In one implementation, a plurality of prior queries are selected wherein each of the prior queries was submitted as a search query a number of times during a recent time period and satisfies a criterion. For each of the prior queries, the prior is selected as a candidate query based on one or more of: a determination that search results responsive to the prior query include a number of news results that satisfy a second threshold, and relevance data indicative of user behavior relative to the search results responsive to the prior query. In response to receiving a user query, one or more candidate queries are selected that match the user query.
Media transcription, synchronization and search
The invention relates to the field of computer search on a network and is particularly directed to searching for and displaying audio and/or audio-video (“A-V”) results. A system and method provide seamless delivery of audio and A-V results that are auto-populated into a media player on a computer system.
Managing copies of data
A method in a computer system for retrieving data from one of multiple copies of the data is provided, referred to as the data management system. The data management system receives a request identifying a data object to be accessed. Then, the data management system queries a metabase to locate data copies that contain the identified data object, wherein the data copies are created from similar source data, and wherein for each data copy the metabase contains an indication of the availability of the copy relative to other copies. Next, the data management system determines one of the located data copies to use to access the identified data object, wherein the determination is made based on the indicated availability contained in the metabase for each of the located data copies. Then, the data management system accesses the identified data object using the determined one of the located data copies.
Scalable lookup-driven entity extraction from indexed document collections
A set of documents is filtered for entity extraction. A list of entity strings is received. A set of token sets that covers the entity strings in the list is determined. An inverted index generated on a first set of documents is queried using the set of token sets to determine a set of document identifiers for a subset of the documents in the first set. A second set of documents identified by the set of document identifiers is retrieved from the first set of documents. The second set of documents is filtered to include one or more documents of the second set that each includes a match with at least one entity string of the list of entity strings. Entity recognition may be performed on the filtered second set of documents.
Multiple phase content ingest
Content ingest can comprise the storage of content and the logging of the descriptive and technical metadata necessary to identify and locate the content. The methods and systems provided herein relate to content ingest utilizing multiple phase processing to account for both standard and non-standard metadata.
Processes to learn enterprise data matching
A system and method for managing media advertising enterprise data including a process for learning enterprise data matching. An EDM (Enterprise Data Management) application module can be configured to include a set of rules at an enterprise level to manage disparate and disconnected records associated with an entity. A number of unmatched and enterprise entities that matches with respect to an active entity can be returned based on a fuzzy logic associated with various matching options stored in an EDM database. A matching process can then be performed to accurately match similar records regardless of manual input, location, and format of the records in a distributed system. Each unmatched record can then be assigned with a parent enterprise entity. Such an optimization mechanism can interactively manage and report records at the enterprise level in a simple and efficient manner.
Geospatial object property assessment apparatus, assessment system, editor apparatus and method of assessing property of a geospatial object
A geospatial object property assessment apparatus comprises a processing resource (102) arranged to support a geospatial object property processor (206) comprising a subject data source input (212) capable of receiving a first metadata associated with 10 quality of current source information content used to define a property (408) of a geospatial object; a resource data source input (214) capable of receiving a second metadata associated with quality of candidate resource information content for updating the definition of the property (408) of the geospatial object. The apparatus also comprises an assessment processor (208) operably coupled to the inputs (212, 214), the 15 assessment processor (208) being arranged to use the first metadata and the second metadata in accordance with a predetermined ruleset in order to determine whether the candidate resource information content constitutes a qualitatively better resource to define the property of the geospatial object than the current source information content.
Method and system for self-adapting classification of user generated content
A self-adapting classification system (“SACS”) generates an evolving classification for content. The classification may start with a seed review process, which generates a level of trust for initial reviews of the content. Once the seed review is completed and distributed, users may submit content reviews to the self adapting classification system. Using the SACS, users may identify themselves with one or more community groups, which indicate certain shared values and preferences with respect to other members of the same community group. Content reviews received by the SACS may comprise a user identifier pertaining to the submitting user, a content descriptor and an associated classification.
Method of displaying adaptive album art for portable terminal and apparatus for providing the same
A method of displaying an adaptive album art for a portable terminal is provided, which includes confirming whether the album art exists by reading meta data frame that corresponds to at least one sound source data, classifying and storing the sound data by meta data items commonly included in the corresponding meta data information if the album art exists, extracting an image file from the album art of the sound source data classified by meta data items, and matching the extracted image file to a changeable disc album art preset by meta data items to display the matched image.
System and methods for predicting future trends of term taxonomies usage
A method and system for predicting future trends of terms taxonomies of users generated content. The method comprises crawling one or more sources of users generated content to collect phrases mentioned by users of the one or more data sources; periodically analyzing one or more term taxonomies to determine at least a trend of at least a non-sentiment phrase with respect of a plurality of sentiment phrases, wherein a term taxonomy is an association between a non-sentiment phrase and a sentiment phrase, the non-sentiment and sentiment phrases are included in the collected phrases; and generating a prediction of future behavior of the at least trend with respect of the one or more term taxonomies.
Method and system for identifying entities
Some embodiments provide a program that identifies an entity having an entity attribute. The program receives, from each method of several methods, a set of candidate identity attributes that are each for identifying a particular entity having the entity attribute specified in the document. Each method of the several methods generates the corresponding set of candidate identity attributes based on the entity attribute specified in a document. The program calculates a score for each candidate identity attribute in the sets of candidate identity attributes. The program identifies, based on the sets of scores, an identity attribute from the sets of candidate identity attributes that identifies the entity having the entity attribute specified in the document.
Generating ranked search results using linear and nonlinear ranking models
Generating ranked search results includes receiving a plurality of matching information items that match a search request, ranking at least some of the plurality of matching information items using a linear ranking model that linearly combines a first plurality of feature values to obtain a first set of ranked results, ranking at least some of the first set of ranked results using a nonlinear ranking model that nonlinearly combines a second plurality of feature values to obtain a second set of ranked results, and provide a search response based on the second set of ranked results.
Generating a semantic graph relating information assets using feedback re-enforced search and navigation
Embodiments of the invention provide an approach for creating, evolving and using a weighted semantic graph to manage and potentially identify certain information assets within an enterprise. The semantic graph may be generated by monitoring users navigating through search results which provide a set of information assets responsive to a search query. By recording the navigation path taken by many users, relationships between information assets may be identified. Further, once generated, the semantic graph may be used to present users with in indication of related information assets as part of the search results. Further still, the semantic graph may also be used to identify information assert “hubs” as well as information assets that may provide low utility to individuals within the enterprise.
Customizing image search for user attributes
Systems, method, and apparatus including computer program products for providing image search results. In some implementations, a method is provided. The method includes receiving from a user a query for images including static images, moving images, and images within multimedia content, identifying at least one of a language attribute and a locale attribute of the user, generating multiple search results, each result corresponding to an image content item that satisfies the query, ordering the search results based at least on click data for image content items that satisfy the query, the click data gathered from users having at least one of the language attribute and the locale attribute, and presenting the ordered search results to the user, including presenting representations of the corresponding image content items.
Managing the sharing of logical resources among separate partitions of a logically partitioned computer system
A mechanism is provided for sharing resources among logical partitions in a logical partitioned data processing system and for managing the changes to resources in such a way that the sharing operating systems are able to handle the various transitions in a graceful manner. Four hypervisor functions plus a specific return code manage the granting of access of resources owned by one partition to another (client) partition, accepting of granted resources by client partitions, returning of granted resources by client partitions, and rescinding of access by the owning partition. These four hypervisor functions are invoked either explicitly by the owning and client partitions or automatically by the hypervisor in response to partition termination. The hypervisor functions provide the needed infrastructure to manage the sharing of logical resources among partitions.
Methods and a device for providing a compressed index of binary records. A method includes: sorting the records by content of a predetermined field of the record, indexing the field from one of the records in a line of a bitmap index, compressing bits in a column of the bitmap index by replacing a group of successive bits with a code, where the sorting includes the steps of assigning, for each record, a hash bucket of a hash table on a basis of a locality sensitive hash function on the contents of the predetermined field, so that the probability for two of the records to be assigned to the same has bucket increases with the similarity of the contents of the predetermined field between the records, and where at least one step of the computer implemented method is executed on a computer device.
Cross-ACL multi-master replication
Techniques for cross-ACL multi-master replication are provided. The techniques allow a replication site in a multi-master replication system implementing an asynchronous replication protocol and an access control policy to appropriately apply received data change updates to data maintained at the site even where a data change update is missing information because of the implemented access control policy.
Synchronization of storage using log files and snapshots
A system for processing data comprises a deduplicating system, an interface, and a processor. The deduplicating system stores a copy of data stored in a data storage system by storing a set of segments that is able to reconstruct the data stored in the data storage system. The data storage system has a stored log file. The stored log file stores a data change and an associated time for the data change. The interface receives an indication to revert data stored in the data storage system to a state at a snapshot time. The processor is configured to determine a first subset of the data stored in the data storage system that has changed since a prior snapshot using the stored log file and to determine a second subset of the data stored in the data storage system that has changed between the prior snapshot and the snapshot time using a first list of fingerprints associated with the prior snapshot and a second list of fingerprints associated with the snapshot time.
Distributed processing with metadata placeholders
Metadata placeholders are used for distributed processing. The metadata placeholders are added to digital objects. The placeholders are filled with requests to perform certain downstream processing on the objects. The placeholders are at least partially empty so they can be filled in by nodes that perform the downstream processing.
Personality / popularity analyzer
A device receives communication information from a user device associated with a user, calculates an extrovert score for the user based on the communication information, and calculates a popularity score for the user based on the communication information. The device also calculates an interesting communicator score for the user based on the communication information, determines a personality score for the user based on the extrovert score, the popularity score, and the interesting communicator score, and stores the personality score.
System and method for scaled multinomial-dirichlet bayesian evidence fusion
A fusion method, implemented by one or more processors, for classifying a target having class types. The method includes: obtaining evidence from one or more classifiers, the evidence represented by scores from the one or more classifiers; representing the obtained evidence in a Bayesian context, where the Bayesian beliefs are obtained from the scores; obtaining new evidence, the new evidence represented by new scores from the classifiers; representing the obtained new evidence in an enhanced Bayesian context, where the enhanced Bayesian beliefs are obtained from the new scores; combining the scores and the new scores over multiple times; combining the evidence and the new evidence over multiple times; and using the combined scores and the combined evidence for each of the plurality of class types to classify the target.
Emotion recognition apparatus and method
An emotion recognition apparatus and method are provided. The emotion recognition apparatus acquires a first emotion factor and a second emotion factor of an emotion model. An emotional state of a user is estimated based on the first emotion factor and the second emotion factor. The emotion recognition apparatus may also acquire a third emotion factor of the emotion model.
Crowdsensus: deriving consensus information from statements made by a crowd of users
A system and method for updating and correcting facts that receives proposed values for facts from users and determines a consensus value for the fact based on a distribution of the probabilities that the proposed values are the correct value for the fact wherein the probability that the proposed value is the correct value for the fact is based on a score indicative of the probability that the user proposing the value proposes accurate values.
Constraint satisfaction problem solving using constraint semantics
A computer-implemented method, apparatus and product for solving a Constraint Satisfaction Problem (CSP). The computer-implemented method, performed by a computerized device, comprising: obtaining the CSP comprising a set of variables, a set of corresponding domains, and a set of constraints; and solving the CSP by iteratively: limiting the domains to exclude values that cannot satisfy one or more constraints of the set of constraints; heuristically selecting a variable out of the set of variables, wherein said heuristically selecting is based on constraint semantics of a constraint of the set of constraints; and limiting a corresponding domain of the selected variable.
Devices and methods for use in forecasting time evolution of states of variables in a domain
Devices and methods for use in forecasting the state of one or more of a plurality of variables within a domain are provided. One example method includes determining, at a processor, a first probability curve indicative of a probability of a change-in-state of the first variable over a first interval, the first probability defining a first substantially continuous time trajectory, determining, at the processor, a second probability curve indicative of a probability of a change-instate of the second variable over a second interval, the second probability defining a second substantially continuous time trajectory, the first interval at least partially overlapping with the second interval, and displaying, at a display device, the first and second probability curves substantially in real time, thereby permitting a user to compare the relative probabilities of the change-in-state of at least one of the first and second variables.
System and method of pricing resources
Embodiments of the present invention relate to a system and method for pricing resources. One embodiment of the present invention includes a historical usage database adapted to store historical customer usage and pricing data, and a pricing algorithm module adapted to perform a simulation using the historical customer usage and pricing data to establish resource usage prices and swing option prices that will maintain a profit margin near or equal to a profit margin setting.
System and method of fraud reduction
A system and method may allow for extending authentication to a two factor, out of band form, requiring an additional data element or code via a channel different from the channel used for the primary transaction, where the different channel has the attribute that it is difficult or costly to achieve many access points to it, and it is possible to limit the number of users associated with a particular access point to it.
Watermarking in an encrypted domain
Methods, apparatus and systems for embedding auxiliary information in encrypted host signals are provided. The present invention enables secure application of digital watermarks at any point in the transmission and/or distribution of digital content by enabling the insertion of a plurality of digital watermarks, without the knowledge of the encryption/decryption keys, into a digital host content that has been encrypted with an encryption key. The embedded watermarks persist throughout the content subsequent to the decryption of the content. The disclosed techniques are applicable to content that has been encrypted using a variety of different encryption techniques and algorithms, including stream ciphers, block ciphers, symmetric and asymmetric encryption algorithms. These methods are further adapted to enable the insertion of watermarks into a content that is compressed prior to encryption.
Money transfer transactions via pre-paid wireless communication devices
Systems and methods for performing money transfer transactions via a wireless communication device, such as a cellular phone, are provided. The wireless communication device may be associated with, or automatically linked to, at least one payment source account. The wireless communication device may be associated with at least one pre-paid payment source account. In one example, the wireless communication device is a pre-paid cellular phone and/or is associated with a pre-paid money transfer account. The wireless communication device may access a pre-directed phone number, e.g., *55, to access a money transfer service provider. Once connected to a money transfer service provider, a user may initiate a money transfer via the wireless device, which is optionally paid to a payee in-person at a money transfer service provider location.
Electronic commerce system
Embodiments of the present invention provide methods, systems, and computer readable storage media to facilitate a transaction in an electronic commerce system. Aspects of the embodiments include receiving a request at a network-connected transaction server to transfer one or more transaction items involving a first user account on the transaction server, selecting a delivery instrument from one or more available delivery instruments associated with the first user account on the transaction server, authorizing the request based at least upon a unique transaction identifier associated with the request and a unique user device identifier associated with a user access device, transferring a quantity of the one or more transaction items into or out of the selected delivery instrument, wherein the quantity is determined at least based upon the authorized request.
Systems and methods for providing a mobile financial platform
The invention provides systems and methods that provide a mobile banking platform to a user. The system may be in the form of an application disposed in a mobile customer machine, the application tangibly disposed in the form of code on a computer readable medium. The application may comprise a processing portion that interfaces with a human user and interfaces with a bank processing system, the processing portion providing financial related functionality relating to a financial account of the user, the processing portion: (1) inputting data related to the financial account from at least one of the user and from the bank processing system; (2) inputting a command related to the data; (3) performing processing on the data in response to the command; and (4) outputting a result based on the processing performed, the result output to at least one of the user and the bank processing system.
System and method for providing alternate funding source for portable consumer device
A system, apparatus, and method for providing a mechanism for loading a prepaid card, such as a payroll card, with funds from a source other than the employer of the cardholder. The invention permits a cardholder to request that their employer provided payroll card (or other form of prepaid card) be charged or loaded with funds from an alternate source of funding. In response to the request, one or more background, credit, or other forms of security checks or investigations may be performed to ensure that accurate data regarding the cardholder is available and that there are no indications that the request might be an attempt to commit a fraudulent act.
Computerized method to accept and settle cash transaction payments
A system and method is provided to accept and settle transaction payments for a consumer. The consumer initiates a transaction with a merchant, and the merchant transmits transaction information to a central processing unit using an initiating processing unit. The central processing unit generates a unique transaction identifier. The system may provide the merchant and consumer the nearest payment processing unit. At the payment processing unit, the consumer presents the unique transaction identifier, which is transmitted to the central processing unit for validation. The consumer makes payment at the payment processing unit, and the payment information is transmitted to the central processing unit. The system remits the payment to the merchant.
Secure payment service and system for interactive voice response (IVR) systems
A secure payment method includes receiving, at a computer of a payment service, a request from a requester for a one time use transaction identification token for a transaction. The one time use transaction identification token is provided from the payment service computer to the requester. The one time use transaction identification token is received at the payment service from a merchant communications apparatus under the control of a merchant. Electronic payment information for the transaction is issued from the payment service to the merchant upon validating the one time use transaction identification token.
