Automatic control of a security protection mode of an electronic device
An automated method and apparatus is provided for deterring unauthorized use or theft of electronic devices, or other sorts of items into which a tracking device has been installed, particularly those in a distribution channel. The automated method is performed by a computer system of a monitoring center, and comprises the steps of: receiving a call over a network from the electronic device, said call initiated by an agent installed on the electronic device, said agent including functionality for tracking usage of the electronic device and for reporting information regarding said usage to the monitoring center, the agent thereby facilitating recovery of the electronic device when stolen; in response to the call, determining, at least, whether a sale of the electronic device has been reported; and by communication with the agent, causing the electronic device to enter into a state that is dependent, at least, upon the determination of whether a sale of the electronic device has been reported, said state affecting whether the agent reports information to the monitoring center regarding usage of the electronic device.
Secure content delivery system and method
A system and method for secure content delivery is provided. The system and method has a content system that verifies a device with a media player based on one or more properties of the device with the media player wherein the content system delivers content to the device with the media player only when the device with the media player is verified.
Secure system and apparatus for data delivery
A system and apparatus for data delivery facilitates secure and controlled delivery of digital information, particularly in the context of an event, but also in the context of commercial and educational forums and the like. Preferably an administrator is positioned between parties wishing to share digital information and parties wishing to obtain such information. The administrator ensures that the digital information falls within certain security and formatting criteria so that parties may obtain the information without fear of damage to or abuse of their computing devices.
Executable content filtering
A executable content message stream filter applies a plurality of executable content filters to a stream of parsed elements of a network message. Each of the plurality of executable content filters targets executable content and is instantiated based on a set of one or more rule sets selected based, at least in part, on a type of the network message. For each of the plurality of executable content filters, it is determined if one or more of the stream of parsed elements includes executable content targeted by the executable content filter. The executable content message stream filter modifies those of the stream of parsed elements that include the executable content targeted by the plurality of executable content filters to disable the executable content.
Security system for computing resources pre-releases
Technology is provided for provisioning a user computer system with membership in a privilege set in order to execute a pre-release resource. Some examples of pre-release resources are alpha and beta versions of firmware or software which can be downloaded to user computer systems. The pre-release resources are associated with different privilege sets based on their security risk levels. In one example, a security risk level may represent a number of user computer systems at risk of an integrity failure of the pre-release resource. In other examples, the security risk may represent an operational layer of the user computer system affected by the resource or a level of security testing certification success for the pre-release resource. A privilege set identifier indicates membership in one or more privilege sets.
Licensing and certificate distribution via secondary or divided signaling communication pathway
In one embodiment, the present invention is directed to the use of separate communication pathways over different types of networks to handle bearer and control signaling in connection with a license transaction.
Pre-emptive pre-indexing of sensitive and vulnerable assets
A system and method for identifying sensitive content or indications of vulnerabilities is provided. A local search engine may index content at a data center. Specifications of sensitive data or fingerprints of vulnerabilities may be received from various internal or external sources. Targeted data may include vulnerable software, confidential content, dynamic or static web pages, or application data. Based on searches for targeted data, one or more components may be notified, enabling one or more security actions, including restricting publication of the targeted data.
Secure web application development and execution environment
Providing secure web application development and operation. In a web development environment, code developed for the web application is analyzed to identify vulnerabilities and remedial actions are identified. The remedial actions may be automatically invoked or a developer can be prompted to take particular actions to remediate the vulnerability.
Methods and systems for prioritizing the monitoring of malicious uniform resource locators for new malware variants
A computer-implemented method for prioritizing the monitoring of malicious uniform resource locators for new malware variants may comprise: 1) identifying at least one malicious uniform resource locator, 2) collecting priority information relating to the malicious uniform resource locator, wherein the priority information comprises information relevant to prioritizing monitoring of the malicious uniform resource locator for new malware variants, 3) determining, based on the priority information, a monitoring-priority level for the malicious uniform resource locator, and then 4) allocating, based on the monitoring-priority level, a monitoring resource for monitoring the malicious uniform resource locator. Various other methods, systems, and computer-readable media are also disclosed.
Tampering monitoring system, control device, and tampering control method
Provided is a tampering monitoring system that can identify a monitoring module that has been tampered with among a plurality of monitoring modules. A management apparatus is provided with an acquisition unit that acquires a new monitoring module that has not been tampered with, a generation unit that generates a decoy monitoring module by modifying the acquired monitoring module, a transmission unit that transmits the decoy monitoring module to the information security device and causes the information security device to install the decoy monitoring module therein, a reception unit that receives from the information security device, after the decoy monitoring module has been installed, monitoring results generated by the monitoring modules monitoring other monitoring modules, and a determination unit that identifies, by referring to the received monitoring results, a monitoring module that determines the decoy monitoring module to be valid and determines the identified monitoring module to be invalid.
Insider threat correlation tool
Systems and methods for calculating threat scores for individuals within an organization or domain are provided. Aspects of the invention relate to computer-implemented methods that form a predictive threat rating for user accounts. In one implementation, a first threat score representing a first time period may be calculated. The first threat score may be compared with aspects of the same user accounts for a second time period. Weighting schemes may be applied to certain activities, controls, and/or user accounts. Further aspects relate to apparatuses configured to execute methods for ranking individual user accounts. Certain embodiments may not block transmissions that violate predefine rules, however, indications of such improper transmission may be considered when constructing a threat rating. Blocked transmissions enforced upon a user account may also be received. Certain activity, such as accessing the internet, may be monitored for the presence of a security threat and/or an ethics threat.
Rotation of web site content to prevent E-mail spam/phishing attacks
A method for phishing attack management through Web site content rotation includes receiving a request for a variation of a component to be incorporated into a Web page from a requesting Web page rendering engine from over a computer communications network. The method also includes comparing the requested variation of the component to a currently configured variation of the component. Finally, the method includes returning both the requested variation of the component and an alert indicating a possible phishing attack in response to the request if the requested variation of the component differs from the currently configured variation of the component.
Controlling access to sensitive data based on changes in information classification
A Data Loss Prevention (DLP) system includes an automated method for tracking changes to a security classification (e.g., content category) associated with an artifact to determine whether an attempt is being made to subvert a DLP policy. The method exploits the basic principle that, depending on context, the classification of a particular artifact, or a change to an existing classification, may indicate an attempt to subvert the policy. According to the method, an artifact classification state machine is implemented within a DLP system. For each policy-defined content category on each artifact, the machine identifies a content category change that may be of interest, as defined by policy. When a change in a classification has occurred, an artifact notification event (or, more generally, a notification of the change in classification) is issued.
Authentication using privacy protected personally identifiable information
An authentication method and system provides for a user requesting authentication where the authentication request includes Personally Identifiable Information (PPI) such as geolocation data. The user's device requesting authentication alters or encrypts the PII in order to prevent the PII's unintentional discovery by third parties or to comply with jurisdictional requirements for the safeguarding of PII. The receiving party saves the altered or encrypted PII for later use. In order to use the PII and perform calculations for authentication, the receiving party requests a trusted third party with knowledge of the methodology or key used to alter or encrypt the PII to perform calculations on the original values of the PII without saving the PII. The trusted third party returns a computed value to the receiving party where it is used to determine whether the user will be authenticated.
Integrated virtual desktop and security management system
An integrated virtual desktop and security management system provides the virtual desktop server functionality and, more importantly, security management for computing devices and servers in the corporate data network. The computing devices include computers running virtual desktop client software and computers running a complete operating system and applications. The system in this invention can intercept data packets exchanged among the computing devices and servers and also can scrutinize virtual machine computing and networking activities, and therefore, possess the capability of analyzing, logging, reporting, and permitting or denying computing and networking activities of devices in the corporate data network.
System and method for host-initiated firewall discovery in a network environment
A method is provided in one example embodiment that includes intercepting a network flow to a destination node having a network address and sending a discovery query based on a discovery action associated with the network address in a firewall cache. A discovery result may be received and metadata associated with the flow may be sent to a firewall before releasing the network flow. In other embodiments, a discovery query may be received from a source node and a discovery result sent to the source node, wherein the discovery result identifies a firewall for managing a route to a destination node. Metadata may be received from the source node over a metadata channel. A network flow from the source node to the destination node may be intercepted, and the metadata may be correlated with the network flow to apply a network policy to the network flow.
Authentication and authorization in network layer two and network layer three
A method may include authenticating a node over layer 2 in a network based on authentication rules; sending a node authentication code to the node; and providing layer 3 network access based on the node authentication code.
Trusted device-specific authentication
An authentication system combines device credential verification with user credential verification to provide a more robust authentication mechanism that is convenient to the user and effective across enterprise boundaries. In one implementation, user credential verification and device credential verification are combined to provide a convenient two-factor authentication. In this manner, an account authority service or other authentication provider verify both factors and provide a security token in accordance with the security policy of the account network resource the user is intending to access. The level of privilege granted by the target account network resource can vary depending on the number and type of factors verified by the account authority service.
Network authentication method, method for client to request authentication, client, and device
A network authentication method, a client and a device are provided. The method includes: receiving SYN data sent by a client, where the SYN data includes a sequence number SEQ1 and a network parameter comprising an ID in the header of the SYN data; sending SYN_ACK data to the client, where the SYN_ACK data includes an acknowledgment number ACK2 obtained by carrying out a function transformation according to the network parameter; receiving RST data sent by the client, where the RST data includes a sequence number SEQ3 or an acknowledgment number ACK3, and the RST data further includes a network parameter the same as that of the SYN data; carrying out the function transformation according to the network parameter of the RST data to obtain a check value CHK; and passing the authentication of the client if CHK matches SEQ3 or ACK3.
Link analysis tool for security information handling system
A security information handling system (IHS) receives a request to navigate to a webpage, such as a link, from a user IHS. A security IHS link analysis tool analyzes the link and determines if the link contains sensitive content. The security IHS link analysis tool transmits a network selection message to the user IHS indicating which network the user IHS should utilize based upon the content of the link.
Image forming method
An image forming apparatus according to the present invention includes an authentication control unit configured to transmit authentication information including a login user name to an authentication server to cause the authentication server to perform authentication. When the authentication has been successful, the authentication control unit acquires user attribute information associated with the login user name from the authentication server. A job-history managing unit is configured to store the log information of a job in association with a display user name in the user attribute information.
Policy-based application management
Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.
Method and apparatus for configuring communication parameters on a wireless device
A method and apparatus for configuring communication parameters of a wireless device are provided herein. In some embodiments, the method may establishing a communication connection to a wireless access point, determining one or more security characteristics of the wireless access point, selecting a security policy to apply to the wireless device based on the determined one or more security characteristics of the wireless access point, adjusting one or more communication parameters of the wireless device based on the selected security policy, and communicating with the wireless access point using the adjusted communication parameters.
Wireless network having multiple security interfaces
A number of wireless networks are established by a network device, each wireless network having an identifier. Requests are received from client devices to establish wireless network sessions via the wireless networks using the identifiers. Network privileges of the client devices are segmented into discrete security interfaces based on the identifier used to establish each wireless network session.
Policy-based privacy protection in converged communication networks
System(s) and method(s) that employ deep packet inspection (DPI) of data flow relating to a requested service associated with a communication device to facilitate customizing the service or results provided by the service are presented. A service request can be received by a gateway identification of the service is attempted. If the service is identified, a privacy rule(s), which is contained in a user privacy profile of a user associated with the communication device, is analyzed to determine whether the privacy rule(s) applies to the service. If the privacy rule(s) is applicable, a DPI engine performs DPI on the data flow, in accordance with the privacy rule(s), to obtain information that can be used to customize the service or results provided by the service. The user can specify the level of DPI to be applied. A default rule can specify that no DPI is performed on the data flow.
Network settings browser synchronization
Computer-implemented methods for automatically configuring a device with network settings retrieved using a web browser are provided. In one aspect, a method includes receiving a user identification associated with a user web browser profile from a web browser on a device, and retrieving network setting information associated with the user web browser profile. The method also includes providing the retrieved network setting information to the web browser of the device. The retrieved network setting information is configured to be used by the web browser to configure the device to connect to at least one network. Systems and machine-readable media are also provided.
Updating system behavior dynamically using feature expressions and feature loops
Behavior of an online system is modified dynamically using feature expressions and feature loops. A feature expression can be expressed as a combination of other features or feature expressions, thereby allowing specification of complex features. The sets of feature expressions and policies of an online system can be modified while the online system is running. Feature loops aggregate values of a feature expression across a plurality of actions, for example, number of occurrences of an event over a time interval. The online system evaluates a set of feature expressions in response to actions performed by users. Feature expressions are used to specify policies that determine how the online system reacts to certain types of user actions. The ability to dynamically modify the feature expressions and policies of the online system allows the online system to adapt to attacks by malicious users in a timely manner.
User agent to exercise privacy control management in a user-centric identity management system
Enforcement of network device configuration policies within a computing environment
A network management system is described for assuring that a network device complies with a device-specific configuration policy. One example of the network management system contains one or more business rules that describe a business policy regarding a computer network in a network-independent form. In general, the business rules refer to high-level business requirements and not to device-specific configuration information. The network management system uses the business rule to determine which business policies are currently in force. In addition, the network management system contains one or more network design rules that describe relationship between the business policy and one or more device-specific configuration policies. The network management server uses the network design rules to determine whether to deploy a device-specific configuration policies. In this manner, an administrator or other user may create high-level business rules without regard to particular network devices or topologies, yet device-specific configuration polices are deployed to the network devices to assure compliance even if the network management system is bypassed.
Electronic apparatus and method for turning off firewall of electronic apparatus
[Object] To increase the usability for users without decreasing the security level.[Solving Means] A personal computer (PC) 10 is connected to a television receiver (TV) 30 using an HDMI cable 1. When a video signal is transmitted from the PC 10 to the TV 30, a TMDS channel in the HDMI cable 1 is used. A high-speed data line that performs bi-directional communication using predetermined lines of the HDMI cable 1 (e.g., a reserve line and an HPD line) is provided. In PC 10, a firewall is set. When, for example, being connected to the PC 10, the TV 30 transmits a firewall turn-off command to the PC 10. Alternatively, when, for example, performing data transmission using the high-speed data line provided between the TV 30 and the PC 10, the TV 30 transmits a firewall turn-off command to the PC 10. The security level and connectivity can be maintained without troublesome setting performed by the user and, therefore, the usability for users can be increased.
Set-top box to request a head end to command one of a plurality of other set-top boxes to transmit an available video program
Disclosed is a set-top box connectable to a display device and a video distribution network that includes a head end, the set-top box and a plurality of other set-top boxes that can store video programs. The set-top box includes a terminal controller responsive to user input and a video sharing program. The terminal controller responsive to the video sharing program displays a menu of available video programs identifying video programs stored at the plurality of other set-top boxes. Furthermore, the terminal controller responsive to user input and the video sharing program selects an available video program from the menu in response to user input, and requests the head end to command one of the plurality of other set-top boxes storing the selected available video program to transmit the selected available video program to the set-top box.
Methods and apparatus for selecting and pushing customized electronic media content
Methods and an apparatus for selecting and pushing customized electronic media content are disclosed. An example method includes determining a first capability associated with a first device; determining a second capability associated with a second device; segmenting a piece of media into a first plurality of portions according to the first capability; when the second capability is different from the first capability, segmenting the piece of electronic media into a second plurality of portions according to the second capability, the second plurality of portions to be sized differently than the first plurality of portions; pushing a first one of the first plurality of portions to the first media device prior to the user requesting the first piece of electronic media; and pushing a first one of the second plurality of portion to the second media device prior to the user requesting the first piece of electronic media.
Method and apparatus for tracking user location within video or audio content streamed to a mobile handset
A method and apparatus for providing audio or video content to a mobile handset is provided.
Video processing apparatus and method of controlling the same
A video processing apparatus is provided that is controlled such that the display position of a cursor for a pointing type remote controller does not change when input is switched in a configuration where the video processing apparatus is connected to an external video apparatus. When input video data is switched, a controller transmits position information regarding the display position of a cursor image to the external video apparatus via a communication unit. The controller receives cursor image data generated by the external video apparatus from the external video apparatus and causes a cursor image, based on the cursor image data, to be displayed on a display unit, such that a cursor image after the input video data is switched is displayed at a position corresponding to the display position of a cursor image that has been displayed before the input video data is switched.
EPG content tree
Disclosure is generally directed to outputting an electronic programming guide (EPG) content tree from a television receiver for display on an output device. A content tree consistent with this disclosure may include a number of interconnected nodes that present programming content that is available for viewing or recording through the operation of the television receiver.
Systems and methods for providing custom media content flipping
Systems and methods for providing enhanced channel flipping are disclosed. A user may selectively mark and unmark channels as temporary favorite channels. These channels may be dynamically added or removed from the channel changing or channel flipping sequence. Unauthorized channels and channels locked by parental controls may also be automatically removed from the channel flipping sequence. A plurality of custom channel flipping sequences may be maintained on the user equipment device. Users may access any of these custom channel flipping sequences in order to flip only through the channels associated with the custom sequence. Channels in the flipping sequence may also be pre-tuned in order to reduce delays associated with tuning.
Media content distribution systems and methods
An exemplary method includes receiving end-user-provided media content with a first media content distribution platform subsystem, distributing the end-user-provided media content with the first media content distribution platform subsystem, receiving end-user-provided ratings of the distributed end-user-provided media content with the first media content distribution platform subsystem, selecting, by a platform linking subsystem, at least a subset of the end-user-provided media content based at least in part on the end-user-provided ratings, and distributing the selected at least a subset of the end-user-provided media content with a second media content distribution platform subsystem. In certain embodiments, the second media content distribution platform subsystem may comprise a subscriber television content distribution platform subsystem. In certain embodiments, the first media content distribution platform subsystem may comprise a World Wide Web media content distribution platform subsystem. Corresponding methods and systems are also disclosed.
A method and system for providing listings of multimedia events and for allowing a user to create virtual channels from the listings is described. The user can specify a headend or zip code and enter a search query to find multimedia events that are of interest to the user. In response, the system provides a list of multimedia events as the results of the user's search query. If the user so desires, the user can create a virtual channel based on the search results, according to certain embodiments of the invention.
Synchronizing an advertisement stream with a video source
In general, embodiments of the present disclosure are directed to a system for synchronizing an advertisement stream on a mobile device with the contents of a video source that includes audio data. In one example, the method includes receiving a mobile device identifier of a mobile device of the at least one user; receiving a television event identifier from the television platform, wherein the television event identifier is associated with a television event included in the television program content; selecting marketing information associated with the television event based on the television event identifier, wherein the television event identifier and the mobile device identifier are usable by the network server to determine that the television program content is provided to the at least one user associated with the mobile device; and transmitting a message that includes the marketing information from the network server to the mobile device.
Electronic program guides, systems and methods providing variable size of textual information
An enhanced electronic program guide (EPG) for television programming may be provided by changing a size of at least a portion of textual information to be displayed in the EPG. In embodiments, a television receiving device may include: a memory configured to store an EPG, the EPG including textual information corresponding to television programs scheduled to be broadcast; a user interface configured to receive user input; and a processor in communication with the memory and the user interface, configured to output the EPG to be displayed with at least one portion of the textual information in a first size in response to first user input received via the user interface, and configured to output the EPG to be displayed with the at least one portion of the textual information in a second size different from the first size in response to a second user input received via the user interface.
Information processing apparatus, information processing method, and computer program
An information processing apparatus is disclosed. The apparatus includes: storing means for storing audio data and related information corresponding to the audio data; receiving means for acquiring electronic program guide information indicating programs scheduled to be broadcasted; and program selecting means for executing comparison processing for comparing predetermined related information corresponding to predetermined audio data among the audio data and the electronic program guide information and selecting, on the basis of a result of the comparison processing, a predetermined program from the broadcast-scheduled programs indicated by the electronic program guide information.
Method and system for efficient manifest manipulation
A method and system for manipulating a manifest is disclosed. A server receives a smart appliance a request for a manifest corresponding to a session identifier. The server retrieves from a session server a session manifest based on the session identifier. The server adjusts a session offset based on a difference in a session length represented by the session manifest from a session length represented by a previous session manifest corresponding to the session. When the session manifest comprises an address of an ad break, the server identifies in a cache at least one advertisement to be inserted into the session and replaces at least one address corresponding to at least one segment of the at least one advertisement in the session manifest based on the difference. The server transmits the session manifest to the smart appliance.
Methods and apparatus to enforce a power off state of an audience measurement device during shipping
Methods and apparatus to enforce a power off state of an audience measurement device during shipping of the device are disclosed herein. An example portable audience measurement device includes a housing, a media detector in the housing to collect media exposure data, and a packaging sensor to receive an audio signal. A packaging detector generates a frequency spectrum of the detected audio signal, determines an energy of a first frequency associated with the generated frequency spectrum, determines an energy of a second frequency higher than the first frequency and associated with the generated frequency spectrum, and compares the difference between the energy of the first frequency and the second frequency to a muffling threshold to determine whether the device is located within a package.
Cooperative filtering algorithm-based personal preference program recommendation system for IPTV
A system for recommending personalized favorite programs or channels to internet protocol television (IPTV) users based on a collaborative filtering algorithm is disclosed. The system includes a broadcast provider as an IPTV broadcast provider that provides users with TV contents through the Internet, a service server to receive a broadcast signal and program information from the broadcast provider, to store corresponding information in respective databases, to calculate the program information based on a recommendation algorithm to quantitatively calculate priority, and to list the program information in recommendation order based on the currently broadcast or reproduced program, a relay device to receive recommended program list information and a broadcast signal from the service server and to transmit the recommended program list information and the broadcast signal through a network, and a TV to output the recommended program list information and the broadcast signal from the relay device.
System and method for support of legacy communications protocols in a smart card
In general, the invention relates to a converter. The converter includes logic for reading annotations in a source program, where the annotations provide a mapping between method names for methods invoked using messages in a legacy protocol and a native protocol. The converter further includes logic for creating a mapping data structure using the annotations to provide a mapping between method invoking instructions in the legacy protocol and method invoking instructions in the native protocol.
Apparatus for controlling at least one electronic device and related method
An apparatus for controlling at least one electronic device is coupled to a host. The apparatus includes a controller and a non-volatile storage unit. The controller is controlled by a driver of the host to thereby control the operation of the electronic device. The non-volatile storage unit is externally coupled to the controller and used for storing data. When the driver is activated, it is determined whether the non-volatile storage unit stores a setting data utilized for the driver. If the setting data for the driver is stored in the non-volatile storage unit, the setting data of the driver is read out for setting the driver.
Techniques for use with repetitive event occurrences
Described are techniques for determining noteworthy events. A client performs a first call to a first routine having a first interface. The first interface includes a first set of input parameters specifying noteworthiness criteria indicating which event occurrences in a sequence of event occurrences are noteworthy. The client performs a second call to a second routine having a second interface to record an event occurrence of the sequence. The second routine perform processing returning information to the client including an indicator value denoting whether the event occurrence is noteworthy. In response to receiving the indicator value, the client may perform an action if the indicator value denotes that the event occurrence is noteworthy.
Active node detection in a failover computing environment
A method, system, and medium are provided for determining whether a program (e.g., a queue manager) is currently an active program in a failover computing environment. A failover environment includes pairs of programs capable of performing the same functions. One program in the pair is the primary program and the other is the backup program. Only one of the two programs is active at any given time. Embodiments of the present invention may determine whether a program is active by looking for a core configuration file in the file directory associated with the program. The program only has access to the core configuration file when the program is active. The activation status of a program may be communicated to other components that monitor the program so that the program's activity or lack of activity can be correctly interpreted.
Managing contact list status notifications in collaboration systems to reduce network traffic
An awareness notification management system including a contact list manager managing an awareness service subscriber contact list including an active sublist for active contacts and an archive sublist for disabled contacts, and an awareness manager for monitoring the status contact list members, where the awareness manager is configured to access a history including at least one timestamp of a last communication exchange between the awareness service subscriber and any of the members of the contact list, and query the history for any of the timestamps and classify any of the contacts as a disabled contact on the archive sublist if the timestamp for the contact is older than a predefined age, and where the awareness manager is configured to forward to the awareness service subscriber awareness notifications regarding the status of the active contacts and withhold from the awareness service subscriber awareness notifications regarding the status of the disabled contacts.
Applying timed operations to non-timed functions
For applying timed operations to non-timed functions, a computer causes the computer to discover, by parsing source code, a caller calling a function. The function does not perform timed operations. The computer further encapsulates the function in a timed method adapter and calls the timed method adapter in place of the function from the caller, passing the timed method adapter an object and an argument for the function. The computer further calls an invoke thread from the set invoker and returns from the set invoker to the timed method adapter. The computer waits for an execution result from the function at the timed method adapter, monitoring for an expiration of a timeout, and invokes the function from the invoke thread, passing the function the object and the argument.
Determining relationship data associated with application programs
A method for determining relationship data associated with application programs in a messaging system, comprising the steps of: responsive to at least one first message event sending a message from a first application to a first destination and at least one second message event retrieving, by a second application, the message from a second destination, intercepting message data associated with the message; analysing the intercepted message data in accordance with one or more rules in order to find one or more message parameters; and in response to finding the one or more message parameters, identifying the first message event and identifying the second message event, determining a relationship associated with the first application and the second application. An apparatus and computer program element for determining such relationship data are also provided.
Method and system for communication between application and web-page embedded code
One embodiment of the present invention provides a system that facilitates communication between an embedded code in a web page and a stand-alone application. During operation, the system first embeds a code within a web page that is displayed in a browser. Next, the embedded code receives information indicating a communication method provided by a stand-alone application, via a first communication channel. The embedded code subsequently sends the contextual information associated with a user browser session by calling the communication method, via a second communication channel, thereby allowing the stand-alone application to inherit the contextual information from the web browser.
Dynamic network load balancing using roundtrip heuristic
Described is a technology by which a relative load of network traffic handling is determined between servers of a cluster, based upon time values that correspond to the time taken by each server to handle a packet. Load may then be transferred between the servers based upon the relative load, for example by having a less-loaded server take some of the responsibility for processing incoming traffic from a more-loaded server. For example, the processing time of a server may be determined by when a receiving server receives a request packet, and when that server sends a return packet. A round trip time for a request and return communication may also be established. A logical tree of nodes representing the servers may be constructed to select pairs of servers for balancing with one another, with the selection algorithm operating recursively, in parallel, and/or repeatedly, until the cluster is balanced.
Computing system, method and computer-readable medium for managing a processing of tasks
A computing system, method and computer-readable medium is provided. To prevent a starvation phenomenon from occurring in a priority-based task scheduling, a plurality of tasks may be divided into a priority-based group and other groups. The groups to which the tasks belong may be changed.
Data processing using different data formats based on shared resource utilization
When a plurality of jobs are processed using a plurality of data processing units, data formats of the jobs to be processed can be determined to distribute a data processing load of the data processing units. A method for controlling a data processing apparatus for causing a plurality of data processing units to process data of a job includes storing data of a first job in a storing unit in first and second data formats, determining whether to process the stored data of the first job in the first or second data format, and causing the plurality of data processing units to process the data in the determined data format. The determination is made based on whether processing of data of a second job by the first or second processing unit requires longer time.
Processing a batched unit of work
A batched unit of work is associated with a plurality of messages for use with a data store. A backout count, associated with a number of instances that work in association with the batched unit of work, is backed out. A backout threshold is associated with the backout count. A commit count is associated with committing the batched unit of work in response to successful commits for a predefined number of the plurality of messages. A checker checks whether the backout count is greater than zero and less than the backout threshold. An override component, responsive to the backout count being greater than zero and less than the backout threshold, overrides the commit count and commits the batched unit of work for a subset of the plurality of messages.
Establishing new service as conversation by replacing variables in generic service in an order with variables from a decoupled method of legacy service
Methods associated with a service are identified. Select ones of the methods are matched to generic methods of a conversation. A new service is established from the conversation that includes the select ones of the methods.
Controlling and selecting cloud centers based on electricity and carbon emission costs
Provided are apparatus and method for managing a plurality of cloud centers that provide a virtual computing environment to a client. The method may include selecting a target cloud center from the plurality of cloud centers based on electricity costs and carbon emission costs of the plurality of cloud centers, and controlling the selected target cloud center so as to manage at least one virtual machine to provide the virtual computing environment to the client. For the selecting the target cloud center, a cloud center having a lowest electric cost and a lowest carbon emission cost may be selected from the plurality of cloud center as the target cloud center. Then, the selected target cloud center may be controlled so as to create a virtual machine.
Virtualization-based resource management apparatus and method and computing system for virtualization-based resource management
A computing system for virtualization-based resource management includes a plurality of physical machines, a plurality of virtual machines and a management virtual machine. The virtual machines are configured by virtualizing each of the plurality of physical machines. The management virtual machine is located at any one of the plurality physical machines. The management virtual machine monitors amounts of network resources utilized by the plurality of physical machines and time costs of the plurality of virtual machines, and performs a resource reallocation and a resource reclamation.
System and method for attributing CPU usage of a virtual machine monitor to a corresponding virtual machine
According to at least one embodiment, a method comprises observing communication from a virtual machine (VM) to a virtual machine monitor (VMM). The method further comprises determining, based on the observed communication, CPU utilization of the VMM that is attributable to the VM. According to at least one embodiment, a system comprises a Central Processing Unit (CPU), Virtual Machines (VMs), and a Virtual Machine Monitor (VMM) operable to receive requests for resource access from the VMs. The system further comprises a CPU utilization monitor operable to determine an amount of CPU utilization of the VMM in processing the received requests that is attributable to each of the VMs.
A method, system and computer program product for downloading an application over a network from a remote server to a client device, where the application includes a plurality of modules. A class for each module is created, where the class includes a constructor. A request to use a module of the application is received. Upon receiving the request, a determination is made as to whether the received request is a first request to use the module. If the received request is the first request to use the module, then the requested module is downloaded, the constructor is overwritten with the downloaded module and the constructor within the created class for the requested module is executed.
Method and system for automated root-cause analysis for class loading failures in java
A method and system for automated root-cause analysis for failures in class loading in a Java Virtual Machine (JVM) environment. Specifically, a class loader comprises a class loader for loading classes which comprises an identifier, a search policy object, a configuration policy object, and metadata. The identifier is unique to the JVM environment. The search policy object defines search procedures for discovering and loading a class by the class loader. The configuration policy object manages configuration of the class loader. Metadata describes the interrelationships between the class loader to other class loaders in a class loader tree supporting the JVM environment.
Software application performance enhancement
Generating parallelized executable code from input code includes statically analyzing the input code to determine aspects of data flow and control flow of the input code; dynamically analyzing the input code to determine additional aspects of data flow and control flow of the input code; generating an intermediate representation of the input code based at least in part on the aspects of data flow and control flow of the input code identified by the static analysis and the additional aspects of data and control flow of the input code identified by the dynamic analysis; and processing the intermediate representation to determine portions of the intermediate representation that are eligible for parallel execution; and generating parallelized executable code from the processed intermediate representation.
Streamlining unit testing through hot code swapping
Methods and systems are described for testing methods and other functions by swapping external functions for mock functions. A test case definition is entered by a programmer, which can specify the expected number of arguments and argument values of external function or method calls, the context state, the return value, and any expected error conditions. The test case definition is used by a function tester to automatically create mock functions, modify the target function so that it calls the mock functions, execute the target function with specified arguments and a test context, and then compare the results to expected results.
Method system and computer program for metering usage of software products based on real-time benchmarking of processing power
A solution (300) for metering usage of software products on a data processing system is proposed. In this context, it is often necessary to known a processing power of each computer wherein a generic software product ran (for example, for licensing accounting based on differentiated charging rates). In the proposed solution, the processing power is estimated dynamically on the computer directly. For this purpose, a (single-threaded) benchmark program written in a low-level language is executed (308-322), such as at the startup or periodically. In this way, dividing (324) the measured execution time of the benchmark program by the known number of its instructions it is possible to determine an execution rate of a single microprocessor of the computer. This value multiplied (326) by the detected (306; 332) number of available microprocessors provides an accurate estimate of the processing power of the computer. The desired result is achieved without requiring any knowledge of the physical details of the computer; this is particularly advantageous when the computer consists of a logical guest machine implemented on a physical host machine.
System for ensuring comprehensiveness of requirements testing of software applications
A method for determining a comprehensiveness of software requirements tests for testing a software application includes receiving data that defines artifacts of a software project. A first sub-link between at least one application requirement and at least one code module of the application code is identified. The first sub-link indicates a relationship between the application requirement and the code module. A second sub-link between at least one test case and the code module is identified. The second sub-link indicates a relationship between the test case and the module. A traceability link between the test case and the application requirement is determined based on the first sub-link and the second sub-link. The traceability link indicates that the test case tests the software application for compliance with the application requirement.
Method and apparatus for the performing unit testing of software modules in software systems
In a method and apparatus of performing unit testing of a software module, the method provides for reading, by a computer, target data and discovering of functional aspects of a piece of software code, dividing the target data into chunks, estimating a plurality of decision/condition statements of the software code, estimating an amount of possible test cases based on the program inputs, defining a data set over the plurality of identified decisions/conditions, finding subset relationships between all the defined data sets, defining a plurality of optimal data sets, classifying the condition of the plurality of optimal data sets by category, refining the plurality of optimal data sets, and calculating the best amount of data sets.
Methods, systems, and articles of manufacture for synchronizing software verification flows
Disclosed are methods, systems, and articles of manufacture for synchronizing a software verification flow of an application that uses a user interface. Various embodiments comprise implementing a menu item as a widget and identifying an operation associated with the menu item. A synchronizer is further identified or created for the operation and then registered with the operation such that the synchronizer is activated when the operation is invoked during the software verification flow. Once activated, the synchronizer takes over control of the verification flow and prevents the verification flow from proceeding until a criterion is fulfilled. The synchronizer may be reused among different tests, and the same test case may be rerun on different machines with different computing performance and workloads without producing false positives or false negatives.
Providing SystemVerilog testing harness for a standardized testing language
A method and apparatus to enable SystemVerilog based tools to compile, debug, and execute a standardized testing language based test bench. The testing harness comprises, in one embodiment, a translator to map TTCN-3 language to a SystemVerilog test bench, a Verilog syntax compiler and simulator database including the mapped TTCN-3 language data, and a run time system using the SystemVerilog test bench with the database including the mapped TTCN-3 language data.
Techniques for debugging computer programs involving multiple computing machines
Techniques for debugging a computer program that includes multiple modules executing on multiple machines include receiving, at a unifying component, first data from a first machine. The first data indicates debugging information generated by the first machine. Second data is also received at the unifying component from a second machine. The second data indicates debugging information generated by the second machine. Based on the first data and the second data, third data is formed indicating a single integrated representation of debugging information for the computer program. The unifying component allows debugging information from several machines to be integrated and then presented to a user through a single debugger client.
XML application framework
The present invention relates to an XML application framework (XAF). XAF applications are data driven such that all operations with the computer system are data focused. In addition, the components used in the XAF application are instantiated and connected according to how the data is displayed and what type of data is used. Applications within XAF comprise a user interface (UI) connector, an action module, and a data connector. UI connectors receive UI events and connect the UI event to an action module. The action module generates a standard format action from the UI event and sends it to the data connector. The data connector translates the standard format action into a data-specific action that changes data in a data store. A data connector then sends a standard format data representation corresponding to the changed data back to the UI connector to provide the changed data to the UI.
Providing online graphical data flow web application tools or services for charge
System and method for performing program-related operations over a network via a web browser. A network connection is established between a server computer and a client computer over a network. A universal resource identifier (URI) is sent from the client computer to the server computer over the network, where the URI indicates a program, e.g., a graphical program (GP), or at least a portion of a graphical program interactive development environment (GPIDE), e.g., a graphical program editor, an execution engine, a static or dynamic analyzer, and/or compiler. The at least a portion of the GPIDE is received from the server computer over the network in response to the URI, and executed in a web browser of the client computer to perform some specified functionality with respect to the GP.
Methods for designing fin-based field effect transistors (FinFETS)
Methods for designing fin-based field effect transistors (FinFETs) are disclosed. In one embodiment, an initial FinFET design is evaluated to ascertain the space between fins (i.e., the “fin pitch”). Additionally, the spacing between interconnect metal modules (i.e., the “metal pitch”) is ascertained. A ratio of metal pitch to fin pitch is established. From this initial ratio, isotropically scaled sizes are considered along with anisotropically scaled sizes. The variously scaled sizes are compared to design criteria to see what new size best fits the design criteria.
Facilitating the design of a clock grid in an integrated circuit
Embodiments of the disclosure relate to methods for facilitating the design of a clock grid in an integrated circuit. The method includes propagating a chip level virtual grid across a multi-level hierarchy of the integrated circuit and customizing the grid at each macro to create a customized virtual grid for each macro. The method further includes propagating the customized virtual grid for each of the plurality of macros to one of a plurality of units and customizing the chip level virtual grid at each of the plurality of units to create the customized virtual grid for each of the plurality of units. The method also includes propagating the customized virtual grid for each of the plurality of units to the chip level and combining the plurality of customized virtual grids to form the clock grid for the integrated circuit.
Adaptive patterning for panelized packaging
An adaptive patterning method and system for fabricating panel based package structures is described. Misalignment for individual device units in a panel or reticulated wafer may be adjusted for by measuring the position of each individual device unit and forming a unit-specific pattern over each of the respective device units.
Branch and bound techniques for computation of critical timing conditions
In one embodiment of the invention, a method for electronic circuit design is disclosed. The method includes analyzing a hierarchy of a netlist of a circuit to determine primary inputs and primary outputs of the circuit at an upper level, and internal vertices of the circuit at lower levels between the primary inputs and the primary outputs; forming a timing graph of the circuit including a plurality of timing delay edges representing timing delay between the primary inputs, the internal vertices and the primary outputs to form a plurality of paths of a path space from the primary inputs to the primary outputs; and in response to the timing delay of the plurality of timing delay edges, dynamically pruning paths of the plurality of paths using branch and bound techniques on bounds of timing delay that are a function of one or more circuit parameters to reduce the path space down to one or more critical timing paths of the circuit with a worse case metric of timing delay between the primary inputs and the primary outputs. Additionally or alternatively, timing in the circuit may be analyzed to determine a bound of timing delay of the circuit for one or more parameter corners in a parameter space and if the bound of timing delay is worse than a threshold time delay then one or more parameter corners may be pruned from the parameter space using branch and bound techniques.
System and methods for converting planar design to FinFET design
A method for generating a layout for a device having FinFETs from a first layout for a device having planar transistors is disclosed. The planar layout is analyzed and corresponding FinFET structures are generated in a matching fashion. The resulting FinFET structures are then optimized. Dummy patterns and a new metal layer may be generated before the FinFET layout is verified and outputted.
Integrated circuit layout design methodology with process variation bands
A system for analyzing IC layouts and designs by calculating variations of a number of objects to be created on a semiconductor wafer as a result of different process conditions. The variations are analyzed to determine individual feature failures or to rank layout designs by their susceptibility to process variations. In one embodiment, the variations are represented by PV-bands having an inner edge that defines the smallest area in which an object will always print and an outer edge that defines the largest area in which an object will print under some process conditions.
A display device includes a display unit, a first display control unit, a title string storing unit, a concatenated string creating unit, a determining unit, a navigation string creating unit, and a second display control unit. The display unit includes a first portion and a second portion. The first display control unit is configured to display one of a plurality of screen images on the first portion. The plurality of screen images includes a base screen image. The first display control unit changes a screen image to display from one to another of the plurality of screen images along a screen navigation path starting from the base screen image. The title string storing unit is configured to store a plurality of title strings. Each title string indicating one of the plurality of screen images. The concatenated string creating unit is configured to create a concatenated string including the title strings each corresponding to a screen image which is positioned in a part of the screen navigation path from the base screen image to a current screen image that is displayed on the first portion currently. The determining unit is configured to determine whether or not the concatenated string is too large to be displayed entirely on the second portion. The navigation string creating unit is configured to create a navigation string by deleting an at least one of the title strings from the concatenated string when the determining unit determines that the concatenated string is too large to be displayed entirely on the second portion. The second display control unit is configured to display the navigation string on the second portion.
Method and apparatus for user inputs for three-dimensional animation
A method for initiating a user-selected operation on a computer system includes sensing a user contacting the user interface device at a first position with one finger of a user, determining whether the one finger is a first finger of the user or is a second finger of the user, wherein when the one finger is the first finger, the method includes determining a first operation to be performed in response to the first finger, and performing the first operation on the computer system, and wherein when the one finger is the second finger, the method includes determining a second operation to be performed in response to the second finger, and performing the second operation on the computer system.
Graphical user interface for multi-tap delay
A multi-tap delay has a graphical user interface in which each delay tap is represented by a bar on a time line. The bars are oriented across the time line, the position of each bar on the time line specifying the amount of delay time of the represented delay tap. The length of each bar specifies the value of another parameter of the represented delay tap.
Automated targeting of content components
Techniques for automated targeting of content components to users are described. Content components are selected and exposed through renderable pages for viewing by a population of users. User activity following exposure is tracked in an effort to identify which types of users (as characterized by certain attributes) are likely to act on the content components. The users are segmented into groups according to the attributes and the segments are fed back to aid in selection of content components to be exposed to the users. This enables more granular targeting of the content components to those users who exhibit the attributes that define the specific groups.
Method and apparatus for displaying medical thumbnail objects in a browsing component
A computer-implemented method and a system for browsing medical thumbnail objects to be displayed on a window on a monitor before loading the medical objects. It is possible to load only those images which indeed are relevant for a user and thus to save transmission time. A display pattern for displaying the thumbnail objects is user-selectable and includes a number of objects to be displayed and advantageously the arrangement or pattern remains constant, even in case a window size has been modified. Using a fixed but user-selectable layout pattern supports selection of relevant images during browsing. The window size is also user-selectable. After having determined the display pattern and the window size the size of the thumbnail objects is calculated automatically according to the determined display pattern and the determined window size. The thumbnail objects are displayed in the calculated object size, which favorably simplifies browsing of complex medical images.
Stability region for a user interface
Exemplary methods and media relate to controlled movement of a viewing window across a graphical user-interface using an orientation-tracked display-device. The viewing window in an exemplary method may move in accordance with detected change in the physical orientation of the display-device. When the physical orientation of the display-device is sufficiently motionless, the position of the viewing window may be held fixed with respect to the graphical user-interface and a stability region may be established in the viewing window. The viewing window may continue to remain still as long as the physical orientation of the display-device remains within a range of orientations represented by the stability region. Then, the viewing window may begin moving again with respect to the graphical user-interface when the orientation moves outside of the range defined by the stability region.
Tabbed content view on a touch-screen device
Content may be displayed on a touch-screen display of a device as part of a graphical interface in which the content is divided into categories or sections, and each category/section is associated with a graphical tab. The device may detect a selection of one of the graphic tabs based on a touch gesture received by the touch-screen display and display, on the touch-screen display, content items corresponding to the subset of content items for the selected tab.
Apparatus, method and computer program product enabling zoom function with multi-function key input that inhibits focus on a textually-responsive element
Disclosed is a method, a computer program, a device, an apparatus and a browser operable with a user interface having an output display and an input to receive signals from a plurality of user inputs, where at least one user input is a multi-function input operable in a first mode to provide a display control input, and in a second mode to provide another function, such as alphanumeric character input and, when operating the at least one user input in the first mode, to inhibit operation of the at least one user input in the second mode due to a change in content of the display in response to operation in the first mode. The first mode may be, as non-limiting examples, a zoom mode or a scroll mode.
Method and system for handwriting-based launch of an application
Methods and systems for providing navigation assistance on a mobile device are provided. A method may include analyzing handwriting data to recognize one or more objects depicted in the handwriting data. The method may further include determining if one or more applications are associated with the handwriting data based on the one or more objects recognized in the handwriting data. If one application is determined to be associated with the handwriting data, the one application may be launched. If two or more applications are determined to be associated with the handwriting data, information allowing a user to select an application to launch from the two or more applications may be displayed.
Display and management of a service candidate inventory
An apparatus, system, and method to facilitate the display and management of service candidates in a service-oriented architecture (SOA). In one embodiment, the method includes receiving a user request for an inventory of service candidates in a SOA service model, and providing a user interface displaying the service candidate inventory. The method further includes allowing user access to individual service candidates in the service candidate inventory via the user interface.
System and method for generating graphical dashboards with drill down navigation
A system, machine-readable medium and a method that may provide a dashboard that may be created with menu controls that allow a user to navigate to the underlying data, manipulate the data, and present the manipulated data in the dashboard upon navigation back to the dashboard. The menu controls may include a data link to an address of a data location containing the data presented in the dashboard.
Providing a single instance of a virtual space represented in either two dimensions or three dimensions via separate client computing devices
A single instance of a virtual space may be provided that can be simultaneously represented in at least two dimensions or three dimensions on separate client computing devices. Virtual space information used to facilitate presentation of the virtual space may be agnostic as to whether the virtual space will be represented in two or three dimensions. That is, the same virtual space information may be sent to one or more client computing platforms regardless of the dimensionality of virtual space representations presented by any given client computing platform. A determination may be made at individual client computing platforms as to whether to present the virtual space representation in two dimensions or three dimensions based on one or more metrics associated with the individual client computing platforms. Such metrics may include a computing power of the one or more processors, a communication bandwidth, a screen size, and/or other metrics.
Explicit use of user context objects in a virtual universe
An approach that facilitates explicit use of user context objects in a virtual universe is described. In one embodiment, there is a user context object tool that includes a user context object retrieving component configured to retrieve the plurality of user context objects for presentation to the avatar. A user context object selection and modification component is configured to receive a user context object selection and any desired modifications made to the user context object selection. A user context object permissions component is configured to permit the avatar to interact with the virtual universe in accordance with the user context object selection.
Text input method in portable device and portable device supporting the same
A text input method in a portable device and a portable device supporting the same are provided. The portable device includes, a touch screen including a display unit for displaying a text input area and a text display area including at least one consonant and vowel, and a touch panel provided at an upper side of the display unit for generating a touch event, and a control unit for controlling text displayed according to a touch event generated from the touch screen, in which the control unit detects multi-touch events for at least two key icons output on the text input area, and controls the display of a specific text composed of a combination of the multi-touched key icons based on the detected multi-touch events.
Scrolling velocity modulation in a tactile interface for a social networking system
A user interface includes a tactile interface on a client device that allows users to interact with social networking system content in a manner that is optimized for touch screens and mobile devices. The tactile interface allows users to efficiently navigate the social networking system data as well as to capture new content for upload to the social networking system. New content may be captured in a way that allows the user to preview the content in-context.
Device, method, and graphical user interface for displaying emphasis animations for an electronic document in a presentation mode
A computing device with a display displays a first portion of an electronic document in a presentation mode of an electronic document authoring application. The first portion of the electronic document includes predefined activation regions for a plurality of presentation emphasis objects. While displaying the first portion of the electronic document the device detects a first input by a user on a respective predefined activation region for a first presentation emphasis object in the plurality of presentation emphasis objects. In response to detecting the first input on the respective predefined activation region for the first presentation emphasis object, the device: selects a first emphasis animation for the first presentation emphasis object based on the first input; displays the first emphasis animation; and displays the first presentation emphasis object.
Translatable annotated presentation of a computer program operation
Embodiments of the disclosure relate to generating a translatable and annotated multimedia or video presentation of a software program operation. An aspect of the disclosure comprises recording user interaction data that includes user interface gestures and text entries from a keyboard and other user devices while the program is operating. Embodiments of the disclosure transform recorded text and visual contents of the program to a selected format or language, annotate contents of interest, and merge recorded user interface gestures, transformed text and visual contents, and transformed annotations into the output presentation. The embodiments of the disclosure optionally generate an accessibility script in a selected format.
Aspect-based sentiment summarization
Phrases in the reviews that express sentiment about a particular aspect are identified. Reviewable aspects of the entity are also identified. The reviewable aspects include static aspects that are specific to particular types of entities and dynamic aspects that are extracted from the reviews of a specific entity instance. The sentiment phrases are associated with the reviewable aspects to which the phrases pertain. The sentiment expressed by the phrases associated with each aspect is summarized, thereby producing a summary of sentiment associated with each reviewable aspect of the entity. The summarized sentiment and associated phrases can be stored and displayed to a user as a summary description of the entity.
Systems for sharing annotations and location references for same for displaying the annotations in context with an electronic document
In one embodiment, a user of a first portable digital computing device creates an annotation associated with a particular reading location within a reference document. The annotation and the reading location are shared with a second portable digital computing device storing a copy of the reference document. Using the shared information, the second device displays the reference document with the annotation shown at the reading location.
Generating forms from user-defined information
A technique for generating a form is described. In the technique, a user provides information associated with a user-defined field, including a data type and/or semantic information for an entry associated with the user-defined field. Then, a computer system generates the form, which includes the user-defined field and additional fields based on the information associated with the user-defined field and the additional fields. This form includes a spatial reference pattern that, when printed on paper, facilitates data input using a writing instrument (such as a digital pen). Furthermore, generating the form may involve translating from a computer-input format of the form to a writing-instrument format based on specified layouts or sequential positions of the user-defined field and the additional fields. Next, the computer system provides the form to a user.
Smart macros using zone selection information and pattern discovery
A system and method for assisting a user to enter data are provided. The method includes detecting a user's selection of a moveable input zone on each of one or more input documents displayed on the user's screen and detecting a user's selection of a moveable target zone on a target document displayed on the user's screen. Data in the input zone(s) and the target zone is captured for one or more locations of the respective zones and a pattern is learned automatically for filling additional data in the target document based on the captured data. A fill arrangement for filling the additional data in the target document based on the learned pattern is generated, which can be presented to the user for validation.
Low complexity optimal soft MIMO receiver
A low-complexity optimal soft MIMO detector is provided for a general spatial multiplexing (SM) systems with two transmit and NR receive antennas. The computational complexity of the proposed scheme is independent from the operating signal-to-noise ratio (SNR) and grows linearly with the constellation order. It provides the optimal maximum likelihood (ML) solution through the introduction of an efficient Log-likelihood ratio (LLR) calculation method, avoiding the exhaustive search over all possible nodes. The intrinsic parallelism makes it an appropriate option for implementation on DSPs, FPGAs, or ASICs. In specific, this MIMO detection architecture is very suitable to be applied in WiMax receivers based on IEEE 802.16e/m in both downlink (subscriber station) and uplink (base station).
Erasure coding and replication in storage clusters
A cluster receives a request to store an object using replication or erasure coding. The cluster writes the object using erasure coding. A manifest is written that includes an indication of erasure coding and a unique identifier for each segment. The cluster returns a unique identifier of the manifest. The cluster receives a request from a client that includes a unique identifier. The cluster determines whether the object has been stored using replication or erasure coding. If using erasure coding, the method reads a manifest. The method identifies segments within the cluster using unique segment identifiers of the manifest. Using these unique segment identifiers, the method reconstructs the object. A persistent storage area of another disk is scanned to find a unique identifier of a failed disk. If using erasure coding, a missing segment previously stored on the disk is identified. The method locates other segments. Missing segments are regenerated.
QC-LDPC decoder with list-syndrome decoding
A QC-LDPC decoding system employing a trapping set look-up table is provided. The entries of the trapping set look-up table may be sorted according to failure frequencies of the trapping sets. The decoder may determine short-cycles associated with dominant trapping sets in order to decode the received codeword. If the iterative decoder of the QC-LDPC decoding system fails to produce a valid codeword, the decoder may compute the syndrome pattern of the processed codeword and search the look-up table for a trapping set class that is responsible for the iterative decoder's failure. If no responsible trapping set is found in the look-up table, the decoder may attempt to decode the received codeword using alternate decoding methods and subsequently determine a trapping set associated with the decoded codeword. If a trapping set is determined, then that trapping set may be added to the look-up table.
Signal segmentation method and CRC attachment method for reducing undetected error
The present invention provides for applying a cyclic redundancy check (CRC) to a data signal. The present invention includes attaching a first CRC to a first data signal block having a first length, segmenting the first data signal block attached with the first CRC into a plurality of second data signal blocks having a length shorter than the first length, respectively generating a second CRC for each second data signal block, and attaching the generated second CRC to the respective second data signal block. Moreover, the first CRC and second CRC may be generated from respectively different CRC generating polynomial equations.
Method of detecting data transmission errors in a CAN controller, and a CAN controller for carrying out the method
A method of detecting data transmission errors in a CAN controller includes generating at least one check bit that is verifiable for ensuring the consistency of the transmitted data. A CAN controller that ensures continuous error monitoring during data transmission includes an interface unit for exchanging data with a CAN bus, a memory unit for storing received data and data to be transmitted, and an electronic unit for controlling data transmission between the memory unit and the interface unit. The interface unit of the CAN controller has an arrangement for generating check bits for received data and for verifying check bits for data to be transmitted.
Transmission control methods and devices for communication systems
A system and method for transmission control by an access device in a wireless communication system including a plurality of receiving devices, including receiving, from a super ordinate device, first transmission data for transmission to a subscriber device, wherein the access device communicates with the plurality of receiving devices, and the subscriber device is one of the plurality of receiving devices. The system and method further include transmitting the first transmission data to the subscriber device, and generating, by the access device, a first access receipt indicator corresponding to the first transmission data. In addition, the system and method include sending the first access receipt indicator to the super ordinate device, and retransmitting, if the access device does not receive a first subscriber receipt indicator from the subscriber device indicating that the first transmission data is received by the subscriber device, one or more portions of the first transmission data to the subscriber device. The system and method further include receiving, by the access device, second transmission data for transmission to the subscriber device, generating, by the access device, a second access receipt indicator corresponding to the second transmission data, and sending the second access receipt indicator to the super ordinate device. Further, the system and method include retransmitting, if the access device does not receive a second subscriber receipt indicator from the subscriber device indicating that all of the second transmission data is received by the subscriber device, one or more portions of the second transmission data to the subscriber device.
Methodology for correlated memory fail estimations
Correlated failure distribution for memory arrays having different groupings of memory cells is estimated by constructing memory unit models for the groupings based on multiple parameters, establishing failure conditions of the memory unit model using fast statistical analysis, calculating a fail boundary of the parameters for each memory unit model based on its corresponding failure conditions, and constructing memory array models characterized by the fail boundaries. Operation of a memory array model is repeatedly simulated with random values of the parameters assigned to the memory cells and peripheral logic elements to identify memory unit failures for each simulated operation. A mean and a variance is calculated for each memory array model, and an optimal architecture can thereafter be identified by selecting the grouping exhibiting the best mean and variance, subject to any other circuit requirements such as power or area.
Clock control for reducing timing exceptions in scan testing of an integrated circuit
An integrated circuit comprises scan test circuitry and additional circuitry subject to testing utilizing the scan test circuitry. The scan test circuitry comprises a scan chain having a plurality of scan cells. The integrated circuit further comprises a clock distribution network configured to provide clock signals to respective portions of the integrated circuit. The clock distribution network comprises a clock tree having clock signal lines, and clock control elements arranged in respective selected ones of the clock signal lines of the clock tree, where the clock control elements are configured to separate at least one synchronous clock domain into multiple asynchronous clock domains during scan testing. The clock control elements may be configured to reduce a number of timing exceptions produced during scan testing relative to a number of timing exceptions that would otherwise be produced if scan testing were performed using the synchronous clock domain.
Semiconductor devices and semiconductor packages
Semiconductor devices configured to test connectivity of micro bumps including one or more micro bumps and a boundary scan test block for testing connectivity of the micro bumps by scanning data input to the micro bumps and outputting the scanned data. The semiconductor device may include a first chip including solder balls and at least one or more switches electrically coupled with the respective solder balls, and a second chip stacked on top of the first chip and electrically coupled with the switches in direct access mode, including micro bumps that input/output signals transmitted from/to the solder balls.
Multiplexer coupled to second core output and first core input
Scan distributor, collector, and controller circuitry connect to the functional inputs and outputs of core circuitry on integrated circuits to provide testing through those functional inputs and outputs. Multiplexer and demultiplexer circuits select between the scan circuitry and the functional inputs and outputs. The core circuitry can also be provided with built-in scan distributor, collector, and controller circuitry to avoid having to add it external of the core circuitry. With appropriately placed built-in scan distributor and collector circuits, connecting together the functional inputs and outputs of the core circuitry also connects together the scan distributor and collector circuitry in each core. This can provide a hierarchy of scan circuitry and reduce the need for separate test interconnects and multiplexers.
Macro and command execution from memory array
Methods of performing an internal diagnostic for a NAND configured memory device include storing data in a data cache coupled to an array of memory cells arranged in a NAND configuration, wherein the data stored in the data cache corresponds to at least one diagnostic function; performing a decode operation on the data stored in the data cache, wherein the decode operation generates a diagnostic function command for testing internal functions of the NAND configured memory device; and providing the decoded diagnostic function command to a state machine of the NAND configured memory device adapted to perform the decoded diagnostic function command.
Methods and apparatus for event logging in an information network
Methods and apparatus for logging, analysis, and reporting of events such as reboots in a client device (e.g., consumer premises equipment in a cable network) using applications. In one aspect, an improved event logging and monitoring system is provided within the device with which the application(s) can interface to record event or error data. In one exemplary embodiment, the client device comprises a digital set-top box having Java-enabled middleware adapted to implement the various functional aspects of the event logging system, which registers to receive event notifications (including resource exhaustion data) from other applications running on the device. The network operator can also optionally control the operation of the logging system remotely via a network agent. Improved client device and network configurations, as well as methods of operating these systems, are also disclosed.
Business to business network management event detection and response system and method
A network management system includes an automatic reconnaissance (resolution) component which, in one embodiment, includes four main operational components, namely a real-time parse/analysis component, a data merge component, a data analysis component, and a response capability component. These four components interact to provide real-time event recognition and response. The network management system efficiently receives, parses, and comprehends a large amount of event and statistical data that could be indicative of a network systems operation failure with resultant response actions initiated through such an infrastructure improving mean time to recovery.
Server, a method, a system and a program thereof
A server includes a monitor unit configured to monitor a failure of one or more user networks and a recovery support unit configured to support a recovery of the failure of one or more user networks. When detecting an alarm showing occurrence of the failure, the server identifies a user network in which the failure occurs based on both line information for each user network and the alarm, and notifies the alarm to the plurality of management terminals of the identified user network.
Semi-automatic conversion and execution of functional manual tests
Embodiments of the invention relate to the conversion and execution of functional tests. In one embodiment, a current test step of a manual functional test is executed. The test includes a set of test steps each including at least one action and one target of the action. The test is associated with an application that includes a plurality of objects to be tested. At least two of the objects are determined to be associated with the target of the test step. A user is prompted to provide a selection of one of the at least objects for association with the target of the test step. A new test step is generated. The new test step associates the object selected by the user with the target of the current test step. The new test step is designated for automatic execution in place of the current test step for subsequent executions thereof.
3-D stacked multiprocessor structures and methods to enable reliable operation of processors at speeds above specified limits
A three-dimensional (3-D) processor system includes a first processor chip and a second processor chip in a stacked configuration. The first processor chip includes a first processor having a first set of state registers. The second processor chip includes a second processor having a second set of state registers that corresponds to the first set of state registers. The first and second processors are connected through vertical connections between the first and second processor chips. A mode control circuit operates the processor system in one of a plurality of operating modes. In one mode of operation, the first processor is active and the second processor is inactive, and the first processor operates at a speed greater than a maximum safe speed of the first processor, and the first processor uses the second set of state registers of the second processor to checkpoint a state of the first processor.
Information processing apparatus, control device, and abnormal unit determination method
An information processing apparatus determines an abnormal unit by: determining whether or not there is an abnormal point in access to a slave unit by a first master unit that controls a plurality of slave units connected by a serial bus; requesting a second master unit having redundancy with the first master unit to access a specific slave unit when the abnormal point is determined to exist in access to the specific slave unit in the determining; and determining a unit having an abnormality by use of an access result relating to the abnormal point determined to have an abnormality in the determining and an access result indicating a result of the request made in the requesting.
The reliability of output data is enhanced, and the frequency of stopping arithmetic devices is reduced. A redundant system includes an input device; a plurality of arithmetic devices that receive input data from the input device; and an output device that receives output data output from the arithmetic devices, the redundant system causing the arithmetic devices to perform the same processing. Each of the arithmetic devices includes: a first communication unit that acquires the input data from the input device; and a second communication unit that sends the input data acquired by the first communication unit to other arithmetic device and receives the input data acquired by the other arithmetic device from the other arithmetic device.
Method and system of exchanging information between processors
A method and system of exchanging information between processors. At least some of the illustrative embodiments may be a method comprising exchanging information between a plurality of processors by writing (by a first processor) a first datum to a logic device and then continuing processing of a user program by the first processor, writing (by a second processor) a second datum to the logic device and then continuing processing of a user program by the second processor, and writing (by the logic device) the first and second datum to each of the first and second processors after all the processors have written their respective datum to the logic device.
Data processing system
Each of a plurality of master devices outputs a speed grade signal indicating a data transfer speed with a data transfer request. An arbiter arbitrates transfer requests and speed grade signals from the plurality of master devices. A clock enable generation circuit generates a clock enable signal with a varying ratio of a valid level according to the speed grade signal arbitrated by the arbiter. A slave device operates upon receiving a clock signal when the clock enable signal is at the valid level, and transfers data according to the transfer request arbitrated by the arbiter. Accordingly, the frequency of the clock signal which causes the slave device to operate may be changed for each transfer request, and a fine control of the power of the slave device may be easily performed. As a result, power consumption of the data processing system may be finely controlled.
Operating system synchronization in loosely coupled multiprocessor system and chips
Methods, systems and devices configured to add synchronization to the entry and exit from low power modes in asynchronous operating systems on a multiprocessor system. A synchronizing agent tracks the requested sleep and wake up times of the different asynchronous operating systems executing on different cores of the same system on chip or multicore processor. The sleep/wake up times of some cores/operating systems may be delayed in order to synchronize the sleep/wake up times of two or more of the asynchronous operating systems executing on the multiprocessor system.
Adaptive recovery for parallel reactive power throttling
Power throttling may be used to conserve power and reduce heat in a parallel computing environment. Compute nodes in the parallel computing environment may be organized into groups based on, for example, whether they execute tasks of the same job or receive power from the same converter. Once one of compute nodes in the group detects that a parameter (i.e., temperature, current, power consumption, etc.) has exceeded a first threshold, power throttling on all the nodes in the group may be activated. However, before deactivating power throttling, a plurality of parameters associated with the group of compute nodes may be monitored to ensure they are all below a second threshold. If so, the power throttling for all of the compute nodes is deactivated.
Information handling system with processing system, low-power processing system and shared resources
An information handling system includes a processing system, a low-power processing system, and a chipset. The processing system is configured to operate using a power system configured to power a shared resource of the processing system and a non-shared resource of the processing system, and to disable the non-shared resource during a reduced operating state of the processing system. The low-power processing system is configured to access the shared resource of the processing system during operation of the low-power processing system, wherein the operation of the low-power processing system is separate from the operation of the processing system. The chipset includes a processor of the processing system and operable to be enabled during operation of the processing system, wherein the processor is configured to be disabled during operation of the low-power processing system.
Adaptive recovery for parallel reactive power throttling
Power throttling may be used to conserve power and reduce heat in a parallel computing environment. Compute nodes in the parallel computing environment may be organized into groups based on, for example, whether they execute tasks of the same job or receive power from the same converter. Once one of compute nodes in the group detects that a parameter (i.e., temperature, current, power consumption, etc.) has exceeded a first threshold, power throttling on all the nodes in the group may be activated. However, before deactivating power throttling, a plurality of parameters associated with the group of compute nodes may be monitored to ensure they are all below a second threshold. If so, the power throttling for all of the compute nodes is deactivated.
Dynamic power optimization for computing devices
In the various aspects, virtualization techniques may be used to reduce the amount of power consumed by execution of applications by power-optimizing the code prior to execution. A dynamic binary translator operating at the machine layer may use a power consumption model to identify code segments that can benefit from optimization and to perform an instruction-sequence to instruction-sequence translation of object code to generate power-optimized object code. Execution hardware may be instrumented with additional circuitry to measure the power consumption characteristics of executing code. The power consumption models may be updated and object code may be regenerated based on the measured the power consumption characteristics of previously executed code. In an aspect, power optimization may be accomplished when the computing device is connected to a battery charger.