System and method for displaying profit related information in an electronic trading environment
A system and method for displaying a plurality of profit and risk related indicators are described. A graphical interface displays and dynamically updates a plurality of profit/loss (P/L) indicators including a realized, net, and open indicator. The net and open indicators are based on a trader's net position and a current market level, while the realized indicator is based on trader's buys and sells associated with a tradeable object. In one embodiment, the plurality of indicators are displayed in relation to a plurality of money management regions defining a maximum order quantity and a maximum net position controlling the trader's trades, so that a trader can quickly determine his current as well as potential money management parameters. The graphical interface may also display a plurality of potential risk/gain indicators in relation to a realized profit indicator so that a trader, before entering an order having a predetermined order quantity, can view a potential risk/gain in entering into a predetermined net position in view of potential market movements.
Distributed server side device architecture
An electronic trading method is provided. The method includes receiving a trading strategy order having a parent trading strategy including multiple quoting legs; splitting the trading strategy order into multiple child orders; and submitting each of the multiple child orders to exchange systems adapted to fill the quoting legs in the child orders. Each child order includes a child trading strategy having a single quoting leg or a reduced number of quoting legs relative to the parent trading strategy. The child trading strategies are the same as the parent trading strategy except for the number of legs marked as quoting legs. The method may be performed by a trading strategy device disposed between a client device and multiple server side devices.
Market data alert and news-driven alert system
A system for providing a real-time user notice or alert for traders and daytraders based on stockmarket events or other market data is disclosed. The system provides for receiving a user selection of a first market event setting, and receiving user input specifying a maximum period of time, and providing the alert only if within the maximum period of time specified a first market signal corresponding to the first market event occurs and a second market signal corresponding to the first market event occurs, the first and second market event both corresponding to the same market event selection but being at different values. Also, customizable business or market news-based alerting is disclosed to allow signals and/or filters to be set for news-driven alerts.
Method and apparatus for facilitating user selection of a category item in a transaction
A method and apparatus are disclosed for facilitating category selection by a user in a computerized auction. A category field is provided, containing a plurality of category entries used to categorize an item in the auction. One category entry is selected in the category field and at least one subcategory field is provided, containing a plurality of subcategory entries also used to categorize the item in the auction, the subcategory entries corresponding to the one selected category entry of the plurality of category entries. At least one subcategory entry corresponding to the one selected category entry is further selected in the at least one subcategory field for further processing.
Amateur athlete compensation product using residual value
A computer-implemented method including, retrieving information indicative of aggregate income that is attributable to a plurality of collegiate sports teams and income that is attributable to a particular collegiate sports team in the plurality, and for the particular collegiate sports team, determining an athlete residual value that is at least partly based on the aggregate income that is attributable to the plurality of collegiate sports teams and the income that is attributable to the particular collegiate sports team in the plurality, determining, based on the athlete residual value, a portion of the aggregate income that is revenue shared with a particular athlete who is a member of the particular collegiate sports team, and causing the determined portion of the aggregate income to be placed in a student athlete retirement trust for the particular athlete.
Optimal portfolio withdrawal during retirement in the presence of longevity risk
A method, system, and medium for recommending an optimal withdrawal amount, for a given period, from a retiree's portfolio accounts comprised of relatively risky and relatively safe financial assets used to finance retirement. The user supplies information about the retiree's personal characteristics, including age, gender, and health status. Details of the retiree's financial situation are also supplied, including the retiree's total liquid wealth, the current value of relatively risky and relatively safe assets, and any after-tax pension and other annuity income. Risk (standard deviation of return), return (expected rate of return based on a lognormal or other random distribution), or other measurable differentiating characteristics are retrieved for a portfolio comprised of relatively risky assets. A valuation rate is also retrieved. Based on these inputs, an actuarial discount rate is computed, an optimal wealth depletion time is located, and the optimal withdrawal amount is computed and displayed to the user.
Method and system for developing and applying market data scenarios
A method for developing and applying market data scenarios may include receiving market data by a record and replay daemon executing on a computer system; storing the received market data in a storage device; replaying the stored market data; changing the stored market data with respect to at least one asset by applying in an automated manner a contrived market activity scenario selected from a plurality of different scenarios stored on the computer system, whereby performance of at least one specific asset is changed to a contrived performance to simulate market activity desired by a user to create a contrived market activity scenario; and transmitting the contrived market activity scenario to a client application, which is able to process the contrived market activity scenario as if it were market data transmitted directly from the market data distribution platform.
Platform for hosting virtual events
A platform for hosting virtual events includes a user interface module generating a user interface for accessing a virtual event; a conferencing module providing conferencing between participants of the virtual event; a virtual environment module generating a virtual environment for interaction between participants of the virtual event; and a payment processing module collecting payments from participants of the virtual event and distributing payments to an event planner.
Enterprise integrity simulation
Methods and apparatus, including computer program products, for risk assessment and analysis. Asset data representing a set of assets is received. Threat data representing a set of threats is received. Measures data representing a set of measures is received. A loss expectancy based upon the value of the assets, the potential reduction of value caused by the threats, and the protection of the value caused by the measures is automatically calculated. Project data representing a simulated project is received. A revised loss expectancy is automatically calculated based upon the value of the assets, the potential reduction of value caused by the threats, and the protection of the value caused by the measures as modified by the simulated project. A savings caused by the simulated project is automatically calculated based upon the loss expectancy and revised loss expectancy.
System and method for guaranteeing minimum periodic retirement income payments using an adjustment account
A system and method for providing a user with a plurality of guaranteed minimum retirement income payments is disclosed. The system comprises a variable immediate annuity module to receive an income generating payment and to output a guaranteed minimum retirement income payment amount wherein the periodic retirement income payment amount is greater than, equal to, or less than a guaranteed minimum periodic retirement income payment amount if the income generating payments received are received according to a predetermined payment schedule, and wherein the predetermined guaranteed minimum periodic retirement income payment amount is defined by the user. The system also includes an adjustment module for comparing the periodic retirement income payment amount and the guaranteed minimum periodic retirement income payment amount, and for outputting to the user at least the guaranteed minimum periodic retirement income payment amount, the adjustment module storing a balance in an adjustment account if the periodic retirement income payment amount is less than the guaranteed minimum periodic retirement income payment amount.
Aggregating a user's transactions across a plurality of service institutions
Methods and systems are provided for supporting electronic transactions, including transactions that are provided with per-user, per-device and per-domain security across domains of multiple service providers.
Light weight, strong, fire retardant dunnage platform bag and system of loading, dispensing and using bag
The present invention relates to methods of manufacturing lightweight thermoplastic dunnage platform decks or repairing and reusing damaged lightweight thermoplastic dunnage platform decks to be mounted with molded feet. In an embodiment of the present invention, a dunnage platform with damaged feet is modified such that the damaged feet are removed and replacement feet are attached. In an embodiment of the present invention, the damaged feet of a dunnage platform are removed and the resulting dunnage platform deck is shipped to a desired site whereupon molded feet are attached to the dunnage platform deck and the dunnage platform generated from the deck and molded feet is used for shipping cargo.
Data row packing apparatus, systems, and methods
Apparatus, systems, and methods may operate to receive a designation of multiple rows to supply data to a single user defined function, which is made available in a structured query language SELECT statement. Further activities may include retrieving the data from at least one storage medium, packing each of the multiple rows having a common key into a single row, and transforming the data from a first state into a second state by applying the single function to the data using a single access module processor. Other apparatus, systems, and methods are disclosed.
Method, system and apparatus for automatic real-time iterative commercial transactions over the internet in a multiple-buyer, multiple-seller marketplace optimizing both buyer and seller needs based upon the dynamics of market conditions
A method of communications network shopping by buyers of products and services for purchasing such from sellers in which buyers request an automatic reverse auctioneer or auction controller to initiate a reverse auction in real time amongst willing sellers and to it their automatic real-time iterative bidding price quotations for such products and services to be returned automatically over the network back to the controller under the iterative processing guidance of the controller to assure a best bid price quotation for the buyer; and automatically effecting buyer notification or purchase at such best price, all while the buyer may remain online, and without any manual intervention.
Computer-based method and computer program product for setting floor prices for items sold at auction
An adaptive method for estimating the selling price for an item at auction in order to set a reserve. The method calculates the selling price as a function of selling prices for items previously-sold at auction and differential values attributable to feature differences between the item to be sold and comparative items previously sold. Distance metrics are calculated by comparing the item to be sold with each item in the set of comparative items, and a subset of most similar items is selected according to the calculated distance metrics. A weighting function is then calculated for each item in the subset based on its respective distance metric value, and the selling price is estimated as a function of the weighting functions and the differential values. The differential values are modeled as a linear dynamical system and updated using a Kalman filter as a function of an actual sales price for the item to be sold and a current estimate of uncertainty for the differential values.
Systems and methods for automated mass media commerce
Systems and methods for implementing point of advertising purchasing include using mass media publications configured for or containing service, product or vendor transmittable signals, such as from radio frequency identification tags. In a preferred arrangement, a consumer perceiving an advertisement of the mass media publication may activate a reader in a portable communications device, such as a smart mobile or cellular phone, to receive information from the radio frequency signal associated with the advertisement to identify a vendor, product or service associated with the radio frequency identification. The smart mobile phone or communications device of the consumer may communicate with a system of a vendor across a network to order a product or product information from a system of the vendor over the network by using the information from the radio frequency identification.
Method and apparatus for automated shopper checkout using radio frequency identification technology
A method and apparatus involve: providing a plurality of products that are each associated with a respective radio frequency identification tag; using radio frequency identification technology to automatically identify specific products in a group of products collected by a shopper; and evaluating whether or not to obtain payment from the shopper based on the radio frequency identification of products in the group. Based on the result of the evaluation, either payment is obtained from the shopper on the basis of the radio frequency identification of products in the group, or else the products in the group are audited, and then payment is obtained on the basis of the products identified by the audit.
System and methods for protecting the privacy of user information in a recommendation system
The invention provides an improved recommender system that includes a client device or service provider server, a trusted function handler module and a recommender module. The recommender system functions to protect the privacy of user rating information maintained by the node (i.e., client device/server) by having the node transform the user rating information using a specific function selected by the function handler and then provide the transformed user rating information to the recommender module. In this way, privacy of the user rating information is maintained because the original user rating information will be unknown to a recommender module.
Advertising a pharmaceutical product to a third party
The disclosed subject matter is a method and system for marketing a client's product for an alternative purpose. The information about the alternative purpose of the product is collected and input into an automated system. The method and system then informs third parties about the client's product along with suggested alternative uses.
Systems and methods to optimize media presentations
In one aspect, a computing apparatus is configured to profile the spending distribution of users who have made purchases from a merchant and who have paid for the purchases via a transaction handler (e.g., using credit cards, debit cards, prepaid cards). The spending distribution is determined based on transaction data of the users, where the transaction data records the transactions of the users for purchases from various merchants. The spending distribution is profiled to indicate the preference of the customers of the merchant as a whole and thus can be used to customize the ratio of media content provided to the customers of the merchant, such as the presentation ratio of advertisements from different merchants, or from merchants of different categories.
System to provide price adjustments based on indicated product interest
A system to provide price adjustments based on indicated product interest includes reception of an indication from a customer of interest in a first product, reception of an indication from a customer of interest in a second product, determination of a price adjustment for the second product based on the indication of interest in the first product, and transmission of the price adjustment to the customer. By virtue of the foregoing features, a retailer may be willing to provide a price adjustment for the second product which would otherwise not be provided. Moreover, such a price adjustment may incent the customer to purchase the second product in a case that the second product would not otherwise be purchased, thereby potentially increasing a total profit received by the retailer.
Digital media benefit attachment mechanism
Particular embodiments of the present invention are related to a digital media benefit attachment mechanism for generating or attaching revenue rights and other benefits to one or more entities associated with socially distributed media.
Portable multifunction device with multiple applications
A portable hand-held multi-function device, such as a smart card or other peripheral device, and method of using same for purchase transactions. The device has processing circuitry, program storage, data memory, and a user input device. A plurality of transaction applications are stored in the data memory. The processing circuitry is programmed via instructions in the program storage to use, as a result of a user selection received via the user input device, one of the plurality of transaction applications for making payment for a purchase from a merchant in a purchase transaction.
Release advertisement system
A new release advertisement system generates advertisement sets for new release items that have a release date. To generate the advertisement sets, the system identifies items with release dates within a “new release advertising window.” The new release advertisement system then identifies item and keyword pairs from the text within the attributes of the items. After identifying item and keyword pairs for each of the new release items, the system removes pairs that do not satisfy a filtering criterion. The system then generates advertisements from the text of the attributes of the items remaining after the removing based on the filtering criterion. The system then creates advertisement sets for the remaining pairs that include the advertisement generated for the item of the pair and the keyword of the pair.
Automotive industry high performance capability assessment
A high performance capability assessment model helps an automotive industry business meet the challenges of the global marketplace. As a result, the automotive industry business can achieve the clarity, consistency, and well-defined execution of core processes that reduce inefficiencies and waste that result from unnecessary process complexity and exceptions. In addition, the high performance capability assessment model helps the automotive industry business to identify specific areas in which improvements may be made and understand how to make the improvements, and establishes levels of capability along the way to reaching an ultimate capability goal.
System, method and apparatus for voice analytics of recorded audio
Disclosed is a method for analyzing recorded telephone calls in order to predict business outcomes. The method involves recording a series of initial telephone calls and analyzing those calls for particular audio features. The audio features are tabulated and annotated to specify whether the telephone call resulted in a pre-determined business outcome. A model is then built whereby the pre-determined business outcome can be predicted based upon the presence of certain audio features. The model can subsequently be used to predict whether future calls are likely to result in the pre-determined business outcome.
System and method of facilitating petroleum engineering analysis
The present invention provides a system and method capable of facilitating the efficient analysis of oilfield data utilizing at least one computer database containing a plurality of stored petroleum engineering operations. In one embodiment, stored petroleum engineering operations may include individual petroleum engineering tasks/calculations, workflows comprising multiple engineering tasks/calculations, and/or third party applications capable of analyzing at least a portion of collected oilfield data. In one embodiment, petroleum engineering operations may be proven in the field, i.e., tested and proven to be accurate under real-world oilfield conditions, prior to storage upon the database. In one embodiment, the present invention provides a graphic user interface adapted to receive customer data and identify stored engineering operations associated thereto. Identified engineering operations stored upon the database may then be displayed and executed according to user instructions and/or predefined execution arrangements.
Computer method and apparatus for outcome-based pricing of goods and services
The present invention provides a system and method that allow sellers to offer goods and services at prices that vary depending on what transpires during the event or service. The final price is determined after the event or service based on the occurrence of certain pre-selected attributes. Candidate attributes are potentially associated with the event or service but the outcome or occurrence of the attribute is not knowable by the buyer and seller with certainty at the time of the original purchase. Using the outcome-based pricing (OBP) and settlement system the seller can set prices to minimize significant deviation from a pre-determined revenue plan, or alternatively build-in an increase or even decrease in gross revenues. The present invention allows for the order, payment and final settlement of the purchase transaction, automatically. The preferred embodiment for the OBP pricing and settlement system is via a computer network that includes the Internet.
Data integration and analysis
Uncorrelated data from a variety of sources, such as consumer panels or retailer points of sale, are combined with maximal coverage of a universal data set for a population in a manner that permits useful inferences about behavioral propensities for the population at an individual or household level.
System for and method of automatic optimizing quantitative business objectives of sellers (advertisers) with synergistic pricing, promotions and advertisements, while simultaneously minimizing expenditures and discovery and optimizing allocation of advertising channels that optimize such objectives
An Internet system for and method of automatic optimizing quantitative business objectives of sellers (advertisers) with synergistic pricing, promotions and advertisements, while simultaneously minimizing expenditure and discovery and optimizing allocation of advertising channels that optimize such objectives.
Insurance incentive program for promoting the purchase or lease of an automobile
Included in the terms of a purchase or lease agreement, particularly pertaining to automobiles, a party having a business relationship with the seller or lessor, or the seller or lessor itself, agrees to provide a policy, including at least collision and/or comprehensive coverage, to a qualified buyer. The insurance coverage protects against losses related to the item being purchased or leased for a predetermined period of time. To be qualified, the purchaser or lessor must reside in a particular geographic region and purchase or lease, for example, a particular make and model of automobile. No further characteristics of the purchaser or lessor are considered in obtaining the insurance policy. The sale or lease of the item and provision of the insurance policy may be completed over a computer network, such as the Internet.
Systems and methods for providing an inducement to purchase incident to a physician's prescription of medication
Systems and methods for providing targeted content to a patient who has received a prescription for medication. The systems and methods generally provide the content prior to the Point of Sale (POS) of the actual prescription allow patients to review the content and possibly act on it prior to actually obtaining the medication. Depending on embodiment, the content may be provided by a pharmacy at or around the time of dispensing or by a physician at or around the time of prescribing.