Method and system for no buffered traffic indication for wireless local area network (WLAN) power save
Aspects in a method and system for no buffered traffic indication for wireless local area network (WLAN) power save may enable a peer communication device to determine a time duration for remaining in an active operating state based on communication with other peer communication devices. In one aspect, a given peer communication device may determine that it has no data to communicate to any of the remaining peer communication devices. The given communication device may communicate to each of the peer communication devices that there is no data to transmit to the peer communication device. Each of the peer communication devices may communicate that there is no data to transmit to the given peer communication device. Based on the communications, the given peer communication device may exit the active operating state and enter a low power operating state.
Memory device, host device, memory system, memory device control method, host device control method and memory system control method
A memory card 100 having a NAND type flash memory connectable to a host device 200, capable of transmitting/receiving a signal to/from the host device 200 at a first voltage (3.3 V) or a second voltage (1.8 V) and safely changing a signal voltage of a transmission/reception signal that mutually checks a signal voltage through handshake processing with the host device 200 when the signal voltage is switched.
Circuits and methods for providing adjustable power consumption
Circuit and methods provide for adjustable power consumption using a plurality of memory controllers. In one example, a first memory controller has a first power consumption level. A second memory controller has a second power consumption level that differs from the first power consumption level. Memory controller bypass logic is connected to the first and second memory controllers and selects for a memory client at least one of the first and second memory controllers in response to a change in a power conservation condition.
Method and system for monitoring module power status in a communication device
Methods and systems for monitoring operating status of a device are provided. Aspects of the method may include receiving within a chip, a signal indicative of a power status of an on-chip device. An output signal indicative of the power status may be generated from within the chip, while the chip is operating. The generated output signal may be communicated outside the chip via a serial bus, a plurality of pin connections on said chip, and/or a general purpose input/output connection. The generated output signal may be multiplexed on at least one pin on the chip and it may comprise a clock signal and/or a data signal. The data signal may comprise sequential power status information for a plurality of on-chip devices.
Content data reproduction system and recording device
To exclude any unauthorized device from a system and thereby prevent illegal use of content data, a memory card 10 stores a service key Ksrv for encrypting content key data Kc in a hidden area 14. The memory card 10 stores answer data ACto be obtained when question data Q is fed to a host function F possessed by an authorized host device 20, with encryption applied to the answer data AC by the service key Ksrv. When the question data Q is provided to the host device 20, answer data AH is obtained based on the question data Q and the host function F. A comparison unit 122 judges match or mismatch of the answer data AH and the answer data AC. When they match, the memory card 10 decrypts the content key data Kc encrypted by the service key Ksrv and sends it to the host device 20.
Redundant array of encrypting disks
By placing an encryption function below a RAID function and requiring independence of encryption functionality along the same boundaries of data member independence of the RAID function, failures of the encryption and key management for individual encryption functions can be recovered with the same data rebuild mechanism as the RAID function. For example, in a RAID set of disk drives, each data partition and each parity partition has a respective data encryption key for storing encrypted data or encrypted parity in the partition, and a LUN or logical volume is mapped to a stripe of data partitions and an associated parity partition across the RAID set so that the data rebuild mechanism of the RAID function may recover from a loss of a single data encryption key without compromising security of the LUN or logical volume.
Authorising use of a computer program
A method of authorizing use of a computer program only able to be used when an authorized message is received from an authorizing system includes providing an authorization system, making a request to use a computer program, signalling the request to the authorization system, the authorization system recording the use of the computer program and providing the authorization message to the computer program upon receipt of the authorization message the computer program may be used.
Small public-key based digital signatures for authentication
Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key value; receiving a verifier's public key value; generating a shared secret value based on the modulus N, the private key value and the verifier's public key value; calculating an authentication signature value using the shared secret value; and transmitting the authentication signature value for authentication. When the authentication signature is received, the public key value and the shared value are generated to calculate an authentication signature value. Thereafter, the authentication signature values are compared and authenticated.
A communication apparatus includes: a first storage unit storing a received electronic mail; a verification unit executing a first verification about an electronic signature attached to the received electronic mail; a printing unit printing the received electronic mail if a verification result of the first verification is positive; a deletion unit deleting the printed electronic mail from the first storage unit; and a storage control unit controlling a second storage unit to store the mail information about the received electronic mail in the second storage unit if the verification result of the first verification is negative. The verification unit again executes the first verification about a specific electronic signature attached to a specific electronic mail which mail information is stored in the second storage unit. The printing unit prints the specific electronic mail if a verification result by again executing the first verification about the specific electronic signature is positive.
Methods for anonymous authentication and key agreement
Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a device and a remote entity. The device remains anonymous to the remote entity after performing the authentication. The method also includes establishing a mutually shared session key for use in secure communication, wherein the initiating and the establishing are in conjunction with direct anonymous attestation (DAA).
Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device
Techniques are described for using unique features of a storage medium for authentication of data as originating from the storage medium, and also for installing software and data to a storage medium in a way which inhibits unauthorized copying of the software and data to another storage medium. Cryptoprocessing keys are created using unique features of the storage medium such as location information related to storage of selected elements of a software installation on the storage medium, or alternatively defective block information relating to the storage medium. The cryptoprocessing keys are used to encrypt data for transmission to a remote server. The remote server uses the cryptoprocessing keys to decrypt the data and authenticates the data as having been encrypted with the correct keys.
Secure portable medical information system and methods related thereto
Using a secure portable reference to medical information, stored on a portable storage medium, various embodiments allow a patient to give to their doctor an easy-to-use access key that will enable access to desired medical information stored on a computer network. The secure portable reference provides greater transportability of medical records to a patient or medical data repository including a doctor's office, clinic, or hospital, while maintaining data security to satisfy medical data privacy regulations and expectations. Some described embodiments use encrypted information inside the secure portable reference to hide, for example, who is allowed access to the stored medical information, and the network location of the stored information. Some embodiments use a secret PIN to authenticate the user attempting access to the referenced medical information. The secure portable reference contains information on network resources used to enable download access to medical information, including medical records and medical images.
Systems and methods for application identification
Systems and methods for application identification in accordance with embodiments of the invention are disclosed. In one embodiment, a user device includes a processor and memory configured to store an application, a session manager, an application identifier, and at least one shared library, and the processor is configured by the session manager to communicate the application identifier and the application identifier data to an authentication server and permit the execution of the application in response to authentication of the application by the authentication server.
Methods and systems for authenticating devices
A computer-implemented method for authenticating devices may include (1) identifying a request from a device for a credentialing service to issue a credential to the device, the request including an application identifier encrypted with a first encryption key, the first encryption key having been derived by the device based on a token provisioned to the device by a vendor of the device, (2) transmitting the request to the credentialing service, (3) receiving, from the credentialing service, the credential encrypted using a second encryption key, the second encryption key having been derived by the device based on the token, and (4) providing the encrypted credential to the device. Various other methods, systems, and computer-readable media are also disclosed.
System and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network
A system for preventing the transmission of known and unknown electronic contents to and from servers or workstations connected to a common network. The system includes devices for means for interpreting the contents of a messaging protocol or application network protocol, for checking compliance of the electronic contents with the messaging protocol specification or application network protocol specification and for filtering the electronic content based on its functions.
A method for secure communication of a message. The method includes providing a message including a plurality of message packets, providing a nodal network including a plurality of nodes, where nodal operations are capable of execution on the message packets at the nodes, gaining, by a first node of the network, a first message packet, processing the first message packet by the first node, relinquishing the first message packet as processed by the first node, gaining, by any other node of the network, at least one other message packet, processing the other message packet by the other node, relinquishing the other message packet as processed by the other node, receiving, by a message destination node of the network, a first message packet, receiving, by the message destination node, at least a second message packet, and processing the first message packet and the second message packet to provide a reproduced message.
Secure proxying using network intermediaries
Methods and apparatus for secure proxying using network intermediaries. A system may include one or more servers and a network intermediary. The network intermediary may generate security metadata associated with a client request, comprising an identification of a source of the client request, and transmit an encoded version of the security metadata and a backend request to a server. The server may determine whether the security metadata is valid. If the security metadata is validated, the server may perform one or more operations in accordance with the backend request and the security metadata.
Method and system for temporarily reconfiguring system settings of a computing device during execution of a software application
Methods and devices for controlling system settings of a computing device are described herein. One example embodiment comprises: determining configuration data associated with a software application, wherein the configuration data identifies one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, and wherein the configuration data is digitally signed; and in response to an initiation of the execution of the software application, reconfiguring system settings on the computing device; wherein the reconfiguring comprises verifying at least one digital signature associated with the digitally signed configuration data; wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application.
Early branch determination
A method and apparatus for branch determination is disclosed. The method includes a first command issuing within a computer processor. Execution of the first command by the computer processor includes evaluating one or more conditions to set one or more flags. Subsequent to the first command issuing, a second command is issued and executed. Execution of the second command includes causing the computer processor to wait until the one or more flags are set. Subsequent to the first and second commands issuing, a third command is issued and executed. Execution of the third command includes performing a jump operation based on a value of at least one of the one or more flags set by the first command.
Software selectable adjustment of SIMD parallelism
Selective power control of one or more processing elements matches a degree of parallelism to requirements of a task performed in a highly parallel programmable data processor. For example, when program operations require less than the full width of the data path, a software instruction of the program sets a mode of operation requiring a subset of the parallel processing capacity. At least one parallel processing element, that is not needed, can be shut down to conserve power. At a later time, when the added capacity is needed, execution of another software instruction sets the mode of operation to that of the wider data path, typically the full width, and the mode change reactivates the previously shut-down processing element.
Fast remote communication and computation between processors using store and load operations on direct core-to-core memory
A method for fast remote communication and computation between processors is provided in the illustrative embodiments. A direct core to core communication unit (DCC) is configured to operate with a first processor, the first processor being a remote processor. A memory associated with the DCC receives a set of bytes, the set of bytes being sent from a second processor. An operation specified in the set of bytes is executed at the remote processor such that the operation is invoked without causing a software thread to execute.
Configurable device interfaces
Coupling a device to a multicore computing system that includes multiple cores that each include a processor includes sending messages to access memory coupled to at least one of the multiple cores, the memory having an address space, and the messages including a virtual address. An interface is provided for coupling the device to the multicore computing system in a shim that: transmits or receives messages on the communication network among the processors to or from the coupled device, and translates virtual addresses to physical addresses of the address space in response to receiving the messages over the communication network that include a virtual address.
Method for managing a memory apparatus
A method for managing a memory apparatus including at least one non-volatile (NV) memory element includes: recording valid/invalid page position information of at least one block; and moving valid data contained in at least a valid page of the block according to the valid/invalid page position information; where the block is an erasing unit. For example, the valid/invalid page position information may contain relative position information of the valid data in the block. More particularly, the valid/invalid page position information may contain a plurality of bits, the ranking of each bit may represent a page address offset of each page within the block, and each bit may respectively indicate whether each page in the block is valid or invalid.
Storing compressed data
A method of processing data for storage in a storage medium coupled to a processing unit adapted to access data stored in the storage medium as one or more pages of data, each page having a predetermined page size and a corresponding virtual memory address, the method comprising: obtaining a compressed data item including compressed data corresponding to a first memory page of uncompressed data; dividing the compressed data item into an initial part and a supplementary part, the initial part having an initial part size; determining respective second memory locations for the supplementary parts so as to reduce the number of sectors occupied by the supplementary parts; allocating the initial part together with an index data item at a first memory location associated with the first memory page, the index data item being indicative of a second memory location; allocating the supplementary part at the second memory location.
Methods and system of pooling storage devices
A system and method are provided for pooling storage devices in a virtual library for performing a storage operation. A storage management device determines a storage characteristic of a plurality of storage devices with respect to performing a storage operation. Based on a storage characteristic relating to performing the storage operation, the storage management device associates at least two storage devices in a virtual library. The storage management device may continuously monitor the virtual library and detect a change in storage characteristics of the storage devices. When changes in storage characteristics are detected, the storage management device may change associations of the storage device in the virtual library.
Monitoring of extent of writing of unobscured data to improve erase performance on a magnetic medium
A system according to one embodiment includes a processor; logic in the processor and/or a memory configured to determine a furthest physical position on a magnetic medium that unobscured data has been written to; and logic configured to store an indicator of the furthest physical position on at least one of the magnetic medium and a memory coupled thereto. A system according to another embodiment includes a processor; logic in the processor and/or a memory configured to receive an instruction to obscure data on a magnetic medium; logic configured to read an indicator of a furthest physical position on the magnetic medium that unobscured data has been written to; and logic configured to cause obscuring of the unobscured data on the magnetic medium, and terminating the obscuring upon reaching the physical position in the indicator.
A method, system and computer product for use in error handling comprising receiving, from a requester, a data storage configuration request comprising sub-tasks, determining, from a plurality of user levels, a first user level at which said data storage configuration request is made, each user level of said plurality of user levels being associated with a respective different level of abstraction with respect to processing performed in the data storage system for servicing the data storage configuration request, servicing said data storage configuration request, storing, in an error structure, the success of each sub-task of the data storage configuration request, based on the storing, recording in an error tree whether each sub-task of the data storage configuration request executed successfully, and based on the first user level, displaying a report of the status of the data storage configuration request as recorded in the error tree.
Techniques involving flaky path detection
A technique oversees a path between a multipathing driver of a host computer and a volume of a data storage array. The technique involves, while the multipathing driver of the host computer sends input/output requests (IOs) to the volume of the data storage array on the path, generating an IOs-Over-Period metric based on outcomes of the IOs, the IOs-Over-Period metric providing a measure of IOs per failure over a period of path operation. The technique further involves performing a comparison operation which compares the IOs-Over-Period metric to a predefined flaky path range having a predefined lower limit and a predefined upper limit. The technique further involves, after performing the comparison operation, outputting a detection signal indicating that the path is (i) flaky when the IOs-Over-Period metric falls within the predefined flaky path range and (ii) non-flaky when the IOs-Over-Period metric falls outside of the predefined flaky path range.
Automated migration to a new target volume via merged bitmaps to maintain consistency
Aspects of the present invention relate to data migration and/or disaster recovery. One embodiment enables merging of bitmaps to allow for automation of the process of switching to a different target volume on the same storage subsystem without major interruption of data recovery capability and limited interruption of host I/O to the source volumes during the migration. In one approach, the migration of data onto a new target volume within the same storage subsystem as the original target volume is automated, without requiring the user to manually create or remove any new copy relationships.
Storage system and data relocation control device
The present invention achieves data relocation in accordance with a user's policies, in an environment where a plurality of storage devices coexist. The volumes belonging to storage devices A-D are managed virtually integrally. A host recognizes a plurality of storage devices A-D as a single virtual storage device. The user is able to group arbitrarily each volume belonging to the storage system, as a plurality of storage layers 1-3. For example, storage layer 1 can be defined as a high-reliability layer, storage layer 2, as a low-cost layer, and storage layer 3, as an archive layer. Each storage layer is constituted by a group of volumes corresponding to respective policies (high reliability, low cost, archiving). The user designates volumes V1 and V2 to be moved, in group units, and indicates a storage layer forming a movement destination, whereby the data is relocated.
Transparent data migration within a computing environment
Described is a method and system for transparently migrating data between storage systems of a computing environment without disrupting realtime access to the stored data of the storage systems. Specifically, when adding a new storage system to the computing environment, realtime data write operations can be redirected to the new storage system instead of an existing storage system. During the redirection, the data stored on the existing storage system can be accessed for data operations. Concurrently, during the redirection, data stored on the existing storage system can be migrated to the new storage system. When the data migration completes and all the data, stored on the existing storage system prior to the redirection, resides on the new storage system, the new storage system can function as the primary storage system. Thus, storage capacity can increase or be replaced without disrupting data operations.
Redundancy loading efficiency
A system comprising a processor and a memory, wherein said memory comprises instructions that when executed by said processor implement a method. The method includes loading a first portion of a set of redundancy data into a register of the processor for each redundant sector of a plurality of redundant sectors. A second portion of a set of redundancy data is also loaded into the volatile memory for each redundant sector of the plurality of redundant sectors. Loading the second portions of the sets of redundancy data comprises loading a third portion of redundancy data comprising a plurality of second portions of redundancy data for the plurality of redundant sectors.
Switching visibility between virtual data storage entities
Visibility of a data storage entity on a first storage system is switched to a replicated data storage entity on a second storage system. Data from the data storage entity is replicated from the first storage system to the second storage system using a common serial number. The data storage entity is hidden from the first storage system by concealing the common serial number. An ejection of the data storage entity from the first storage system is automated, and the replicated data storage entity is introduced to the second storage system.
Flash memory devices, data randomizing methods of the same, memory systems including the same
Disclosed is a flash memory device which includes a memory cell array configured to store data, a randomizer configured to generate a random sequence, to interleave the random sequence using at least one of memory parameters associated with data to be programmed in the memory cell array, and a control logic circuit configured to provide the memory parameters to the randomizer and to control the randomizer.
Direct memory access-like data transfer between guest operating systems
A computer system with a memory containing a first guest operating system, including a first portion of the memory and a second guest operating system, including a second portion of the memory. The memory further contains an address exchange module for exchanging memory address handles, a data mover for moving data between the first and second portions of the memory, and an emulated input output memory management unit for controlling the data mover. Instructions in the memory cause the processor to: register accessible memory with the emulated input output memory management unit, write address handles to the address exchange module, read the address handles from the address exchange module, and move the data into the second portion of the memory.
An embodiment of the invention provides an apparatus and method for controlling access by a read-write spinlock with no mutual exclusion among readers. The apparatus and method perform the steps of using values in a data structure in the read-write spinlock to control read access to a shared object and using values in the data structure and a guard lock to control write access to the shared object.
Memory mirroring and migration at home agent
Methods and apparatus relating to memory mirroring and migration at a Home Agent (HA) are described. In one embodiment, a home agent may mirror its data at a slave agent. In some embodiments, a bit in a directory may indicate status of cache lines. Other embodiments are also disclosed.
Extending cache coherency protocols to support locally buffered data
A method and apparatus for extending cache coherency to hold buffered data to support transactional execution is herein described. A transactional store operation referencing an address associated with a data item is performed in a buffered manner. Here, the coherency state associated with cache lines to hold the data item are transitioned to a buffered state. In response to local requests for the buffered data item, the data item is provided to ensure internal transactional sequential ordering. However, in response to external access requests, a miss response is provided to ensure the transactionally updated data item is not made globally visible until commit. Upon commit, the buffered lines are transitioned to a modified state to make the data item globally visible.
Storage apparatus and data processing method
To raise the CPU cache hit rate and improve the I/O processing. Controller is CPU configured from a CPU core and a CPU cache wherein the CPU selects memory bus optimization execution processing or cache poisoning optimization execution processing according to an attribute of the access target volume on the basis of an access request. If the memory bus optimization execution processing is selected, CPU loads the target data into the CPU core after storing the target data in the main storage area, and if the cache poisoning optimization execution processing is selected, the CPU loads the target data into the CPU core after storing the target data in the temporary area of the CPU cache from the CPU memory, and the CPU core checks the target data which was loaded from the main storage area or the temporary area of the CPU cache.
Managing unmodified tracks maintained in both a first cache and a second cache
Provided are a computer program product, system, and method for managing unmodified tracks maintained in both a first cache and a second cache. The first cache has unmodified tracks in the storage subject to Input/Output (I/O) requests. Unmodified tracks are demoted from the first cache to a second cache. An inclusive list indicates unmodified tracks maintained in both the first cache and a second cache. An exclusive list indicates unmodified tracks maintained in the second cache but not the first cache. The inclusive list and the exclusive list are used to determine whether to promote to the second cache an unmodified track demoted from the first cache.
Gather and scatter operations in multi-level memory hierarchy
Methods and apparatus relating to gather or scatter operations in a multi-level cache are described. In some embodiments, a logic may determine whether to perform gather or scatter operations at a first memory or a second memory, based in part on a relative performance of performing the gather or scatter operations at the first memory and the second memory. Other embodiments are also described and claimed.
Method and devices for installing and retrieving linked MIFARE applications
A method for installing linked MIFARE applications (TK1-A, TK1-B, TK1-C) in a MIFARE memory (MM) being configured as a MIFARE Classic card or an emulated MIFARE Classic memory comprises storing the first linked MIFARE application (TK1-A) in a first free sector of the MIFARE memory, storing the second linked MIFARE application (TK1-B) in a second free sector of the MIFARE memory and writing link information (LK) indicating this second sector in a link information memory location of the first sector where first linked MIFARE application (TK1-A) has been stored, and repeating the steps of storing linked MIFARE applications and writing link information (LK) until the last linked MIFARE application (TK1-C) has been stored.
Methods for adaptively programming flash memory devices and flash memory systems incorporating same
A method for programming data into a first plurality of rows within a second plurality of erase sectors of a flash memory device using a programming process having at least one selectable parameter, the method includes characterizing each of at least one row subsets, each row subset comprising at least one row from among said first plurality of rows, thereby to generate at least one row subset characteristic value; and programming data into at least a portion of at least one individual row belonging to at least one row subset, using a programming process having at least one selectable parameter, said at least one selectable parameter being set at least partly in accordance with the row subset characteristic value characterizing a row subset to which said individual row belongs; wherein at least two row subsets of an array of flash memory cells differ from each other by their row subset characteristic values.
Valid page threshold based garbage collection for solid state drive
A method for garbage collection in a solid state drive (SSD) includes determining whether the SSD is idle by a garbage collection module of the SSD; based on determining that the SSD is idle, determining a victim block from a plurality of memory blocks of the SSD; determining a number of valid pages in the victim block; comparing the determined number of valid pages in the victim block to a valid page threshold; and based on the number of valid pages in the victim block being less than the valid page threshold, issuing a garbage collection request for the victim block.
A high-speed large-capacity phase-change memory is achieved. A semiconductor device according to the present invention includes: a plurality of memory planes MP; a plurality of storage information register groups SDRBK paired with the plurality of memory planes; and a chip control circuit CPCTL. The plurality of memory planes include a plurality of memory cells. Also, the plurality of storage information register groups temporarily retain information to be stored in the plurality of memory planes. Further, the chip control circuit includes a register which temporarily stores a value indicating volume of the storage information, and a first storage information volume is smaller than a second storage information volume. When the first storage information volume is written, the plurality of memory planes and the plurality of storage information register groups are activated during a first period. When the second storage information volume is written, the plurality of memory planes and the plurality of storage information register groups are activated during a second period. By such a structure, the first period is shorter than the second period.
Data packet processing method for a multi core processor
A method for processing a data packet in a network server system comprising at least one central processor unit (CPU) having a plurality of cores; and a network interface for forming a connection to a network between the network and a designated CPU core, such that for all data packets received from the network an interrupt is created in the designated CPU core for received data packet processing. Each data packet received from the network is associated with an application connection established in a CPU core selected based on processor load and an interrupt thread is created on the CPU core associated with the application connection for processing the data packet. Each data packet being sent to the network is associated with an application connected established either in the CPU core in which the application is executing or an alternative CPU core selected based on processor load. Where the application connection is established in an alternative CPU core, an interrupt thread is created on the CPU core associated with the connection for processing the data packet.
Method and system for transformation of logical data objects for storage
Various embodiments for transforming a logical data object for storage in a storage device operable with at least one storage protocol are provided. In one such embodiment, the logical data object into one or more segments are divided with each segment characterized by respective start and end offsets. One or more obtained variable size data chunks are processed corresponding to the logical data object to obtain processed data chunks, wherein at least one of the processed data chunks comprises transformed data resulting from the processing. Each of the variable size data chunks is associated with a respective segment of the logical data object. The processed data chunks are sequentially accommodated in accordance with an order of chunks received while keeping the association with the respective segments.
System and method for providing remote device driver
Provided is a system and method for providing a remote device driver. The system includes a first device configured to request device information from a terminal connected through a universal serial bus (USB) interface and transmit device information provided from the terminal in response to the request via a network, and a second device connected with the first device via the network and configured to load a driver for driving the terminal on the basis of the device information on the mobile terminal received from the first device. Accordingly, it is possible to drive and control a mobile terminal at a remote location without installing a function driver directly on a computer that is physically connected with the mobile terminal.
Providing signals to electronic connectors
A connector can be activated or deactivated by providing power and data signals to the connector at different times. In some embodiments, the power signals are provided to a connector, and then the data signals are provided to the connector after a delay. Providing power and data signals at different times can, in at least some cases, better mimic the timing of signals provided by a connector as the connector is attached to an electronic device. This can aid automated testing of the electronic device. It can also be used to control access of the device through the connector.
Storage of data utilizing scheduling queue locations associated with different data rates
In one example, multimedia content is requested from a plurality of storage modules. Each storage module retrieves the requested parts, which are typically stored on a plurality of storage devices at each storage module. Each storage module determines independently when to retrieve the requested parts of the data file from storage and transmits those parts from storage to a data queue. Based on a capacity of a delivery module and/or the data rate associated with the request, each storage module transmits the parts of the data file to the delivery module. The delivery module generates a sequenced data segment from the parts of the data file received from the plurality of storage modules and transmits the sequenced data segment to the requester.
Universal serial bus assistance engine
A method to interact with a local USB device is disclosed. A message is received from the local USB device. Predetermined information is extracted from a proper subset of the message. The extracted information is transmitted to a local process.
Data processing system with a host bus adapter (HBA) running on a PCIe bus that manages the number enqueues or dequeues of data in order to reduce bottleneck
An HBA driver manages a queue number for enqueuing and dequeuing data to an I/O queue by the main storage, and HBA-F/W manages a storage region at inside of HBA. The HBA driver reduces the number of access times by way of the PCIe bus by noticing an enqueued queue number or a dequeued queue number of an I/O queue to HBA-F/W by utilizing an MMIO area of the main storage in which a storage region on HBA is mapped.
Direct memory access controller and operating method thereof
Disclosed is an operating method of a direct memory access (DMA) controller having first and second DMA channels. The operating method includes iteratively performing a DMA transfer operation of the first DMA channel based upon loop information and transfer information of the first DMA channel; iteratively performing a DMA transfer operation of the second DMA channel based upon loop information and transfer information of the second DMA channel; reconfiguring the transfer and loop information of the first and second DMA channels; and again performing the iteratively performing a DMA transfer operation of the first DMA channel and the iteratively performing a DMA transfer operation of the first DMA channel based upon the reconfigured transfer and loop information of the first and second DMA channels.
Data storage architecture extension system and method
A data storage architecture extension (DAX) system and method that permits multiple disk drive storage elements to be logically daisy-chained to allow a single host bus adapter (HBA) to view the storage elements as one logical disk drive is disclosed. The system/method may be broadly described as comprising a pass-thru disk drive controller (PTDDC) further comprising a HBA port, a disk drive interface port, pass-thru input port, and a pass-thru output port. The PTDDC intercepts and translates the HBA port input to the requirements of an individual disk drive connected to the drive interface port. Each PTDDC may be daisy-chained to other PTDDCs to permit a plethora of disk drives to be associated with a given HBA, with the first PTDDC providing a presentation interface to the HBA integrating all disk drive storage connected to the PTDDCs. The system/method also permits RAID configuration of disk drives using one or more PTDDCs.
Executing a start operator message command
A facility is provided to enable operator message commands from multiple, distinct sources to be provided to a coupling facility of a computing environment for processing. These commands are used, for instance, to perform actions on the coupling facility, and may be received from consoles coupled to the coupling facility, as well as logical partitions or other systems coupled thereto. Responsive to performing the commands, responses are returned to the initiators of the commands.
Process for selecting an authoritative name server
Methods and systems for intelligently choosing an authoritative name server from among a group of name servers for resolving Domain Name System requests. Systems and methods are provided that enable choosing of a first server associated with and/or operated by a first service provider based on a first measurement associated with that first server. The systems and methods further comprise requesting first data from that first server, determining that the first server is unresponsive, and choosing a second server. The second server is chosen based on a second measurement, and chosen contingent on it being associated with and/or operated by to a different service provider than that associated with the first server. The systems and methods then comprise requesting second data from the second server.
Rewriting of client-side executed scripts in the operation of an SSL VPN
A network device implements an SSL VPN gateway for client devices. The network device may receive a script destined for a client device. The script may include at least one later binding uniform resource locator (URL)-based link entity. The network device may rewrite the script to include additional script associated with the later binding URL-based link entity. The additional script is configured to execute at the client device to rewrite the later binding URL-based link entity with substitute links that refer to the network device. In this manner, the network device allows the external client devices to access back-end servers in a proprietary network without requiring the installation of custom software on the client devices.
Managing host routes for local computer networks with a plurality of field area routers
In one embodiment, a particular field area router (FAR), in a local computer network (e.g., a mesh network) having a plurality of FARs, advertises a common subnet prefix assigned to the local computer network into a global computer network. Each of the plurality of FARs of the local computer network is configured to accept any traffic destined to the local computer network, and a tunnel overlay is built among the plurality of FARs. Upon receiving a packet at the particular FAR destined to a particular device in the local computer network, and in response to the particular FAR not having a host route to the particular device, it forwards the packet on the tunnel overlay to another of the plurality of FARs of the local computer network.
System and method of TCP tunneling
Tunneling is a mechanism used to aggregate payloads from a network protocol at or below the tunneling layer into a single packet. A user-space application establishes a Transmission Control Protocol (TCP) tunnel and encapsulates an end-to-end TCP payload into a TCP segment for transmission over a TCP connection. This enhanced TCP tunnel eliminates TCP meltdown and can be used over any network which supports TCP. The calling application either identifies the parameters of an existing TCP socket or establishes a new TCP socket. A modified transport layer uses the identified TCP connection in forming the enhanced TCP tunnel. The enhanced TCP tunnel manages the data transmission on the TCP stack to eliminate TCP meltdown.
System and method for downloading content associated with optical media
Systems and methods for reducing problems and disadvantages associated with downloading content associated with optical media are disclosed. A method may include determining a size of an item of content to be downloaded. The method may also include determining a download speed of a network connection between an information handling system and a content provider and determining a fractional download size corresponding with a desired download time at the download speed of the network connection based at least on the download speed. The method may further include downloading a plurality of portions of the content from the content provider, each portion less than or substantially equal in file size than the fractional download size, wherein at least two of the plurality of portions are downloaded substantially in parallel, and combining each of the plurality of portions such that the combination is substantially similar to the item of content.
Systems and methods for media stream processing
Portions of streaming media are selectively removed for storage and/or delivery over a computer network medium. The amount of data in a media stream itself may be selectively reduced and, the amount of data in the media stream may be selected for delivery and/or storage so that it is reduced in a manageable and consistent fashion. Data within a media stream of a given temporal duration may be selected for delivery and/or storage in such a way that leads to a proportional increase in the maximum speed at which data from the given temporal duration of the media stream may be transmitted and reviewed while simultaneously providing the benefit of reducing overall storage capacity requirements.
Multiple devices multimedia control
The claimed subject matter provides systems and/or methods that effectuate initiating, transferring, manipulating, and/or maintaining simultaneous real time streaming of multimedia content. The system can include devices and components that synchronize multimedia distribution to disparate user devices, distribute media streams to the disparate user devices, and provide media control over the media streams by the disparate user devices.
Multi-user system with dynamic data source selection
Techniques to dynamically select data sources for users and to direct queries for the users to the proper data sources. Initially, user information (e.g., user name) for each user is received and used to determine a data source designated for the user. The designated data source may be determined via a look-up table or by running a query with the user information to obtain the identity (e.g., the logical name) of the data source. A data source variable for each user can then be set to the identity of the designated data source. Thereafter, queries for each user are directed to the user's designated data source by determining database connection information for the designated data source based on the data source variable and using this information to direct the queries.
System and method for transferring a session between multiple clients
A method for transferring a session between clients is provided when one user uses multiple clients on a service (for example, Push to talk over Cellular (PoC), Instant Messaging (IM), Converged-Internet Protocol (IP) Messaging (CPM)) providing system implemented through a Session Initiation Protocol (SIP)/IP core network. A session transfer method is provided when the user needs to transfer a session to another client while the session is performed through one client. A “temporary storing” technique is used in which a conversation server or client as one of elements of a seamless CPM system for providing a seamless user environment temporarily stores data transmitted from another user during session transfer.
Methods and systems for facilitating transfer of sessions between user devices
Methods and systems for facilitating transfer of an active session from a first device to a second device associated with the same user. A network server is configured to enable the switching or swapping of an active session from one device to another device, where both devices are associated with a common user address. The switching or swapping is implemented with no or minimal effect on the active session or awareness of the remote party. The device switch may be performed in relation to any active session, including VoIP, video conferencing, or other media sessions.
Apparatus and method to allocate limited resources
A computerized method and apparatus to allocate a shared resource are described. The method may comprise accessing sensor data corresponding to an availability of the shared resource, and identifying when the availability of the shared resource reaches a threshold level below which the activities compete for the shared resource. Thereafter, when the activities compete for the shared resource, the method may allocate at least a portion of the shared resource to the activity associated with an active policy having a higher priority.
Concurrent web based multi-task support for computer system
The traditional web based computing system does not support web based multitasking. Therefore, when a user via a web user interface displayed in a web browser on an end-user computing device to submit a task of accessing a web server, the user has to wait the task to be finished before can submit a second task from the same web user interface. A method of supporting web based multitasking is disclosed herein for solving above mentioned issue to let user much efficiently perform web based tasks without wasting waiting time.
Peer signaling protocol and system for decentralized traffic management
A network communications protocol to allow endpoints in a computer network to communicate their respective requirements for access to a network resource to each other, and to communicate a policy for access to the network resource by the endpoints. The network protocol may also allow negotiation of access to the network resource for the respective endpoint in accordance with the policy and the requirements information communicated by other endpoints. The network resource may be access to a WAN connection or an Internet connection, or may be a device such as a network printer or network attached storage.
Method and system for delivering personalized broadband content
A system and method (the “Channel Dancer”) of delivering broadband content that has been personalized for a recipient user is disclosed. By excelling in the personalization of the user's view of broadband content on the Internet and otherwise, the system and method develop “stickiness” with the user that maximizes the benefits and effectiveness of advertising and related activities. The system preferably comprises a network operations center (“NOC”) that receives and packages content, with promotional materials, on virtual channels, a transmission medium that transmits the virtual channels, a broadband ISP with a point-of-presence (“POP”) server that receives the virtual channels and routs virtual channels to a user machine, based on requests received from client software (the “client”) resident on the user machine and filtering performed by the client based on a personal profile of the user.
Fake web addresses and hyperlinks
A destination address is processed to determine if the destination address is a fake web address or hyperlink. The destination address may be compared with a database of known domain names to see if the domain name is legitimate or illegitimate. The designation address may also be compared to other domain names to see if it is an honest or dishonest transformation of the other domain names. Appropriate action may be taken if the designation address is a dishonest transformation of another domain name.
Method and apparatus for processing information related to interactive web sites
A method for creating interactive web sites that are easy to modify is disclosed. The method uses a specific web server request handler system that examines each request to determine if a handler should be called to handle information related to the referring web page. Specifically, the server system examines the address of the referring web page to see if the server has a handler routine associated with the referring web page. If the server has a handler associated with the referring web page, then the server executes the handler routine to process any information in the current request, any state information, or any other information. After executing the handler routine, the server handles the current request. The handling of the current request may be affected by the processing performed by the handler routine associated with the referring web page.
System for collecting, analyzing, and transmitting information relevant to transportation networks
When individual persons or vehicles move through a transportation network, they are likely to be both actively and passively creating information that reflects their location and current behavior. In this patent, we propose a system that makes complete use of this information. First, through a broad web of sensors, our system collects and stores the full range of information generated by travelers. Next, through the use of previously-stored data and active computational analysis, our system deduces the identity of individual travelers. Finally, using advanced data-mining technology, our system selects useful information and transmits it back to the individual, as well as to third-party users; in short, it forms the backbone for a variety of useful location-related end-user applications.
Method and system of providing a summary of web application performance monitoring
The performance of several application servers is monitored. Based on the monitoring, performance metrics of the several application servers is collected by several clusters of collectors. Each cluster of collectors is associated with a respective manager of performance metrics. Each manager of performance metrics receives collected performance metrics from their respective collectors. An Enterprise Manager Extension plug-in module enables each manager of performance metrics to synthesize the performance metrics of its respective cluster of collectors. A summary manager summarizes the synthesized performance metrics of the various server clusters received from the manager of performance metrics and provides it as an output presentation.
System and method for providing automatically updated product inserts
Systems, apparatuses, and methods can provide parameters of operating results for control products used in biological reactions. For example, automatically updated inserts containing such parameters for clinical quality controls can be provided. A customer can log into a website, provide lot number of quality control products, information about instruments, and tests being performed and then receive updated parameters for the products. The product inserts can be customized for or by a particular customer.
Fast device classification
In a system in which one or more client devices 10 access web servers 20 over a network 40, a classification server 30 is provided to assist in identifying the nature of the agent controlling the client devices 10. In particular, the classification server 30 monitors events that occur as a client device 10 accesses content on a web server 20, and uses a record of these events to classify the client device 10. This classification occurs when a classification time, generated in dependence on the events that have already taken place, is reached. The classification time represents the earliest time at which a classification can be made with a predetermined level of confidence.
Behavior based client selection for disparate treatment
Embodiments for server connection optimization in a persistently connected publish/subscribe environment are provided. A computer assigns an initial activity category for a client. The computer logs, into a log file, one or more select operations of a connection between a client and a first server. The computer calculates a ratio of a number of the select operations to a check time of the first server, wherein the check time is a period of time that has elapsed since a previous review of logged data. The computer sets a second activity category for the client based on a look-up of the ratio in a schedule of ratio ranges in a control file, wherein the second activity category is not the initial activity category. The computer transfers the client from the first server to a second server, in response to setting the second activity category.
Information technology remote services management environment
An apparatus for providing remote services to an integrated information technology environment. The information technology environment comprises a services appliance. The services appliance provides agent-less monitoring of information handling systems within the information technology environment. The apparatus comprises a remote management platform. The remote management platform is configured to receive services information from the services appliance. The remote management platform analyzes the services information and determines a response based upon the services information. The remote management platform initiating the response by the remote management platform based upon the services information.
System coordinated WLAN scanning
The invention proposes a scan control device, wherein in the scan operation a network detection is performed, the device comprising a request receiving means (41) for receiving at least one request for providing scan information, and a scan control means (42) for performing a scan operation independently from receiving the scan information requests. The invention also proposes a corresponding method and a computer program product.
Automated host discovery and path tracing by network management server
One embodiment described relates to an automated method of host discovery and path tracing by a network management server. The method includes discovery of a location in the network of a source host, discovery of a location in the network of a destination host, and discovery of a path from the source host to the destination host. Other embodiments are also described.
Discovery of electronic devices in a combined network
Embodiments of the invention are generally directed to discovery of electronic devices in a combined network. An embodiment of a method includes determining an identifier for a first device in a combined network according to a first network protocol, the combined network including a first network using the first network protocol and a second network using a second network protocol, where the identifier is determined based on a unique designation for the first device, and determining addressing information for the first device according to the second network protocol, where determining the addressing information includes establishing a physical address and a logical address for the first device. The method further includes broadcasting one or more messages containing identification information and capabilities of the first device to devices in the first network and to devices in the second network. The first device records and processes information from messages received by the first device, the messages being one or more messages under the first network protocol and one or more message under the second network protocol.
Policy and charging control method and system for multi-PDN connections of single APN
A method and a system for performing policy and charging control for establishing multiple packet data network (PDN) connections to a single access point name (APN) are provided. The method associates the gateway control session with the subsession in the S9 session associated with the Gx session modified by the indication of Internet Protocol connectivity access network (IP-CAN) session modification message through the PDN Connection Identifier (ID), thereby, after the relocation occurs on the bearer binding and event report function (BBERF), making the modified policy and charging control (PCC) rule be sent down to the policy and charging enforcement function (PCEF) through the associated Gx session and the modified quality of service (QoS) be sent down to the destination BBERF through the gateway control session, thereby implementing the policy and charging control when establishing multiple PDN connections to the single APN in the roaming scenario.
Managing attributes associated with an application server
Embodiments relate to systems and methods for maintaining attributes associated with application servers. In particular, a system administrator can register a set of services associated with an application server. Before initiating, a service can need to be configured with a set of attributes. According to embodiments, a vault service associated with the application can validate a service requesting to be configured. Further, an attribute management tool can store attributes, such as passwords and other sensitive data, associated with the requesting service. Upon a successful validation, the attribute management tool can provide the associated attributes to the vault service, which uses the attributes to configure the service.
Generic and automatic address configuration for data center networks
This application describes a system and method for auto configuring data center networks. The networks include a plurality of electronic devices that may include switches, servers, routers, or any other device that may be used in a data center network. Graph theory is applied to the arrangement of the network devices to determine if the intended design of the data network matches the actual implementation of the network. This may be achieved by resolving the blueprint graph with the physical graph to determine if they are isomorphic. Also, the isomorphic techniques may be used to detect miswirings in the network that do not cause a node degree change for any of the network components.
Virtual systems management
Automatic configuration management of a network is provided by determining an inventory of resources at a virtualization layer of a node of the network, assigning prioritization to members of a set of network configuration elements, allocating virtual resources among the set of network configuration elements, establishing a network configuration. The configuration is managed by determining real time performance metrics for the configuration, producing a reallocation of the virtual resources based on the performance metrics that are estimated to change the established configuration, change the performance metrics, and initiating the reallocation of the virtual resources. This Abstract is provided for the sole purpose of complying with the Abstract requirement that allows a reader to quickly ascertain the subject matter of the disclosure contained herein. This Abstract is submitted with the understanding that it will not be used to interpret or to limit the scope or the meaning of the claims.
Apparatus and method for sharing a generic configuration across a group of network devices
Various embodiments provide an apparatus and method for sharing a generic configuration across a group of network devices. An example embodiment includes sending a scope challenge to a plurality of network devices; receiving a response to the scope challenge from a plurality of in-scope network devices; sending a configuration change message including a configuration change to the plurality of in-scope network devices; and receiving a commit message from the plurality of in-cope network devices indicating that the configuration change has been committed.
Hybrid model in self-provisioning process
A networked computing device may be configured to determine, by a service application executing on the networked computing device, to change a configuration of a network service plan associated with the networked computing device and used by the service application, the network service plan identifying whether at least one service of the communications network is available for use by the networked computing device, request self-provisioning content from a self-provisioning gateway responsive to the determination, provide, by the service application, a user interface for configuration of the network service plan based on the received self-provisioning content, send a change data feature request to the self-provisioning gateway responsive to a request for the change in the configuration of the network service plan through the provided user interface, and allow for utilization of the service application after receiving a response to the change data feature request without having to restart the service application.
System and method for customizing settings in a communication device for a user
The illustrative embodiments described herein provide a method, apparatus, and computer program product for customizing settings in a communication device for a user. In one illustrative embodiment, the process identifies a user profile to which a user belongs. The process identifies a set of custom communication device settings associated with the user profile. The process also sets a current set of communication device settings for a set of functions in a communication device to the set of custom communication device settings. In one embodiment, identifying the user profile to which the user belongs includes identifying the user profile to which the user belongs based on one or more characteristics of the user.
Method and apparatus for providing enhanced streaming content delivery with multi-archive support using secure download manager and content-indifferent decoding
A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically fetched, material specific, data handlers (e.g., download assistants). A download assistant fetches a data stream from a remote location and processes the streamed data iteratively using buffers and multi-threaded processes through the decoder (e.g., codec), allowing source material-specific processing of the data as it is streamed from one or more download sources as well as content-indifferent and platform-indifferent decoding. To minimize versioning issues, payload construction for secure delivery is simplified to packing and encrypting a directory tree containing any number of files or other digital media into an archive and, when needed, dividing a payload into multiple files or archives with a descriptor that lists the archives.
Server side data cache system
In an example embodiment, a system and method to store and retrieve application data from a cache and a database are provided. The example method may comprise receiving location data associated with application data from a user device, using the location data to determine a cache or database on which the application data is stored, and requesting application data from the cache or database. The system and method may further include monitoring requests for application data associated with instructions having a set of characteristics, identifying application data as associated with the instructions having the set of characteristics, and requesting the application data based on receiving subsequent instructions sharing the same set of characteristics.
System and method for efficiently streaming digital video
In a system and method for streaming video information, a video device driver is configured to analyze video frames stored in a frame buffer to identify a video stream. Video frames identified as containing a video stream are excluded from rendering. An encoding format-independent media transport is configured to encode a copy of a video frame containing the video stream according to an encoding format supported by a client device requesting the video stream. The media transport further is configured to transmit the encoded video frame copy to the client device.
Caching content and state data at a network element
Methods are disclosed for caching content and state data at a network element. In one embodiment, data packets are intercepted at a network element. An application layer message, which specifies a request for specified data from a server application, is determined from the data packets. A first portion of the specified data contained in the network element's cache is determined. A message that requests a second portion of the data not contained in the cache is sent toward a server application. A first response that contains the second portion, but not the first portion, is received. A second response, which contains the first and second portions, is sent toward a client application.In one embodiment, data packets are intercepted at the network element. An application layer message, which specifies session or database connection state information, is determined from the data packets. The state information is cached at the network element.
A method and apparatus for processing message is described. In one embodiment, messages are received over a plurality of channels from a plurality of applications in a virtual machine. An identifier is coupled to each message. The identifier refers to the application originating the corresponding message. A shared transport is formed and associated with the channels. The messages are processed with the shared transport with the identifier.
Systems and methods providing a mobile zero client
The disclosure relates to a portable computing device configured to selectably switch between a wired zero client mode in which the portable computing device operates as a terminal for a host computer via a wired communication channel, a wireless zero client mode in which the portable computing device operates as a terminal for the host computer via a wireless communication channel, and a local mode in which the portable computing device operates independently from the host computer. The portable computing device may include one or more zero client processors that facilitate operation in the wired or wireless zero client mode and one or more local control processors that facilitate operation in the local mode. The portable computing device may include input devices used to receive inputs for the host computer during the wireless or wired zero client modes or for the local control processors during the local mode.
Dynamic data movement
A method, article of manufacture, and apparatus for processing information are disclosed. In some embodiments, this includes completing a disk operation, retrieving a NIC from a NIC queue, retrieving a list of files to transfer, and transferring data to a target disk based on the retrieved NIC and based on the list of files. In some embodiments, transferring data to a target disk includes writing data to a target disk, and wherein writing data to a target disk is the only disk operation performed on the target disk.
Transmitting method and transmitting device, receiving method and receiving device, and transfer method and transfer system
Data broadcast data, which is broadcast in data broadcasts, is constructed by disposing, for example, EMD (Electric Music Distribution) links required to acquire song data as actual broadcast data, which is broadcast in actual broadcasts by a transmitting device, the actual broadcast data is transmitted, and the data broadcast data wherein the EMD links for the song data in the actual broadcasts are disposed, is transmitted periodically during the transmission of the actual broadcast data. The actual broadcast data and the data broadcast data are received by a user terminal, and the EMD links disposed in the data broadcast data are stored whenever there is an input of an operation to attach a “bookmark”. Thus, audio data such as songs in programs broadcast can easily be acquired by radio.
Method and apparatus for enabling authentication of on-line communications
Method and apparatus for enabling authentication of on-line communications. In some embodiments, a message code is embedded in an e-mail, where the message code can be used by the recipient to verify the authenticity of the e-mail or of a Web site. In some embodiments, this code can be created for a particular e-mail message; in other embodiments, the code is created as a watermark for use by a customer or other a specific user or recipient. The message code is associated with both the e-mail message and the recipient. In the case of a message-specific code, a recipient can verify the e-mail message by inputting the code via a Web server to be looked up in the database. Provision is also made for including stenographic information in graphical or other codes as further authentication when accessing a Web site.
Recipient-controlled remote E-mail alerting and delivery
Embodiments of the present disclosure provide message notification systems and methods. Briefly described, one embodiment of a message notification method can be broadly summarized by the following: receiving a new message at a first inbox of a recipient; determining existence of at least one trigger for determining if a notification is to be sent for a newly received message at the first inbox; and sending a notification alerting the recipient of the arrival of the new message at the first inbox, the notification being sent to a second inbox of the recipient that is different than the first inbox. Other methods and systems are also provided.
System and method for peer to peer social networking
System enables users to surf the web and engage in social networking interaction through a downloadable peer-to-peer client that stores all user's private information locally on the user's computer. System establishes communication between the computers of multiple users participating in social interaction without having to store users' personal information on central servers. All user data, including, without limitation, pictures, ideas, personal information and communications with friends is maintained locally on the user's own computer and the social communication takes place between two or more users' computers. This provides the users with greater control over the dissemination of their personal information. In addition, the system randomly selects peer-to-peer social networking clients that are online at any given time and enable such clients to randomly and automatically connect with one another.
Systems and methods for transmitting information, alerts, and/or comments to participants based on location information
The present invention generally relates to systems and methods for sharing information related to a location also referred to herein as a “spot,” such as spot alerts and/or spot comments (e.g., shared information, advertisements, etc.) received, displayed, played, and/or actuated, for example, on recipient mobile electronic devices proximately located to such location (e.g., spot). Users of the system can create spot alerts in which designated recipients can receive messages, such as spot alerts and/or spot comments (e.g., shared information, advertisements, etc.) received, displayed, played, and/or actuated, for example, on respective recipient mobile electronic devices, when located within a proximity of a defined location (e.g., spot).
Systems, methods and articles for a server providing communications and services involving automobile head units
Network communications, Web-based services and customized services using the Web-based services may be provided to drivers and users via the automobile head unit in the vehicle and via their mobile device. The automobile head unit in the vehicle and the mobile device are communicatively linked via a short range wireless connection. Also, these devices may communicate over a network such as a cellular network to a service provider that provides entertainment and informational services to the mobile device and the head unit of the vehicle. The user's profile and preferences are able to follow the user to various locations and into vehicles because this information is stored at a server accessible by the user's mobile device, and in some embodiments, also the head unit. The mobile device may provide services to the head unit if it does not have wider network connectivity over the short range wireless connection.
Session management within a multi-tiered enterprise network
A system and method are described in which session objects are organized and managed within a structured hierarchy of session object storage units, referred to herein as “session domains.” In an example, a method can include generating a plurality of session objects, defining a plurality of session domains, associating the plurality of session objects with the plurality of session domains, identifying related session domains, and organizing the related session domains within one of a plurality of hierarchy levels. The session objects can store session data defining a state of interaction with clients. The session domains can provide abstract storage for session objects having similar management characteristics. The related session domains can be grouped in hierarchy levels based on one or more related management characteristics of the session objects.
Method and device for establishing network communication compatibility of terminals
In order to set up a communication channel on a link connecting a client application on a client machine and a service application present on a device dependent on a terminal, the client machine includes a representative of the service application. A formatting module is located at the client machine, downstream of the representative, for formatting the client application messages in a form readable by the service application. A gateway is located at the terminal, for receiving the messages readable by the card and transmitting them to the service application. Typically, the communicating device is a smart card, and the service application is a card application. The link is typically a network, for example of the Internet type.
System and method for resolving a unit of work
A method for resolving a unit of work involving a plurality of participants, the method comprising the steps of: generating logic comprising an identifier generator; aggregating the logic with an owning application of a unit of work; and in response to the owning application initiating the unit of work, generating, by the identifier generator, an identifier associated with the unit of work.
Modular exponentiation with partitioned and scattered storage of Montgomery Multiplication results
Embodiments of techniques and systems for side-channel-protected modular exponentiation are described. In embodiments, during a modular exponentiation calculation, Montgomery Multiplication (“MM”) results are produced. These MM results are scattered through a table for storage, such that storage of the values may not lead to discovery of a secret exponent value by a spy process through a side-channel attack. The scattering may be performed in order to reduce a number of per-result memory operations performed during each MM result storage or retrieval. In embodiments, a window size of 4 may be used in the modular exponentiation, along with partitioning of the MM result into 32-bit partition values which are scattered with offsets of 64-bytes. In embodiments, while use of a window size of 4 may result in additional MM calculations during modular exponentiation than other window sizes, the reduction in memory operations may provide a positive performance offset.
Signal processing device
A device capable of improving the convergence rate and estimation accuracy in estimating a correlation value. According to a signal processing device, since a window length is adjusted in such a manner to reduce an estimated error of a correlation matrix, the convergence rate and estimation accuracy in estimating the correlation matrix and the correlation value as its off-diagonal element can be improved. Then, in such a high-probability condition that the correlation of plural output signals according to a state is estimated with a high degree of precision, signal processing is performed on the plural signals, so that the state can be estimated with a high degree of precision.
Multi-dimensional hybrid and transpose form finite impulse response filters
Multi-dimensional finite impulse response filters ale disclosed in hybrid and transpose forms. Multi-dimensional signals can be expressed in a vector (ox matrix) form to allow multi-dimensional signals to be processed collectively. Known hybrid and transpose FIR filters are extended to the multi-dimensional case to allow multi-dimensional signals to be processed with reduced redundancies. The input signals are vectors with multidimensional components. The disclosed FIR filters include multipliers that perform matrix multiplications with multiple coefficients, and adders for performing vector additions with multiple inputs and outputs. The z-transforms are provided for the disclosed hybrid and transpose multi-dimensional FIR filters.
Systems and methods for efficient data channel testing
Various embodiments of the present invention provide systems and methods for data processing. For example, a data processing system is disclosed that includes: a data detector circuit, a pseudo-random sequence generator circuit, a decoder circuit, and a pseudo-random sequence reconstitution circuit. The data detector circuit is operable to apply a data detection algorithm to a first data set to yield a detected output. The pseudo-random sequence generator circuit is operable to generate an interim data sequence and to generate a second data set based upon a combination of the detected output and the interim data sequence. The decoder circuit is operable to apply a data decode algorithm to a derivative of the second data set to yield a third data set.
Automatic prompt for input data on a calculator
A calculator comprises a processor and a keyboard coupled to the processor. The keyboard comprises a calculation key that causes a calculation to be performed on input data. The calculator also comprises a display coupled to the processor. When the calculation key is pressed, the processor determines whether the input data has already been entered. If the input data has not already been input, the processor prompts a user of the calculator to enter the input data via the keyboard by displaying an alphanumeric description of the input data required for the calculation.
System reset and system restore
Some embodiments of the invention provide techniques for performing system reset and/or system restore operations. Some embodiments store a record of any changes performed to a data file stored on a virtual hard disk using differencing virtual disks that are captured over time. To restore the file to the state in which it existed at any particular point in time, embodiments of the invention may allow for rolling back the system to a differencing virtual disk captured at or before that time and setting aside blocks of the differencing virtual disk chain captured after that point. To perform a system reset, the system may be rolled back to the parent virtual hard disk, by setting aside all of the blocks of the differencing virtual disk chain. Some embodiments of the invention provide for separating information on the system into a plurality of entities, and maintaining a separate set of differencing virtual disks for each entity. For example, some embodiments may create an entity may be created for each of the operating system, applications and user data, and maintain differencing virtual disks for each over time.
Delayed deletion of extended attributes
Methods, systems, and products for delayed deletion of extended attributes associated with a file in a file system are provided. Embodiments include identifying a file to delete, moving an extended attribute directory associated with the file to a background deletion directory, deleting the file, and deleting in the background the extended attribute directory. Some embodiments also include deleting an ACL associated with the file.
Content conversion apparatus and method
Disclosed herein is a content conversion apparatus and method. The content conversion apparatus includes a table generation unit for generating a media dependent table and a weight table. An information management unit receives information about a terminal and information about a player of the terminal from the terminal and manages the received information. A content conversion unit generates a content information table, related to content that is to be converted, using the media dependent table, the weight table, the terminal information and the player information, and converts the content using the content information table so as to transmit converted content to the terminal.
Determining the value of an association between ontologies
An approach is presented for determining a value of an association between first and second ontologies, S1 and S2. A first bridge of S1 with S2 is generated. A schema S′ is created from sub-schema S extracted from the first bridge by removing common concepts and relationships to the common concepts, and for each common concept to which first and second concepts have immediate links in S, by creating a new immediate link in S′ between the first and second concepts. Based on an intrinsic value of S′ and a strength of the bridge of S1 with S, a value of the first bridge is determined. Similarly, a value of a second bridge of S2 with S1 is determined. A value of the association between S1 and S2 is determined based on a sum of the values of the first and second bridges.
Asynchronously flattening graphs in relational stores
An application asynchronously flattens a graph in a relational store to provide fast access to node relationship queries. The application may implement an algorithm that retrieves forward paths of a start node. The algorithm may also retrieve reverse paths of end node. The application may cross-join the forward and reverse paths to determine link paths connecting the start and end nodes. The application may merge the link paths with existing paths. The application may increment path reference counts. The application may store the link paths as a link between the nodes to represent a relationship between the nodes.
Centralized selection context for user interface data binding and event handling
Systems and methods are disclosed which employ a centralized selection context having selection states spread across user interface elements. Methods are described in which the binding between widgets and data storage is isolated using the centralized selection context paradigm for a majority of data items represented within a user interface. This selection context is fully accessible by methods that access data while considering the current selection context. The centralized selection context simplifies event-handling logic by having selection context readily available thus removing the need to query individual widgets for their state.
License management apparatus, license management method, and computer readable medium
A license management apparatus includes: a license information storage; a reproduced user information storage; an invalidation information storage; a compare unit; an update unit; and a setting unit.
Firewalls for securing customer data in a multi-tenant environment
Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to locate and raise an alert for suspect query plans. Security also can be enhanced using a firewall system sitting between the application servers and the client systems that records user and organization information for each client request received, compares this with information included in a response from an application server, and verifies that the response is being sent to the appropriate user. Security also can be enhanced using a client-side firewall system with logic executing on the client system that verifies whether a response from an application server is being sent to the appropriate user system by comparing user and organization id information stored at the client with similar information in the response.
System and method for meta-data driven, semi-automated generation of web services based on existing applications
Techniques for reusing logic implemented in an existing software application such that the logic can be exposed as a Web service or in any other service-oriented context. In one set of embodiments, a design-time technique is provided that comprises, inter alia, receiving program code for an existing software application, generating metadata based on the program code, and customizing the metadata to align with an intended Web service. Artifacts for the Web service are then generated based on the customized metadata. In another set of embodiments, a run-time technique is provided that comprises, inter alia, receiving a payload representing an invocation of a Web service operation of the generated Web service, processing the payload, and, based on the processing, causing the existing software application to execute an operation in response to the invocation of the Web service operation.
Selective construction of data search result per search request specifying path information
A system and associated method for selectively constructing a search result for a data requested by a search request specifying path information of a data node comprising the data. A template tree represents a hierarchy of the search result with expandable nodes which initially do not have actual data. A node of the template tree is dynamically expanded by a callback function to have a respective data for the node when the node is traversed for the first time during traversing the template tree according to the path information. The search result is created by expanding all nodes of the template tree that are specified in the path information. The data node in the search result is communicated to an entity that had originated the search request.
Efficient label acquisition for query rewriting
Systems, methods, and computer storage media having computer-executable instructions embodied thereon for rewriting queries and labeling word pairs. Queries are received and alternate words are identified for word pairs (i.e., query words and alternate words). Word pair links are presented to users and indicators are received based on actions taken by the users. Labels are assigned to the word pairs based on the indicators and communicated to a classifier.
Method and system for processing a uniform resource locator
The present disclosure provides a computer-implemented method of processing a Uniform Resource Locator (URL). The method includes generating a plurality of lattice nodes based on a URL, wherein each of the plurality of lattice nodes includes a host component corresponding to a portion of the URL and a path component corresponding to a portion of the URL. The method also includes identifying one of the plurality of lattice nodes as a search node. The method also includes searching a pattern table database using the search node to find a matching pattern table entry, the pattern table database comprising a plurality of pattern table entries corresponding to known lattice nodes associated with previously encountered URLs. The method also includes processing the URL based on whether the matching pattern table entry was found in the pattern table database.
Recommendation of search keywords based on indication of user intention
Search keyword recommendation includes: receiving a set of search keywords input by a user; determining whether the set of search keywords indicate a clearly defined intention by the user, including comparing the set of search keywords with a plurality of predetermined words corresponding to intentions that are not clearly defined; in the event that the set of search keywords are determined not to indicate a clearly defined intention, executing a first recommendation method to obtain recommended search keywords; wherein: the first recommendation method is selected among a plurality of recommendation methods; and the first recommendation method includes a knowledge-based recommendation method, a session correlation-based method, or a combination.
System and method for optimized filtered data feeds to capture data and send to multiple destinations
There is provided a system and method for optimized filtered data feeds to capture data and send to multiple destinations. There is provided a system comprising a memory and a processor. The memory has a database associating data feed patterns to one or more of a plurality of destinations. The processor captures data from a data feed having a data feed destination, stores the data in the memory, compares the data feed with the data feed patterns in the database to determine matched patterns, retrieves one or more destinations associated with the matched patterns, and sends the data to the data feed destination and the retrieved destinations. There is also provided a system comprising data feed sources, destinations, a network connected to the data feed sources and the destinations, and a server configured to intercept and route network traffic on the network, the server including a memory and a processor.
Providing social-network information to third-party systems
Particular embodiments receive, at a first computing device associated with a social-networking system and from a second computing device associated with a third-party system, a query comprising a first identifier corresponding to a user of the third-party system, wherein the first identifier is computed by applying a hash algorithm to a user credential associated with the user of the third-party system; determine, by the first computing device, whether the user of the third-party system matches any member of the social-networking system; and if the second identifier corresponding to a member of the social-networking system matches the first identifier, then send, by the first computing device to the second computing device, social-network information of the member of the social-networking system in response to the query.
Establishing an interactive environment for rendered documents
A system for identifying an electronic counterpart for a rendered document is described. The system receives an indication of a text capture operation performed from a rendered document. The indication identifies a text sequence captured as part of the text capture operation, the identified text sequence comprising fewer than nine words. In response to receiving the indication, the system uniquely identifies an electronic document from which the rendered document was rendered.
Bookmarking segments of content
A request from a user to bookmark a segment of content is received at a computing device. The segment of content is identified automatically and/or manually by the user. An expression of the user regarding a particular attribute of the segment of content is obtained, and a bookmark is generated. The bookmark includes both an identification of the segment of content and metadata that includes the expression of the user.
Schema contracts for data integration
A system and method for extracting data from an input source, transforming the data, and loading the transformed data to an output destination. A schema contract including constraints is used to validate a set of input data column types and translate them into a set of actual types. Mapping data in the schema contract enable mapping input data columns to data columns used by data integration components. The constraints and mapping data provide flexibility in transforming sets of data having different sets of input data column types, while providing a fixed set of types for use during dataflow executions. Flexibility may enable optional columns, sets of one or more columns, varying arrangements of columns, and variations in type definitions of each column.
Eigenvalue ranking of social offerings using social network information
Systems and methods in which a ranking engine, for example such an engine as is communicatively coupled to a search engine or social networking system, or is part of such a system, ranks social offerings for eventual display to a user, said social offerings being ranked according to eigenvalues of matrices associated with a social graph G of the user and the user's friends and other connections. In some instances, the social offerings may be divided into categories and ranks for the social offerings computed for each of the categories based on activities and communications of the user with friends and other connections for each category. The eigenvalues are used for ranking the social offerings based on actions of the user's friends and other connections with respect to the social offerings.
Method and system for scoring domain names
Methods and systems for scoring domain names are provided. A domain name may be scored based on a set of criteria, and a sub-score assigned to each criteria. The sub-scores may be used to generate a domain name score and identify ways of increasing the score of the domain name. A domain name score may provide an indication of the value or usefulness of the domain name.
Method for enhancing search and browsing in collaborative tagging systems through learned tag hierarchies
A number of Web 2.0 sites support collaborative tagging systems, which allow users to tag resources with keywords. The tags enable search and retrieval of resources both for the user and for other users, using interfaces like a conventional search form or a tag cloud. A tag hierarchy-based search and retrieval system is provided that enhances the existing interfaces by improving search recall and allowing the discovery of even poorly annotated resources. The system uses tag co-occurrence information to automatically learn tag hierarchies. The learned hierarchies are used for automatically inferring additional tags to resources. These inferences are used to improve the recall of queries issued from a search form or via a tag cloud. The learned hierarchies can be viewed as an emergent ontology that is built up through the collaborative wisdom of a large number of users.
Method for automated scaling of a massive parallel processing (MPP) database
A massively parallel processing (MPP) database can be re-partitioned/re-balanced while remaining on-line through a staged migration procedure. Staged migration may include a first stage and a second stage. During the first stage, entries in an existing partition are reallocated to the new partition, and the catalog is updated to associate the re-allocated entries with both the existing partition and the new partition such that queries for the re-allocated entries are directed toward the existing partition and the new partition. During the second stage, the re-allocated entries are migrated from the existing partition to the new partition, and after the migration is complete, the catalog is re-updated to associate the migrated entries with the new partition such that new queries are directed toward the new partition.