Patient-interactive healthcare management
Patient-interactive health care management provides the ability for healthcare services received by a patient to be confirmed by the patient, or designated person, immediately after and subsequently after the healthcare services are rendered. The patient/designated person may be provided the ability to verify the accuracy of an invoice for the rendered services/goods and may provide an assessment of the rendered services/goods. The patient/designated person may provide this information via an appropriate stationary and/or portable processor. Healthcare may be received at any appropriate location or locations. The evaluation may occur at any appropriate location or locations. An after care risk assessment may be provided to the patient/designated person to evaluate the patient's status immediately after, subsequently after, and/or in between the healthcare services rendered. Patient-interactive health care may protect the safety of patients, mitigate disparities in care, protect payers, and/or facilitate adoption of health information technology.
System and method for scheduling travel on a charter transport
A method is disclosed for scheduling travel on a charter transport. The method can include obtaining from a traveler a passenger accommodation request identifying an origin-destination-pair. The method can also include automatically identifying one or more charter transports having an available passenger accommodation. Moreover, the method can include notifying the traveler of the available passenger accommodation.
Method and apparatus for verification of medication administration adherence
A system and method of confirming administration of medication is provided. The method comprises the steps of receiving information identifying a particular medication prescription regimen, determining one or more procedures for administering such prescription regimen and identifying one or more activity sequences associated with such procedures. Activity sequences of actual administration of such prescription regimen are captured and then compared to the identified activity sequences to determine differences therebetween. A notice is provided if differences are determined.
Integrated point of care medication administration information system
An integrated point of care medication administration system comprises a point of care medication administration system including an interface for communicating with the at least one repository and information sources and including a processor. The processor uses the information and the interface in automatically acquiring for a particular patient, data representing particular patient parameters and laboratory test results associated with a particular individual medication in response to user initiation of an order for the particular individual medication to be administered to the particular patient. A display device presents at least one display image indicating acquired particular patient parameters and laboratory test results of the particular patient and identifying a particular patient parameter or laboratory test result needing to be acquired prior to administration of the particular individual medication to the particular patient.
Systems and methods for providing an inducement of a purchase in conjunction with a prescription
Systems and methods for providing targeted content to a patient who has received a prescription for medication. The systems and methods generally provide the content prior to the Point of Sale (POS) of the actual prescription to allow patients to review the content and possibly act on it prior to actually obtaining the medication. Depending on embodiment, the content may be provided by a pharmacy at or around the time of dispensing or by a physician at or around the time of prescribing.
System and method for managing alert notifications in an automated patient management system
A system and method for managing alert notifications in an automated patient management system is presented. One or more settings specifying patient data collection periodicity are defined. One or more patient data sources operating on a remotely managed patient and selected from at least one of a physiological sensor and a therapy delivery device are also defined. One or more triggers associated with a condition occurring in relation to at least one such patient data evaluateable subsequent to collection are defined. Finally, a notification scheme executable upon detection of at least one such trigger is determined to provide an external indicator of the condition occurrence.
In-vehicle text messaging experience engine
The disclosed invention provides a system and apparatus for providing a telematics system user with an improved texting experience. A messaging experience engine database enables voice avatar/personality selection, acronym conversion, shorthand conversion, and custom audio and video mapping. As an interpreter of the messaging content that is passed through the telematics system, the system eliminates the need for a user to manually manipulate a texting device, or to read such a device. The system recognizes functional content and executes actions based on the identified functional content.
Speech recognition system and method for plural applications
Disclosed is a speech recognition system in which a common data processing means performs speech recognition of a speech captured by a speech input means to generate recognition result hypotheses which is not biased to one of applications and an adaptation data processing means regenerates recognition result hypotheses, using adaptation data and adaptation processing for each application. The adaptation data processing means provides to each application the recognition result recalculated for each application.
Methods and apparatuses for facilitating speech synthesis
Methods and apparatuses are provided for facilitating speech synthesis. A method may include generating a plurality of input models representing an input by using a statistical model synthesizer to statistically model the input. The method may further include determining a speech unit sequence representing at least a portion of the input by using the input models to influence selection of one or more pre-recorded speech units having parameter representations. The method may additionally include identifying one or more bad units in the unit sequence. The method may also include replacing the identified one or more bad units with one or more parameters generated by the statistical model synthesizer. Corresponding apparatuses are also provided.
System and method for standardized speech recognition infrastructure
Disclosed herein are systems, methods, and computer-readable storage media for selecting a speech recognition model in a standardized speech recognition infrastructure. The system receives speech from a user, and if a user-specific supervised speech model associated with the user is available, retrieves the supervised speech model. If the user-specific supervised speech model is unavailable and if an unsupervised speech model is available, the system retrieves the unsupervised speech model. If the user-specific supervised speech model and the unsupervised speech model are unavailable, the system retrieves a generic speech model associated with the user. Next the system recognizes the received speech from the user with the retrieved model. In one embodiment, the system trains a speech recognition model in a standardized speech recognition infrastructure. In another embodiment, the system handshakes with a remote application in a standardized speech recognition infrastructure.
Differential dynamic content delivery with text display in dependence upon simultaneous speech
Differential dynamic content delivery including providing a session document for a presentation, wherein the session document includes a session grammar and a session structured document; selecting from the session structured document a classified structural element in dependence upon user classifications of a user participant in the presentation; presenting the selected structural element to the user; streaming presentation speech to the user including individual speech from at least one user participating in the presentation; converting the presentation speech to text; detecting whether the presentation speech contains simultaneous individual speech from two or more users; and displaying the text if the presentation speech contains simultaneous individual speech from two or more users.
Electronic device and method of controlling the same
An electronic device and a method of controlling the electronic device are provided. According to an embodiment, the electronic device may recognize a first sound signal output from at least one external device connectable through a communication unit and to control a sound output of at least one of the at least one external device or the sound output unit when a second sound signal is output through the sound output unit.
Multi band audio compressor dynamic level adjust in a communications device
An uplink or downlink audio processor contains a multi band compressor that receives an input, uplink or downlink, audio signal. The multi-band compressor has a band splitter that splits the input audio signal into a number of different band signals. Each band signal is input to a respective compressor block, which is independently programmable so that its audio frequency response (a) differs from a linear response in at least two non-overlapping windows of its input signal, and (b) differs from the frequency response of another one of the compressor blocks. Other embodiments are also described and claimed.
Phrase based document clustering with automatic phrase extraction
Meaningful phrases are distinguished from chance word sequences statistically, by analyzing a large number of documents and using a statistical metric such as a mutual information metric to distinguish meaningful phrases from groups of words that co-occur by chance. In some embodiments, multiple lists of candidate phrases are maintained to optimize the storage requirement of the phrase-identification algorithm. After phrase identification, a combination of words and meaningful phrases can be used to construct clusters of documents.
Systems and methods for an automated personalized dictionary generator for portable devices
A system and method for automated dictionary population is provided to facilitate the entry of textual material in dictionaries for enhancing word prediction. The automated dictionary population system is useful in association with a mobile device including at least one dictionary which includes entries. The device receives a communication which is parsed and textual data extracted. The text is compared to the entries of the dictionaries to identify new words. Statistical information for the parsed words, including word usage frequency, recency, or likelihood of use, is generated. Profanities may be processed by identifying profanities, modifying the profanities, and asking the user to provide feedback. Phrases are identified by phrase markers. Lastly, the new words are stored in a supplementary word list as single words or by linking the words of the identified phrases to preserve any phrase relationships. Likewise, the statistical information may be stored.
Method for locating line breaks in text
A method for locating line breaks in text, carried out by a computer device having a processor and system memory, includes the steps of creating a probabilistic model of a paragraph of text, parameterized by inter-word spacing, and running an inference on the model to find a sequence of line-breaks that maximize the joint probability of line break positions with minimum deviation of inter-word spacing from an ideal value.
Automatic spoken language identification based on phoneme sequence patterns
A language identification system that includes a universal phoneme decoder (UPD) is described. The UPD contains a universal phoneme set representing both 1) all phonemes occurring in the set of two or more spoken languages, and 2) captures phoneme correspondences across languages, such that a set of unique phoneme patterns and probabilities are calculated in order to identify a most likely phoneme occurring each time in the audio files in the set of two or more potential languages in which the UPD was trained on. Each statistical language model (SLM) uses the set of unique phoneme patterns created for each language in the set to distinguish between spoken human languages in the set of languages. The run-time language identifier module identifies a particular human language being spoken by utilizing the linguistic probabilities supplied by the SLMs that are based on the set of unique phoneme patterns created for each language.
Cross-application centralized language preferences
A process for a language selection using one or more language preferences is disclosed. Information for presenting a language preference selection control may be sent to a user. A language preference may be received from the user and stored to a server. A cookie, which includes an indication of the language preference, may be caused to be stored to a device of a user. The stored language preference may be accessed from the cookie responsive to a communication from the user. Responsive to whether the user has logged into an account, the language preference may be retrieved from either the server or from the cookie. The retrieved language preference may be compared with languages available in an application and a most preferred language for the application may be determined based upon the comparison. Information from the application may be provided to the user in the most preferred language.
Software modeling systems for metering and translating measurements
Systems and methods are provided for collecting and aggregating a plurality of power flow measurements from a plurality of devices in a power management system. The error bounds of the aggregated power flow measurement are then determined using at least one error model. Systems and methods are also provided for inferring AC power flows from DC power flows. A device having at least one DC power flow sensor is augmented with at least one AC power flow sensor AC and DC power flows through the device are measured using the sensors over a range of operating points. An inference model of AC power flow in the device as a function of DC power flow is then built, wherein the error of the model is bounded. DC power flow through the device and in similar devices can then be then measured and used to infer AC power flow for the device.
Downhole sensor MODBUS data emulator
In order to simulate the inputs from a downhole sensor (DHS), RTD type sensors are typically employed, externally heated, and the input provided into an interface unit. At best such an approach provides a solution that is cumbersome and not reliably repeatable. Such temporary inputs seldom provide the equivalent communications protocol verification between the surface controller of the DHS and the external communications device. DHS units commercially available use different register addresses for the requested data, as well as a variation in the number of parameters expected from the DHS itself. The number of parameters may range from 3 to 7 based on the vendor unit selected. In the proposed system, a number of potentiometers are used to provide a variable signal level to the microprocessor, acting as variable parameters from the DHS sensor, the settings of which can be repeated for reliable test or regression test results.
Determining elastic and fluid flow properties of a fractured reservoir
A technique includes identifying a fracture polygon intersecting a voxel of a three-dimensional grid of voxels representing a region of interest of a hydrocarbon-bearing reservoir based on data indicative of a discrete fracture network. The technique includes partitioning the polygon with a regular mesh of points and determining a number of the mesh points inside the voxel and inside the polygon. The technique includes estimating an area of the fracture inside the voxel based at least in part on the determined number of mesh points inside the voxel and inside the polygon. The technique includes determining at least one property of a portion of the hydrocarbon-bearing reservoir, which coincides with the voxel based at least in part on the estimated area of the fracture.
Method of estimating load carrying capacity of bridge
Provided is a method of estimating a load carrying capacity of a bridge. The load carrying capacity estimation method includes the steps of: estimating a mode coefficient of the bridge using an acceleration signal obtained from an accelerometer that is installed in the bridge; updating an analysis model of the bridge using the estimated mode coefficient; and estimating a rating factor of the bridge by applying a dead load and a design live load to the updated analysis model.
Methods and systems for creating free space reflective optical surfaces
Computer-based methods and associated computer systems are disclosed for designing free space reflective optical surfaces (13) for use in head-mounted displays (HMDs). The reflective optical surface (13) produces a virtual image of a display surface (11) for viewing by a user's eye (15). The method includes using one or more computers to: (i) represent the display surface (11) by display objects (25); (ii) represent the free space reflective optical surface (13) by surface elements (23); and (iii) iteratively calculate spatial locations, normals, and radii of curvature for the surface elements (23) which will cause a virtual image of each display object (25) to be displayed to a nominal user's eye (15) in a desired direction of gaze of the eye (15).
Substrate carrying mechanism, substrate carrying method and recording medium storing program including set of instructions to be executed to accomplish the substrate carrying method
A substrate carrying mechanism includes: a base; a substrate holding member placed on the base and capable of holding a substrate and of being advanced and retracted relative to the base; four or more detecting units respectively for detecting different parts of the edge of a substrate held by the substrate holding member when the substrate holding member holding a substrate is retracted; and a controller that determines whether or not a notch formed in the edge of the substrate has been detected by one of the detecting units, on the basis of measurements measured by the four or more detecting units and corrects an error in a transfer position where the substrate is to be transferred to the succeeding processing unit on the basis of measurements measured by the detecting units excluding the one detecting unit that has detected the notch of the substrate.
Information processing method, and recording medium and information processing apparatus therefor
An information processing method for evaluating a communication state of a device, includes: (a) obtaining communication data including content of communication between a plurality of devices; (b) creating a first test program on the basis of the content of communication included in the communication data obtained in (a), the first test program to be executed when performing communication between a test-target device and another device; and (c) executing the first test program created in (b) and generating performance results regarding communication performed between the test-target device and the other device.
System and method for detecting miswiring of an electrical appliance
A system for detecting the miswiring of an electrical appliance that includes a microprocessor having first and second input connections to sample signals on two different electrical power lines. The microprocessor further includes a third input connection for a neutral line. In an embodiment of the invention, there is at least one switch through which electrical power can flow into a load. The at least one switch is controlled by the microprocessor. In a particular embodiment, the microprocessor is configured to compare the signals sampled at the first and second input connections to determine whether the electrical appliance has been wired correctly.
Electro-optical distance measuring method and electro-optical distance measuring device
The present invention provides an electro-optical distance measurement, wherein a light from a light source (6) is projected toward an object to be measured (2), a reflection light reflected by the object to be measured is received at a photodetection unit (8), the light from the light source is received by the photodetection unit as an inner light via an inner optical path (11), and a distance to the object to be measured is measured according to the result of photodetection of the reflection light and the inner light of the photodetection unit, and wherein a correction information is acquired based on the inner light, the acquired correction information is stored, a correction value is obtained from the correction information based on the reflection light and the inner light, and a distance is calculated from the correction value and the result of photodetection of the reflection light and the inner light.
Methods and apparatuses for dynamic probe adjustment
An improved method and apparatus for automatically aligning probe pins to the test or bond pads of semiconductor devices under changing conditions. In at least one embodiment, a dynamic model is used to predict an impact of changing conditions to wafer probing process. This reduces the need for frequent measurements and calibrations during probing and testing, thereby increasing the number of dice that can be probed and tested in a given period of time and increasing the accuracy of probing at the same time. Embodiments of the present invention also make it possible to adjust positions of probe pins and pads in response to the changing conditions while they are in contact with each other.
Position calculating method and position calculating device
A method of calculating the position of a moving body includes: detecting a movement direction of the moving body; calculating a velocity vector of the moving body using a detection result of an acceleration sensor installed in the moving body; correcting the velocity vector using the movement direction; and calculating the position of the moving body using the corrected velocity vector.
Lithographic apparatus and method for correcting a position of a stage of a lithographic apparatus
A lithographic apparatus includes a stage to hold an object, the stage being moveable relative to a reference structure in a motion range; a magnet structure to provide a spatially varying magnetic field in at least a part of the motion range, the magnet structure being moveable relative to the reference structure and the stage; a first position measurement system to provide a first measurement signal corresponding to a position of the stage and/or the object in a measurement direction relative to the reference structure; a second position measurement system to provide a second measurement signal corresponding to a position of the stage relative to the magnet structure; and a data processor to correct the first measurement signal with a value dependent on the second measurement signal to provide a corrected first measurement signal representative of the position of the stage and/or the object relative to the reference structure in the measurement direction.
System and methods for parametric testing
Methods, systems, computer-program products and program-storage devices for determining whether or not to perform an action based at least partly on an estimated maximum test-range. One method comprises: attaining results generated from a parametric test on semiconductor devices included in a control set; selecting from the semiconductor devices at least one extreme subset including at least one of a high-scoring subset and a low-scoring subset; plotting at least results of the at least one extreme subset; fitting a plurality of curves to a plurality of subsets of the results; extending the curves to the zero-probability axis for the low-scoring subset or the one-probability axis for the high-scoring subset to define a corresponding plurality of intersection points; defining an estimated maximum test range based on at least one of the intersection points; and determining whether or not to perform an action based at least partly on the estimated maximum test range.
Measurement of material properties
A system and method employing a general impedance as a cost-effective detector to measure dielectric properties of a material at both high and low frequencies, using combinations of resistance, capacitance, and inductance. The method may be applied in a wood drying installation including a kiln as coaxial cable element for a data transmission, wherein metal walls and doors of the kiln grounded to the soil include the outer coaxial conductor (shield) relative to a substantially isolated axial central conductor. The method is further suitable for determining the fiber saturation point of wood by measuring the loss tangent of the wood and determining the point where the time derivative of the loss-tangent equals zero, which corresponds to the fiber saturation point of the wood.