Information storage medium having recorded thereon AV data including meta data with representative title information, apparatus for reproducing AV data from the information storage medium, and method of searching for the meta data
An information storage medium having recorded thereon audio/video (AV) data including meta data with representative title information, and a method and apparatus for reproducing the AV data from the information storage medium, wherein the information storage medium having recorded thereon AV data including meta data includes storage medium information about the AV data recorded on the information storage medium and title information about at least one title constituting the AV data. The title information includes representative title information that designates at least one of the titles as a representative title.
Displaying social content in search results
Systems for displaying social content in search results may include receiving an input query for a subject; determining that the input query is a navigational query; identifying a first page on a social network for the subject; obtaining content from the first page; obtaining search results corresponding to the input query; identifying a second page for the subject from among the search results, where the second page is represented in the search results by a snippet of content associated with the second page; combining the content from the first page with the snippet to thereby produce combined content; and outputting data corresponding to the combined content.
Information retrieval based on semantic patterns of queries
An information retrieval method includes pre-processing a set of historical query information and processing a user query. Pre-processing a set of historical query information includes determining a plurality of semantic patterns based on a plurality of queries in the set of historical query information; establishing correspondence relationships between the plurality of semantic patterns and a plurality of filtering and ranking operations. Processing a user query comprises receiving the user query; retrieve a plurality of results in response to the user query; determining a semantic pattern that corresponds to the user query; determining a set of filtering and ranking operations that corresponds to the semantic pattern based on the correspondence relationships; and performing the set of filtering and ranking operations on the plurality of results to generate a set of filtered and ranked results.
Determining query terms of little significance
A system determines whether a term of a search query is a term with little significance based on a context of the search query. The system performs a search based on the search query while considering the term with little significance as optional when the search query includes the term with little significance and presents a list of search results based on the search.
Semantically associated text index and the population and use thereof
The construction of a semantically associated computer search database is disclosed. A text catalog containing the text particulars and contents of a plurality of electronic documents, a term association database which joins text search terms with their semantic meanings or definitions, and a content association database which contains records associating text search terms and their contextual definitions in respect of individual electronic documents are used to in conjunction provide a text index in which it is possible to search based upon the actual definitions or meanings of certain text or terms within the electronic documents, reducing or refining query search result sets. A method of operating a search engine with the index in question, as well as other e-commerce methods employing the index as a refining tool are also disclosed.
Configurable web crawler
A configurable web crawler allows a user configure a web crawl by specifying one or more of thread throttling rules, domain restriction rules, and crawling rules. The configurable web crawler crawls the web beginning with a seed uniform resource locator and according to the crawl configuration.
Method and apparatus for quality ranking of media
In accordance with an example embodiment of the present invention, an apparatus comprises a processor configured to determine at least one quality parameter for a media, assign a value to each quality parameter of the media, calculate a quality score for the media based at least in part on the value for each quality parameter, receive a search request, and transmit search results based at least in part on the quality score of the media.
Searching based on audio and/or visual features of documents
One or more computer devices may generate a keyword based on a visual feature or an audible feature of a document. The visual feature may include a color of a background of the document, a color of text in the document, a size of the text in the document, or a feature relating to a video in the document. The audible feature may relate to sound or music that is associated with the document. The one or more computer devices may further associate, in an index, the keyword with information identifying the document, receive a search query from a client, the search query including a term related to the keyword, identify documents based on the search query and using the index, the identified documents including the document, and provide a search results document to the client. The search results document may identify one or more of the identified documents.
Button-activated contextual search
This patent application relates to button-activated contextual search techniques for providing contextually relevant search functionality on a display. The single button can be a search button on a pointing device (e.g., a computer mouse device, touch pad, track ball device, etc.) configured to move a pointer on the display. The pointer can be moved to a location that is on or near an entity on the display, allowing a search to be enabled and/or performed for that entity when the search button is activated (e.g., with a single user click). Furthermore, the search functionality can be based on one or more automatically generated search terms for the entity, and thus be contextually relevant to the entity.
Method and apparatus for collecting and providing information of interest to user regarding multimedia content
A method of collecting information of interest to a user regarding multimedia content is described. The method may include receiving first content about the information of interest to the user among the multimedia content, collecting metadata of the first content by using a uniform resource identifier (URI) of the first content, extracting at least one first information object including a schema according to a search category from the metadata, and storing the first information object in a first database.
Enhanced search with user suggested search information
A method and system are disclosed for allowing a user to suggest information about content that can be utilized in processing subsequent searches. The suggested information may be different from a fixed set of information about an item, such as keywords, attributes, or characteristics of an item, generally provided by a manufacturer or seller of the item. Users can submit to a service the information that they feel is relevant to the item, such as a brief explanation of relevance and a detailed explanation that would help other users to make a decision about the item. The submitted information may be associated with the item information and stored in a data store and utilized as additional attributes of the item for a search. In addition, when a user requests detail information about an item, the user-submitted information may be displayed to the user.
Method and system for rendering a collection of media items
The systems and methods disclosed herein relate to the identification, rendering, and publishing of collections of media items in an interactive computing environment.
Automated, tiered data retention
The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period.
Distributed scalable policy based content management
A method for defining and constraining the behavior of a shared, mobile content management system is disclosed. The method includes providing an admin console for defining, modifying, and managing declarative policies. Declarative policies are defined based on an XML policy model. The XML policy model dictates the policies that can be expressed by the admin console. The defined declarative policies are enacted without requiring the content management system to be restarted, reconfigured, or re-implemented. An XML-based policy wizard definition language is provided to define policy wizards in the admin console that guide an administrator through the steps of creating and editing the policies. Additionally, at least one policy repository based on LDAP is provided. The at least one policy repository has an interface and is adapted to store a plurality of declarative policies. The policy repository has scalable and distributed capabilities.
Dynamic partial uncompression of a database table
A database dynamic partial uncompression mechanism determines when to dynamically uncompress one or more compressed portions of a database table that also includes uncompressed portions. A query may include an express term that specifies whether or not to skip compressed portions. In addition, a query may include associated information that specifies whether or not to skip compressed portions, and one or more thresholds that may be used to determine if the system is too busy to perform uncompression. A display mechanism may also determine whether or not to display compressed portions. The uncompression may occur at the database server or at a client. The database dynamic partial uncompression mechanism thus performs dynamic uncompression in a way that preferably uncompresses one or more compressed portions of a partially compressed database table only when the compressed portions satisfy a query and/or need to be displayed.
Method, apparatus and computer program product for performing a query using a decision diagram
A method, apparatus and computer program product are provided for performing a query using a decision diagram. In this regard, in response to receiving a query instruction a compression value for a query result decision diagram can be determined. A compression value for a compressed query result set may also be determined. A compression ratio can be determined between the compression value for the query result decision diagram and the compression value for a compressed query result set. A query result decision diagram may be generated based on the query instruction and a relationship between the compression ratio and a threshold ratio. The query result decision diagram may also be transmitted based upon a relationship between the compression ratio and a threshold ratio.
Detecting duplicated content among digital items
When a digital item is submitted for publication, an automated system may determine whether the digital item includes content from other digital items. In some implementations, when the digital item is an electronic book (eBook), the automated system may select sets of words from the eBook and compute hash codes, such that each hash code corresponds to a set of words. The automated system may compare the computed hash codes with retained hash codes associated with other electronic books to determine whether the digital item includes duplicate content.
Data de-duplication system
A data de-duplication system is provided that supports the loading and integration of data from multiple data sources. The data de-duplication system identifies and merges duplicate dimension data records that describe the same entity by creating a single dimension data record that is identified as a single best record (“SBR”). The data de-duplication system further adjusts foreign keys that reference the duplicate dimension data records so that the foreign keys correctly reference the merged dimension data record (i.e., the SBR).
Host based software block level replication using metadata indicating changed data objects at source and secondary nodes
A host-based replication snapshot method. The method includes synchronizing a set of data objects stored at both a replication source node and a secondary node. The method further includes identifying changed data objects out of the set of data objects from the replication source node that have been modified during a time period between a first time and a subsequent second time. Metadata indicating the changed data objects from the replication source node is transmitted to the secondary node. A snapshot is then generated at the second time on the secondary node by using the metadata.
Business channel synchronization
A method and a system of business channel synchronization are provided. In one example embodiment, a network-based commerce system may receive, via a network and from a client application, update data related to a user listing, update a record related to the user listing, utilizing the received update data; and communicate, via the network, the received update data reflecting a further update to the record related to the user listing to the client application. In one example embodiment, a client system may comprise a communication module, a listing manager, a synchronization engine, an upload module, and a user interface module. In one example embodiment, a user may synchronize the user's listing data from a client application to one or more network-based commerce systems. In an alternative example embodiment the user may synchronize the user's listing data from one or more network-based commerce systems to a client application.
Combining capture and apply in a distributed information sharing system
In accordance with an embodiment of the present invention, an information sharing mechanism comprising a memory structure may be provided in a database system. In an embodiment, mined information transferred by a capture process to an associated apply process can be written into the memory structure without taking any latch. Similarly, the mined information can be read by the apply process from the memory structure without taking any latch. The capture and apply processes may work cooperatively to establish a safe point in log mining under various circumstances such as in an initial startup state, in a steady state, in a process restart scenario in the middle of information sharing. In some embodiments, the information sharing mechanism supports both checkpoint-free and checkpoint modes of log mining by the capture process. In addition, both the capture process and the apply process may employ an eager apply approach to increase processing capacity.
Method and system for evaluating, reporting, and improving on-line promotion effectiveness
A system and method for populating and analyzing a member consumer profile database for implementing an incentive driven targeted product marketing program is disclosed. To implement the targeted product marketing program, personal profile information is collected from several member consumers and stored in a profile database. A group of the member consumers are identified and selected, and the promotion operator provides a promotion to this group on behalf of a sponsor. During and/or after the promotion, information is solicited from the member consumer about the promotion in exchange for rewards. In addition, interactive behavior information of the member consumer is tracked. The solicited information and the interactive behavior information can then be used to enrich the profile database for future promotions.
Predicting states of subjects
Methods for predicting states of a subject are presented. For example, a method for predicting states of a subject includes obtaining training data comprising a plurality of variables, obtaining training states associated with the training data, and forming a predictive model according to the training data and the training states, the predictive model predictive of the training states. The forming of the predictive model includes extracting one or more hidden components from the training data. The extracting of the one or more hidden components includes regression analysis including determining one or more relationships between the one or more hidden components and the plurality of variables, and determining one or more relationships between the one or more hidden components and the training states. A number of the one or more hidden components is less than a number of the plurality of variables and greater than a number of the training states.
Method and system for tracking objects
An object tracking system and method operable to minimize processing time for tracking objects is provided. The system includes a pair of filters operable to make associations between dynamic objects newly detected and previously detected. One of the pair of filters makes an association when the predicted location of the previously detected objects is within a predetermined distance of the newly detected object. The other of the pair of filters makes an association based upon the probability that a newly detected dynamic object is a previously detected dynamic object. The remaining unassociated dynamic objects are then localized so as to form discrete matrices for optimization filters.
Universal, online learning in multi-modal perception-action semilattices
In one embodiment, the present invention provides a method for interconnecting neurons in a neural network. At least one node among a first set of nodes is interconnected to at least one node among a second set of nodes, and nodes of the first and second set are arranged in a lattice. At least one node of the first set represents a sensory-motor modality of the neural network. At least one node of the second set is a union of at least two nodes of the first set. Each node in the lattice has an acyclic digraph comprising multiple vertices and directed edges. Each vertex represents a neuron population. Each directed edge comprises multiple synaptic connections. Vertices in different acyclic digraphs are interconnected using an acyclic bottom-up digraph. The bottom-up digraph has a corresponding acyclic top-down digraph. Vertices in the bottom-up digraph are interconnected to vertices in the top-down digraph.
Method for unsupervised clustering of multimedia data using a large-scale matching system
A method and apparatus for unsupervised clustering of a large-scale collection of multimedia data elements. The method comprises generating a first cluster from the large-scale collection by: matching each of the multimedia data elements to all other multimedia data elements in the large-scale collection, determining a clustering score for each match being performed, clustering multimedia data elements having a clustering score above a threshold to create the first cluster; and storing the first cluster in a storage unit.
Graph-based malware classification based on file relationships
A reliable automated malware classification approach with substantially low false positive rates is provided. Graph-based local and/or global file relationships are used to improve malware classification along with a feature selection algorithm. File relationships such as containing, creating, copying, downloading, modifying, etc. are used to assign malware probabilities and simultaneously reduce the false positive and false negative rates on executable files.
Multiple hypothesis tracking
Embodiments described herein are directed to multiple hypothesis systems and methods for tracking observations that are domain agnostic and involves determining the probability that a given set of observations (i.e., a track) corresponds to a particular target, object or linked set of events. One embodiment described herein relates to cyber security tracking methods and systems.
Method for tagging of a content and a corresponding system
A method generates tag proposals for tagging of a content, wherein the generating of said tag proposals is performed by combining at least two tag proposing procedures in dependence of a work context of a user. The method can be applied with regard to each area where tagging of contents is desired. By use of the method an effective, computing resource saving, and/or flexible tagging is enabled, by which a sufficient number of tags with high quality can be identified.
Choice modelling system and method
Systems and methods for choice experiments to model user behavior are disclosed. Choice experiment surveys require respondents to choose by performing trade-offs between combinations of features included in alternatives under consideration. Users specify constraints and an attribute space of features to investigate, and generate candidate experimental designs based on the constraints and attributes. Users select an optimum design tailored to the problem to be solved, instead of having to modify their problem to match a known experimental design. An online survey assembly module generates survey templates used by a data collection and sampling unit to display treatments to survey respondents. A model generation module analysis the collected data, and a model explorer module enables exploration of results. The system has the advantage of making choice modelling accessible to a wider range of users, and enables considerable freedom and scope to investigate problems of specific interest.
Devices, systems and methods for wirelessly routing a vehicle
The present invention automates the process of receiving transportation documentation and producing advance loading manifests therefrom to optimize load planning and dynamic product shipment and delivery control. Methods provide for receipt of the transportation documentation, initial preparation, and transmission of the documentation from on board a vehicle or while the vehicle is in transit.
Secure online banking transaction apparatus and method
A secure online banking transaction apparatus to communicate with a server over a non-secure connection is provided and includes a selector configured to allow for a selection of a mode of the apparatus, a processing unit coupled to the selector and including a secure communication unit, which is configured to set up a secure connection, along which a secure transaction occurs, with the server via the non-secure connection in accordance with the mode, an input unit coupled to the processing unit and configured to allow for a input of data into the apparatus, which is at least partly related to the secure transaction, and an interface coupled to the processing unit and configured to convey at least a status of the secure transaction and the contents off the inputted data.
Method for recommendation of audio
A method for recommendation of a content item, comprising: providing first identifiers for first content items stored on a first device; providing second identifiers for second content items stored on a second device; determining measures for at least a part of said first content items, wherein each measure is associated with a respective content item, and said measure depends on said first and second identifiers; determining or updating, on a third device, an item-to-item matrix based on said measures, wherein said first, second, and third devices are physically separated devices; determining a recommendation for a user based on said item-to-item matrix.
System and method for financial instrument pre-qualification and offering
A computer implemented method for offering financial instruments to pre-qualified consumers is disclosed. The method may include retrieving information for a consumer from a third party; pre-qualifying the consumer for financial instruments offered by a plurality of financial institutions based on the received consumer information; storing, in a database, the consumer information and pre-qualification information indexed using a unique identifier that is assigned to the consumer; receiving, from a business, consumer identification information including a received unique consumer identifier that is collected from the consumer following contact by the consumer with the business; retrieving, from the database, consumer information and pre-qualification information for the consumer using the received unique identifier; checking a suppression database to see if the consumer should not be offered the financial instrument that the consumer is pre-qualified; and offering the financial instrument for which the consumer is pre-qualified to the consumer.
Systems and methods for facilitating financial transactions over a network
Systems and methods for facilitating financial transactions over a network include a merchant device, a client device and a payment processing device. The merchant device is adapted to allow a merchant to provide items for purchase via the network. The client device is adapted to allow a user to access the merchant device via the network and view the items for purchase. The client device is adapted to provide a payment mechanism to the user. The user generates a purchase request for an item by selecting the one item, dragging the item to the payment mechanism, and dropping the item over the payment mechanism. The payment processing device is adapted to receive the purchase request from the client device via the network and authorize the user to purchase the item from the merchant based on information passed with the purchase request.
Business combined bill management system and method
An integrated bill management system and an associated method for use therewith are disclosed which can manage the delivery of, and handle the payments associated with, both outgoing invoices from businesses to their customers and incoming bills from vendors to the businesses. Invoices are presented to customers and payment by the customers is facilitated, and bills from the vendors are obtained and presented electronically to the businesses and paid electronically for the businesses. Invoices may be presented to the customers either electronically or in paper form, and electronic and paper payments from the customers may be processed by the system. Vendors may provide either electronic or paper bills, and payment to vendors may be processed electronically or in paper form.
System and method for improved order entry using market depth
Market depth information pertaining to the hedging side is utilized to intelligently break a non-hedging order into multiple orders, such that the orders rest at cascading price levels. This way, the trader can benefit from sweeps in the book and still properly account for the market depth on the hedging side. Further, there is a greater probability of receiving “partials” on the spread order. In addition, hedge orders may be sent at multiple price levels, or sent to the market in pieces over time. By applying a more intelligent process to hedge orders (as opposed to “fire and forget”) an alternative beyond limit orders that can be legged or market orders is provided.
Framework for implementing trade preference agreements
A preference management framework allows for the management of vendor-based vendor declarations and of vendor declarations for customer's purposes, preference determination based on preference agreements, the provision of statements regarding the preference eligibility of goods based on preference determinations, and the printing of several preference related documents according to the relevant agreements. The framework is flexible enough for users to easily develop their own preference schemes for new preference agreements. Users may first define (or modify) their responsible areas for preference management by assigning (or removing) administrative units of a business to themselves. Then the users may begin the preference processing by choosing one of their assigned administrative units and any preference agreements relevant to that administrative unit may be automatically determined for possible following steps in preference processes which can now be started.
A method is described that includes accessing bids for ranked goods and minimum rank indicators that each specifies a lowest rank for a good that is acceptable to a bidder, assigning a ranked good to a first bidder based on a first bid and a first minimum rank indicator each associated with the first bidder, and outputting a signal indicative of a cost of the assigned rank good based on a second bid associated with a next highest bidder having a second minimum rank indicator that specifies a rank that is inclusive of a rank of the ranked good assigned to the first bidder.
Routing control for orders eligible for multiple markets
Trading processes are operative to route orders from order rooms to market processes, which process the orders according to respective market methodologies. The order routing strategy can be embodied in a decision table having rules with conditions and actions to be taken when the conditions are true. Accordingly, order rooms can readily configure and reconfigure trading processes.
Method and system for providing option spread indicative quotes
A computer network and method for electronically trading combinations of derivatives. One preferred method of trading includes providing quotes information to a central server, and determining indicative quotes for combination trades, and providing the non-binding, indicative quotes to market participants (which typically includes subscribers, but may also include market makers). A participant may then submit an e-RFQ, which is a request for a binding quote for the combination of derivatives. Market Makers may then elect to submit a binding quote for the corresponding derivative combination. Market participants may then elect to enter a binding order.
Financial instrument and related business method
A business method. A dividend is calculated from: (i) a penalty assessed against a holder, of at least one share of a financial instrument, who sells the at least one share on a date of sale preceding an extinguish date associated with the financial instrument; and/or (ii) a premium lost by other purchasers of the financial instrument who sell, on dates of sale preceding an extinguish date associated with the financial instrument, shares of the financial instrument purchased by the other purchasers, wherein a premium consisting of an upfront fee against a purchaser of one or more shares of the financial instrument is assessed against the purchaser which entitles the purchaser to a future portion of the premium lost. The dividend is distributed, on a date subsequent to the date of sale, to all Holders of Record of the financial instrument on the date of sale.
Method for creating and pricing options
A preferred embodiment of the subject invention is directed to creation and pricing of an option related to a target zone in a time-price plot. If the price curve against time enters this zone (in a preferred embodiment, a “box”), a fixed amount of money is paid to the owner of the option; if the curve misses the box, there is no payout to the option owner, who also forfeits the premium paid for the option. Software is described that enables an option buyer to easily create and set the parameters of such an option, that computes a premium for the option, and that manages payout and other functions related to the option. The above-described embodiment is a buy-to-hit option. Other embodiments are directed to sell-to-hit, buy-to-miss, and sell-to-miss options.
System and method for preventing cross trading
Information regarding the current state in the market is used to prevent orders from crossing. In an example provided herein, when an order is entered into a market, information regarding current positions in the market is taken into account to determine whether the order will cross with other orders. If the orders would cross, appropriate action is taken to prevent the crossing of orders in a way suitable for the person or persons trading. The teachings described herein may be used for any reason to prevent orders from crossing. Moreover, they may be used in other areas of trading to assist the trader in obeying any other rule or regulation that might involve analyzing current positions in the market before taking action.
Method for electronic display and review of a document by a plurality of parties in a predetermined order and which allows for document branding and additional documents to be added to the document based on the then current recipient and sender from the predetermined order of recipients and senders
A software based process which includes marketing and additional documents created dynamically from templates specific to the audience reviewing and approving the policy package for further distribution, and in one non-limiting example eventually reaching the insured. In non-limiting examples, a typical distribution chain could include (1) an Insurance Provider (Carrier) to Wholesale Brokerage Agency or Broker to an Agent or Retail Agency to an Insured; (2) Insurance Provider (Carrier) to an Insured; or (3) Insurance Provider (Carrier) to a Direct Marketer to an Insured or any combination of the above.
System and method for rendering dynamic insurance quote interface
An insurance quotation management system for administering and managing insurance quotations through a graphical user interface. The system is configured to interface with third party data to provide insurance quotations based on input from a predictive model and data which may include social network information. The user interface permits the user to provide all inputs required to complete an application for insurance without the use of keyboard based input to provide a simplified user experience through a smart phone or other touch screen device.
System and method for usage billing of hosted applications
A system, method, and computer readable medium for usage billing of one or more hosted applications serving one or more clients. The hosted applications are contained within one or more isolated environments or run without isolated environments. The system may include usage billing based on one or more of resources open, amount of data flowing through resources, number of open files, number of transactions, number of concurrent users, number of processes, CPU utilization and memory usage, The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades. If using isolated environments, the isolated environments may be isolated from other applications and the host operating system on the clients and applications within the isolated environments may run without performing an application-installation on the client.
Managing consistent interfaces for business objects across heterogeneous systems
A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to an individual material bill of material and/or an order tracking view business object.
Interactive map for browsing items
Disclosed are various embodiments for generating interactive maps for browsing items in a catalog. A first map of items that includes graphical representations of each one of a first set of items is generated. A selected item is determined according to a selection of one of the graphical representations of the first set of items. A second set of items is determined based at least in part on similarity of the second set of items to the selected item. A second map of items that includes graphical representations of each one of the second set of items is generated. The graphical representations of each one of the second set of items are arranged in the second map of items relative to the graphical representation of the selected item based at least in part on a corresponding degree of similarity of the respective item to the selected item.
Passive shopping service optimization
A shopping system may receive, from a user, a request to add information about an item to a watch list associated with the user; may receive, from the user, a price associated with the item; and may receive, from the user, a schedule associated with the item. The shopping system may identify a vendor offer associated with the item and associated with a particular vendor, where the vendor offer includes a price that is less than or equal to the received price, the identifying being based on the schedule associated with the item; and may provide a notification to the user, where the notification includes information about the identified vendor offer.
Systems and methods for scoring documents
A system generates a score for a document based on best seller list information relating to the document, circulation information relating to the document, publisher sales information relating to a publisher associated with the document, author sales information relating to an author associated with the document, user behavior information relating to access of the document by users, and/or a link-based score of a web document relating to the document.
Trade-in photo documentation
Disclosed are various embodiments for an inspection system and method that automatically photographs or captures video footage of received items for trade-in as they are being inspected or graded.
Processing techniques for text capture from a rendered document
A facility for initiating a purchase is described. The facility receives a text sequence captured by a user from a rendered document using a handheld text capture device. The facility identifies in the received text sequence a reference to a distinguished product. In response to identifying the reference, the facility presents to the user an opportunity to place an order for the established product. If the user accepts the presented opportunity to order the distinct product, the facility orders the distinct product on behalf of the user.
Electronic payment application system and payment authorization method
The system contains a virtual POS terminal's unit in the user's personal device. The mobile communication device (1) contains a virtual POS terminal's unit (4) and also a removable memory card (3), on which there are at least two physically separate secure elements (2) stored. The removable memory card (3) is connected to the secure element (2) containing the secured part of the virtual POS terminal. The mobile communication device (1) and/or the separate portable element (6) is adjusted in such a way to be able to connect to a remote payment procession server. The removable memory card (3) and the separate portable element (6) can be equipped with the NFC communication element. Depending on the user choice, a corresponding secure element (2) with the selected payment card unit (14) is activated on the removable memory card (3). The user's payment card's identification data are supplemented by the payment receiver's identification data and also by a one-time password that was created in the one-time password unit.
Externality-based advertisement bid adjustment
Within a computer networking environment, bid requests having data are received at a communication interface of a bid determination platform. Bids for a plurality of advertisements are determined via a computer processor of the bid determination platform based on the data associated with such bid request. Via the computer processor, at least a first portion of the bids that were determined for one or more of the bid requests are decreased based on one or more quantitative and qualitative factors, such as missing variable data, of the one or more bid request's associated data. For each bid request, an optimum set of one or more of the determined bids is selected and transmitted, along with a reference to the associated advertisement, via the communication interface to a sender of the bid request.
Dynamic webpage generation including request-time auctioned web content
Embodiments include methods, apparatus, and systems associated with providing request-time auctioning of web content and web services. The auction may be performed by a request-time web content auctioning service, which may accept bids of content and/or services from content and/or service providers, and may auction these bids against offers of space on webpages in websites. The auction may, in various embodiments, be performed in real time, such as, for example, during generation of a webpage in response to a request to view a webpage from a visitor to the webpage. The auction service may, in various embodiments, also provide for the auctioning of web services for webpages, such as, for example, content filtering. Other embodiments may be described and claimed.
Advertising value tools
Methods, systems, and apparatus, including computer program products, that generate a display including one or more user-adjustable advertising mechanisms and receive a user selection of at least one of the one or more user-adjustable advertising mechanisms. Optionally, a user-adjustable tool can be displayed. The user-adjustable tool is configurable by the user to adjust the at least one user-adjustable advertising mechanism. A graphic is generated that represents at least one other user-adjustable advertising mechanism, where the graphic is generated based at least in part on the adjustment of the at least one user-adjustable advertising mechanism using the user-adjustable tool.
Ad integration and extensible themes for operating systems
The claimed subject matter relates to an architecture or extension to an operating system (or component thereof) that can facilitate extensible themes for or advertising integration with a desktop that is managed by the operating system. In particular, the architecture can acquire advertisement content such as ads or advertiser skins, select suitable content for display, and configure the operating system to display the selected content. The architecture also provides mechanisms for identifying suitable locations as well as appropriate time for displaying the content.
Identifying a same user of multiple communication devices based on user locations
A system for identifying a same user of multiple communication devices is configured to perform the steps of: (a) receiving first data relating to a first device operated by a user; (b) receiving second data relating to a second device operated by a user; (c) determining that the user of the first device is the user of the second device based on identifying that the first data is substantially the same as the second data; and (d) selecting and transmitting a sponsored content to the second device for display thereon, wherein the sponsored content has a relevance to the first and second data and/or a user characteristic datum associated with the user.
Computing system for monetizing calendar applications
A method is disclosed for advertisers to target specific calendar users with the advertisers' events. When uploading information for an advertisement to a service provider system, the advertiser provides targeting criteria along with advertisement content. The targeting criteria is compared against user data stored about the user within one or more databases in the service provider system to select targeted recipients that meet the targeting criteria. The advertised events are then downloaded for display along side a users' calendar interface, where users may quickly and easily add the event to their calendars.
Method and system for providing filtered and/or masked advertisements over the internet
Methods and systems that allow an Internet distribution partner of an advertisement listings provider to receive filtered and masked listings for display on the website of the Internet distribution partner. The Internet distribution partner defines filters to be applied to ranked advertising listings provided by an advertising listing provider. The advertisement listings provider system applies the filter to the listings in its database and identify matches and/or excludes matches depending on the characteristic specified. The advertisement listings provider may then send the Internet distribution partner advertisement listings based on the application of one or more filter selected by the distribution partner. Thus, the advertisement listings provider and the Internet distribution partner are able to generate additional revenue without risking the Internet distribution partner's valuable relationships with its exclusive advertisers and without jeopardizing the Internet advertising distribution partner's relationships with its end users.
Generating synthetic advertisements for an electronic environment
Techniques for injecting synthetic electronic advertisements into a production electronic advertisement system to test the effectiveness of new categories of electronic advertisement are provided. Synthetic advertisement content may be provided to real users of the production system in order to determine the effectiveness of new electronic advertisements and/or new categories of electronic advertisements. The synthetic advertisements content appears to users to be regular production advertisement that may include navigational element such as a hypertext link and associated text and/or graphics to be displayed in the electronic interface. Statistics regarding the effectiveness of the new electronic advertisements and/or new categories are gathered and may be used to determine which new electronic advertisements and/or new categories of electronic advertisements are effective enough to include in the production system. Various techniques for generating new electronic advertisements and/or new categories of electronic advertisements are provided.
Mobile click fraud prevention
A system is disclosed for detecting and handling click fraud in a mobile environment. The system may identify a source of a request. The request may be handled differently based on whether the source of the request originated from mobile traffic or web traffic. The source of the request may be used to determine whether a request is valid or invalid. The request may be flagged if the request is invalid.
Method and system for providing rewards to a portable computing device at the point of sale
A method of providing rewards to a user by storing, in a portable computing device, user profile data which may be accessed by a merchant terminal. A merchant terminal interacts with the portable computing device by accessing the user profile data from the portable computing device, and providing the user with a reward in accordance with the user profile data accessed by the merchant terminal, wherein the merchant terminal provides a relatively greater reward to the user when relatively more user profile data is accessed by the merchant terminal and a relatively lesser reward to the user when relatively less data is accessed by the merchant terminal.
System for improving shape-based targeting by using interest level data
A system for improving shape-based targeting by using interest level data is disclosed. According to one embodiment, a computer-implemented method includes creating one or more trade zones, wherein creating a trade zone includes grouping a set of parameters to deliver custom shapes, clustering the custom shapes according to offline data and geographic distribution of IP addresses, and mapping clusters of the custom shapes to IP addresses. Data indicating consumption of a content source is received by one or more trade zones at a calculated rate and the calculated rate is analyzed to determine an interest associated with each trade zone. Targeting is based on a selected trade zone, wherein the selected trade zone is selected based upon a desired interest representative of a desired audience. A targeting request is transmitted including instructions or information associated with a target action, and the target action is performed.
System and method for assessment and consolidation of contractor data
Solutions are provided for assessing and consolidating contractor data in an organization from a plurality of data sources. Contractor data from a plurality of data sources is collected, wherein the data sources comprise existing information systems, surveys and interviews. The collected contractor data is segmented using a decision matrix, wherein the decision matrix comprises a plurality of predefined functional units and a plurality of vendors, roles and experience bands. The segmented contractor data is evaluated for its impact on ongoing business activities in the organization, wherein the evaluation of the segmented contractor data comprises performing at least contractor assessment and application assessment. Further, the evaluated contractor data is consolidated to form at least one logical cluster within a plurality of predefined categories, wherein the predefined categories comprise functional unit, application platform, and technology platform and service type and presented to a user.
Dynamic marketing system and method
Provided herein are systems and methods for providing access to marketing data via a reduced-complexity marketer GUI for dynamically defining market segments for use in marketing campaigns.
Network-based methods and systems for initiating a research panel of persons operating under a group agreement
Methods and systems for initiating participation of a user of a portable device (PUA) in a research operation using a respective one of a plurality of PUA's providing communication services pursuant to a single agreement with a communication service provider. Data identifying the PUA user is associated with data identifying a group of persons receiving communication services pursuant to the single agreement, and demographic data of the PUA user is associated with the data identifying the PUA user.
Secure consumer data exchange method, apparatus, and system therfor
A method, system, and apparatus for consumer authorized collection and communication of consumer data, while facilitating compliance with government consumer privacy legislation and regulations, is provided. Authorization is obtained from a user of a network connected appliance to collect and communicate to other entities consumer data resulting from the user's use of the appliance. The data is encrypted, linked with an appliance user anonymous identifier and communicated to a first entity, where it is analyzed by the use of defined parameters. Based on this analysis, the anonymous identifier of the appliance user is aggregated with anonymous identifiers linked with the consumer data of other appliance users whose consumer data has at least one parameter in common with the consumer data of the appliance user. The aggregate set of anonymous identifiers is provisioned to a second entity by the first entity. Subsequent interaction with the first entity provides the second entity with access to the appliance user of the appliance without revealing the identity of the appliance user or providing access to the appliance user's consumer's data.
Method and system for deterministic sampling with a specific distribution
A method and system for selection of a task in proportion to a desired distribution. Specifically, in one embodiment, the present invention discloses a method and system for selecting a task associated with a visiting customer to a web site over a communication network. The customer is assigned to a segment of a target customer base that most closely resembles the customer's characteristics. A plurality of tasks is associated with the segment and can be expressed as a distribution of tasks performed. A current distribution of tasks is determined. The task which provides a new distribution that is closest to a desired distribution of the plurality of tasks is selected to be performed. In one embodiment, the task to be performed is the offering of an advertising promotion to the customer over the communication network.
Techniques for visual integration of meeting space in calendar systems
Techniques for visual integration of meeting spaces within a calendar system are presented. A meeting room can be viewed via a map and selected for scheduling a meeting. The map depicts the location of the meeting room within a facility of an enterprise. A meeting scheduler visually sees the meeting room within the map and can select the meeting room and acquire details about the meeting room.
System and method for computerized resource optimization for insurance related tasks
Disclosed herein are computer-implemented methods, computing systems, and related technologies that may be used for determining the optimal number of Full Time Equivalents (FTEs) that should be engaged by a service provider in order to provide a service to an insurance company. Multiple service level agreements (SLAs) exists between the service provider and the insurance company, each of which indicates that the service provider must complete a given percentage of assigned tasks for the service within a given time period. A resource optimization application (ROA) determines how many FTEs the service provider should employ, in order to complete assigned tasks as required by the SLAs. The ROA determines the number of FTEs based on factors such as an average handling time (AHT) for the tasks, the capacity of the service provider, historical data that describes tasks previously assigned to the service provider, and other factors.
System and method for customizing product lifecycle management process to improve product effectiveness
A method for improving product effectiveness of a New Product Development (NPD) process by customizing a Product Lifecycle Management (PLM) of an organization is provided. The method comprises diagnosing current status of the organization with respect to one or more product effectiveness parameters. The method further comprises generating a set of initiatives for the organization based on diagnosis. The method furthermore comprises customizing the PLM using one or more solution accelerators corresponding to one or more initiatives.
Dynamic taxi-sharing system and sharing method thereof
A dynamic taxi-sharing system and a sharing method thereof. A ride-sharing service provider carries at least one passenger from the first current location to the first travel destination through a route in an area and sends registration information to a service server. A plurality of ride-sharing requests is sent to the service server, and each of the ride-sharing requests comprises the second current location and the second travel destination. The service server divides the area into n by n blocks. A ride-matching module of the service server chooses a destination area in which the first travel destination is a center point and divides the destination area into k by k blocks. According to the registration information and the ride-sharing requests, the ride-matching module matches at least one ride-sharing traveler to the ride-sharing service provider to achieve a goal of fuel-saving and pollution-reducing.
Systems and methods for analyzing vehicle operation data to facilitate insurance policy processing
Methods and systems for leveraging a plurality of sensor devices distributed in a geographical area to monitor vehicle usage for assessing, pricing, and provisioning distance-based vehicle insurance. One or more sensor devices may capture information associated with a vehicle and communicate the information to an insurance provider. In aspects, the insurance provider may analyze the information to determine a distance that the vehicle travels within a particular time period. Further, the insurance provider may determine a vehicle usage unit based on the distance traveled as well as provide various insurance coverage types to a customer associated with the vehicle. Based on a selected coverage type, the insurance provider may generate an insurance quote for a policy having an amount of the vehicle usage units and may facilitate a purchase transaction with the customer for the insurance policy.
System and method for determining an insurance premium based on complexity of a vehicle trip
Systems and methods are disclosed herein for pricing an insurance premium based on route complexity. The system includes a computer memory and a processor in communication with the computer memory. The computer memory stores telematics data received from a sensor within a vehicle. The telematics data includes at least one of geo-position information of the vehicle and vehicle kinematics data. The processor is configured to compute a complexity score of the trip based on the telematics data. The processor is also configured to determine a price for automobile insurance for the driver based on the complexity score of the at least one trip.
Systems and methods for purchasing insurance
Systems and methods related to an online website wherein businesses seeking insurance can obtain quotations and be connected to a plurality of insurance providers are described herein. In some embodiments, the businesses are authenticated and verified by providing such details as, e.g., employer identification number (EIN) or tax identification number (TIN), and being registered with the system prior to requesting quotations. In some embodiments, the system has an online collaboration system where a business can ask or post questions and receive answers from insurance providers or agents who match their search criteria.
System for funding third-party-administered losses
A computerized system for funding third-party-administered insurance claims includes at least one processor configured to provide a claim data throughput module for receiving at least one claim transaction from at least one third party administrator, an administrative services module for receiving at least one bank transaction from at least one third party administration, for passing at least one bank transaction to a bank, and for receiving at least one paid file from a bank, and a transactions matching engine for validating at least one bank transaction based upon at least one claim transaction, and for determining completion of at least one bank transaction based upon at least one paid file.
Pharmaceutical systems and methods
A system for determining a second drug and a third drug that may collectively be taken by a patient in lieu of a first drug prescribed to the patient by a physician comprises a processor in data communication with a non-transitory memory, an input device, an output device, and a networking device. The system also comprises a patients' database for storing a profile of the patient, and a drug pricing database for storing the first price, the second price, and the third price for the first, the second, and the third drugs, respectively. The first price is greater than a sum of the second and the third price. The system further comprises a drug segregation database for outlining that the first drug is segregable into the second drug and the third drug.
Wellcare management methods and systems
Methods and systems related to wellcare management are disclosed. The methods comprise enrolling wellcare providers and consumers, offering wellcare plans, and providing automated payment processing and collection in connection with the wellcare plans. The methods also allow the wellcare management systems to interface with the wellcare provider's practice management software administered by a third party. Preferably, the wellcare plan providers are veterinarians, particularly independent veterinarians. Systems employing the methods over one or more computer networks are also disclosed, as are articles comprising computer readable media.
System and method for comparing and utilizing activity information and configuration information from multiple medical device management systems
A method of aggregating and using medical device data from a plurality of remote institutions. The system and method electronically receives at a central computer system a plurality of established medical device data, each of the plurality of established medical device data being received from a respective medication delivery system, each of the respective medication delivery systems having a respective plurality of medical devices within the respective remote institution, such as medication delivery pumps, associated therewith and utilized therein. The system and method electronically combines and stores the plurality of established medical device data from each of the plurality of remote institutions within a memory, and electronically provides a remote client computer access to at least one of a central reporting application adapted for providing summary information to the remote client computer about the medical device data, and/or other applications.
Methods and systems for substantiation of healthcare expenses
Methods and systems are disclosed for processing a request to fund a purchase from a provider with a medical expense account. The request identifies expenses incurred with the purchase is received at a substantiation system and used to identify the provider. A determination is made whether the provider is included in a presubstantiation list, which identifies a set of providers determined to provide only goods and/or services eligible for funding by medical expense accounts. In response to a determination that the provider is included in the presubstantiation list, the expenses are automatically substantiated and substantiation information is generated and transmitted to a third-party administrator.
Disambiguation based on active input elicitation by intelligent automated assistant
Methods, systems, and computer readable storage medium related to operating an intelligent digital assistant are disclosed. A user request is received, the user request including at least a speech input received from a user. Two or more alternative interpretations of user intent are obtained based on the received user request. One or more commonalities and one or more differences among the two or more alternative interpretations of user intent are identified. A response is provided to the user, the response presenting at least one of the identified differences and eliciting additional user input to choose among the two or more alternative interpretations of user intent based on the at least one difference.
Key word determinations from voice data
Topics of potential interest to a user, useful for purposes such as targeted advertising and product recommendations, can be extracted from voice content produced by a user. A computing device can capture voice content, such as when a user speaks into or near the device. One or more sniffer algorithms or processes can attempt to identify trigger words in the voice content, which can indicate a level of interest of the user. For each identified potential trigger word, the device can capture adjacent audio that can be analyzed, on the device or remotely, to attempt to determine one or more keywords associated with that trigger word. The identified keywords can be stored and/or transmitted to an appropriate location accessible to entities such as advertisers or content providers who can use the keywords to attempt to select or customize content that is likely relevant to the user.
Audio noise modification for event broadcasting
An signal processing apparatus, system and software product for audio modification/substitution of a background noise generated during an event including, but not be limited to, substituting or partially substituting a noise signal from one or more microphones by a pre-recorded noise, and/or selecting one or more noise signals from a plurality of microphones for further processing in real-time or near real-time broadcasting.
Methods and systems for natural language understanding using human knowledge and collected data
Disclosed herein are systems and methods to incorporate human knowledge when developing and using statistical models for natural language understanding. The disclosed systems and methods embrace a data-driven approach to natural language understanding which progresses seamlessly along the continuum of availability of annotated collected data, from when there is no available annotated collected data to when there is any amount of annotated collected data.
Identifying related terms in different languages
One embodiment of the present invention provides a system that uses a known set of related terms to identify additional related terms in different languages. During operation, the system receives two terms that are known to be related. The system translates these two non-synonym terms into a given language, and then adds the translations of the two related terms to a list of known related pairs.
System and method for processing data relating to insurance claim volatility
The invention relates generally to data analysis, and to systems and methods for the computation of the volatility of a loss. The system comprises a module for receiving a data parameter, a database for storing the parameter, a computerized predictive model, and a business logic processor for executing the predictive model. The volatility is used to, among other things, determine an appropriate work flow for handling the loss.
Interpretation terminals and method for interpretation through communication between interpretation terminals
A method for interpreting a dialogue between two terminals includes establishing a communication channel between interpretation terminals of two parties in response to an interpretation request; specifying a language of an initiating party and a language of the other party in each of the interpretation terminals of the two parties by exchanging information about the language of the initiating party used in the interpretation terminal of the initiating party and the language of the other party used in the interpretation terminal of the other party via the communication channel; recognizing speech uttered from the interpretation terminal of the initiating party; translating the speech recognized by the interpretation terminal of the initiating party into the language of the other party; and transmitting a sentence translated into the language of the other party to the interpretation terminal of the other party.
Adaptation for statistical language model
Architecture that suppresses the unexpected appearance of words by applying appropriate restrictions to long-term and short-term memory. The quickness of adaptation is also realized by leveraging the restriction. The architecture includes a history component for processing user input history for conversion of a phonetic string by a conversion process that output conversion results, and an adaptation component for adapting the conversion process to the user input history based on restriction(s) applied to short-term memory that impacts word appearances during the conversion process. The architecture performs probability boosting based on context-dependent probability differences (short-term memory), and dynamic linear-interpolation between long-term memory and baseline language model based on frequency of preceding context of word (long-term memory).
System and method for simulating fluid flow in a fractured reservoir
A method, system and computer program product are disclosed for simulating fluid flow in a fractured subterranean reservoir. A reservoir model representative of a fractured subterranean reservoir is provided. The reservoir model includes porous matrix control volumes and a network of fractures, which define fracture control volumes, overlying the porous matrix control volumes. A system of equations based on scale separation is constructed for fluid flow in the porous matrix control volumes and the fracture control volumes. The system of equations can include fracture equations having a pressure vector for each network of fractures that is split into an average pressure value and remainder pressure value. The system of equations based on scale separation is sequentially solved, such as by using an iterative Multi-Scale Finite Volume (MSFV) method.
Computer method and system providing design of an assembly modeled by a graph
The invention provides a computer-implemented method and system intended for designing an assembly of a plurality of objects. The assembly is modeled by a directed acyclic modeling graph having nodes and arcs. Each node represents an object of the assembly. Each arc represents the use of an end node by an origin node. At least one arc is uniquely identified by an identifier. The assembly is further modeled by at least one relation having at least one tuple containing a first chain of at least one identifier. The method comprises determining at least one mapping between the first chain and a second chain of at least one identifier as well as substituting at least one occurrence of the first chain in the tuple of the relation with the second chain. The invention provides a means to repair broken tuples automatically and thus to facilitate design.
Apparatus and method for virtual assembly, integration and testing of an integrated system
An apparatus for testing a subsystem of a plurality of subsystems capable of being assembled to form an integrated system may include an integration stand for testing the subsystem without actual physical assembly of the plurality of subsystems which form the integrated system. The integration stand may include an interface to connect the subsystem to the integration stand for testing. The integration stand may also include a network device for connecting the integration stand to a communications network for communications between the subsystem and any other subsystems of the plurality of subsystems available via the network. In this way, the subsystem and the other subsystems may be virtually assembled and integrated to virtually form the integrated system for interoperability of the subsystems and testing without actual physical assembly of the plurality of subsystems. The integration stand may also include a simulation unit to simulate any other subsystems forming the integrated system, which are unavailable via the communications network, to virtually form the integrated system for testing the subsystem connected to the interface of the integration stand.
System and method for using a truth table graphical function in a statechart
A method of specifying a truth table includes generating a block diagram model, generating a statechart in the block diagram model, selecting a truth table graphical function in the statechart, and applying a set of graphical semantics for logic specification to the truth table graphical function combined with textual language predicates and actions.
Computing device and method for enforcing passivity of scattering parameter equivalent circuit
A computing device and a method for scattering parameter equivalent circuit reads a scattering parameter file from a storage device. A non-common-pole rational function of the scattering parameters in the scattering parameter file is created by applying a vector fitting algorithm to the scattering parameters. Passivity of the non-common-pole rational function is enforced if the non-common-pole rational function does not satisfy a determined passivity requirement.
Container transport monitoring and analysis
Systems and methods for container analysis and tracking. A method includes scanning a plurality of items by a first data processing system to generate x-ray image data of the items, each of the plurality of items having a unique identifier. The method includes performing a computer implemented image recognition process on the x-ray image data to identify the items. The method includes interactively reviewing the x-ray image data with a human operator by a second data processing system, including displaying the x-ray image data to the human operator. The method includes recording the result of the human operator's review. The method includes determining, for each item, if the results from the computer implemented image recognition process and interactive review meet criteria for items that are exceptions that should not be shipped, and storing an exception indicator for each item using the respective unique identifier.
High speed spectrometer
A system for measuring quantum efficiency in a sample photovoltaic cell may include a Fourier transform infrared spectrometer. One or more light source for illuminating the photovoltaic cell in a wavelength range of interest are provided.
Small form-factor distance sensor
The subject matter disclosed herein relates to measuring a distance along a remote surface performed by a non-stationary mobile device. The mobile device directs, from a first position of the mobile device, a first energy beam toward a first point on a remote surface, directs, from a second position of the mobile device, a second energy beam toward a second point on the remote surface, measures a position displacement between the first position of the mobile device and the second position of the mobile device, and determines the distance along the remote surface based, at least in part, on the position displacement.
Method for the computer-aided calculation of the movement of an object using sensor data
A method for the computer-aided calculation of the movement of an object using sensor data from a sensor arranged on the object is provided. The sensor data comprise measuring point set measured at different time points, and the movement of the object is determined between different measuring point sets. From the measuring point sets, initially structural information is extracted and stored together with the measuring points that are not to be associated with any structural type. Subsequently, associations between the structural elements with the same structure type are determined and a corresponding transformation for representing the structural elements is performed. An association of the unassignable measuring points and the structural elements is created and a corresponding transformation of the superimposed associated measuring points and structural elements is performed. The structural elements or measuring points are associated preferably by a statistic method taking into account a measuring noise of the sensor.
Spectrometer, measuring apparatus, and method of data processing
A spectrometer has: Accumulation means to obtain a data set containing N data points, repeating the measurement M times to obtain M spectral data sets or time-domain data sets S1 (d1 to dN) to SM (d1 to dN), and accumulating the M spectral data sets or time-domain data sets. Means for creating sets S1 (dn) to SM (dn) of the data points contained in the M spectral data sets or time-domain data sets S1 (d1 to dN) to SM (d1 to dN). Correlation computing means for finding correlations. Computing means for finding either the product of an accumulated or anticipated spectrum.
Methods and systems for data analysis using the Burrows Wheeler transform
The present disclosure provides computer implemented methods and systems for analyzing datasets, such as large data sets output from nucleic acid sequencing technologies. In particular, the present disclosure provides for data analysis comprising computing the BWT of a collection of strings in an incremental, character by character, manner. The present disclosure also provides compression boosting strategies resulting in a BWT of a reordered collection of data that is more compressible by second stage compression methods compared to non-reordered computational analysis.
Evaluation method for evaluating a state of a photosynthesis sample
An object of the present invention is to appropriately and easily evaluate a photosynthetic function of a photosynthetic sample contained in an evaluation sample.An evaluation method for photosynthetic sample according to the present invention is for evaluating a state of a photosynthetic sample with a photosynthetic function based on temporal data of a luminescence amount of delayed luminescence emitted from the photosynthetic sample. First, characteristic values that indicate characteristics are determined for a plurality of time periods in the temporal data. An evaluation value is then computed by weighting the characteristic values. The state of the photosynthetic sample is then evaluated based on the evaluation value.
Method for servicing a field device of process automation technology having at least two measurement channels and field device of process automation technology having at least two measurement channels and being suitable for performing the method
In a method for servicing a field device of process automation technology having at least two measurement channels, with the assistance of an external service unit, separate device descriptions are provided in the service unit for the measurement channels. The individual measurement channels can be invoked on the service unit via the corresponding device descriptions as logical units, so that, in servicing, the field device appears to the user as at least two logically independent field devices.
Automatic image capture
In one embodiment, a mobile device generates sensor data configured to describe a geographic position of a mobile device. A list of events is defined according to position data and time data. The geographic position of the mobile device is compared to positions in the list of events of interest and a current time is compared to time data in the list of events of interest. The comparison determines whether events in the list are in range of the mobile device. One or more nearby events in range of the mobile device at the current time or a future time are selected. A command is generated to capture an image of the nearby events using a camera coupled to the mobile device. The captured images may be used to update navigation or map database, provide community or weather data to other users, social media functions, or other features.
Utilizing magnetic field based navigation
There is provided a solution comprising detecting that a positioning device is within a predetermined control area associated with a building, acquiring a first sequence of magnetic field measurements carried out by the positioning device, wherein the first sequence represents at least one of the magnitude and the direction of Earth's magnetic field; determining that an operational environment of the positioning de-vice has changed between an indoor environment and an outdoor environment when a at least one predetermined criterion with respect to the first sequence is met; and causing actuation of a predetermined software function in or with respect to the positioning device when the operational environment of the positioning device has changed.
Generating a display image
A method is disclosed for generating a display image including a map view and a road, the map view being a three dimensional perspective elevation view of a portion of a digital map as viewed from a viewing position. In at least one embodiment, the method includes determining, from information associated with the distance of the road that is to be displayed in the display image from the viewing position, whether a map object obscures a line of sight from said viewing position to the road in the three dimensional perspective elevation; and displaying an element of the road in a format that is dependent on whether the map object is determined to obscure said line of sight. An apparatus and a computer program are also disclosed.
Driving characteristics detector and route search device
A driving characteristics detector includes: a driving information obtaining element for obtaining driving information, which relates to a driving condition of a vehicle; and a driving characteristics determining element for determining driving characteristics of a driver of the vehicle based on the driving information. The driving information includes vehicle speed relating information, which relates to at least one of a vehicle speed, acceleration and deceleration of the vehicle. A driving unit section is defined as a section from the vehicle starts to go until the vehicle stops. The driving characteristics determining element determines the driving characteristics based on the vehicle speed relating information in each driving unit section.
A computer-implemented method of providing personalized route information involves gathering a plurality of past location indicators over time for a wireless client device, determining a future driving objective using the plurality of previously-gathered location indicators, obtaining real-time traffic data for an area proximate to the determined driving objective, and generating a suggested route for the driving objective using the near real-time traffic data.
Location based services with combinatorial data sources
A location based service using combinatorial data sources for routing and time information is disclosed. One embodiment comprises using a user location, a first data set from a first data source containing information related to a first waypoint, and a second data set from a second data source containing information related to a second waypoint to determine a tour of the first waypoint and the second waypoint. In this way, the embodiment may send the tour of the first waypoint and the second waypoint to a navigation device.
Apparatus and method for switching mode in a location based service system using visible light communication
A method and a lighting device for providing a Location Based Service (LBS) service that is based on Visible Light Communication (VLC) in the lighting device is provided. The method includes receiving, from a terminal, a data request needed to perform an LBS service; and transmitting data to the terminal, the data including identification information of the lighting device, which is used by the terminal to identify a location of the lighting device and a location of the terminal located in the position corresponding to the lighting device.
Method, apparatus and computer program for estimating driver's personality of route selection
A method for selecting a route from a departure point to an arrival point includes acquiring information concerning a departure point and an arrival point and information concerning a route from the departure point to the arrival point; generating a plurality of basic routes; calculating a parameter of an evaluation function that yields the selected route as an optimum route; generating a new route using the calculated parameter, determining whether or not the generated new route is identical to the selected route; on a condition that the generated new route is not identical to the selected route, adding the generated new route to the basic routes, recalculating the parameter, generating a new route, and comparing the new route with the selected route; and if the new route is identical to the selected route, storing the parameter when the new data becomes identical to the selected route.
On-vehicle apparatus, preceding vehicle position determining apparatus, and preceding vehicle position determining method
An ECU acquires relative position information related to a relative position between a host vehicle and another vehicle (A, B, C) traveling ahead of the host vehicle, and error information related to an error in the relative position, detects the position of a preceding vehicle (A) traveling in front of the host vehicle, identifies the position of the preceding vehicle (A) by comparing the relative position based on the acquired relative position information with the detected position, and if relative position information oh a plurality of other vehicles (A, B, C) is acquired, identifies the position of the preceding vehicle (A) by comparing the relative position based on the acquired relative position information with the detected position, by using a threshold that is varied in accordance with the error information.
Method and apparatus for detecting arrival at new city and producing information on new city
An apparatus and method for a navigation system to detect arrival to a new city and provide information on the city such as dining, lodging, popular sightseeing place, etc. to the user. In addition, it can also provide the user a list of his or her friends in the new city according to an address book or from social networking websites. The navigation includes a detecting unit communicatively coupled with a position measuring device and a map information memory to detect whether the user is entering a new city by determining whether the user is moving across the new city border line. Further, the detecting unit indicates the user is entering a new city when the user is moving a predetermined distance away from an airport. Further, the new city information may not be shown if the user has visited the city before within a predetermined period.
Travel distance estimating apparatus, travel distance estimating method, travel distance estimating program, and recording medium
A travel distance estimating apparatus (100) estimates a travel distance of a moving body in a given section through which the moving body travels (hereinafter referred to as a “travel interval”). A current position acquiring unit (101) acquires the current position of the moving body. A variable acquiring unit (102) acquires information related to the speed of the moving body in the travel interval. An estimating unit (103) estimates based on a consumed energy estimating equation, energy consumption and a travelable distance for travel through the travel interval. A correcting unit (104) corrects information related to the moving body and used as variables of the consumed energy estimating equation. A storage unit (105) stores information related to roads associated with a travel history of the moving body. A display unit (110) displays map data including information related to travelable distance calculated by the estimating unit (103).
Vehicle control unit
A vehicle control unit includes an engine switch, an idling stop controller and a power supply controller. When the engine switch is depressed in a state where the engine is automatically stopped by the idling stop controller, the idling stop controller restarts the engine in a case where a relationship between an operating time during which the engine switch is depressed and a predetermined reference time satisfies a predetermined condition, and the power supply controller switches a power supply mode in a case where the relationship between the operating time and the reference time does not satisfy the predetermined condition.
Control unit and method for driver assistance
A control unit for a driving assistance of a vehicle includes a data interface for querying sensors for detecting surroundings data of the vehicle, a data interface for querying a steering angle of the vehicle, an arithmetic unit for ascertaining driving instructions based on the surroundings data of the vehicle transmitted by the sensors, a data interface for outputting the driving instructions, the driving instructions including at least one instruction to perform a steering of the vehicle at a standstill, and an interface for activating a braking system of the vehicle in such a way that the vehicle is braked during the steering performed at a standstill until a predefined steering angle is reached.
System and method for estimating the mass of a vehicle
A vehicle system and method that estimates or approximates the mass of a vehicle so that a more accurate vehicle mass estimate can be made available to other vehicle systems, such as an adaptive cruise control (ACC) system or an automated lane change (LCX) system. In an exemplary embodiment, the method compares an actual acceleration of the vehicle to an expected acceleration while the vehicle is under the control of an automated acceleration event. The difference between these two acceleration values, along with other potential input, may then be used to approximate the actual mass of the vehicle in a way that takes into account items such as passengers, cargo, fuel, etc. Once an accurate vehicle mass estimate is generated, the method may make this estimate available to other vehicle components, devices, modules, systems, etc. so that their performance can be improved.
Collision reducing device
A collision reducing device including a radar, an image sensor, a collision mitigation, and a brake. A collision predicting section of the collision mitigation has a first actuating section for causing a vehicle control section to perform running control when a collision possibility exceeds a reference value in one-frame determination, a second actuating section for causing the vehicle control section to perform running control when the collision possibility exceeds a reference value in M-frame determination, and a selecting section for selectively operating the first actuating section and second actuating section, so that the vehicle control section can be operated by two kinds of numbers of determinations, whereby the speed of collision determination can be secured by a smaller number of determinations when operating the first actuating section, while malfunctions can be reduced more by a greater number of determinations when operating the second actuating section.
Method of controlling a hydraulic continuously variable transmission
A method of controlling a hydraulic CVT of a vehicle comprises: determining a speed of rotation of a driving shaft; determining a speed of rotation of a driven shaft; determining a ratio of the speed of rotation of the driving shaft versus the speed of rotation of the driven shaft; determining an engine torque; determining a base clamping force to be applied by the driving pulley onto the belt based on the ratio and the engine torque; determining a desired speed of rotation of the driving shaft; determining a corrective clamping force by comparing the speed of rotation of the driving shaft to the desired speed of rotation of the driving shaft; and controlling a hydraulic pressure applied to a movable sheave to apply a sum of the base and corrective clamping forces onto the belt. A vehicle having a CVT controlled by the method is also disclosed.
System and method for controlling loads on a dual mass flywheel attached to an engine based on engine speed
A system according to the principles of the present disclosure includes an engine speed module and a downshift indicator module. The engine speed module determines an engine speed when a clutch is engaged with a dual mass flywheel. The downshift indicator module generates a downshift indicator signal when the engine speed is less than a first speed, the downshift indicator signal indicating when to downshift a manual transmission.
Control device of continuously variable transmission for vehicle
A control device of a continuously variable transmission for a vehicle has a pair of variable pulleys and a transmission belt, and the control device respectively controls input-side and output-side thrust forces of input-side and output-side variable pulleys to set an actual gear ratio to a target gear ratio, prevents a slip of the transmission belt, and determines a lowest-speed-side gear ratio. When it is determined that a detection value of a rotation speed for calculating the actual gear ratio does not reflect an actual rotation speed, target input-side and output-side thrust forces are set to be target thrust forces for maintaining the lowest-speed-side gear ratio and preventing the slip of the transmission belt, and based on whether the actual gear ratio is already the lowest-speed-side gear ratio, values of the input-side and output-side thrust forces are changed for obtaining the target thrust forces.
Rotation control device for working machine
In a rotation control device for rotating a rotation motor at speed in accordance with a boom raising operation amount, at the time of a combined operation for simultaneously performing a rotation action and a boom raising action, a limitation value of rotation torque in accordance with the boom raising operation amount is determined by rotation torque limitation value setting means of a controller, the limitation value serving as a rotation torque limitation value is sent to rotation speed control means, and a command value of the rotation torque is torque-limited by rotation torque limiting means.
Active aerodynamic chassis control
The automobile described herein employs an aerodynamic chassis control system to limit and/or control the affect of yaw and roll created by environmental and operating conditions on an automobile with minimal penalty to improve ride comfort and performance of the automobile. The aerodynamic chassis control system employs various movable stabilization elements to control yaw and roll. Moreover, aerodynamic chassis control system constantly monitors environmental and operating conditions of the automobile and adjusts the stabilization elements to provide ride comfort and automobile performance.
Method for operating a pedestrian protection system and a motor vehicle
A method for operating a pedestrian protection system in a motor vehicle for reducing the severity of an accident in a frontal collision with pedestrians includes evaluating the measurement data from at least one detection device depending on at least one trigger condition, wherein the trigger condition includes a height criterion evaluating whether a height of a collision object determined from measurement data from an optical detection device exceeds a height threshold value.
Pull-drift compensation enhancements
A pull-drift compensation controller device for a vehicle configured to perform operations including identifying a current pull-drift compensation torque and a current driver input torque while in an adapt-and-compensate state in which pull-drift compensation torque is learned and applied, wherein the vehicle is moving at a substantially straight heading; and performing a transition from a normal pull-drift compensation adjustment sub-state of the adapt-and-compensate state to a fast pull-drift compensation adjustment sub-state of the adapt-and-compensate state based on the current driver torque opposing the direction of the current pull-drift compensation torque without a change in the heading.
Road wheel disturbance rejection
A control method for an electric power steering system is provided. The control method includes evaluating wheel disturbance based on a wheel velocity. A wheel disturbance cancel amount is determined based on the wheel velocity. An assist command is generated to the power steering system based on the wheel disturbance cancel amount.
Suspension control apparatus
[Object]The present invention provides a suspension control apparatus that allows miniaturization of a solenoid valve.[Solution]When a controller is started up by a power source controller (a power source unit), the controller switches a control current from 0 ampere to a maximum current value I6 at the same time as the startup. After that, the control shifts to normal control. As a result, even if a hysteresis of a damping force characteristic is large relative to the control current, it is possible to promptly move a solenoid valve to a position to be used in the normal control.
System and method for self-detecting vehicle theft
A system and method for self-detecting vehicle theft is provided that includes a first antenna and a second antenna, both located on a vehicle. The first antenna transmits the signal and the second antenna receives the signal. A monitoring module in communication with the second antenna is configured to determine whether the signal has changed. A vehicle security system is configured to activate based on a change in the signal.
Tire condition monitoring system and installation position ascertaining method
A tire condition monitoring system stores information representing a number of dual wheels having two tires arranged closely adjacent to each other on, for example, a commercial vehicle. The system measures internal air temperatures of the tires on all of the wheels, and stores temperatures measured when a system reset is executed as reference temperatures. The system determines calculated values based on the temperatures measured for each tire until a measured temperature exceeds the corresponding reference temperature by 20 degrees Celsius or more. The system arranges the calculated values in an order and determines that a number of the calculated values high in the order are calculated values of temperatures of tires mounted on the inside wheel. The number of calculated values corresponding to a dual wheel is equivalent to the number of dual wheels. Thus, the system determines which tires are mounted on an inside wheel.
Apparatus, system, and method for authentication of vehicular components
Manufacturers and original equipment manufacturers provide vehicles that include various components and systems that operate to provide safe, environmentally conscious transportation compliant with local, state, and federal requirements. Each of the components or systems may include a nontransitory storage media containing data indicative of an authentication code specific to the respective component or system. Authentication data may be communicated from each of the nontransitory storage media on a vehicle to a control system where the authentication data is compared to one or more defined criteria. If the one or more criteria confirm the validity of the authentication data supplied by the components or systems, full operation of one or more vehicular systems is permitted. If the one or more criteria fail to confirm the validity of the authentication data supplied by the components or systems, the operation of at least one vehicular system is at least partially inhibited.