Data reduction in a multi-node system
An advanced metering infrastructure comprises intermediate nodes. The intermediate nodes receive data from child nodes and aggregate the data according to groups of child nodes. The aggregation provides for a reduced version of the data. The reduction is performed based on groups determined by clustering. The reduced version of the data comprises data describing a group of measurements over time, such as a centroid in an n-dimension space, number of customers in the group, radius of the group and the like. The centroid may shift over time based on a consumption profile, such as low consumption at noon, and high consumption at evening. The consumption profiles may be determined in a learning phase, as well as shifting of centroids of each group over time.
Online monitoring system and method to identify shorted turns in a field winding of a rotor
A method for analyzing electrical shorts in field windings of a synchronous machine having a rotor using a magnetic flux probe, the method includes: monitoring flux signals generated by the flux probe wherein the flux signals are indicative of magnetic flux emanating from the field windings; electronically storing flux data obtained from the monitored flux signals and indicative of electrical shorts in the field windings; automatically analyzing the stored flux data to identify field windings having the shorts and to count the shorts in each identified field winding, and automatically displaying information identifying the field windings with shorts and a number of shorts in each field winding.
System for detecting a short circuit associated with a direct current bus
The system comprises a direct current bus having a positive terminal and a negative terminal. A first switching transistor and a second switching transistor have their respective switched terminals connected in series with respect to each other between the positive terminal and the negative terminal. A primary supply is arranged to generating a test voltage that is lower than an operational voltage of the direct current bus. The test voltage is applied between the positive terminal and the negative terminal of the direct current bus. A primary thermal circuit is associated with the supply for detecting whether the supply exceeds an operational temperature threshold. The thermal circuit provides a signal or logic level state indicative of a detected short circuit in the direct current bus if the primary supply exceeds the operational temperature threshold.
Method for analyzing operating point of permanent magnet, program therefor, and recording medium
A method for analyzing an operating point of a permanent magnet performs electromagnetic field analysis based on a B-H curve of the permanent magnet and element data concerning a finite number of elements into which the permanent magnet is divided to obtain the operating point of the permanent magnet. The method includes the steps of storing data of inputted B-H curve; obtaining magnetic flux densities and magnetic fields in plural regions of the permanent magnet by performing the electromagnetic field analysis based on the data of the B-H curve; and obtaining the operating point of each of the elements based on the result of the electromagnetic field analysis by employing a variable, the variable continuously varying in a first quadrant, in a second quadrant, in a third quadrant, and over these quadrants of the B-H curve and linearly varying with respect to the magnetic flux density and magnetic field.
Optical inspection method and its apparatus
The present invention provides an optical inspection method capable of detecting a finer defect in the surface of a substrate, including the steps of: irradiating a surface of a sample which is rotating and continuously moving in one direction with illumination light which is incident in a direction obliquely to the sample surface; detecting an image of light formed by a forward scattering light around an optical axis of regular-reflection light while excluding the regular-reflection light from the sample surface irradiated with the illumination light; condensing and detecting lateral scattering light which scatters laterally from the sample surface with respect to an incidence direction of the illumination light; and processing a signal obtained by detecting the image of light formed by the forward scattering light and a signal obtained by condensing and detecting the lateral scattering light to extract a defect including a scratch defect.
Method and apparatus for determining properties of fuels
The method and apparatus are used to determine class, grade and properties of fuel samples, regardless of ambient, instrument, or sample temperature, using mathematical correlations between fuel class, grade and properties and their spectra developed from a database of samples with measured properties and spectra. The ability to measure a fuel sample using the present method and apparatus is useful in identifying unknown fuel samples, determining suitability in equipment, and monitoring and controlling fuel processes, such as blending operations, distillation, and synthesis.
Method and system for estimating transformer remaining life
A transformer (26) is monitored by a dissolved gas monitoring device (28). A method (36) in the form of executable code instructs a processor (34) to estimate a remaining life (124) of the transformer. The method includes receiving (126), from the monitoring device (28) data elements (60) representing a current value (134) of dissolved gases (72) in the transformer (26) that correlate with degradation of insulating material in the transformer. Adjustment values (142, 144) are determined for the gases (72) in response to isolated events (160, 162) occurring at the transformer. The current value (134) and the adjustment values (142, 144) are combined to obtain a total value (114), and a degree of polymerization value (116) is estimated using the total value (114). The value (116) is converted into a measure of remaining life (124) of the transformer, and the measure of remaining life (124) is presented to a user (58).
Method of determining parameters of a layered reservoir
A method of determining parameters relating to the flow performance of subterranean sources is described using the steps of measuring a total flow rate and pressure at a reference datum for at least two different flow rates, allocating the flow from each of the sources using identified concentrations of characteristic components, and using the total flow rate, pressure and the allocation to determine selective inflow performance relationships for each source.
System and method for obtaining and using downhole data during well control operations
A tool driver activates a telemetry tool when a predetermined threshold of accelerometer data measured by an accelerometer. The threshold preferably corresponds to an acceleration level expected while drilling mud is pumped at a slow pump rate through the well's drill pipe. When a fluid influx occurs during drilling, the well is shut-in, and the tool driver turns off the telemetry tool. The drill pipe and casing pressures of the shut-in well are obtained. Then, drilling mud having a first weight is pumped at a slow mud pump rate. Because the tool driver is set to activate the telemetry tool in response to accelerometer data at the slow pump rate, the telemetry tool begins sending downhole pressure data to the surface. In this way, rig operations can change the mud weight and adjust the choke line during the kill operation based on an analysis of the downhole pressure data obtained.
Pulse sequences are applied to a fluid in an earth formation in a static magnetic field and NMR spin echo signals are obtained. The signals are processed to give a distribution of relaxation time at each of the plurality of depths. A quasi-DNA is obtained by autoscaling and a nonlinear mapping of T2 component logs and non-NMR logs. Similarities between the quasi-DNA of the two types of logs are used to estimate formation lithology and fluids.
Monitoring the health of a blowout preventer
A computerized monitoring system and corresponding method of monitoring the status and health of a blowout preventer. The system includes a graphics display at which a graphical user interface (GUI) displays the health of various sealing elements and control systems by way of “traffic light” indicators. The health indicators are evaluated, by the monitoring system, based on a risk profile for each of the indicated elements and control systems. The risk profiles are evaluated based on inputs such as measurement inputs, feedback signals, mechanical positions, diagnostic results, drilling conditions, and other status information of the blowout preventer at a given time and based on levels of redundancy and levels of deviation from normal conditions. The GUI includes recent history of changes in operating condition, and alarm indications such as poor health, along with the times of those events.
Multi-body dynamics method of generating fuel efficient transfer orbits for spacecraft
A method of generating orbital transfers for spacecraft. The method provides an innovative technique for transferring spacecraft from one Earth orbit to another Earth orbit using significant solar gravitational influences. In one particular implementation, the multi-bodies in the transfer determination are the Earth (about which the spacecraft is to orbit) and the Sun (e.g., the Earth and the Sun are the first and second celestial bodies providing multi-body dynamics). The transfer orbit or trajectory is determined to make use of efficient tangential maneuvers by leveraging solar gravitational influences to improve transfer performance. Based on the generated transfer orbit, the spacecraft is controlled to perform one or more maneuvers to achieve a transfer orbit that traverses into a regime where the spacecraft's trajectory is significantly affected by gravity from both the Sun and the Earth. The spacecraft performs a near-tangential orbit insertion maneuver to enter the final orbit.
Driving operation diagnostic apparatus and method for diagnosing driving operation
A storing unit stores traveling history information items on a vehicle, the traveling history information items being respectively associated with trips each being a segment from a start of a driving operation to an end of the driving operation. A determination unit determines whether to assign one of the traveling history information items, which is stored in the storing unit and associated with one trip, to a predetermined period, the one trip being partially included in the predetermined period. A driving operation diagnostic unit diagnoses a driving operation of a driver in the predetermined period according to the traveling history information item determined by the determination unit to be assigned to the predetermined period.
Systems and methods for using magnetic field readings to refine device location estimates
Systems and methods for using magnetic field readings to refine device location estimates are provided. As an example, a plurality of magnetic field readings can be collected by a device as it travels along a path. A positioning system (e.g., GPS) or other sensors can be used to provide a coarse location for the device at each reading. A contribution to each of the magnetic field readings by the Earth's magnetic field can be removed to obtain a plurality of residual readings and a plurality of regions of interest along the path can be identified based at least in part on the residual readings. The regions of interest can be compared to each other to identify a plurality of correspondences between magnetic field readings or residual readings and the plurality of correspondences can be used to refine the location estimates.
Map display device and map display method
The invention provides a map display device and map display method that enhance the information density of displayed road names while maintaining legibility of a map image. First, the map drawing unit draws, to an image storage unit, a map image of roads and so forth in a desired scale, by using the background layer of a first hierarchy corresponding to the desired scale. Second, the map drawing unit draws place names and facility names by using the character layer of the first hierarchy to superimpose them on the map image. Third, the map drawing unit extracts the road names that do not overlap with the map characters of the place names and facility names on the map image by using the character layer of the first hierarchy, and superimposes them on the map image at the normal character size. Fourth, the map drawing unit extracts, by using the character layer of a second hierarchy corresponding to a scale level smaller by one step than the desired scale level, road names that do not overlap with the map characters of the other road names, place names, facility names and so forth on the map image, and superimposes them on the map image at a smaller character size. Finally, the map drawing unit superimposes the vehicle position mark on the map image.
Vehicle system for navigation and/or driver assistance
Disclosed herein is assistance, safety and navigation technology for vehicles. In particular, the disclosure relates to a vehicle system and a method for controlling the vehicle system.
Route selection employing metrics
Techniques are described that may be implemented in a mobile electronic device providing navigation functionality to facilitate selection of a route to a destination from multiple route options. In one or more implementations, route selection information is displayed on a display of the mobile electronic device to facilitate selection of a route to a destination. The route selection information describes one or more routes to the destination and includes one or more metrics, associated with each route, that identify a characteristic of the route (e.g., a difficulty rating, topography, total climb distance, number of turns, and so on). A map may then be displayed on the display to furnish navigation information for the selected route to facilitate navigation to the destination.
Identifying a route configured to travel through multiple points of interest
A computer-implemented method for identifying a route that is configured to travel through multiple points of interest includes receiving a query that includes an origin location, a destination location, and at least a first point of interest and a second point of interest. The method also includes identifying a perimeter that surrounds the received origin and destination locations in response to the query. The perimeter is then used to identify a set of locations for each of the first and second points of interest.
Travel history editing device
A travel history editing device including: a position information detecting unit detecting position information of a vehicle; a map information accumulation unit accumulating pre-registered position information and name information; and an arrival point name providing unit, (i) reading out a name of a facility, and providing the read name as the arrival point when the arrival point corresponds to a position of the facility, and (ii) reading out other name information from the map information accumulation unit, and providing the other name information when the arrival point does not correspond to the position of the facility. Further the device includes an arrival point history accumulation unit accumulating an arrival point corresponding to the facility and the name; and a name editing unit editing the name of the arrival point for which the other name is provided as the name of the facility accumulated in the arrival point history accumulation unit.
Vehicle travel track estimator
A vehicle risk level acquiring ECU calculates and acquires a plurality of courses of other vehicles around a driver's own vehicle, and acquires the predicted course of the driver's own vehicle. The vehicle risk level acquiring ECU calculates the collision probability of the driver's own vehicle as collision possibility on the basis of the predicted course of the driver's own vehicle and the plurality of courses of other vehicles.
High-low airdrop wind management
A method and apparatus for managing an airdrop system. Wind around an aircraft is measured to form first wind information. Wind around a target location is measured to form second wind information. A four-dimensional wind profile for use in deploying the airdrop system from the aircraft is generated using the first wind information and the second wind information.
Estimating time travel distributions on signalized arterials
A system is provided for estimating time travel distributions on signalized arterials. The system may be implemented as a network service. Traffic data regarding a plurality of travel times on a signalized arterial may be received. A present distribution of the travel times on the signalized arterial may be determined. A prior distribution based on one or more travel time observations may also be determined. The present distribution may be calibrated based on the prior distribution.
Traffic information creating device, traffic information creating method and program
Devices, methods, and programs determine whether a vehicle has exited a link based on map information. If so, the devices, methods, and programs acquire a travel traffic congestion level of the exited link based on travel information within the exited link, and determine whether the travel traffic congestion level of the exited link coincides with a distributed traffic congestion level at a time when the vehicle exited. If not, the devices, methods, and programs determine whether the traffic information has been updated and the distributed traffic congestion level has been changed within the exited link, and if so, acquire a distribution time rate of each distributed traffic congestion level within the exited link. The devices, methods, and programs determine a traffic congestion level of the exited link based on the distribution time rate of each acquired distributed traffic congestion level and the travel traffic congestion level of the exited link.
Predictive travel notifications
Various embodiments can predict a user's intended driving route in order to provide the user with traffic warnings for traffic conditions along the same. A user's driving route, in at least one embodiment, is predicted by collecting travel data, such as information associated with the date, time, location, and direction for trips made within a network of roads over time. Instead of keeping the travel data anonymous, the travel data is associate or linked to the user's account or stored in a user profile in order to build a history of travel patterns for the user over time. The travel patterns can then be used to predict when a user is going to travel or make a trip and, upon identifying a context indicative of a travel pattern, traffic information for a route associated with the pattern is obtained and provided to the user's computing device.
Apparatus and method for controlling engine restarting of vehicle
An apparatus and a method for controlling engine restarting of a vehicle includes a hood opening recognition switch automatically on when a hood of the vehicle is opened and outputting a hood opening recognition signal; a front sensor installed on the front of the vehicle and outputting a sensing signal by sensing an object positioned with a predetermined distance in front of the vehicle; a determination unit verifying whether at least one of the hood opening recognition signal and the sensing signal is inputted in the state where an engine of the vehicle is off; and a setting unit setting a lock of restarting of the engine when it is verified that at least one of the hood opening recognition signal and the sensing signal is inputted.
Engine control system with algorithm for actuator control
An engine control apparatus works to determine a target value of each of performance parameters associated with different types of performances of a combustion engine based on operating conditions of the combustion engine, determine target values of combustion parameters associated with combustion states of fuel in the combustion engine based on the target values of the performance parameters using first correlation data representing correlations between the performance parameters and the combustion parameters, and calculate command values of controlled parameters for actuators as a function of the target values of the combustion parameters. When actual values of the performance parameters are in coincidence with the target values, the system changes or corrects the target value of a selected one of the performance parameters so as to enhance the level of a corresponding one of the performances of the engine based on the other performance parameters.
Compression ratio determination and control systems and methods
A system includes a sampling module and a map generating module. The sampling module receives a first mapping of thermal efficiency of a spark-ignition engine generated based on operation of the spark-ignition engine with a dynamometer. A combustion chamber of the spark-ignition engine has a first compression ratio. The map generating module generates a second mapping of the thermal efficiency of the spark-ignition engine based on the first mapping and the combustion chamber having a second compression ratio. The second compression ratio is different than the first compression ratio.
Selective automated vehicle brake force release on an inclined surface
An system for controlling vehicle movement includes a brake assembly configured to selectively resist movement of the vehicle. A controller selectively controls a brake force applied by the brake assembly. The controller is configured to determine a drive torque condition when the vehicle is stationary on an inclined surface. The controller selectively controls a rate of automatically reducing the brake force dependent on the determined drive torque condition to allow the vehicle to accelerate.
Vehicle regeneration cooperative braking system
In a vehicular brake-by-wire braking system, during a four wheel simultaneous control mode when regeneration cooperative braking is implemented, a pair of electromagnetic isolation control valves and one of normally closed electromagnetic pressure relief valves corresponding to regeneration side left and right wheel brakes and normally closed electromagnetic pressure relief valves corresponding to non-regeneration side left and right wheel brakes are caused to operate to open and close, while the other of the normally closed electromagnetic pressure relief valves corresponding to the regeneration side left and right wheel brakes and the normally closed electromagnetic pressure relief valves corresponding to the non-regeneration side left and right wheel brakes are put in de-energized states in which the valves concerned are kept closed, and all normally open electromagnetic pressure supply valves are put in de-energized states in which the valves concerned are kept opened.
Coasting control device
A coasting control device for reducing uneasiness experienced by a driver when pressing a clutch pedal during coasting control. The device includes a clutch control unit that, when the clutch pedal is pressed during coasting control, controls an actuator to cause an amount of hydraulic oil that depends on the amount of depression of the clutch pedal to be ejected from a clutch-free operating cylinder.
Control arrangement for controlling the transfer of agricultural crop from a harvesting machine to a transport vehicle
A control arrangement and method for controlling the transfer of agricultural crop from a harvesting machine to a transport vehicle comprises a loading container. The control arrangement is able to be operated to automatically deposit the crop during the harvesting mode successively at different points in the loading container, following a predetermined loading strategy, by means of a discharging device of the harvesting machine, where the loading strategy may be changed and/or a choice may be made between different loading strategies.