Method and device for dual-channel monitoring of safety-relevant sensor signals
A method and device for dual-channel transmission of safety-relevant sensor signals. In the method, two sensor signals to be monitored are generated parallel to one another by two sensors and the generated sensor signals are transmitted to a common evaluation unit via two separate, input-side transmission channels. Within the evaluation unit, the permissibility of the transmitted sensor signals is checked using prescribed calculation specifications that correspond to one another and an evaluation unit output signal representing permissibility or impermissibility is generated for each sensor signal. The individual processing steps of the two calculation specifications are decoupled by the evaluation unit for the two sensor signals and performed diversified within the evaluation unit. The generated output signals are output via two separate, output-side transmission channels.
Method and system for remote diagnostics of vessels and watercrafts
The present disclosure generally relates to a bidirectional communication platform using short message communication with a telematics device for remotely updating parameters of the device, for obtaining reports and other information regarding the parameters of the device, and to upload control data and specific data to the device. More specifically, a software adaptation layer is added to a telematics device to bidirectionally communicate with receiver and emitter cell phones.
Power limiting system and method based upon brake rotor temperature determination
A brake rotor temperature determination or estimation system and method for controlling output power of a power source in a vehicle. The system includes a brake rotor, a processor, a memory, a speed sensor and a temperature sensor. The speed sensor senses a speed of the vehicle. The temperature sensor senses a temperature of a brake rotor or ambient air in a vicinity of the brake rotor. Based upon data stored in the memory and inputs from the speed sensor or the temperature sensor, the processor determines if an output power of the power source should be limited based on rotor temperature thresholds. The power limits may be defined as discrete power limits corresponding to the particular thresholds of rotor temperature or may be defined as interpolated data values along a linear or nonlinear ramp or slope.
Trailer hitch alignment systems and methods
Systems and methods for aligning a towing vehicle trailer hitch with the tongue of a trailer/towed vehicle are provided that enable a driver to know when the towing vehicle trailer hitch is close enough to the trailer tongue such that the two can be coupled. A trailer hitch includes a tow bar having a free end configured to be coupled to a trailer tongue. An alignment system includes at least one energy emitter secured to the vehicle that emits energy in the direction of the trailer tongue, and at least two sensors secured to the vehicle in spaced-apart relationship. The energy emitter(s) and sensors may be secured to the trailer or trailer hitch.
Adaptive mapping with spatial summaries of sensor data
A system and method for mapping parameter data acquired by a robot mapping system is disclosed. Parameter data characterizing the environment is collected while the robot localizes itself within the environment using landmarks. Parameter data is recorded in a plurality of local grids, i.e., sub-maps associated with the robot position and orientation when the data was collected. The robot is configured to generate new grids or reuse existing grids depending on the robot's current pose, the pose associated with other grids, and the uncertainty of these relative pose estimates. The pose estimates associated with the grids are updated over time as the robot refines its estimates of the locations of landmarks from which determines its pose in the environment. Occupancy maps or other global parameter maps may be generated by rendering local grids into a comprehensive map indicating the parameter data in a global reference frame extending the dimensions of the environment.
Electric storage device
An electric storage device including a state detection unit managing and controlling the state of a battery unit, wherein the state detection unit captures an inter-terminal voltage of each of a plurality of batteries measured by a battery management unit in a no-load state where the battery unit is separated from a load, and calculates variation information about the states of charge of the batteries. In addition, the state detection unit, taking into consideration the variation information about the states of charge of the batteries, calculates allowable charge and discharge information required for controlling the charging and discharging of the battery unit in a loaded state where the battery unit is connected to a load and charged or discharged, and outputs the allowable charge and discharge information to a charge and discharge device in the battery unit.
Power feeding system for vehicle, electrically powered vehicle and power feeding apparatus for vehicle
An IPA-ECU recognizes a position of a power transferring unit by image recognition based on image information from a camera incorporated in a vehicle. Then, the IPA-ECU performs guidance control such that the vehicle is guided to the power transferring unit based on a result of the image recognition (first guidance control). A resonant ECU estimates a distance between the power transferring unit and a power receiving unit based on an electric power feeding condition from the power transferring unit to the power receiving unit. When the power transferring unit comes under a body of the vehicle, an HV-ECU performs guidance control of the vehicle such that a position of the power receiving unit is adjusted to a position of the power transferring unit based on distance information from the resonant ECU (second guidance control).
Motor torque smoothing treatment method for hybrid power and a hybrid power system
A motor torque smoothing process method includes judging the required work mode of the motor (3) and the current work mode of the motor (3); judging the transition process of the motor (3) based on said required work mode and said current work mode; determining the smoothing time parameter of the motor torque and the target torque based on said judged transition process; calculating the increasing step length of the current output torque based on the said detailed smoothing time parameter, the target torque and the current actual output torque; therefore calculating the actual output torque based on said increasing step length and the current actual output torque.
Power supply system, vehicle including the same, control method for power supply system, and computer-readable recording medium recording program for causing computer to execute the control method
A lower limit value setting unit (52) variably sets a lower limit value (Vth) of a target voltage (Vh*) in a range of a voltage that is higher than the maximum value of voltages (Vb1, Vb2) of power storage devices and is not affected by a dead time provided for converters, based on temperatures (Tb1, Tb2) and required electric powers (Pb1*, Pb2*). A maximum value selection unit (53) sets the maximum value among the voltages (Vb1, Vb2) of the power storage devices and required voltages (Vm1*, Vm2*) of motor-generators, as the target voltage. A target voltage limiting unit (54) compares the target voltage with the lower limit value (Vth), and if the target voltage is lower than the lower limit value (Vth), the target voltage limiting unit (54) sets the lower limit value (Vth) as the target voltage (Vh*).
System and method alerting an aircrew of threshold altitudes
A system and method display general terrain clearance awareness, whether the aircraft is off route, on airway, off procedure, or on procedure, so altitude thresholds are not violated and EGPWS alerts are avoided, while reducing clutter in displaying the information. Altitude, location, and rate of change in altitude are considered in determining whether the aircraft will exceed the threshold altitude. A flight path or an area to be entered is highlighted when the threshold altitude will be violated by the aircraft with the current flight path. The threshold altitude may be a minimum or maximum allowed altitude, or the terrain.
Providing a description of aircraft intent
The present disclosure provides a computer-implemented method of generating a description of aircraft intent expressed in a formal language that provides an unambiguous description of an aircraft's intended motion and configuration during a period of flight. A description of flight intent is parsed to provide instances of flight intent, each instance of flight intent spanning a flight segment. For each flight segment, an associated flight segment description is generated that comprises one or more instances of flight intent that describe the aircraft's motion in at least one degree of freedom of motion. Flight segment descriptions are compared with constraints and/or objectives and the associated flight segment descriptions are enriched with information describing relevant constraints and/or objectives. The enriched flight intent is converted into aircraft intent by ensuring that the flight segment descriptions close all degrees of freedom of the aircraft during the period of flight.
Three-dimensional digital map
Disclosed herein is a three-dimensional (3D) digital map system for implementing a navigation and ground collision preventing method using 3D terrain information. The 3D digital map system includes a terrain referenced navigation module configured to receive data from EGI (Embedded GPS/INS), a radio-altimeter (RALT) and a map database, corrects the data to perform accurate navigation computation, and outputs the corrected data, a collision avoidance warning module configured to generate a warning against collision of an aircraft with the ground or an obstacle using the corrected data, a 3D terrain database and an obstacle database, a terrain following module configured to generate a terrain following trajectory of the aircraft using the same information, and a Passive Ranging module configured to receive the 3D terrain database and line-of-sight (LOS) information of a target and calculate distance and position information of the target located on the ground.
Energy protecting device for aircraft
An energy protecting device for three and four-engined aircraft includes a detecting unit configured to detect failure of each engine. A control unit is configured to provide a protective function by controlling maximum thrust of each engine. A triggering unit is configured to monitor a plurality of parameters and trigger the control unit to provide maximum thrust at predetermined conditions of the monitored parameters. An inhibiting unit is linked to the triggering unit and is configured to inhibit the protective function, when at least one of the engine on the wings of the aircraft has failed. The control unit is also configured to control the engines that have not failed to minimize thrust imbalance.
System for passive entry and passive start using near field communication
A system for activating a vehicle to a key-on state by detecting a presence of a near field communication (“NFC”) tag is provided. The system includes a vehicle bus, a start button in communication with the vehicle bus, an NFC antenna, and a control module. The NFC antenna is positioned to selectively couple with the NFC tag if the NFC tag is within a predetermined distance from the NFC antenna. The control module is in communication with the NFC antenna and the start button. The control module includes control logic for determining if the determining if the NFC antenna is coupled with the NFC tag. The control module includes control logic for determining if the start button has received the input to activate the vehicle to the key-on state. The control module includes control logic for sending a signal through the vehicle bus to activate the vehicle.
Control system for an electric power system
A control system for an electric power system is provided. The control system includes a wireless communication system for tracking one or more electric vehicles and receiving a battery charge data of said electric vehicles. The control system also includes a load sensor for sensing load of the electric power system. The control system further includes a controller for operating one or more protection elements based on the battery charge data of the electric vehicles and the load data of the electric power system.
Method and system for highly precisely positioning at least one object in an end position in space
An object is highly precisely moved by an industrial robot to an end position by the following steps, which are repeated until the end position is reached within a specified tolerance: Recording a three-dimensional image by means of a 3-D image recording device. Determining the present position of the object in the spatial coordinate system from the position of the 3-D image recording device the angular orientation of the 3-D image recording device detected by an angle measuring unit, the three-dimensional image, and the knowledge of features on the object. Calculating the position difference between the present position of the object and the end position. Calculating a new target position of the industrial robot while taking into consideration the compensation value from the present position of the industrial robot and a value linked to the position difference. Moving the industrial robot to the new target position.
Apparatus and method for detecting contact position of robot
An apparatus for detecting a contact position where a robot makes contact with an object includes a probe, a probe-position calculating unit, a contact detecting unit, and a contact-position calculating unit. The probe is attached to the robot and is configured to make a displacement in a direction of making contact with the object in an elastic manner. The probe-position calculating unit calculates a position of the probe of the robot in operation. The contact detecting unit detects a contact state of the probe with the object. When the contact state of the probe is detected, the contact-position calculating unit derives the contact position based on a calculated position of the probe.
System and process for real time monitoring of mail and print jobs and providing real time verification of mail piece completion
The present application relates to a system and method for tracking individual pieces within a printing or mailing job, as well as tracking completed trays, skids, or containers of printed documents.
Material removal depth measurement by scribing
The described embodiment relates generally to the polishing of a device housing. The device housing can be formed of a thermoplastic, or a metal such as aluminum or stainless steel. More particularly, a method and an apparatus are described for accurately measuring the amount of material removed during a polishing process. Accurate measurement of such a polishing process can be especially helpful in measuring material removal on curved surfaces and edges where material removal rates tend to be less predictable.
Method and system for converting an image to a color-reduced image mapped to embroidery thread colors
Methods and systems are presented for converting an image to a color-reduced image suitable for embroidery and having colors mapped only to available embroidery thread colors. Pixel color values in the image are snapped to a nearest color in a predetermined reduced set of colors that correspond to embroidery thread colors. The image is then color-reduced by iteratively identifying possible pairs of colors in the color-reduced image and merging at least one identified color pair based on color similarity and edge characteristics until the total number of colors in the color-reduced image is not greater than the predetermined maximum color count.
Multi-dimensional resource optimization in the manufacture of substantially two-dimensional elements
The present invention enables the efficient use of resources in the manufacture of substantially two-dimensional elements through multi-dimensional resource optimization subject to rules and objectives. The invention may be embodied as a computer-based method, a computerized system that performs the method, or a machine readable storage medium containing instructions that when executed cause performance of the method using the computerized system. To fulfill customer orders, product design data, resource data, and rules and objective data are accessed to determine the efficient use of the resources, such as consumption of particular units of raw material and utilization of production stations. For a given set of customer orders, multiple scenarios of production plans are computed and recomputed until an efficient production plan is achieved. The production plan can be generated at a location remote from the manufacturing site, and it can then be sent in an automated fashion to the production stations.
Transcoding of audio metadata
The invention relates to the field of audio encoding. In particular, it relates to the transcoding of audio metadata between different audio coding schemes. It describes a method and a system for transcoding audio gain metadata related to dynamic range control from first gain metadata of a first audio coding scheme to second gain metadata of a second audio coding scheme, wherein the first and second audio coding schemes use coding blocks and wherein each coding block has at least one associated gain value. The method and the system select a gain value of the second gain metadata based on the gain values of the first gain metadata such that within a time interval around the time instance associated with the gain value of the second gain metadata, the minimum gain value of the first gain metadata is selected.
Binding graphic elements to controller data
System(s), device(s), and method(s) provide bi-directional mechanisms for binding graphic element definitions to industrial automation data types in an industrial control system. Moreover, a system that automatically provides data searching and filtering of an item based on user interactions with either the graphic element definition or a controller data type is provided. Further, a graphic element definition is associated with a data source type information, to simplify configuration of an instance of that graphic element and populate suitable data source fields based on instances of the associated data source type. In addition, a system to automatically generate the graphic element based on data from a logic controller is provided. Moreover, the graphic element can be updated to reflect a change in the data, without a manual refresh.
Implantable cardiac prosthetic for resynchronization by biventricular pacing using reverse remodeling
Improving cardiac response in terms of pressure, ejected volume, and filling and ejection times by cardiac reverse remodelling, including temporary, occasionally harmful stimulation sequences. An original pacing configuration (a) is switched to a modified pacing configuration (b) in a direction opposite to that of an optimization of the hemodynamic parameters, to cause an immediate change in the response to controlled stimulation of the myocardium. This response is assessed based on: the maximum value (P (b, a)) achieved by the peak-to-peak (PEA (i)) of the first peak of endocardial acceleration (PEA) after a pacing configuration change, the mean PEA value (A (b, a)) after stabilization, the PEA variability (V (b, a)) around this average value, and the duration (T (b, a)) of stabilization after the pacing configuration change.
Systems and methods for fixating transvenously implanted medical devices
A transvenously implantable medical device (TIMD) includes an electrical lead and a control module. The electrical lead includes one or more electrodes and is adapted for transvenous implantation. The electrical lead is also pre-biased to expand from a collapsed state to an expanded state to mechanically engage an internal wall of a blood vessel. The control module is secured to and in electrical communication with the electrical lead. The control module includes a signal management component and a power component disposed in a housing adapted for implantation into the blood vessel. The control module is adapted for at least one of stimulating and sensing a physiologic response using the one or more electrodes of the electrical lead.
Determination of cardiac resynchronization therapy settings
CRT settings for an implantable medical device are determined by applying pacing pulses to heart chambers of a scheme of different combinations of interchamber delays. A respective width parameter value representing an R or P wave width is determined for each such delay combination based on an ECG representing signal and the width parameter values are employed to estimate a parametric model defining the width parameter as a function of interchamber delays. Candidate interchamber delays that minimize the width parameter are determined from the parametric model and employed to determine optimal CRT settings. The technique provides an efficient way of finding optimal CRT settings when multiple pacing sites are available in a heart chamber.
System and method for remotely programming a patient medical device
A system and method for remotely programming a patient medical device (PMD) is presented. Programming instructions specified remotely are translated into commands formatted for a PMD to control functionality thereof. Correctness of the PMD-formatted commands is checked. Patient consent to modify the functionality of the PMD is confirmed. Application of the PMD-formatted commands to the PMD is controlled during a programming session initiated and performed remotely. The application of the PMD-formatted commands is confirmed through interrogation of the PMD to verify the functionality modified.
Non-regular electrical stimulation patterns for treating neurological disorders
Systems and methods for stimulation of neurological tissue and generation stimulation trains with temporal patterns of stimulation, in which the interval between electrical pulses (the inter-pulse intervals) changes or varies over time. The features of the stimulation trains may be selected and arranged algorithmically to by clinical trial. These stimulation trains are generated to target a specific neurological disorder, by arranging sets of features which reduce symptoms of that neurological disorder into a pattern which is effective at reducing those symptoms while maintaining or reducing power consumption versus regular stimulation signals. Compared to conventional continuous, high rate pulse trains having regular (i.e., constant) inter-pulse intervals, the non-regular (i.e., not constant) pulse patterns or trains that embody features of the invention provide increased efficacy and/or a lower than average frequency.
Device and implantation system for electrical stimulation of biological systems
An implantable stimulation device for use in stimulation based treatments for diseases such as GERD or obesity is described. The device is provided with an anchoring unit which upon deployment assumes a shape optimized for the site of deployment. Sensing electrodes and stimulating electrodes in the device are also designed to assume a suitable shape upon deployment. A novel catheter is also provided for easy and expeditious deployment of the device.
Identifying a lead related condition based on detecting noise subsequent to signal delivery
In general, the disclosure describes techniques for detecting lead related conditions, such as lead fractures or other lead integrity issues. As described herein, delivering an electrical signal through selected electrodes may result in, reveal, or amplify noise if a lead related condition is present. A processor may detect electrical noise indicative of the lead related condition subsequent to the delivery of the electrical signal, and identify a lead related condition in response to detecting the noise.
Predictive diagnosis of a patient's status in an active implantable medical device notably for cardiac pacing, resynchronization, defibrillation or cardioversion
An active implantable medical device or pacing, resynchronization defibrillation and/or cardioversion, and/or a device for diagnosing patient conditions, having a predictive diagnosis of the patient's status. The device measures a physiologic parameter, notably the minute ventilation; measures a physical parameter, notably the acceleration; discriminates between phases of activity and rest of the patient; and includes a memory containing a plurality of fields selectively updated by statistical processing. These fields are comprising one first set containing data related to the patient's activity phases, and one second set containing data related to the patient's rest phases. The statistical processing is updating in a dissociated manner the first and second sets of fields, selectively as a function of the value taken by the status indicator, and the analysis evaluates at least one clinical status index based upon the data contained in the fields of both first and second sets.
Single chamber leadless intra-cardiac medical device with dual-chamber functionality
A leadless intra-cardiac medical device (LIMD) includes a housing configured to be implanted entirely within a single local chamber of the heart.
Systems and methods for processing and displaying patient electrocardiograph data
A method is disclosed for displaying patient ECG data. The method includes receiving ECG data including an ECG waveform; receiving analyzed ECG data including arrhythmic events; generating an indicia of the detected arrhythmic event; and displaying the indicia of the detected arrhythmic event in relation to the ECG waveform at a position associated with a time of the detected arrhythmic event. A system for displaying patient ECG data is also disclosed.
Device and method for identifying cardiac events
An implantable medical device includes leads having electrodes that are positioned within a heart. The electrodes sense signals derived from the heart that include waveform segments. The device includes a timing module that determines when the waveform segments cross a threshold and measures time intervals between at least two threshold crossings by the waveform segments. The device also includes event identification module that compares the time intervals to a predetermined pattern associated with a cardiac event. The event identification module identifies the cardiac event based on the time intervals and the predetermined pattern.
Method of detecting signal clipping in a wearable ambulatory medical device
A wearable medical device and method of detecting clipping of ECG signals is disclosed. In one embodiment, the wearable medical device comprises a plurality of ECG sensing electrodes configured to sense an ECG of a patient and an ECG acquisition circuit electrically coupled to a pair of the plurality of ECG sensing electrodes and configured to provide an amplified and conditioned analog ECG signal, a programmable attenuation/gain stage electrically coupled between a first gain stage and a second gain stage, an ADC electrically coupled to the ECG acquisition circuit to receive and digitize the amplified and conditioned analog ECG signal and provide a digitized ECG signal, and a signal conditioning to and control unit electrically coupled to the ECG acquisition circuit and the ADC to receive and monitor the digitized ECG signal and to detect clipping of the amplified and conditioned analog ECG signal based upon the digitized ECG signal.
Long-term monitoring for discrimination of different heart rhythms
A method, system, and device for detection of an arrhythmia, and discrimination between different types of arrhythmia, for example to determine whether to administer an electric shock to the heart, the device comprising a wearable monitor with electrodes that detect the electrical activity of a beating heart, attached to an embedded monitoring system having an amplifier, a microprocessor, a data storage device, and a power supply, all disposed on a substrate having large distal end portions that attach to the electrodes and a narrow intermediate portion that attaches to the monitoring system.
Method and apparatus for eliminating motion artifacts of bio signal using personalized bio signal pattern
An apparatus for eliminating motion artifacts in a bio signal includes a bio signal acquisition unit configured to acquire a bio signal from a patient; a reconstruction signal generator configured to generate a reconstruction signal of the acquired bio signal based on a result of comparing the acquired bio signal with a bio signal pattern of the patient generated using a bio signal measured from the patient before acquiring the bio signal from the patient; and a motion artifact elimination unit configured to eliminate motion artifacts in the acquired bio signal based on a difference between the reconstruction signal and the acquired bio signal.
Method for determining a heart period from an ECG waveform using image representation of ECG
A method for estimating a heart period is disclosed. The heart period is detected from an ECG recording. ECG data is acquired, and converted into electronic ECG images. The data is processed to prepare for estimation of a heart period. The heart period is estimated based upon an average of intervals between a plurality of detected peaks of electronic electrocardiogram waveforms. The peaks are determined by taking a product of a filtered electronic ECG signal with a wandering baseline removed, a difference between the upper and lower ECG envelopes of the electronic ECG images, and a first order derivative of a derived ECG waveform.
Systems and methods for increased specificity in diagnostics
Methods and apparatuses for monitoring, with improved specificity, occurrences of episodes relating to disorders that are known to affect T-wave morphology. T-wave variability is monitored. When T-wave variability, or a change therein, exceeds a corresponding threshold for a specific period of time, monitoring for a specific change in T-wave morphology that is known to be indicative of episodes relating to a disorder may be triggered.
Method and device for determining a position of a part of a medical instrument
The invention relates to a method and a device for determining the position of a part of a medical instrument with an x-ray sensitive sensor in a plane of an x-ray image using an x-ray facility having an x-ray beam source and a device, which is assigned to the beam source and influences the x-ray radiation emitted by the x-ray beam source, wherein a spatial region, in which the medical instrument is located, is scanned with x-ray radiation and at the same time x-ray radiation is detected with the x-ray-sensitive sensor with the device for influencing the x-ray radiation rotating at constant speed, the rotation being synchronized to the receipt of signals based on x-ray radiation with the x-ray-sensitive sensor and with the position of the part of the medical instrument in the plane of an x-ray image being determined based on the x-ray radiation detected with the x-ray-sensitive sensor.
Fiducial markers and related methods
In part, the invention relates to fiduciary markers suitable for affixing to a patient that are detectable with respect an imaging modality such as MRI and methods of making the same. The markers include a paramagnetic material disposed therein that generates a distinguishable signal relative to a patient or other biological sample of interest during an imaging data collection session. Further, the markers demonstrate desirable signal to noise ratios across two or more MRI data collection procedures in one embodiment. The length of the markers is also adjustable by, for example, cutting or tearing a substrate upon which a substantially fluid-free region straddles a specified separation position on the substrate.
Magnetic resonance method and apparatus to separate depiction of a tracked item from surrounding anatomy of a patient, using a transmit array system
In a method for detecting rotational orientation and position tracking of an inductively coupled RF (ICRF) coil using a transmit array system, a conventional body birdcage coil is used, but the quadrature hybrid is eliminated to use the two excitation-channels separately. The transmit array system provides RF excitations such that the body birdcage coil creates linearly polarized and circulating RF pulses instead of a conventional rotational forward polarized excitation. Inductively coupled RF (ICRF) coils can be constructed on catheters for detecting rotational orientation and tracking purposes. The modifications on anatomy and ICRF coil images are different due to the RF excitation scheme such that the ICRF coil can be separated from the anatomy in real-time. After separating the ICRF coil from the anatomy, a color-coded image can be reconstructed, for example.
Shielding of catheter handle
Electrical apparatus includes a probe, having a proximal end and a distal end. The probe includes a sensor, which outputs a sensor signal, and a first connector at the proximal end of the probe, electrically coupled at least to the sensor. A probe adapter includes a second connector, which is arranged to mate with the first connector, and a third connector, for coupling to a console. A shield includes a material of high magnetic permeability, which is configured to enclose an internal volume containing the first and second connectors when the probe is connected to the probe adapter.
Flexible, multi-channel microelectrode for recording laboratory animal EEG and method for recording laboratory animal EEG using the same
Disclosed are a novel, elastic, biocompatible, micro-sized, polyimide-based multi-channel microelectrode for recording of electroencephalography (EEG) from a laboratory animal including mouse, and a method for recording of laboratory animal EEG using the microelectrode. The microelectrode may include 2 grounding electrodes and 32 recording electrodes. A connector for signal transmission easily connects the microelectrode to a signal acquiring apparatus. The total weight of the microelectrode, including the connector, does not exceed 150 mg. Laboratory animal EEG, including that of mouse, provides the advantage of monitoring the brain state of a freely moving animal following a genetic or pharmaceutical manipulation. The microelectrode can be implanted without surgery and may be detached from wires while EEG is not recorded from the laboratory animal. The microelectrode can successfully acquire broadband EEG signals from the skull of the laboratory animal and is effective in monitoring spatial and temporal pattern of brain activities of the laboratory animal.
Loop structures for supporting diagnostic and/or therapeutic elements in contact with tissue
An apparatus which includes a dual loop structure that carries a plurality of operative elements. A guide with a distal indentation that may be used to reorient a dual loop structure.
Photoacoustic spectroscopy method and system to discern sepsis from shock
According to various embodiments, a medical system and method for determining a microcirculation parameter of a patient may include a photoacoustic sensor. Specifically, a signal from a photoacoustic sensor may be used to determine if a patient is likely to have sepsis or shock. Although sepsis and shock present similarly with regard to many patient parameters, they may be differentiated by characteristic microcirculation changes.
Disposable and detachable sensor for continuous non-invasive arterial blood pressure monitoring
A sensor system for continuous non-invasive arterial blood pressure (CNAP) is provided. The CNAP-sensor comprises of a base portion and a detachable and disposable portion. The base portion is connected to a control system. The disposable portion is for attachment to a human body part. The CNAP-sensor system includes a photo-plethysmographic (PPG) system having at least one light source, at least one light detector, electrical supplies, light coupling systems, one or more connectors, and a cuff including air supplies.
Multiplexed photodetector array for optical medical sensors
The present disclosure relates generally to medical devices and, more particularly, to optical medical sensors used for sensing physiological characteristics of a patient. In one embodiment, a system includes a physiological sensor having a photodetector array with a plurality of photodetectors configured to receive light from patient tissue. The physiological sensor also includes a multiplexor configured select and output a signal from the photodetector array. The physiological sensor may also include a signal analyzer configured to determine the signal quality for each of the output signals of the photodetector array and select an output signal, based on the signal quality determination, for the calculation of a physiological parameter of the patient. In another embodiment, a system includes a pulse oximetry sensor having a multiplexed array of photodetectors configured to receive light from patient tissue. The system also includes a pulse oximetry monitor having a multiplexor driver to control the multiplexed array of photodetectors as well as a processor configured to control the multiplexor driver and receive the output signals from the array of photodetectors. The processor is also configured to determine the signal quality of each of the output signals from the array of photodetectors, select an output signal based on the signal quality determination, and use the selected signal to calculate a physiological parameter of a patient.
Spectroscopic detection of malaria via the eye
Methods, apparatus, and systems for detecting hemozoin and diagnosing malaria infection are disclosed.
A communication device is capable of extending a power supply unit to a second casing without additional components. A mobile telephone includes a circuit board disposed at an operation unit-side casing, a circuit board disposed at a display unit-side casing, a circuit part formed on the circuit board having a ground pattern and a contact point, a reference potential pattern layer disposed at the operation unit-side casing and electrically connected to the ground pattern, a reference potential pattern layer disposed at the display unit-side casing, and an FPC unit. The FPC unit includes a signal line and a shield layer. The shield layer is electrically connected to the contact point in the operation unit-side casing and is thus electrically connected to the reference potential pattern layer in the display unit-side casing.
Wireless headphones with dual antennas
A wireless headphone assembly has left and right speakers attached to ends of a headphone body, and at least two antennas, e.g., one located at each speaker. Since multiple antennas are used, reception can be improved using one of several approaches, e.g., simple selection of the “best” antenna, multiplexing antenna input, using diversity algorithms such as multiple input multiple output (MIMO) algorithms, etc.
Mobile wireless communications device with reduced interfering energy into audio circuit and related methods
A mobile wireless communications device includes a housing and circuit board carried by the housing. RF circuitry and a processor are operative with each other and carried by the circuit board. A receiver speaker and microphone are carried by the housing. Audio circuitry is carried by the circuit board and operative with the RF circuitry and processor. A microphone audio switch and receiver speaker audio switch are carried by the circuit board and are connected with audio connection lines that interconnect the processor. A filter is operative with the audio connection lines and operatively connected to at least one of the microphone audio switch or receiver speaker audio switch to reduce conducted and radiated interfering RF energy from coupling into the audio circuitry.
A cellular phone includes a telephone line communication part, a telephone functional part for making a telephone call via the telephone line communication part, an entry qualification holding part for holding fixed-term entry qualification information in which an entry target is specified, which is received via the telephone line communication part, and an entry communication part for transmitting the fixed-term entry qualification information held by the entry qualification holding part.
In-vehicle apparatus having handsfree function
An in-vehicle handsfree apparatus stores a mail operation state while a message access profile (MAP) is being connected with a cellular phone. An incoming voice call from a communication network arises in the cellular phone while the in-vehicle handsfree apparatus is receiving mail information from the cellular phone. When the cellular phone answers the incoming voice call, the MAP is disconnected from the cellular phone. After completing the handsfree call relative to the incoming voice call, the reception of the mail information is resumed from the state just before the MAP was once disconnected.
Combined omni- and directional-communications in high-frequency wireless networks
In a wireless communication network, specific portions of the communication may combine directional transmission with omnidirectional reception. In particular, sector-level directional transmission may be established through sector sweeps, followed by antenna training for more directionality. In some embodiments, collisions during the exchange may be reduced by having different network devices use different sub-channels or different time slots. In some embodiments, each network may restrict its network communications to a single sub-channel that is different than the sub-channels used by adjacent networks.
Mobile communication base station antenna
A mobile communication base station antenna has a plurality of polarization diversity antenna blocks, each of the polarization diversity antenna blocks including a plurality of polarization diversity antenna elements, each of the polarization diversity antenna elements including antenna elements that are disposed to be orthogonal to each other. The polarization diversity antenna elements of one of the polarization diversity antenna blocks are interposed between the polarization diversity antenna elements of another one of the polarization diversity antenna blocks, and tilt angles in the vertical plane of the respective polarization diversity antenna blocks are different from each other.
Card device and mobile communication terminal
A card device that is loaded in a mobile communication terminal and is used for wireless communication, includes a transmission and reception circuit that generates a transmission signal to be transmitted in a wireless manner based on transmission data, and processes a received signal that has been received in the wireless manner; a first antenna that is used for signal transmission and reception in the wireless manner; an antenna terminal that is connected with a second antenna that is provided in the outside of the card device; and a switch that connects in a switching manner one of the first antenna and the antenna terminal to the transmission and reception circuit.
Dual mode apparatus and method for wireless networking configuration
A wireless networking system and method for wireless network configuration of dual mode wireless networking devices, such as a dual mode cordless telephone base station and one or more dual mode wireless network client devices. The dual mode wireless networking device includes a radio transceiver, a wireless network transceiver and a controller coupled therebetween. The dual mode devices wirelessly exchange network configuration data, via their respective radio transceivers, in response to the initiation of a wireless pairing between the devices by an end user. Within each device, the received network configuration data is transferred from the radio transceiver to the wireless network transceiver. The devices then establish a wireless networking communication or networking link, via their wireless network transceivers, based on the network configuration data exchanged therebetween. Upon such link being established, the client device is associated with the base station device and authenticated within the wireless network.
Method and apparatus for determining output transmit power for an access channel in a wireless communication network
A wireless device stores historical information for a prior access attempt and uses this information to lower the output transmit power for a current access attempt on an access channel. The historical information may include RF conditions for the prior access attempt, the performance for the prior access attempt, and a power value used for the prior access attempt. The power value may be a power adjustment or an initial power level. For the current access attempt, the wireless device obtains the historical information, determines the current RF conditions, and determines a power value for this access attempt based on the current RF conditions and the historical information. The wireless device determines the output power for each access probe based on the power value and other applicable parameters and sends each access probe at the determined output power. The wireless device updates the historical information upon completing the access attempt.