Power seat device
A power seat device includes a motor, an adjustment operation member, a Hall sensor, an ECU, a memory, and a single request operation member. The adjustment operation member adjusts a seat position. The Hall sensor detects a seat position. The ECU drives and controls the motor in accordance with an operation of the adjustment operation member to adjust the seat position. The memory stores two seat positions adjusted by the adjustment operation member. The request operation member sequentially retrieves the two seat positions stored in the memory when pushed. The ECU drives and controls the motor to reinstate the seat position retrieved by the operation of the request operation member. The ECU automatically stores a seat position before the reinstatement of the retrieved seat position is started in the memory.
Bicycle seat position indicator
A bicycle seat position indicator has a controller and an indicating device. The controller provides an output signal indicative of a current height position of an adjustable bicycle seatpost. The indicating device is operatively coupled to the controller to receive the output signal and provide information representing the current height position of the adjustable bicycle seatpost based on the output signal from the controller.
Device/method for controlling turning behavior of vehicle
A vehicle turning behavior control apparatus comprises a controlling section which limits a turning behavior of a vehicle caused by a steering operation, to a limit behavior corresponding to an actual steering speed, by a vehicle speed decrease. The controlling section is configured to determine a modified steering speed in accordance with the actual steering speed, and to determine the limit behavior in accordance with the modified steering speed. The controlling section is further configured to make the modified steering speed higher than the actual steering speed when the actual steering speed decreases during a turning steering for increasing a steering amount. For example, the actual steering speed is used directly as the modified steering speed while the actual steering speed during the turning steering is increasing. While the actual steering speed during the turning steering is decreasing, the modified steering speed higher than the actual steering speed is used.
Electric power steering system
A motor control signal output unit of an electric power steering system includes a feedback gain calculation unit (52), and a feedback control unit executes a feedback control with the use of a proportional gain (Kp) and an integral gain (Ki) that are calculated by the feedback gain calculation unit (52). The feedback gain calculation unit (52) sets the feedback gains to large values (Kp=P0, Ki=I0) when the absolute value of an assist gradient (α) is equal to or smaller than a predetermined value (α0) (|α|≦α0). On the other hand, when the absolute value of the assist gradient (α) exceeds the predetermined value (α0) (|α|>α0), the feedback gain calculation unit (52) sets the feedback gains to small values (Kp=p1, Ki=I1:P1
In an active suspension system for actively suspending a plant, a fail-safe system controlled by a failure-detector has a selectively-activated damper coupled to the plant. The damper may be a separate element from the actuator. Under normal circumstances, the damper is deactivated and therefore generates no damping force. However, if the failure detector detects an abnormal state in the system, it activates the damper, thereby causing a damping force that resists motion of the plant.
Control apparatus for vehicular power transmitting apparatus
A control apparatus for a vehicular power transmitting apparatus includes a first valve that controls the supply of hydraulic fluid to a running clutch in connection with the switching of the operating state of a first solenoid valve; a second valve that controls the supply of hydraulic fluid to a lockup clutch in connection with the switching of the operating state of a second solenoid valve; and a linear solenoid valve that selectively controls the apply force of the running clutch and the lockup clutch according to the supply of control pressure to the first valve and the second valve. The control apparatus detects a failure state of a part related to the operation of the power transmitting apparatus by the operating state of the running clutch and the operating state of the lockup clutch.
Water-in fuel detection using duty cycle calculation
A method for operating a vehicle having a fuel system that may include unwanted water is described. The method includes, adjusting an operating parameter in response to a relative amount of high and low readings from a water-in-fuel sensor coupled in the fuel system.
Noise reduction in motor vehicles with a hybrid drive
A method for noise reduction in a motor vehicle that has a hybrid drive and includes an internal combustion engine and at least two electric machines including a first electric machine on a front axle of the motor vehicle and a second electric machine on a rear axle of the motor vehicle. The method includes automatically cutting in the at least two electric machines as a function of a required drive torque and an expected noise emission associated with the required drive torque, in a case of sole operation of the internal combustion engine, so as to reduce the load of the internal combustion engine. Torque distribution is carried out variably between the front axle and rear axle of the motor vehicle.
Torque control method for hybrid vehicle and system thereof
A torque control system and method for a hybrid vehicle. More specifically, an optimal torque at a driving point of an engine, a maximum torque at a steady state of the engine, optimal torques at a driving point of two motor/generators and maximum torques at a steady state of the two motor/generators are input into a control unit. Then each reduction torque ratio of the engine and two the motor/generators is calculated by the control unit, and a reduction factor based on the reduction torque ratio of the engine and the two motor/generators is determined. Next, each target torque based on the reduction factor and the optimal torques of the engine and the two motor/generators is calculated, and each torque of the engine and motor/generators is controlled according to the each target torque.
Vehicular dual mode master/slave interface
A vehicular interface may include an electromechanical interface between a handheld electronic device and subsystems on a vehicular bus or network. In selected embodiments the interface may operate in a “master mode” when a handheld device, such as a tablet computer or smart-phone, is not inserted therein. In this mode the interface may serve as a master controller and accesses and controls various subsystems on a vehicle (such as engine control subsystems, media controllers, navigation systems, sensors and transducers) as a master controller. In one embodiment, when a tablet device is inserted into the interface, the interface may automatically switch to “slave mode” in which it acts as an adapter or interface between the tablet device and the vehicular subsystems. In this mode of operation the user's exclusive interface is through the tablet computer and the tablet computer serves as the master controller for the system.
Method and device for aiding the approach of an aircraft during an approach phase for the purpose of landing
The device includes elements of a processing unit which determine a limit trajectory representing a flight trajectory which is compatible with the aircraft performance during the approach and which shows the limits for the flight of the aircraft. For example, a vertical profile and a horizontal trajectory are determined, with the horizontal trajectory being non-linear so that the energy of the aircraft can be sufficiently dissipated before final approach along an approach axis, while also avoiding obstacles. Thus, a flight trajectory is determined even when the aircraft has deviated from a flight plan and approach axis.
Estimation of propellant remaining in a satellite
An amount of propellant remaining in an orbiting satellite can be estimated in a more accurate manner than is possible with conventional approached. Pressure and temperature telemetry data received from the satellite can be analyzed using a maximum likelihood estimation approach that reconstructs a predicted tank pressure signal using the temperature data and determines a pressurant volume necessary to make the reconstructed pressure signal match the received pressure signal. Drift of the pressure data received from pressure transducers in the satellite can also be addressed using the current subject matter, as can issues including but not limited to inaccessible propellant due to satellite spin, tank expansion under pressure, and the like. Independent determinations of the amounts of propellant remaining can be made using moment of inertia calculations in situations in which an axis of spin of the satellite is known a priori.
Aircraft navigation system
A method and apparatus for assisting in management of unmanned aerial vehicles. Planned routes are identified for the unmanned aerial vehicles. The planned routes are displayed on a map. A set of planned routes is identified that is within a predefined distance of a selected planned route during substantially a same point in time within a viewing area on the map.
Apparatus, systems, and methods for processing alerts relating to an in-vehicle control unit
A management system using Global Positioning System receivers for tracking remote units from a central office and quickly and conveniently determining if those remote units have varied from a set of predetermined parameters of operation. The system also includes provisions that allows information to be sent from the remote units to the central office and vice versa. The system also has safety features that promote the rapid dispatch of law enforcement personnel when requests for emergency assistance have been made from the remote units.
Vehicle control device and vehicle control method
A control device and method in which, even when a road deviation operation is performed continuously near a road boundary where sidewalk/road separating blocks are discontinuously lined up, discontinuity does not occur in the control input, and unwanted vehicle behavior does not occur. The sizes of obstacles present around a host vehicle, as well as their relative positions and relative speeds with respect to the host vehicle are detected. An obstacle link length that serves as a determination criterion for virtual linking of obstacles is set. A gap position interpolation process is performed with respect to the linked obstacles. A search is performed as to whether or not there exists a control subject for which collision is to be avoided. A yaw moment for avoiding an obstacle is calculated based on position information of the avoidance control subject.
Vehicle control system
The present invention relates to control system for a vehicle. The control system includes a manually operable control lever, such as a joystick, an actuator, a sensor and a control unit. The control lever sets a state variable of the vehicle. The actuator applies a force to the control lever. The sensor senses a vehicle parameter and transmits a parameter signal to the control unit. The control unit determines a current operating state of the vehicle. The control unit, depending on the present operating state of the vehicle, controls the actuator and causes it to apply a changed, predetermined force to the control lever, in order to make the operator aware of an unsafe operating state.
System and method for controlling states of a DC and AC bus microgrid
Systems and methods are described herein for controlling the states of a microgrid module. The microgrid module includes transformers and/or power converters necessary for modifying the input AC or DC power sources to meet the required characteristics of the output power. The microgrid module further comprises a control software module installed on a microgrid computer. The control software module receives data associated with the operating state of the microgrid module. The control software module can access rules associated with each microgrid module operating state to determine whether the microgrid module must transition to a different operating state. If a transition is appropriate, the control software module can apply commands to transition the microgrid module to a different operating state. The control software module can continue to monitor the microgrid module to determine when another state transition is appropriate.
Equipment condition and performance monitoring using comprehensive process model based upon mass and energy conservation
A method and apparatus capable of monitoring performance of a process and of the condition of equipment units effecting such process is disclosed. A process model predicated upon mass and energy balancing is developed on the basis of a plurality of generally nonlinear models of the equipment units. At least one or more of such equipment models are characterized by one or more adjustable maintenance parameters. Data relating to mass and energy transfer within the process is collected and is reconciled with the mass and energy characteristics of the process predicted by the model. The condition of the equipment units and process performance may then be inferred by monitoring the values of the maintenance parameters over successive data reconciliation operations.
Air conditioning system and communication method thereof
In an air conditioning system and a communication method thereof a wireless network may be established between indoor units and a controller or between outdoor units so as to allow communications therebetween, thereby facilitating device addition or device deletion. Also, one or more outdoor units and a plurality of indoor units may be controlled without a dedicated communication line or with using a less mount of the dedicated communication line, and the outdoor units or indoor units may perform communications using one or more communication technologies, such as wireless communication and pipe communication technologies and wireless communication and dedicated line communication technologies, while performing communications with the controller using the wireless communication technology.
Hydrate monitoring system
A method for analyzing a fluid containing one or more analytes of interest includes; measuring a plurality of properties of a sample fluid with unknown concentrations of the one or more analytes of interest; and using the measurements and a model of the relationship between the plurality of properties and concentrations of the one or more analytes to calculate the concentration of at least one of the analytes of interest. The model may be an artificial neural network. The method may be used to monitor the concentration of inhibitors of gas hydrate formation in a fluid. Apparatus for use in the method is also provided.
Navigational control system for a robotic device
An autonomous cleaning apparatus includes a chassis, a drive system disposed on the chassis and operable to enable movement of the cleaning apparatus, and a controller in communication with the drive system. The controller includes a processor operable to control the drive system to steer movement of the cleaning apparatus. The autonomous cleaning apparatus includes a cleaning head system disposed on the chassis and a sensor system in communication with the controller. The sensor system includes a debris sensor for generating a debris signal, a bump sensor for generating a bump signal, and an obstacle following sensor disposed on a side of the autonomous cleaning apparatus for generating an obstacle signal. The processor executes a prioritized arbitration scheme to identify and implement one or more dominant behavioral modes based upon at least one signal received from the sensor system.
Systems and methods for tracking and balancing robots for imitating motion capture data
Various embodiments of the invention provide a control framework for robots such that a robot can use all joints simultaneously to track motion capture data and maintain balance. Embodiments of the invention provide a framework enabling complex reference movements to be automatically tracked, for example reference movements derived from a motion capture data system.
Interactive clamp force control system for load handling clamps
Improvements are disclosed for a load-clamping system with variable clamping force control by which a wide variety of dissimilar loads of different types, geometric configurations and/or other parameters can be accurately clamped at respective variable optimal clamping force settings. An operator terminal cooperates with a controller to translate one or more possible load parameters into a form easily discernible visually by a clamp operator and preferably easily comparable by the clamp operator, from his visual observation, to each particular load which he is about to engage, so that the clamp operator can interactively guide the controller in its selection of an optimal clamping force setting for each particular load.
Robotic unscrambler and method
A robotic unscrambler apparatus is provided that ensures articles that are delivered in an initial orientation are transported in a conveyable orientation for further treatment at one or more stations in a production line. The apparatus includes a conveyance apparatus and at least one picker. An uprighting device is provided with a series of guides. The picker removes articles from the conveyance apparatus, and places the articles onto one of the guides. The uprighting device moves the guides between article placement positions and article conveyance positions. Each guide may include a contoured article support surface that facilitates centering of an article placed thereon.
Audio apparatus for portable devices
An audio apparatus for a portable device is provided. The portable device includes computing hardware coupled to associated data memory, which stores one or more audio or computer program products that include a plurality of audio libraries. The audio apparatus is operable to execute the audio products upon the computing hardware, whereby the audio products are operable to call the audio libraries to generate digital audio data. The digital audio data so generated is provided to sound-generating hardware, which is then operable to generate acoustic audio signals corresponding to the digital audio data. The audio apparatus is operable to host one or more replacement audio products, which are storable in the data memory. The audio apparatus is operable to invoke the replacement audio products as an alternative to the audio products for generating the digital audio data. The replacement audio products are operable to provide a functionality of capturing the digital audio data while substantially generating the acoustic audio signals.
Method of ball game motion recognition, apparatus for the same, and motion assisting device
The invention provides a method of ball game motion recognition, an apparatus for the same, and a motion assisting device. The method comprises: obtaining motion parameters corresponding to each sampling time for a motion; extracting feature points according to predetermined feature point recognition tactics utilizing the motion parameters obtained, in which the feature point recognition tactics comprise recognition tactics of at least three types of the feature points, comprising: power-assisting path early stage corresponding feature point, motion top point corresponding feature point, and ball hitting time corresponding feature point; and recognizing the motion as a predetermined ball game type if the feature points extracted satisfy feature point requirements of the predetermined ball game type.
Signal processing network
A system, method, and device for generating a signal processing network for deployment on a motion control system are disclosed. The exemplary system may have a module that supplies one or more signal processing units represented in data format using existing compiled and linked code. Another module provides a dedicated interface with the motion control system. The system may also have a module that supplies each signal processing unit with multiple inputs and multiple outputs and a module that routes the inputs and the outputs between the one or more signal processing units.
Method of implanting stimulation lead with biased curved section through the interatrial septum
A lead includes a lead body and an electrode disposed proximate a distal end of the lead body. A retaining member is disposed proximate the distal end of the lead and adapted to retain the electrode proximate an interatrial septum when the retaining member is located on a left atrial side of the interatrial septum.
Sensing vector selection in a cardiac stimulus device with postural assessment
Methods, implantable medical devices and systems configured to perform analysis of captured signals from implanted electrodes to identify cardiac arrhythmias. In an illustrative embodiment, signals captured from two or more sensing vectors are analyzed, where the signals are captured with a patient in at least first and second body positions. Analysis is performed to identify primary or default sensing vectors and/or templates for event detection.
Implantable electrode array assembly including a carrier in which control modules for regulating the operation of the electrodes are disposed and electrodes that are disposed on top of the carrier
An implantable electrode array that includes multiple spaced apart electrodes to which current can be individually sourced and sunk. The array includes a carrier that supports the electrodes. One or more control modules that source current to or sink current from the electrodes are disposed in recesses within the carrier. A sheet of material more flexible than the carrier is disposed between, on one side, the carrier and the control modules and, on the other side, the electrodes. Conductors over which instructions and power are applied to the control modules and conductors that extend between the control modules are the electrodes are embedded in and extend through the sheet of flexible material.
Techniques for sensing and adjusting a compliance voltage in an implantable stimulator device
Disclosed herein are methods and circuitry for monitoring and adjusting a compliance voltage in an implantable stimulator devices to an optimal value that is sufficiently high to allow for proper circuit performance (i.e., sufficient current output), but low enough that power is not needlessly wasted via excessive voltage drops across the current output circuitry. The algorithm measures output voltages across the current source and sink circuitry during at least periods of actual stimulation when both the current sources and sinks are operable, and adjusts the compliance voltage so as to reduce these output voltages to within guard band values preferably indicative for operation in transistor saturation. The output voltages can additionally be monitored during periods between stimulation pulses to improve the accuracy of the measurement, and is further beneficial in that such additional measurements are not perceptible to the patient.
System and method for eyelid simulation
A system and method of treating hyperactivity of an eyelid closing muscle in a subject after facial nerve paralysis includes providing a stimulation system and selectively stimulating eyelid opening muscle(s) or innervating nerves, eyelid opening reflexes, or eyelid opening reflexes in non-muscular tissue, using the stimulation system, without substantially activating the eyelid closing muscle. The system and method evokes eyelid movement in the subject.
System and method for controlling skeletal muscles by means of neuro-electrical coded signals
A system and method for controlling a skeletal muscle by means of a neuro-electrical coded signal. An actual neuro-coded signal that is naturally generated in a body and operative in control of a skeletal muscle can be collected from a nervous network and stored in a database associated with an electronic device. An implantable muscle control device having one or more electrodes can be directly attached to an appropriate nerve leading to one or more target skeletal muscles associated with a subject. The actual neuro-coded signal can then be selected from the database and broadcasted to the implantable device associated with the subject via a neuro-code transmission approach in order to activate and regulate the affected skeletal muscles.
Identifying an area for electrical stimulation to treat a patient
A stimulation system, such as a spinal cord stimulation (SCS) system, having a programmer for identifying an area for electrical stimulation to treat a patient. The programmer includes a communication interface, a display screen, and a user interface. The communication interface communicates with the electrical stimulation generator to generate electrical stimulation and the display screen displays a patient model. The user interface receives user input identifying an area of pain on the patient model via a selection of the area of the body part. The programmer then associates the area of pain identified with a spinal column location, and displays on the display screen a suggested medical lead position and/or a suggested stimulation area on an image of a spinal column based on the step of associating.
Method of producing a proximal connector end of an implantable lead
A connector for an implantable medical lead that is electrically and mechanically connectable to an implantable medical device, has a connector pin made of a first conducting material. A tubular insulator made of an insulating material concentrically surrounds at least a portion of the pin. A connector ring made of a second conducting material is concentrically positioned around at least a portion of the insulator. The insulator is connected to the connector ring by spark plasma sintering in the case of an active fixation lead, and is connected to the ring and the pin by spark plasma sintering in the case of a passive fixation lead.
Method of bonding zirconia to platinum
The invention is a method of hermetically bonding a ceramic part to a metal part by welding and brazing a component assembly comprised of metal parts, a ceramic part, and a metal ferrule having alignment lips. The ceramic part is preferably a hollow tube of partially-stabilized zirconia that is brazed to an alignment ferrule that is preferably titanium or a titanium alloy, such as Ti-6Al-4V. On one end the component assembly is brazed to an end cap for closure. On the other end the alignment ferrule is preferably brazed to a ring that is preferably comprised of a noble metal, such as platinum, iridium, or alloys of platinum and iridium. The ring is laser welded to an eyelet that is preferably comprised of a noble metal.
Device and method for detecting electromagnetic fields occurring in imaging magnetic resonance tomography MRT/MRI tests. Relates to an implantable medical device (IMD) comprising a hermetically sealed housing, control unit(s), detection unit(s) for MRT interference fields connected/connectable to control unit(s) and to electrode(s) and/or to antenna(s) and/or coil(s), wherein the MRT interference detection unit contains at least one electro-optical converter which converts induced voltages from the electrode(s) and/or the antenna(s) and/or the coil(s) to optical signals, which are optically transmitted in a potential-free manner within the detection unit for MRT interference fields to an evaluation unit for the detection unit for MRT interference fields, and when a threshold for the optical signal and/or a predetermined periodic occurrence of the optical signals is exceeded, the evaluation unit triggers switching to an MRI-safe state or transmits a corresponding signal to the control unit(s).
Resuscitation device and method for resuscitation
A method for providing a resuscitating treatment of a human being, which has the following actions sensing human muscle activity, human breathing activity, human neural activity or human cerebral activity, determining whether the human being is in a state of developing apnoea by a processing unit based on the sensing, provoking an induced aspiration reflex by a resuscitating stimulation of a respiratory area of a human brain stem by providing a stimulus with a stimulation device to a location distant from the respiratory area of the human brain stem upon the processing unit determining the state of developing apnoea, the location being a nasal filter of the human being or a nasopharyngeal area of the human being.
Method and apparatus for electrotherapy drug delivery
The present invention is directed to a method and apparatus for an electrotherapeutic system including a first and second electrode. Each electrode includes a respective resistance wherein during operation of the electrotherapeutic system, an electrochemical reaction involving one or both of the electrodes varies the respective resistance of at least one of the electrodes.
Switch validation circuit and method
A switch operated therapeutic agent delivery device is described. Embodiments of the operated therapeutic agent delivery device include a switch that can be operated by a user, a device controller connected to the switch through a switch input where the device can actuate the device when certain predetermined conditions are met, and a switch integrity subcircuit which is used to detect a fault or a precursor to a fault.
Audio headset with bio-signal sensors
An audio headset with bio-signal sensors is provided. In some embodiments, an audio headset that includes one or more electroencephalography (EEG) sensors is provided.
Systems and methods for heart rate monitoring, data transmission, and use
In a first aspect, a heart rate monitoring system is provided that includes (1) a heart rate monitor adapted to wirelessly transmit a signal indicative of a heart rate of a user; and (2) a user device adapted to receive the signal from the heart rate monitor, process the signal, and determine sleep information for the user from the heart rate. Numerous other aspects are provided.
Implantable medical devices using heuristic filtering in cardiac event detection
Methods for performing cardiac signal analysis in an implanted medical device, and devices configured to perform illustrative methods of cardiac signal analysis. A cardiac signal is captured by an implanted device using implanted electrodes and, during at least certain conditions, the cardiac signal undergoes heuristic filtering. In some embodiments, heuristic filtering is achieved by modifying a signal or value that is used as an indicator of received signal amplitude. In an illustrative example, the heuristic filtering includes periodically incrementing or decrementing the signal or value toward a desired quiescent point, where the heuristic filter period is significantly longer than the sampling period for the signal itself. In another illustrative example, the heuristic filter frequency can be adjusted dynamically to keep the signal average near the desired quiescent point.
Method and apparatus in connection with exercise
An apparatus in connection with a fitness exercise of a person, including means for processing multidimensional electrocardiographic data of the person, the multidimensional electrocardiographic data comprising at least two spatially separately measured electrocardiographic signal components, means for forming a vectorcardiographic measure on the basis of the multidimensional electrocardiographic data, and means for applying the vectorcardiographic measure in determination of a fitness exercise related parameter.
Ultra wideband monitoring systems and antennas
Apparatus for monitoring vital signs of one or more living subjects comprises a monitoring station and at least one sensor in communication with the monitoring station. The sensor comprises an antenna system, an ultra wideband radar system coupled to the antenna system, a signal processor and a communication system. The signal processor is connected to receive a signal from the ultra wideband radar system and configured to extract from the signal information about one or more vital signs of a person or animal in a sensing volume corresponding to the antenna system. The communication system is configured to transmit the information to the monitoring station.
Physiological monitoring using an ocular probing system and method
A method and system perform physiological monitoring. The system includes a first light source and a plurality of optical waveguide couplers, each of the plurality of optical waveguide couplers being arranged at a different predetermined spatial location on an ocular insert to be placed on an eye. The system also includes a plurality of optical waveguides. Each optical waveguide carries light from a second light source to a respective one of the plurality of optical waveguide couplers and carries a received signal from the respective one of the plurality of optical waveguide couplers. A processor receives the received signal from each of the plurality of optical waveguides and monitors a parameter based on the received signal.
Method and apparatus for rapid detection and diagnosis of tissue abnormalities
A method and apparatus are provided that interrogate, receive, and analyze full emission spectra for at least one fluorescence excitation wavelength and for at least one reflectance measurement to determine tissue characteristics and correlate same to photographic images. Further, the system and method accomplish this measurement rapidly by increasing the light throughput by integrating optics into a hand held unit and avoiding the need for a coherent fiber optic bundle being used. The method includes illuminating a first portion of a target tissue with optical energy, forming a first image of the target tissue, illuminating a second portion of the target tissue with optical energy, performing spectroscopic measurements on optical energy reflected and/or emitted by the target tissue upon illumination of the second portion of the target tissue with optical energy, and determining tissue characteristics of the target tissue based on the results of the spectroscopic measurements.
Producing a three dimensional model of an implant
Determining a shape of a medical device to be implanted into a subject produces an image including a defective portion and a non-defective portion of a surface of a tissue of interest included in the subject. The tissue of interest is segmented within the image. A template, representing a normative shape of an external anatomical surface of the tissue of interest, is superimposed to span the defective portion. An external shape of an implant, is determined as a function of respective shapes of the defective portion as seen in the template, for repairing the defective portion.
Manual and automatic probe calibration
Embodiments of the present disclosure include an optical probe capable of communicating identification information to a patient monitor in addition to signals indicative of intensities of light after attenuation by body tissue. The identification information may indicate operating wavelengths of light sources, indicate a type of probe, such as, for example, that the probe is an adult probe, a pediatric probe, a neonatal probe, a disposable probe, a reusable probe, or the like. The information could also be utilized for security purposes, such as, for example, to ensure that the probe is configured properly for the oximeter, to indicate that the probe is from an authorized supplier, or the like.
Elastomeric back with rails for mobile device
A mobile device has a front face and a back face opposite the front face. The back face includes an elastomeric layer. A pair of longitudinal sides are coupled to the front face and back face, and a pair of latitudinal sides are also coupled to the front face and back face. The back face or the longitudinal sides define a recessed slot extending along a longitudinal length of the back face or longitudinal sides, respectively. The recessed slot defines an open end at at least one of the latitudinal sides. The recessed slot has a recessed slot surface that has a low-friction material. A holster includes a pocket defining an open top end configured to receive the mobile device. A rail extends longitudinally along an interior side of the pocket. The rail is configured to correspond with and slidably engage the slot on the mobile device.
Semiconductor integrated circuit, noncontact/contact electronics device using the same and mobile terminal
The semiconductor integrated circuit includes: a pair of antenna terminals; a rectifier; a source-voltage terminal; a shunt regulator; a series regulator. When the voltage of the inside source line rises to or above a first set voltage, the shunt regulator passes a pull-down current through a pull-down transistor. When the voltage of the inside source line drops to or below the second set voltage, the series regulator passes a pull-up current through a pull-up transistor. The first set voltage is set to be higher than the second set voltage in voltage level. With the semiconductor integrated circuit, the competition of actions of the two regulators is prevented. The semiconductor integrated circuit is arranged to work in contact and noncontact operation modes, and a stable source voltage can be supplied to an internal circuit thereof.
Power control using fast signal correlation
A method for controlling output signal power in a communication terminal includes accepting, from first and second measurement points along a transmission chain in a transmitter of the terminal, respective first and second signal representations of a communication signal to be transmitted by the communication terminal. A cross-correlation is computed between the first and second signal representations accepted from the first and second measurement points. An actual gain between the first and second measurement points is computed using the cross-correlation. An output power of the communication signal is adjusted by setting a gain of the transmitter responsively to the actual gain.
Customized data retrieval applications for mobile devices providing interpretation of markup language data
Systems and techniques, including computer software, for retrieving information to a mobile device involve installing a data retrieval application on the mobile device. The data retrieval application includes instructions for presenting a structured data display on the mobile device, defining a structure of the structured data display, requesting selected hyperlinks included in the structured data display, and rendering markup language information received in response to the selected hyperlinks. A user request to retrieve data through the data retrieval application is received, and data is retrieved in response to the received user request. The retrieved data is displayed according to the structure of the structured data display, and a user can select a hyperlink in the displayed data to retrieve and render markup language information using the data retrieval application.
Automatic mobile device backup
Embodiments of systems and methods for automatic backup of a user's data stored on a mobile device are disclosed. In one embodiment, a method includes storing a user information from a memory of a mobile communication device into a database; determining a status of the mobile communication device; and when the status indicates that the mobile communication device requires replacement, notifying a user of an availability of the user information from the storage facility for creation of a replacement device.
The communication device comprising a voice communication implementer, a navigation implementer, a video game implementer, a multiple language mode implementer, and a remote control implementer.
Mobile device having hybrid keypad
A mobile device comprising: a communication module for sending and receiving radio communications; a display for displaying information; a processor for controlling software and firmware operation; a keypad for entering data to the processor comprising an array of alpha keys for alpha data entry and an array of numeric keys for numeric data entry, wherein entry of alpha data does not require use of numeric keys and numeric data does not require use of alpha keys; and a housing encompassing the communication system, display, image processor and keypad configured to facilitate an operator holding the mobile device in one hand and keypad data entry with the other hand.
A communication device and method are disclosed. Transmitted signals are transmitted from antennas. A beam is formed based on known-received signals by controlling a transmission directionality of the antennas. Transmitted power of the transmitted signals is controlled based on a time interval between a reception time during which the known-received signals are received and a transmission time during which the transmitted signals are transmitted.
System and method for establishing a communication session between context aware portable communication devices
A system and method for establishing a communication session between at least two parties that are located in a common context (e.g., location) without sufficient knowledge to establish a communication session in a conventional manner. In one embodiment, a request to establish a communication session between two devices is received at a remote server. The request includes user information and location information associated with the first device and the request includes data corresponding to a physical feature of the user of the second device. The request is processed to obtain network information related to the second device, by searching a plurality of user profilers stored on the server based on the received location information and the data corresponding to the physical feature of the associated user of the second portable communication. If a suitable user profile is found, a communication session is established between the devices.
Radio communication system, radio communication device, and radio communication method
A radio base station (1) includes a scheduler (114) and a control unit (112). As a reception device has a higher reception quality, the scheduler (114) sets a higher allocation priority of a radio resource used for data transmission. When the priority β set for a transmission destination reception device by the scheduler (114) is higher than the priority α set for transmission destination reception device, the controller (112) allocates the radio resource to both of the transmission destination reception device and the transmission destination reception device ant transmits both of the transmission data and the retransmission data by using the allocated radio resource.
Methods and systems for providing near real time messaging to hearing impaired user during telephone calls
A data connection between a server and an application running on a mobile telephone handset is used to provide caption text of a telephonic conversation between call participants to the mobile phone handset during an active telephone call. Prior to providing the captions, a communication session between the server and the application running on the handset, the means of transporting the caption text is determined. Transport may be by way of data socket connection or by way of SMS messages.
Obtaining timing of LTE wireless base stations using aggregated OTDOA assistance data
An apparatus and method for calculating time offsets for imperceptible base stations, which include base stations that have limited or no communication with a mobile station are presented. Time offsets for the imperceptible base stations are computed using transmit time offset information for a plurality of base station pairs received from a non-carrier base station almanac. A time offset between the mobile device at a first location and a serving base station at a second location is also computed. The time offsets for the imperceptible base stations may then be computed using the received transmit time offsets of the plurality of base station pairs and the time offset between the mobile device and the serving base station. The non-carrier base station almanac is built using a mobile device that informs a non-carrier location server of observed time difference of arrival (OTDOA) assistance data it receives from a carrier's location server.
System for monitoring in real-time movement or location and method thereof
The present invention relates to a system for monitoring in real-time movement or location, comprising at least one sensor, at least one receiver, a server unit and a database unit. Regarding the system of the present invention, the signals of the sensors attached on users or articles are transmitted to a website via a Wireless Ad Hoc Network and a local area network to real-time monitor movement or location for users or articles. The present invention further provides a method for monitoring in real-time movement or location for users or articles.
Systems and methods for display of supplemental content responsive to location
The present disclosure provides a system and method for providing a user with supplemental content based on the user's preferences and location. The disclosure provides a computer program that allows users to discover and organize content from a platform that is accessible from a mobile device or computer. Additionally, the disclosure provides a system for determining a user's location while indoors. The system can associate the user's location with specific content or items in a store and provide the user with supplemental content related to those items.
Information sharing system using maps
System capable of giving a sense of unity or solidarity to a plurality of users sharing information is provided. Each of a plurality of client terminals includes a position information acquiring means. A management server updates user position information stored in a user database based on present position information of the respective client terminals. The management server reads a plurality of items of user position information contained in a predetermined range and a plurality of items of user information associated with the user position information contained in the predetermined range from the user database on the basis of the predetermined range of the map information read from a map database, and transmits them to the client terminals. The client terminal displays the items of user information at respective positions corresponding to the items of user position information on the map information in the predetermined range received from the management server.
Proprietor-controlled location-based setting of notification policies
A property could be covered by a mobile device policy map that defines a plurality of spaces within the property and associates each defined space with a respective notification policy regarding how one or more classes of mobile devices are permitted to provide notifications in response to incoming communications. The mobile device policy map for a property could be developed by the proprietor of the property and could be enforced by a server. A mobile device could report its location to the server, and the server could determine that the location is within or proximate to an area covered by a mobile device policy map. The server could then transmit at least a portion of the mobile device policy map to the mobile device, so that the mobile device can apply the relevant policies based on its location.
Control channel interference mitigation
In some embodiments, control channel data is passed between neighboring base stations to allocate control channel resources to mitigate inter-cell interference.
Program for distributed channel selection, power adjustment and load balancing decisions in a wireless network
The performance and ease of management of wireless communications environments is improved by a mechanism that enables access points (APs) to perform automatic channel selection. A wireless network can therefore include multiple APs, each of which will automatically choose a channel such that channel usage is optimized. Furthermore, APs can perform automatic power adjustment so that multiple APs can operate on the same channel while minimizing interference with each other. Wireless stations are load balanced across APs so that user bandwidth is optimized. A movement detection scheme provides seamless roaming of stations between APs.