Processing an incoming request message and transmitting outgoing request messages to telephony devices located in various different geographic regions of a telephony system are provided. The telephony devices include at least one group of potential recipient telephony devices. A group of potential recipient devices include mobile telephony devices that can move between the various different geographic regions. An incoming request message comprising a telephony party identifier is received. The telephony party identifier is recognized as a telephony party identifier to be subject to location-based processing. A subgroup, including a plurality of potential recipient telephony devices currently within one or more target geographic regions associated with the recognized telephony party identifier, of the group of potential recipient telephony devices is determined. An outgoing request message is transmitted to each of a plurality of different telephony party identifiers, each being associated with a different potential recipient telephony device in the subgroup.
Remote messaging for mobile communication device and accessory
Message notifications to an accessory from a mobile communication device are provided according to some embodiments of the invention. When a message such as a text message, email, and/or voicemail is received at a mobile communication device, the mobile communication device can notify an attached accessory that a message has been received. In response, the accessory can request the full message, media associated with the message, an attachment to the message, and/or an audio/video stream of the message for presentation to a user.
Method, system and apparatus for alternate data service provisioning
A method, system and apparatus for providing an alternate data service to a mobile communication device. The apparatus includes a logic module operable to identify a wireless network accessible by the mobile communication device, a logic module operable to determine whether a packet data service is available to the mobile communication device via the wireless network and a logic module operable to effectuate an alternate data service when the packet data service is unavailable to the mobile communication device via the wireless network.
Methods and apparatus for managing messages
Methods and apparatus for managing messages may include receiving at a mobile device a message, such as a short message service (SMS) message. The methods and apparatus may further include determining a message priority for the message by comparing a source of the message with a set of rules defining the message priority. The methods and apparatus may further include determining one or more groups for the messages based upon the priority and placing the messages into the determined groups.
Methods and systems for sharing position data and tracing paths between mobile-device users
A system for exchanging GPS or other position data between devices for purposes of group activities, child location monitoring, work group coordination, dispatching of employees etc. Cell phones and other wireless devices with GPS receivers have loaded therein a Buddy Watch application that communicates with a remote Buddy Watch Server. The server gets or maintains position data for the wireless devices. When the server receives a request from a first device to set up a position-sharing relationship between it and a second device, the server calculates a path between the devices and transmits the path to each device. One or both users can then approach the other along the path. During this process, the server can receive updated position data from one or both devices, and if necessary recalculate the path based on the updated data.
Location-based and group-based operations on a data processing device
A system and method are described for location-based and group-based operations on a data processing device. For example, a computer-implemented method according to one embodiment of the invention comprises: establishing a group containing identities of a plurality of users within the group and notification data indicating when other users are to be notified about current locations of the users in the group; determining whether wireless data processing devices of two or more users of the group are at the same location or within a particular distance of the location; identifying the users and the location; and notifying other users in the group of the identity of the users and the location.
Positioning-assisted cell selection and handover for LTE
A cell-selection and a cell re-selection process include a wireless device that receives a signal from at least one node of a wireless network. The received signal can be a reference signal, an uplink signal, or a downlink signal, or a combination thereof. Location information of the wireless device is determined based on the received signal and transmitted to the wireless network. Information is received from the wireless network that contains a list of candidate nodes to which the wireless device can connect to the wireless network. The list of candidate nodes comprises a list of macro cell nodes, low-power cell nodes, or a combination thereof. The wireless device searches through the information containing the list of candidate nodes to determine a node for a connection to the wireless network.
Methods and systems for estimating available capacity of a base station within a wireless communications network
Systems, methods, and computer program products are provided for calculating an indicator of a quality of communication within a wireless communication access network and for estimating the available capacity of a base station within the wireless communication access network. In one exemplary embodiment, a method comprises receiving an indication, generated by a mobile terminal, of the quality of communication between the base station and the mobile terminal, and estimating the available capacity of the base station based on the received indication.
Systems and method for triggering location based voice and/or data communications to or from mobile ratio terminals
Systems, methods and devices for monitoring the location of mobile radio terminal users for the purpose of detecting when they approach within range of one or more target locations in order to trigger voice and/or data communications to or from the network or other mobile radio terminals.
Mobile communication terminal for controlling startup of application based on received message and information providing system
Information that is no longer valid due to the passage of time is not provided to a user. When a stock price information server acquires updated stock price information from a securities market network, a message that instructs that a predetermined application be started up and to which a term of validity has been attached is sent to a user terminal over a paging channel via an SMS server. When the user terminal receives the message, it determines whether or not the message is within the term of validity, and if it determines that the message is within the term of validity, starts up the instructed application from among a plurality of applications that are stored. The stock price information server then sends to the user terminal the stock price information that is requested by the started up application.
Mobile network monitoring
The present description refers in particular to a computer-implemented method, a computer program product and a device for measuring QoS in a mobile network, the method comprising: accessing at least one platform dependent API on a mobile device; obtaining, according to a set of QoS parameters, a first plurality of QoS measurement values from the mobile device by means of the API; and sending the first plurality of QoS measurement values to a first server.
Distributed locater, alert, repeater, and/or call technologies for communication devices
Systems, methods, and apparatus that utilize distributed locater, alert, repeater, and/or call technologies for communication devices are presented herein. A base component can be configured to receive a message at a base unit, the message corresponding to at least one of a call directed to a wireless communication device or another message directed to at least one of the wireless communication device or a wired communication device. The base component can distribute an alert to at least one remote unit based on the message. A remote component can be configured to receive the alert at the at least one remote unit, and broadcast the alert or another alert from the at least one remote unit. An interface component can be configured to receive an input at the at least one remote unit based on the alert. Further, the remote component can be configured to transmit a response based on the input.
Variable incoming communication indicators
An electronic device receives an incoming communication including an originating address. A user associated with the originating address is identified. A set of attributes associated with the incoming communication is identified. At least one incoming communication indicator presentation rule is selected based on at least one of the user that has been identified and the set of attributes that have been identified. An incoming communication indicator is presented based on the incoming communication indicator presentation rule that has been selected.
System for targeting advertising content to a plurality of mobile communication facilities
A system for targeting advertising content includes the steps of: (a) receiving respective requests for advertising content corresponding to a plurality of mobile communication facilities operated by a group of users, wherein the plurality includes first and second types of mobile communication facilities with different rendering capabilities; (b) receiving a datum corresponding to the group; (c) selecting from a first and second sponsor respective content based on a relevancy to the datum, wherein each content includes a first and second item requiring respective rendering capabilities; (d) receiving bids from the first and second sponsors; (e) attributing a priority to the content of the first sponsor based upon a determination that a yield associated with the first sponsor is greater than a yield associated with the second sponsor; and (f) transmitting the first and second items of the first sponsor to the first and second types of mobile communication facilities respectively.
System and method for centrally distributing mobile content
There are provided methods, systems, devices and computer program products for distributing mobile content, on behalf of mobile content providers, to mobile devices. A central mobile content delivery system and a central mobile content delivery store system are provided. Interfaces permit a mobile content provider to author and publish mobile content in association with subscription data. Content offers may be defined from such data and offered to mobile device user subscribers such as in a catalog system. Content is delivered on behalf of the content providers in accordance with the subscriptions concluded by the store system. Subscriptions may relate to single packages of mobile content or a plurality of packages (e.g. in a series of publications) such as previously or subsequently published mobile content. Subscriptions are provided to the central delivery system to assign and deliver mobile content to devices.
Method and system for provisioning wireless services
A method for provisioning wireless devices for use of services offered by a service provider on a wireless network, comprising: receiving at a provisioning system from a wireless device a wireless device identifier, the wireless device having a first subset of the services; identifying from the wireless device identifier a subscriber associated with the wireless device, the subscriber having a second subset of the services; and, if the first and second subsets conflict, enabling none, one, or both of the first and second subsets of services in accordance with conflict resolution information for the service provider.
Apparatus, and associated method, for providing enterprise-controlled voice services to wireless devices
An apparatus, and an associated methodology, provides control over operation of a voice-only, cellular mobile phone by an enterprise. An enterprise server provides selection of the operating capabilities of the voice-only wireless device. Once selected, the wireless device is caused to be provisioned to operate in conformity with the selected policy. Rather than sole control of the operational capability of the wireless device by a network operator, i.e., carrier, control of some operational capabilities of the device is carried out directly by enterprise personnel.
Mobile device having a protection mechanism for sensitive information
The present invention discloses a mobile phone comprising a gravity sensor, a processor, and a memory. The gravity sensor senses inertia data along a specific direction, the processor couples with the gravity sensor and receives a output signal from the gravity sensor, and the memory stores at least one personal information and operates under the processor's control. When either the gravity sensor or the processor detects a vertical free-fall motion, the processor performs a information security process to lock the personal information to become inaccessible.
Terminal and method for binding SIM card
A terminal and a method for binding Subscriber Identification Module (SIM) cards are provided. During an initialization of a SIM card, the terminal sends a terminal profile command to inform related items of a SIM Tool Kit (STK) supported by the SIM card. The SIM card provides the SIM card related operator information to the terminal by actively reporting a proactive command or providing menu items. The terminal judges whether the SIM card operator information of the STK function matches with the SIM card operator information stored in the terminal or not, if they match, the terminal allows the user to normally use the terminal; otherwise or the STK function does not provide the SIM card related operator information, the terminal does not allow the user to normally use the terminal. Therefore, the purpose of locking cards by the terminal is realized with the STK function of the SIM card.
System and method for secure management of mobile user access to network resources
A client-server system and method is provided for secure management of mobile user access to network resources from a wireless mobile device, such as a smart phone. A mobile access control layer resides between a wireless service provider network and host network, allowing for management of mobile access without overriding internal access policies. Access rules determining accessible resources and permitted operations are determined based on a user's group memberships, and optionally on other information received from the system, or from the mobile device, e.g. time or location. Each group is associated with a set of permitted accessible resources and operations, e.g. read or write access to a resource such as a file, list, shared calendar, et al. A list of accessible resources and permitted operations is generated, and the list is made available for subsequent processes, e.g. presented to the user for selection of an accessible resource and permitted operation.
Revenue management systems and methods with enhanced rollover
A revenue management system for telecommunication systems is disclosed. The revenue management system can have multiple integrated modules. The modules can include a revenue generation module, a revenue capture module, a revenue collection module, a revenue intelligence module, and others. The revenue management system can also be configured to simultaneously manage revenue for prepaid, postpaid, now-paid payment models.
Method for improving service data flow based charging and system thereof
A method for improving service data flow based charging and a system thereof are disclosed. A CRF may determine, according to input information provided by an AF or TPF, that the charging method for the current data flow service is an online or offline charging method, and provide the TPF with the charging rules with the corresponding mechanism. Moreover, the CRF may provide the TPF with the address information of an OCS or OFCS corresponding to the UE, to enable the TPF to address the corresponding OCS according to the address information of the OCS and trigger the following credit request procedure for the UE, or enable the TPF to address the corresponding OFCS according to address information of the OFCS and send collected charging data information of the UE to the OFCS. Therefore the charging procedure based on the FBC mechanism is more complete and more reasonable.
Monitoring activities of daily living using radio frequency emissions
Briefly, in accordance with one or more embodiments, a monitoring system is capable of monitoring the Activities of Daily Living (ADL) of one or more persons occupying a building. The monitoring system includes an information handling system having a radio-frequency (RF) scanner capable of scanning the RF ambient environment of the building. When an individual uses devices in the building that emit RF signals or emissions, the RF signals are detected by the RF scanner and analyzed by the information handling system. The characteristics of the detected RF signals are compared to a database of signature of known devices. If a detected RF signal matches the signature of a known device, the use of the device is logged into a database for ADL analysis.
Solutions for voice over internet protocol (VoIP) 911 location services
An E-9-1-1 voice-over-IP (VoIP) solution is provided wherein a 911 call from a mobile VoIP device is routed directly to the correct Public Safety Answer Point (PSAP) via dedicated trunks, together with correct location information and call-back number. VoIP gateways are implemented locally, at least one per LATA, and accept VoIP packetized data inbound, and convert it to standard wireline voice calls. Calls are routed to an IP address at the VoIP gateway, which then egresses the call to a voice port at a selective router. Mid-call updating of location of a moving VoIP terminal is provided to a PSAP. The location of the VoIP is validated using HTTP based protocol by pushing location information to a VoIP location server, and comparing it against a geographic location database to confirm that a contained street address is valid.
Method of managing power consumption of portable computer and portable computer using the same
The present invention relates to a power management method for portable computers with a wireless device and detects the electric power source of a portable computer through a power source detection circuit during the operation of portable computer. In addition, any one of the following is dynamically changed: the supporting rate of the connection interface between a wireless device and the portable computer, the data rate between the AP (Access Point) and the wireless device. Moreover, the invention provides a plurality of input methods for triggering the power saving modes of the portable computer to achieve the object of reducing power consumption.
Channel estimation method and device in a multi-antenna system
The present invention discloses a channel estimation method and device in a multi-antenna system. The method includes: obtaining the original channel estimation value of each array element of an array antenna for each uplink user received by the antenna; converting them into a channel estimation matrix; dividing the channel estimation matrix into an amplitude matrix and a phase matrix; grouping the elements of each array element at the same tap location in the amplitude matrix together for signal transformation processing and performing transform domain noise reduction to the high-frequency portion of the obtained transform domain data; inversely transforming the noise-reduced data to a noise-reduced amplitude matrix; and combining the noise-reduced amplitude matrix with the phase matrix into a restored channel estimation matrix, wherein the amplitude of each channel estimation value of the restored channel estimation matrix has undertaken a multi-antenna transform domain noise reduction process.
Signal transmission method, transmission circuit and apparatus
A signal transmission method suppresses a reflected wave of a transmission signal on a transmission line, by obtaining level and time information related to the reflected wave by computing a correlation between a data pattern of the transmission signal and the reflected wave, and correcting a waveform of the transmission signal based on the level and time information related to the reflected wave.
Gain control circuit and receiving system
Disclosed herein is a gain control circuit including: an amplifying section configured to amplify an input voltage in such a manner that amplitude of an output voltage at an output terminal is kept constant; an allowable voltage acquirer configured to acquire an allowable voltage of an apparatus connected to the output terminal; a voltage divider configured to divide the output voltage according to a ratio between a maximum voltage of the amplified input voltage and the allowable voltage; and an adjusting section configured to further amplify the amplified input voltage according to the ratio and supply a resulting voltage to the output terminal.
Receiver with hybrid reception estimation and methods for use therewith
A receiver includes an antenna array that generates received signals from a first remote transmitter and a second remote transmitter, the antenna array having a beam pattern that is controllable based a control signal. A plurality of receiver sections process the received signals to generate down-converted signals. A receiver processing module, generates the control signal to control the beam pattern to a first pattern during a first time period for reception from the first remote transmitter, generates a first reception estimate based on the down-converted signals during the first time period, generates the control signal to control the beam pattern to a second pattern during a second time period for reception from the second remote transmitter, generates a second reception estimate based on the down-converted signals during the second time period, and generates inbound data based on the first reception estimate and the second reception estimate.
Transmitter with replaceable power amplifier
A transmitter includes an up-converter and a modular receptacle. The up-converter is coupled to convert an input signal into a Radio Frequency (RF) signal having an output frequency, and is configurable to adjust the output frequency over a frequency range containing multiple sub-bands. The modular receptacle includes a first interconnection adapter coupled to the up-converter and a second interconnection adapter for coupling to an antenna. The receptacle is configured to receive between the first and second interconnection adapters a Power Amplifier (PA), which is selected from a group of power amplifiers each covering a respective sub-band in the frequency range.
Radio-frequency circuit having a transcoupling element
An RF circuit having a transcoupler, a multifunctional RF-circuit element that can operate both as an impedance inverter and as a signal coupler. When connected to a fixed load impedance, the transcoupler can also operate as an impedance transformer. The impedance-transformer/inverter functionality of the transcoupler can be used, e.g., to modulate the load of a power amplifier. The signal coupler functionality of the transcoupler can be used, e.g., to generate a corresponding feedback signal indicative of phase and/or amplitude distortions in the amplifier. The use of various embodiments of the transcoupler in an RF circuit can be advantageous, for example, because the transcoupler has a lower insertion loss than a cascade consisting of a prior-art impedance inverter and a prior-art directional coupler, occupies a relatively small area on the printed circuit board, and helps to reduce the per-unit fabrication and operating costs.
Multiple frequency band information signal universal front end with adjustable analog signal path components
A wireless device includes processing circuitry, a receiver section, a transmitter section, and an antenna. The processing circuitry determines a set of information signals of a RF Multiple Frequency Bands Multiple Standards (MFBMS) signal. The receiver section down-converts a portion of the RF MFBMS signal by one or more respective shift frequencies to produce a corresponding baseband/low Intermediate Frequency (BB/IF) information signal from which the processing circuitry extracts data. The transmitter section converts a respective BB/IF information signal received from the processing circuitry by a respective shift frequency to produce a corresponding RF information signal and a combiner that combines the RF information signals to form a RF MFBMS signal. Each of the receiver section and the transmitter section may include analog signal path elements that are adjustable based upon characteristics of the RF MFBMS signal, the BB/IF MFBMS signal, and/or based upon signals carried therein, e.g., modulation type, SNR requirements, etc.
Tunable antenna system with multiple feeds
Electronic devices may be provided that contain wireless communications circuitry. The wireless communications circuitry may include radio-frequency transceiver circuitry and antenna structures. The antenna structures may form an antenna having first and second feeds at different locations. The transceiver circuit may have a first circuit that handles communications using the first feed and may have a second circuit that handles communications using the second feed. A first filter may be interposed between the first feed and the first circuit and a second filter may be interposed between the second feed and the second circuit. The first and second filters and the antenna may be configured so that the first circuit can use the first feed without being adversely affected by the presence of the second feed and so that the second circuit can use the second feed without being adversely affected by the presence of the first feed.
Signal processing circuit, signal processing method and control program recording medium
A signal processing circuit includes a first multiplying unit which multiplies a first signal including a first frequency by a second signal including a second frequency and outputs a third signal, a second multiplying unit which multiplies the first signal by a fourth signal of a second frequency with phase lagging of a first phase difference relative to the second signal and outputs a fifth signal, a third multiplying unit which multiplies the first signal by the sixth signal of the second frequency with phase lagging of a second phase difference relative to the second signal and outputs a seventh signal, a first adding unit which adds the third signal, the fifth signal and the seventh signal respectively weighted and a signal generating unit which controls the first and the second phase difference based on a control signal and outputs the second, the fourth and the sixth signal.
Reconfigurable wireless transceiver
A reconfigurable wireless transceiver and method of use are disclosed. As one example, a reconfigurable wireless transceiver is disclosed, which includes a transmitter unit, a plurality of receiver units, and a processing unit coupled to the plurality of receiver units. A first receiver unit of the plurality of receiver units receives a first signal at a first frequency, and determines a strength level of the first signal. A second receiver unit of the plurality of receiver units searches for a second signal at a second frequency, detects the second signal at the second frequency, and determines a strength level of the detected second signal. The processing unit determines if the strength level of the detected second signal is greater than a predetermined value, and enables the second receiver unit to receive a third signal at substantially the second frequency, if the strength level of the detected second signal is greater than the predetermined value. The predetermined value may be substantially equal to the signal strength of the received first signal, and the third signal may be associated with over-the-air programming or tasking. As a second example, a method for reconfiguring a wireless transceiver is disclosed, which includes receiving a first signal in a first frequency band, determining a signal strength of the received signal, searching for a second signal in a second frequency band, detecting the second signal, determining a signal strength of the detected second signal, comparing the signal strength of the received first signal with a predetermined signal strength value, and enabling reception of the detected second signal and disabling reception of the first signal, if the signal strength of the detected second signal is greater than the predetermined signal strength value.
Methods and arrangements for CSI reporting
Some embodiments provide a method in a wireless device for reporting channel state information, CSI, for a CSI process. The CSI process corresponds to a reference signal resource and an associated interference measurement resource, IMR. According to the method, the wireless device obtains an interference power adjustment value. The wireless device estimates interference and noise based on the IMR, and on the interference power adjustment value. Furthermore, the wireless device determines channel state information based on an estimated effective channel measured based on the reference signal resource, and on the estimated interference and noise. Finally, the wireless device transmits the channel state information to a network node.
Radio communication device having carrier phase noise elimination function, and radio communication method
A radio communication device reproduces a carrier signal by eliminating phase noise from a carrier phase signal detected from a received baseband signal. Herein, a filtering characteristic having a default value is adopted to eliminate phase noise from the carrier phase signal with respect to a firstly received baseband signal. Integrated phase noise characteristics are calculated by adding a transmission-side phase noise characteristic, which is extracted from a radio frame demodulated from the carrier signal, to a predetermined reception-side phase noise characteristic. An optimum filtering characteristic is selected through comparison between a threshold and integrated phase noise characteristics. The selected filtering characteristic is adopted to eliminate a noise component from the carrier phase signal with respect to a subsequent baseband signal.
Systems, methods, and devices having databases for electronic spectrum management
Systems, methods, and apparatus are provided for automated identification of baseline data and changes in state in a wireless communications spectrum, by identifying sources of signal emission in the spectrum by automatically detecting signals, analyzing signals, comparing signal data to historical and reference data, creating corresponding signal profiles, and determining information about the baseline data and changes in state based upon the measured and analyzed data in near real time, which is stored on each apparatus or device units and/or on a remote server computer that aggregates data from each of the units.
Directional filter for separating closely spaced channels in an HF transceiver
Apparatus and methods of simultaneous transmission and reception in a single-antenna radio transceiver. The transceiver may be used, for instance, for communication between at least two terminals, by use of multiple intermediate recruited transceiver nodes. The recruited transceiver nodes receive a signal from a master mode, and then retransmit the signal to a receiver. The recruited transceiver nodes are designed to have reduced interference between the transmit channel and the received channel. In accordance with one aspect of the present application, embodiments can achieve more robust wireless communication between a transmitter and an over-the-horizon receiver. The robust wireless communication will have improved resistance to interference, including self-interference, and improved communication range.
Wireless communications using coinciding multiple pairing criteria
A system including a first mobile device and a second mobile device is disclosed. The first mobile device has a first interactive pairing criterion associated therewith, and the second mobile device has a second interactive pairing criterion associated therewith. The first mobile device includes a processor configured to perform and/or initiate the following. Upon the second mobile device being geographically positioned within a predetermined geographic distance from the first mobile device, an automatic query is issued to determine whether the first interactive pairing criterion and the second interactive pairing criterion at least partially coincide with one another. Upon a determination that the first interactive pairing criterion and the second interactive pairing criterion at least partially coincide with one another, a digital media file associated with the second mobile device is downloaded.
Automatic multimedia upload for publishing data and multimedia content
Disclosed herein is a method and system for utilizing a digital data capture device in conjunction with a Bluetooth (BT) enabled mobile device for publishing data and multimedia content on one or more websites automatically or with minimal user intervention. A client application is provided on the BT enabled mobile device. In the absence of inbuilt BT capability, a BT communication device is provided on the digital data capture device. The BT communication device is paired with the BT enabled mobile device to establish a connection. The client application detects capture of data and multimedia content on the digital data capture device and initiates transfer of the captured data, multimedia content, and associated files. The digital data capture device transfers the captured data, multimedia content, and the associated files to the client application. The client application automatically publishes the transferred data and multimedia content on one or more websites.
Mobile terminal and controlling method thereof
A mobile terminal including a power supply unit including a chargeable battery; a wireless power transmitting unit configured to transform power supplied from the battery into a magnetic field, and to transmit the magnetic field to at least one other terminal placed within a predetermined distance from the mobile terminal; and a controller configured to control an amount of power supplied from the battery to the wireless power transmitting unit.
Two-way communication in wireless power transfer
Disclosed herein is a wireless power transmitter for solving a problem that a collision occurs when recognizing an initial wireless power receiver in two-way communication of wireless power transmission. A wireless power transmitter according to a first embodiment disclosed herein may include a transceiver configured to transmit and/or receive a message to and/or from a wireless power receiver; and a controller configured to control the transceiver to transmit a message for requesting identification information to the wireless power receiver, and determine whether the identification information is validly received from the wireless power receiver by the transceiver in response to the identification information request, and control the transceiver to transmit a message for requesting sleep mode switching to the wireless power receiver when the identification information is validly received by the transceiver.
Mobile wireless communications device including parallel NFC loop antennas and associated methods
A mobile wireless communications device includes a portable housing, an NFC transceiver carried by the portable housing, and an antenna assembly coupled to the NFC transceiver and comprising a plurality of loop antennas connected in parallel, and progressively increasing in size from an innermost loop antenna to an outermost loop antenna.
Evaluation of the coupling factor of an electromagnetic transponder by capacitive detuning
A method for evaluating the current coupling factor between an electromagnetic transponder and a terminal, and a transponder implementing this method, wherein a ratio between data representative of a voltage across an oscillating circuit of the transponder and obtained for two capacitance values of the oscillating circuit is compared with one or several thresholds.
Adaptive offset-compensating decision-feedback receiver
A circuit that receives input signals from a transmitter via proximity communication, such as capacitively coupled proximity communication, is described. Because proximity communication may block DC content, the circuit may restore the DC content of input signals. In particular, a refresh circuit in the circuit may short inputs of the circuit to each other at least once per clock cycle (which sets a null value). Furthermore, a feedback circuit ensures that, if there is a signal transition in the input signals during a current clock cycle, it is passed through to an output node of the circuit. On the other hand, if there is no signal transition in the input signals during the current clock cycle, the feedback circuit may select the appropriate output value on the output node based on the output value during the immediately preceding clock cycle.
Wireless relay module for remote monitoring systems
A wireless relay module for networked communications between a series of medical devices and a remote monitoring device. The relay module communicates with the remote monitoring device over one or more internet-accessible wireless communication networks, and includes a receiver, transmitter for communicating over wireless relay networks, other transmitters for the one or more internet-accessible wireless communications networks; and a controller. The controller determines a status of the one or more internet-accessible wireless communications networks. When the status indicates that at least one of the interne-accessible wireless communications network is available, the appropriate transmitter is selected for the transmitting medical device data over the available internet-accessible wireless communications networks. When internet-accessible wireless communications networks are not accessible, the appropriate wireless relay network transmitter is selected for transmitting the data to another wireless relay module.
Method and apparatus for selecting and processing signals from a source station and relay stations
Techniques for selecting and processing signals from different stations in a wireless network are described. A destination station may receive a direct signal from a source station and at least one relay signal from at least one relay station. The destination station may determine metrics for the source and relay stations, e.g., based on pilots received from these stations. The destination station may select at least one signal to process from among the direct and relay signals based on the metrics for the source and relay stations. The destination station may select the direct signal if the metric for the source station exceeds a threshold. The destination station may select the relay signal from each relay station having a metric exceeding at least one threshold. The destination station may process the at least one selected signal to recover a transmission sent by the source station to the destination station.
Composite reporting of wireless relay power capability
A relay node (800) reports its output power capability to a donor base station or other network node separately for the relay node's backhaul and access links, which may have different maximum output power. A corresponding network node (900), such as a donor base station, an Operations & Maintenance node, an Operational Support Systems node, a Self-Organizing Network node, is configured to request the relay node (800) to report its backhaul link and access link output power class capabilities or maximum output powers or rated output powers to the network node (900), and then to receive the reported capabilities in response. The report may specify a per-antenna transmit power capability; this may be specifically requested in some cases. The received relay node power-class capability information for the backhaul and access links is then used for one or several network management functions, such as radio resources management or network planning and dimensioning.
Content creation in an online learning environment
A collaborative learning service allows for a participant to create and share content for discussion with other participants in an online learning environment. Tagged content along with descriptive content regarding the tagged content is received from a participant. The content may be associated with a particular topic and/or forum. The content is published into a forum for discussion amongst participants. Following the publishing of the content to the online learning environment, participants, such as educators and students, may discuss, interact, and collaborate with one another regarding the content. The content may be stored in a library of topics for subsequent retrieval by any participant namely an educator.
Object-based system and language for dynamic data or network interaction including learning management
A system including an object-oriented programming language for building state-based applications with flow control, event loops, measures of similarity, and Boolean logic to dynamically control the interaction between members in a social network around content and, in particular, project-based activities, where the system collects and groups individuals who are members of a social network, projects or assignments and their content, and activities or processes within projects based on the attributes of the objects and runtime events to create a social context for learning or for other interaction.
Sheet supplying device and image forming apparatus incorporating same
A sheet supplying device that is incorporatable in an image forming apparatus includes a recording media container, a sheet feeding unit to feed a recording medium from the recording media container, and a frame to support the recording media container and the sheet feeding unit. The recording media container is detachably attachable to the frame in a first operation in which the recording media container is moved in a sheet conveyance direction in which the recording medium is conveyed upstream or downstream by the sheet feeding unit, and the recording media container is separated from the frame and the sheet feeding unit with the sheet feeding unit remaining in the frame, and a second operation in which the recording media container is moved in a direction perpendicular to the sheet conveyance direction, and the recording media container is separated from the frame together with the sheet feeding unit.
Image forming apparatus
An image forming apparatus includes a plurality of N image carriers including first through Nth image carriers, a transfer unit including an endless transfer belt, a plurality of M belt supporting members including a plurality of first through Nth nip opposing members contacting the inner surface of the endless transfer belt at positions corresponding to where the plurality of N image carriers contacts the outer surface of the endless transfer belt to form N transfer nips thereat, the first opposing member defining a first supported area of the endless transfer belt, a contact and separation mechanism including a retaining unit to move the first supported area of the endless transfer belt into and out of contact with the first image carrier, and a mark detector to detect a plurality of adjacent marks formed at a predetermined pitch in a circumferential direction of the endless transfer belt.
Automatic mob sensor timing adjustment
When reading calibration chevrons during mark-on-belt (MOB) sensor timing calibration, cyan portions or legs of printed chevrons are detected in order to determine a timing window offset adjustment. Depending on which of the six cyan legs on the left side of the chevrons are detected, a determination can be made regarding whether the window needs to be started earlier or later. If only the first two cyan legs on the left side of the chevron are detected, then the MOB sensor timing window is beginning (and ending) too early and an appropriate adjustment can be made to cause the timing window to initiate later. If only the last two cyan legs on the left side of the chevron are detected, then the MOB sensor timing window is beginning (and ending) too late, and appropriate adjustment can be made to cause the timing window to initiate earlier.
Image forming apparatus capable of effectively developing images
An image forming apparatus, a process cartridge, and a developing unit includes a developer carrying member to carry developer, first and second rotary members arranged in parallel to each other and configured to rotate to agitate and convey the developer, and an enclosure having an inside space to contain the developer, the inside space being divided by a partition with communication openings formed therein at opposite ends thereof into a first chamber configured to maintain the developer above a first level and to hold the first rotary member therein which supplies the developer to the developer carrying member while agitating and conveying the developer, and a second chamber configured to communicate with the first chamber through the communication openings, to maintain the developer at a second level lower than the first level, and to hold the second rotary member therein which circulates the developer with the first chamber through the communication openings.
Image forming apparatus
The present invention provides an image forming apparatus, including: an image carrier configured by a positively charged single-layer electrophotographic photosensitive body; a charging device which is based on a contact charging method for charging a circumferential surface of the image carrier while making contact with the circumferential surface of the image carrier; and a transfer unit which transfers a toner image on the circumferential surface of the image carrier to a transfer receiving body by gripping the transfer receiving body with the image carrier, wherein the transfer unit includes an application unit to which a transfer bias is applied, and a region having a volume resistivity of 107 to 109 Ω·cm exists between the image carrier and the application unit.
Image forming apparatus
An image forming apparatus includes a rotatable image carrier, a detachable transfer body on which an image is transferred, a contact and separation mechanism that moves the transfer body into contact with and away from the image carrier, and a coupling member to be coupled to the contact and separation mechanism. When the coupling member is turned forward to a first turn position in a coupled state coupled to the contact and separation mechanism, the contact and separation mechanism contacts the transfer body with the image carrier, and when the coupling member is turned in reverse from the first turn position to a second turn position in the coupled state, the contact and separation mechanism separates the transfer body from the image carrier and the coupling member withdraws in a direction opposite a direction to couple the coupling member to the contact and separation mechanism.