Methods and devices for communicating over a radio channel
The invention relates to methods and communication devices for transmitting data on a radio channel comprising the steps of determining a first preamble format to be used in a cell of the second communication device, determining a basic cyclic shift value from a set of basic cyclic shift values, the set is selected based on the preamble format, and transmitting data comprising indication of the determined first preamble format and a basic cyclic shift value pointer indicating the basic cyclic shift value in the set of basic cyclic shift values.
Handover method and apparatus in a wireless communication system including femto cells
A handover method and apparatus for facilitating a handover of a user equipment to a femto cell in a wireless communication system supporting both the femto and macro cells. When a handover condition is detected, the user equipment acquires identity information of a target femto cell base station from system information transmitted by the target femto cell base station, decides whether to handover to the target femto cell base station, based on the identity information; and transmits a measurement report message including the identity information to a serving base station of the user equipment, when the handover is to be made.
Method for switching from a first cellular network to a second cellular network
This invention provides a system and a method to automatically switch cellular data communications from 3G to 4G mode wherever reliable 4G cellular connectivity is available, and to collect and report reliable 4G cellular coverage geo-fence polygon information. The invention also provides a system and method to automatically switch cellular data communications between 4G cellular networks provided by different carriers, and 3G cellular networks provided by different carriers.
Non-3GPP to 3GPP network handover optimizations
A method for a handover of a mobile node from a non-3GPP to a 3GPP network, and of a mobile node, which is located in a non-3GPP/3GPP network. The handover is improved by discovering an appropriate MME and registering the mobile node at the discovered mobility management entity (MME), in advance. This includes to first determine the location of the mobile node in the non-3GPP network, so as to be able to detect an MME in the vicinity of the mobile node's location. The 3GPP contexts are then transmitted to the new MME before the handover is performed. Moreover, the Serving-Gateway in the 3GPP network is changed before performing a handover, thereby accelerating the handover. When a handover gets likely, the mobile node's location is determined and a new Serving-Gateway is selected. The data path is changed to go via the new Serving-Gateway.
Method and apparatus for selecting a service area identifier for a user equipment in a wireless system
The present invention relates to a method for allocating service area identifiers (SAI) for a femto cell (200A) upon the femto cell (200A) being created. According to the method, information is received about detected cells obtained by scanning performed by a femto radio base station (210A) that is serving the femto cell (200A) in addition to information identifying the femto base station (210A) or the femto cell (200A); a request for SAIs, is transmitted to a SAI selection entity (250, 400) based on the received information, and SAIs selected by a selection entity (250) are received together with an associated user type. The identifiers are further allocated for the created femto cell (200A). The present invention also relates to an apparatus (100, 300) and to the selection entity (250, 400).
Technique for cell signature determination
A technique for cell signature determination in a cellular communication network is provided. A method implementation of this technique comprises the steps of providing a set of hypothesis signals, each hypothesis signal including a signature hypothesis, receiving a composite signal including a first signal portion carrying a first signature from a first cell and a second signal portion carrying a second signature from a second cell, wherein the first signal portion and the second signal portion overlap at least partially in time, and obtaining a correlation result by correlating the composite signal with each hypothesis signal. After the first signature has been determined, a set of phantom signatures associated with the first signature is provided. The phantom signatures represent artifacts from the first signal portion in the correlation result. Finally, the second signature is determined based on the correlation result taking into account the set of phantom signatures associated with the first signature.
Method of discovering overlapping cells
A method of discovering overlapping cells in a telecommunications network comprising a plurality of base stations, wherein steps carried out by an individual base station comprise determining sets of terminals in ranges of its associated cells and sending a message with information about said sets of terminals to other base stations. The method also includes receiving messages from said other base stations with information about sets of terminals in ranges of their associated cells. The individual base station calculates intersection of its own set of terminals with those received from said other base stations and classifies cells as overlapping if the corresponding intersection is equal or above a predefined level.
Remote mobile device management
Remote mobile device management is provided. A master user account is established based on a request from a master user and a request to associate a remote mobile device with the master user account is received. The remote mobile device is associated with the master user account and management information is received from the master user account that is associated with the remote mobile device including restriction activation information. A first indication of geographic location is received when the remote mobile device enters a defined geographic area. The system also provides for the restriction of at least one device capability of the remote mobile device based on the restriction activation information and the first indication of geographic location. A second indication of geographic location is received when the remote mobile device exits the defined geographic area and provides for restoration of the at least one device capability based on the second indication of geographic location. Alternately, notifications may be sent to a master user upon receipt of an indication of a geographic location.
System and method for controlling mobile communication devices
A system and method are provided for controlling a mobile device. The method includes, during use of the mobile device, interpreting at least one item, the at least one item corresponding to data or events detectable on the mobile device. At least action may then be determined, which are associated with the at least one item, each action capable of preemptively executing at least a portion of a task using features available on the mobile device. At least one of the actions may then be executed and a result associated with the execution of the at least one action provided.
Wireless devices and methods of operating wireless devices based on the presence of another person
A method of operating a device for a user is provided. The method includes operating the device in a first mode; receiving an indication of a first person in the presence of the user; retrieving a first profile associated with the first person; and operating the device in a second mode based, at least in part, on the first profile.
Method and system for distributing data to mobile devices
Embodiments of the invention are concerned with a method and a system for distributing mobile applications, in particular to aspects of receiving, processing and displaying advertisements on mobile terminals. In one aspect, embodiments provide a software component for controlling movement for an advertisement image on a mobile terminal, the mobile terminal comprising a display area and a processor, the software component comprising processable instructions defining movement of the advertisement image relative to the display area, wherein the instructions are wirelessly transmissible to the mobile terminal and the processor is arranged to process said instructions in order to more the advertisement image.
Method and system for data exchange when a call is established on a non-class A cellular endpoint
A telecommunication system and method that allow a data exchange to be initiated while a user is engaged in a voice communication using a non-class A endpoint (e.g., cellular telephone, personal digital assistant, etc.) with another party. One example method maintains a first voice communication leg to the wireless device and a second voice communication leg to the second device, inputs a request for the data exchange during the voice communication, disconnects the first voice communication leg, parks the second voice communication leg and waits for data to be transmitted to or from the wireless device. Once it is determined that the data exchange is complete, the method establishes a third voice communication leg to the wireless device, unparks the second voice communication leg and connects the second and third voice communication legs.
Speech to message processing
Voice message processors are configured to produce text representations of voice messages. The text representations can be compacted based on one or more abbreviation libraries or rule libraries. Abbreviation processing can be applied to produce a compact text representation based on display properties of a destination device or to enhance user perception. Text representation length can be reduced based on abbreviations in a standard abbreviation list, a user specific abbreviation list, or a combination of standard and custom lists. In some examples, text length is shortened based on stored rules.
Decision environment for devices that fail authentication
A system, a method and computer-readable media for handling a device that experiences a failure to complete a network's authentication process. Causes of the failure are determined, and device attributes are received. These causes and attributes are then used to determine an alternative authentication process. The device is authenticated by using this alternative authentication process.
Real time charging mechanism to deliver on demand telecommunication services
The method and system for charging a user in real time to deliver On demand telecommunication services is disclosed. The method provides premium services like voice message services, content services and so on to the subscribers on their request and deducts an appropriate amount of charge instantly before providing the service. The method of deducting the charge and providing the requested service to the user happens while the call is still connected. The method of charging is applicable in either same network or in a different network that provides the premium services. Further, the method in the disclosed embodiment resides on a server that controls the charge deduction through any suitable network protocols. The charging server acts as a central entity where a group of merchants, content providers, value added service providers are connected to it and delivers services to the user depending on their requirement.
System and method for providing network assisted geographic coordinates for emergency data messaging
A system and method for communicating geographic coordinates with an emergency data message to a public safety answering point (PSAP) may include receiving a request from a user to send an emergency data message to a PSAP and determining whether geographic coordinates are locally available. If geographic coordinates are locally available, then the locally available geographic coordinates may be obtained and included with an emergency data message. Otherwise, if the geographic coordinates are not locally available, then a request for geographic coordinates from a network node on a communications network may be made and received from the communications network for inclusion with the emergency data message. The emergency data message may be communicated to a network node on the communications network for routing to the PSAP.
Managing non-voice emergency services in a wireless communication network
A user equipment (UE) may send a non-voice emergency services (NOVES) message to a public safety access point (PSAP). If the UE does not receive an acknowledgement that the PSAP received the NOVES message, the UE may buffer the NOVES message and periodically re-transmit the NOVES message. The NOVES message may include a counter value that is incremented with each successive transmission. The PSAP may recognize if the counter value is greater than an initial value, and determine if the PSAP or another PSAP has received the NOVES message previously. In some embodiments, the UE may change an interval between re-transmissions if the UE receives a partial acknowledgement from an operator network indicating that the operator network has received the NOVES message but that the PSAP is unavailable. Embodiments also provide an emergency module hosted at the operator network to store and forward the NOVES message to the PSAP.
Method and system for enabling a user to configure custom voice alarms/events for mobile communication devices
In one embodiment, a method comprising receiving at a mobile device plural user inputs entered at a user interface of the mobile device, the inputs comprising a text message or a recorded voice message of a user that indicates a manner of generating a custom voice alarm; sending a request to a server device based on the user inputs, the request configured to cause the server device to convert the request into the custom voice alarm; receiving the custom voice alarm at the mobile device; and triggering activation of the custom voice alarm at the mobile device based on user selection of a triggering event.
High rate packet data (HRPD) idle state handout from femto access point to macro access network
Systems and methods for identifying an address of a femto node during handoff of an access terminal from a femto node to a macro node. In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node. The macro node partitions the unique identifier to determine the address of the femto node. In another embodiment, the femto node registers its address with a domain name system. The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy. The proxy partitions the unique identifier to determine the address of the femto node.
A semiconductor device is provided with a power supply circuit having a function to generate a power supply voltage from a wireless signal and an A/D converter circuit having a function to detect the strength of the wireless signal by an A/D conversion of a voltage generated from the wireless signal. This enables to provide a semiconductor device which does not require replacement of batteries, has few limitations on its physical shape and mass, and has a function to detect a physical position. By formation of the semiconductor device with use of a thin film transistor formed over a plastic substrate, a lightweight semiconductor device, which has flexibility in physical shape and a function to detect a physical location, can be provided at low cost.
Ordered electromagnetic interference cancellation
Progressive cancellation of electromagnetic interference (EMI) is achieved by establishing a canceller stage processing order in a receiver feed circuit. Such a processing order may be one that progressively narrows an interference analysis bandwidth around desired target signal and optimizes gain-bandwidth characteristics of a cancellation loop in each canceller stage accordingly. A cancellation signal generated by each canceller stage is adaptively controlled without disturbing the stability of the cancellation loop. By doing so, the residual interference-to-noise ratio at each adaptive canceller stage is optimized independently from the closed cancellation loop control of the other canceller stages resulting in improved interference cancellation in the receiver feed circuit.
Signal interference detection and avoidance via spectral analysis
In one embodiment, an apparatus for minimizing signal interference for a network device is provided. The apparatus includes a receiver configured to detect an interference signal. The apparatus also includes a signal analyzer that is configured to analyze the detected interference signal. The apparatus further includes an interface. The interface is configured to advertise detection of the interference signal as a service offered by the apparatus to the network device. The interface is configured to accept a request from the network device to subscribe to the service. The interface is also configured to alert the network device when the interference signal is detected.
Wireless communication device and control method for wireless communication device
An antenna receives an RF signal and an RF signal at different frequency bands. An oscillator outputs a local oscillator signal at a frequency f1. An oscillator outputs a local oscillator signal at a frequency f2. A modulator modulates the frequency based on the local oscillator signal at the frequency f1 and the local oscillator signal at the frequency f2, and generates a plurality of local oscillator signals at different frequencies. A frequency converter mixes the plurality of local oscillator signals, at different frequencies, generated by the modulator, with the RF signal and the RF signal, and generates baseband signals of the RF signal and the RF signal. A signal processor performs a predetermined process for the baseband signals generated by the frequency converter.
Distortion correction based feedforward control systems and methods for radio frequency power sources
A distortion module includes a first module, at least one module and a correction module. The first module is configured to (i) receive radio frequency signals from radio frequency sensors of a power amplifier, and (ii) generate a distortion signal indicating distortion values for the radio frequency signals. The radio frequency signals are indicative of radio frequency power out of the power amplifier and received by a transmission line. At least one module is configured to estimate a phase of the distortion signal. The phase of the distortion signal is indicative of a phase of the transmission line. The correction module is configured to generate a distortion correction signal based on the phase to correct at least one of the distortion values of the radio frequency signals.
Radio transmission system, radio communication apparatus, and radio transmission method
A radio transmission system includes: antenna pairs, each antenna pair being a combination of a transmitting antenna and a receiving antenna in one-to-one correspondence. A radio signal from the transmitting antenna in one of the antenna pairs reaches the receiving antenna of the one antenna pair as a desired wave directly, and a radio signal from the transmitting antenna of another antenna pair different from the one antenna pair reaches the receiving antenna of the one antenna pair as an unnecessary wave directly. A transfer characteristic correction section which performs a correction operation based on the transfer characteristic of a transmission space between the transmitting antenna and the receiving antenna for a transmission-target signal corresponding to the transmitting antenna, and a modulation functional section which modulates a carrier signal with a corrected signal after having been corrected by the transfer characteristic correction section and transmits the modulated carrier signal from the corresponding transmitting antenna, are provided in correspondence with each antenna pair.
Method and apparatus for adaptive channel utilisation
A transceiver with an adaptable filter and a method of controlling the settings of the filter to adapt to local channel assignments and usage are provided. The adaptable filter is connected in at least one of the transmitter path and the receiver path of the transceiver to separate signals from adjacent spectrum blocks to permit use of all of the channels in the adjacent spectrum blocks and to separate signals in adjacent or nearby channels in a shared-channel block. A method and system for forward link control signalling are provided. The forward link control signalling includes a frame for transmission that includes at least one control channel that includes control information for receivers sharing a common characteristic, and a guide channel that includes information pertaining to the at least one control channel, including control information for receivers sharing a common characteristic.
Radio communication terminal
Provided is a radio communication terminal capable of ending communication processing in a normal manner even if removed from an information processing terminal in the course of the communication processing. According to the present invention, the radio communication terminal operates by receiving power from an external apparatus connected thereto and includes a radio communication unit for performing radio communication with a radio base station, a battery capable of operating the radio communication terminal without receiving power from the external apparatus, and a control unit, in case of disconnection from the external apparatus in the course of the communication processing using the radio communication unit by receiving power from the external apparatus, for controlling the radio communication terminal to switch over to operation powered by the battery and carry out continuing processing to end the communication processing in the normal manner and then to stop the operation powered by the battery.
Self calibration method for radio equipment with receive and transmit circuitry
A self-calibration circuit and associated method for testing an RF device includes the RF device to be tested having transmit and receive sections, and a built-in self test (BIST) circuit coupled to the transmit and receive sections of the RF device on the same chip. The self-calibration circuit is configured to calibrate the receive section of the RF device in a receive test mode, and calibrate the transmit section of the RF device in a subsequent transmit test mode using the calibrated receive section to measure a transmit output signal from the transmit section and to provide calibration data therefrom used in the transmit section calibration. The self-calibration circuit may include a duplex filter coupled between the transmit and receive sections and the BIST circuit, and a multiplexor coupled between the RF device, and the BIST circuit, configured to select one or more of a plurality of RF devices to be tested.
Method for generating cooperation areas in communications networks and corresponding network nodes
The present invention refers to generating of cooperation areas in a communications network, wherein each cooperation area is defined by at least two base stations of said communications network, which are cooperating when communicating with mobile nodes in said communications network. In particular, a number of sets of possible interferers is transmitted to at least one mobile node by a base station, wherein with each set of possible interferers an index value associated to said set of possible interferers is transmitted. Then, said mobile node selects a set of possible interferers from said number of sets of possible interferers and transmits a selected index value to said base station, said selected index value being an index value associated to said selected set of possible interferers. Hereupon, a cooperation area for said mobile node is defined by said base station by use of said selected index value.
Dynamically reconfigurable universal transmitter system
A dynamically reconfigurable universal transmitter system is disclosed herein. The electronic device includes multiple transmitter resources for generating transmission signals, an output bus; and an antenna summer coupled to the output bus. The output bus is selectively coupled to the plurality of transmitter resources and it selectively receives transmission signals from the plurality of transmission resources. The antenna summer stores transmission signals received on the output bus.
Method and apparatus to transfer files between two touch screen interfaces
Systems and methods for configuring transferring a file between wireless communication devices are presented. The source device receives an input via a touch screen interface. It queries a destination device to determine if the destination device has received an input via the destination device's touch screen interface that completes a file transfer gesture. The source device transfers the file based on the response of the destination device to the query.
Wireless communication information relay
To improve operation in a wireless communication system, a relay can be used to assist in transferring information from a mobile device to a base station. Uplink and downlink communications can be monitored to determine if a mobile device is at an edge of a cell and if there should be assistance provided. If there should be assistance performed, then digital or analog relay operations can be implemented. Multiple packet transmissions can take place as well as a scaled version of a transmission can be transferred.
Hierarchical broadcast transmission via multiple transmitters
A technique for controlling a wireless broadcast transmission of media data via multiple transmitter sites into a broadcast area with different inter-site distances is proposed. The broadcast area comprises a region of large inter-site distance (ISD) and a region of small inter-site distance. The technique provides for a high spectral efficiency in regions of small ISD and at the same time for an acceptable reception quality in regions of large ISD. A first transmission is initiated into the broadcast area, wherein the first transmission is adapted for reception in a first of the regions. A second transmission is initiated into a second of the regions, the second transmission being adapted for reception in the second region.
Image forming apparatus
An image forming apparatus includes a medium guide. A toner image is formed on an image bearing body. A transfer section transfers the toner image onto a print medium. A fixing section fixes the toner image into a permanent image. A guide section is disposed along a transport path in which the print medium advances toward the fixing section. The guide section includes a first portion that extends substantially parallel to the transport path, and a second portion closer to the fixing section (22) than the first portion. The second portion extends farther away from the transport path than the first portion nearer the fixing section.
Paper particle removing device, and image formation device provided with paper particle removing device
A paper particle removing device is provided with a paper particle removing roller configured to contact a printing sheet to capture paper particles on the printing sheet, a scraping member arranged adjacent to the paper particle removing roller and configured to contact the paper particle removing roller to scrape the paper particles, a paper particle container arranged on a scraping member side with respect to a position where the scraping member contacts the paper particle removing roller, and configured to collect the paper particles scraped by the scraping member, and a negatively-charged member arranged on the scraping member side with respect to a position where the paper particle removing roller contacts the scraping member and having a relative tendency in a triboelectric series to be negatively charged relative to the paper particles, the negatively-charged member inducing the paper particles scraped by the scraping member toward the paper particle container.
A developing device includes: a housing made of resin; a developer carrier, which is rotatably supported by the housing, and which is configured to carry developer on a circumferential surface thereof; a receiving-side coupling member, which is provided rotatably to one of end portions of the developer carrier and is configured to couple with a driving-side coupling member in the rotational axial direction to transmit driving force to the developer carrier; a blade, which is provided along the rotational axial direction, and which configured to contact the circumferential surface of the developer carrier to regulate a layer thickness of the developer on the circumferential surface; and a support member, which is bent into an L-shape as viewed from the rotational axial direction, and which supports the blade, wherein the receiving-side coupling member is overlapped with a bending portion of the support member, as viewed from the rotational axial direction.
Developer storage body, image forming unit and image forming apparatus
A developer storage body includes an outer case enclosing a space in which a developer is stored and having a first opening, and an inner case rotatably provided in the outer case and having a second opening. The inner case is rotatable with respect to the outer case between an opening position and a closing position to open and close the first opening. An operating portion is provided for operation to rotate the inner case between the opening and closing positions. The inner case includes a bottom wall having the second opening, and a plurality of beams provided so as to extend between edges of the bottom wall. The beam has an inclined upper surface. The inclined upper surface is inclined downward in a gravity direction toward a side end of the beam in a cross-section of the beam.
Image forming apparatus with reduced charge leakage
An image forming apparatus includes an image carrier whose surface is moved in a specific direction, a charging device to charge the image carrier, an exposure device to form an electrostatic latent image by exposing a surface of the charged image carrier, a developing device to supply a developer to the image carrier on which the electrostatic latent image is formed, a transfer device to transfer a developer image formed on the surface of the image carrier onto an image forming medium, and a dielectric member that extends from the charging device to the vicinity of the image carrier and is disposed between the charging device and the image carrier surface part exposed by the exposure device, in which the charging device, the exposure device, the developing device and the transfer device are sequentially arranged around the image carrier along the movement direction of the surface of the image carrier.
Automatic document transportation device and document scanning device
An automatic document transportation device includes an ADF main body, a first lock pin and a second lock pin, a cover, a first lock lever and a second lock lever, and an unlock portion. The first lock pin and the second lock pin are arranged in the ADF main body. The cover is supported in an openable/closable manner at the ADF main body. The first lock lever and the second lock lever lock the cover so as not to open by being hooked at the first lock pin and the second lock pin when the cover is closed. The unlock portion is arranged on the surface on the ADF main body side of the cover and in the vicinity of the end of the distal end side of the cover, and can unlock the lock of the first lock lever and the second lock lever.
Method for assessing transfer pressure uniformity
Systems and methods are described that facilitate automatically and uniformly depositing a marking material on transfer assist blade (TAB) petals to improve TAB pressure profile accuracy. A TAB liftoff timing value is adjusted in non-volatile memory (NVM) to delay TAB liftoff beyond a trailing edge of a page on which an oversized (in the process direction) image being printed. Toner deposited on a photoreceptor belt beyond the trailing edge of the page is picked up by the TAB petals once the trailing edge of the page has passed the TAB. The TAB is then disengaged and re-engaged against a backside of a next page, where the TAB petals deposit the uniformly acquired toner to generate the TAB pressure profile.
Transfer device and image forming apparatus incorporating same
A transfer device includes a controller that controls a transfer bias supply to cause a transfer bias to increase, between an image carrier and a first rotary body disposed opposite the image carrier, a potential of the first rotary body toward an opposite polarity to a charge polarity of toner of a toner image on the image carrier to be higher than a potential of the image carrier, and to change, on the basis of identified recording medium type, a returning peak value which is one of a peak value of positive polarity and a peak value of negative polarity of the transfer bias and which generates an electric field that causes the toner having moved to the recording medium from the image carrier to return to the image carrier from the recording medium in a transfer nip.
Image forming apparatus and method
Certain embodiments provide an image forming apparatus including: an image carrier; a latent image forming unit; a developing unit; a fixing unit; a toner cartridge; a battery in the toner cartridge; a temperature sensor in the toner cartridge driven by the battery; a first controller which causes the temperature sensor to measure an ambient temperature periodically in the toner cartridge and be supplied with power from the battery; a recording medium which is provided in the toner cartridge and records a result of measurement by the temperature sensor in timing controlled by the first controller; and a second controller which reads out information recorded in the recording medium, and changes an operating condition of the latent image forming unit, the developing unit and the fixing unit according to a state of preservation of the supply of toner, based on the information.
Image forming apparatus, image forming method, and fixing apparatus
According to one embodiment, an image forming apparatus includes an image forming section configured to form a toner image on a medium, a fixing device including a heating member configured to heat the medium and a pressurizing member configured to come into contact with the heating member via the medium and heat the medium, and a control section configured to stop, if the temperatures of the heating member and the pressurizing member deviate from a predetermined temperature range, the image forming operation, separate the heating member and the pressurizing member, and control the respective temperatures within the predetermined temperature range.
Toner consumption calculator, image forming apparatus, and toner consumption calculation method
A toner consumption calculator includes a plurality of line memories; a recorder that sequentially records image data including a plurality of pixels into the line memories; a skew correction unit that performs skew correction on the image data by sequentially reading the image data from the line memories while controlling read timing; and a counter that sequentially reads the image data from the line memories and counts toner consumption of a target pixel on the basis of light amounts of surrounding pixels of the target pixel.
Determination of effective amount of remaining life of toner cartridge
An image forming system includes at least one toner cartridge, an image forming unit, and a cartridge life determination module. The toner cartridge may include toner and at least one component. The image forming unit may selectively form an image in one of a low coverage mode and a high coverage mode such that a greater amount of the toner is used in the high coverage mode than the low coverage mode in a formation of the respective image. The cartridge life determination module may determine an amount of remaining life of the toner, an amount of remaining life of the at least one component, and an effective amount of remaining life of the at least one toner cartridge based on the amount of remaining life of the toner and the amount of remaining life of the at least one component.
Method and apparatus for optical phase modulation
A method of phase modulating optical radiation by the steps of phase modulating the optical radiation by using a modulator having an extinction ratio in order to provide a multilevel phase shift key signal, and applying to each optical pulse a phase-shift having an absolute value depending on the extinction ratio and a sign depending, for each of the optical pulses, on the respective optical phase value. An apparatus implementing the method is also disclosed.
Greedy channel selection procedure for the routing, wavelength assignment and spectrum allocation in the flexible optical WDM networks
The inventive method, implemented in an optical flexible wavelength division multiplexing FWDM network, includes finding a connection route in an optical FWDM network on which a channel with sufficient spectrum is available at lowest wavelength among all available channels, finding K channels at first available K lower wavelengths out of available channels for minimizing total required spectrum; and selecting a channel which is routed through minimum number of optical fiber paths out of the K available channels at one of the lower wavelengths.
Methods and systems for coherent multi-subcarrier source generation
A method of generating a multi-subcarrier optical signal is disclosed. A local oscillator oscillates one or more data signals to generate one or more oscillating data signals. A series of modulators phase modulate a lightwave to generate a phase modulated lightwave, wherein the series of modulators are driven by the one or more oscillating data signals. The intensity modulator modulates the phase modulated lightwave, the intensity modulator being driven by one of the oscillating data signals, to generate the multi-subcarrier optical signal.
Packet transport layer passive optical network (PTL-PON) providing system and method
A packet transport layer passive optical network providing method controls an optical line termination device and an optical network terminal or an optical network unit of the subscriber end to transport packet transport layer passive optical network packets between the optical network terminals or the optical network units and the optical line termination device, and the optical network terminals or the optical network unit of the subscriber end becomes an end point of a packet transport layer connection.
Automatically switched optical network and method for data transmission in the network
An automatically switched optical network includes several areas of a transmission plane and a control plane, and a method for data transmission in the network includes that when the control plane has detected at least one partition of an area separated from other partitions of the area, a route over area is realized between the separated partitions of the area by the way of virtual link in the area. When several partitions exist in a certain area of the network, which can not be connected with each other through routes within the area, and the data transmission can not be performed between these partitions, a hierarchical route in the case of the area of ASON transmission plane being parted is realized by the method, so when the several separated partitions are caused by link fault in a certain area, the hierarchical route over area can be realized for the partitions of the area.
Image capturing device and activation method therefor
An image capturing device includes a first controller operable to control image capturing; an operation section including a switch; a detector operable to detect a change to an image capturing mode and to send a signal representing the change; a second controller operable to monitor and process the sent signal, the second controller having a power consumption less than that of the first controller; and a power supply operable to supply power to the first controller, the second controller, and a functional section of the device. When the second controller receives the signal sent from the detecting section in a power saving state in which power is supplied from the power supply to the second controller, the power saving state is changed to a power supplying state capable of image capturing by supplying power from the power supply to portions of the device including the first controller.
Media streaming with smooth fast-forward and rewind
Media streaming with smooth fast-forward and rewind is disclosed. One embodiment receives a media stream encoded at a first bit rate over a network connection, and in response to an input to fast-forward or rewind the media stream, the media stream may be retrieved at a second bit rate, and rendered at the second bit rate for fast-forward or rewind playback. By receiving the media stream at multiple bit rates, a media stream may be rendered at increased forward or reverse speeds without dropping frames in the media stream.
System and method for augmenting rich media content using multiple content repositories
Computer-implemented systems and methods for determining second content which was not selected by the user but which is related to first content which was selected by the user. For example, a system and method can be configured to receive, using one or more processors, first and second content where the first and second content are rich media (e.g., content containing audio or video elements). Systems and methods may be further configured where the relationship between the first content and second content are determined based on data or metadata of the first content (e.g., the title of the content or an episode number). Systems and methods may be further configured where the relationship between the first content and second content are determined based on scheduling data of the first content (e.g., the time and channel when the first content is transmitted).
Moving image reproducing apparatus and control method therefor, and storage medium
A moving image reproducing apparatus which performs blur correction focusing on a portion highly likely to be paid attention by a user, in reproduction operation without user's specific operation. The moving image reproducing apparatus is connected to a recording medium that records moving image data. A moving image data recorded in the recording medium is searched, based on a designated search condition, a motion vector calculating position for blur correction is set to the searched moving image data based on the search condition, a motion vector of the searched moving image data is calculated based on the motion vector calculating position, a blur correction cut-out region of the searched moving image data is set based on the calculated motion vector and the searched moving image data is subjected to blur correction, and a moving image data subjected to the blur correction is output.
System and apparatus for managing video content recordings
A system that incorporates teachings of the present disclosure may include, for example, a digital video recorder (DVR) having a controller to record video content supplied by a media communication system, establish a threshold for utilization of a memory resource of the DVR, detect a utilization of the memory resource that exceeds the threshold, generate a notice describing the utilization of the memory resource at or after the time the threshold was exceeded, identify a communication identifier associated with a portable communication device, transmit the notice to the portable communication device according to the identified communication identifier, and receive a response message from the portable communication device that includes one or more instructions to manage the memory resource of the DVR. Other embodiments are disclosed.
Methods, systems, and computer program products for coordinating playing of media streams
Methods and systems are described for coordinating playing of media streams. In one aspect, an access by a media player to a presentation device to play a media stream is detected. Additionally, presentation focus information is accessed for determining whether the media player has presentation focus for playing the media stream. Further, it is determine, based on the presentation focus information, that the media player has presentation focus for playing the media stream. Still further, in response to determining the media player has presentation focus, it is indicated that the media player is allowed to play the media stream via the presentation device.
Auditing system for misuse of an image information
The present invention relates to a system for auditing misuse of an image information, and more particularly, to a system for auditing misuse of an image information, which stores the image information recorded by an image recording device as a file; transmits a log which is related to suspected misuse to the stored file to an auditing server in order to determine whether the stored file was misused; transmits information as to whether a user's access log to the stored file, an image deletion log, an image copy log, and an image view log have been modified to the auditing server; determine whether misuse occurred in view of a misuse behavior pattern; and in a case that misuse occurs generates misuse alarm data thereby notifying a user's terminal of such misuse.
Method and apparatus for enabling sub-channel recording and playback
An apparatus such as a television signal receiver controls a digital recording device via a digital data bus to enable sub-channel recording and playback. According to an exemplary embodiment, the apparatus includes a processor that is operative to process signals representing a plurality of sub-channels to generate digital data for a first one of the sub-channels. The digital data includes program data and identification data for the first sub-channel. An input/output terminal is operative to provide the digital data to a digital recording device via a digital data bus.
Computer program, method, and system for managing multiple data recording devices
A multiple recording device management system including an intermediate multiple recording device managing apparatus, a vehicle recording device mounted in a police vehicle and synced to the managing apparatus, and a personal recording device carried by a police officer and wirelessly synced to the managing apparatus. The managing apparatus is operable to detect when the vehicle recording device, personal recording device, or any other synced device in range has begun recording and to transmit a communication signal to any synced recording device in range indicating that the recording device should begin recording and to further transmit a time stamp to synced recording devices for corroborating recorded data.
Video recording failover
Embodiments disclosed herein provide systems and methods for performing video recorder failover. In a particular embodiment, a system includes a first Network Video Recorder (NVR) configured to receive a video stream and record the video stream to a first long-term storage. The system further includes a second NVR configured to receive the video stream and temporarily stores an amount of the video stream in temporary storage. In response to a detection of a failure of the first NVR, the second NVR is configured to record the video stream to the second long-term storage and transfer at least a portion of the video stream stored in the temporary storage corresponding to the amount of time between detection of the failure and when the second NVR began recording the video stream to the second long-term storage.
Silicon optical bench OCT probe for medical imaging
An optical probe for emitting and/or receiving light within a body comprises an optical fiber that transmits and/or receives an optical signal, a silicon optical bench including a fiber groove running longitudinally that holds an optical fiber termination of the optical fiber and a reflecting surface that optically couples an endface of the optical fiber termination to a lateral side of the optical bench. The fiber groove is fabricated using silicon anisotropic etching techniques. Some examples use a housing around the optical bench that is fabricated using LIGA or other electroforming technology. A method for forming lens structure is also described that comprises forming a refractive lens in a first layer of a composite wafer material, such as SOI (silicon on insulator) wafers and forming an optical port through a backside of the composite wafer material along an optical axis of the refractive lens. The refractive lens is preferably formed using grey-scale lithography and dry etching the first layer.
Insert for an optical fiber assembly and optical fiber assembly using an insert
The present invention relates to an insert for an optical fiber assembly through which an optical fiber element can be pulled out without damage. The insert is provided for guiding a part of the optical cable (2) which comprises at least one optical fiber element (3) and being accommodated in a housing of the optical fiber assembly, wherein said part of the optical cable (2) has a cut-out portion in which a jacket of said optical cable (2) is partially removed, thereby exposing said at least one optical fiber element (3). The insert (1) comprises an optical cable guidance means (4) for guiding said optical cable (2) across the insert (1); a recess (5) surrounding the exposed optical fiber element (3) and a bend element (6) arranged at an end portion of the recess (5) and projecting from the recess (5) in a curved manner.