Scanning probe microscope
A scanning probe microscope including: a scanning probe microscope unit section including, a cantilever having a probe, a cantilever holder configured to fix the cantilever, a sample holder on which a sample is configured to be placed, a horizontal fine transfer mechanism configured to relatively scan a surface of the sample with the probe, a vertical fine transfer mechanism configured to control a distance between the probe and the sample surface, an optical microscope configured to observe the cantilever and the sample; a control device; an imaging device to which a viewing field, wider than that of the optical microscope and capable of observing the cantilever and the sample at the same time, can be set; and an image display device configured to display images observed by the optical microscope and the imaging device.
Self-contained device security
Self-contained security for memory devices or, alternatively, for other devices and/or other types of machinery to be protected with user authentication. User authentication occurs within the device itself, enabling access to be physically unlocked when the proper security code is provided. A dialing approach is used, whereby a user rotates a disk-shaped device through a sequence of numbers or other symbols, in a similar manner to rotating the dial of a padlock. The device is inserted into a host device or receptacle (such as a Universal Serial Bus, or “USB”, port), and receives power therefrom.
Regulator of commands which are destined for a sensitive application
The present invention describes a method and a software module making it possible to secure communications with a sensitive application, for which exchanges with the outside have been delegated to a so-called interfacing application. Accordingly, the present invention describes the application of security rules to all or some of the commands destined for this sensitive application.
Method for controlling content and digital device using the same
A method and device for controlling content that includes plural display pages in a sequence, the method including: displaying a current page included in the content; receiving a user input to or above a display screen of the display unit for changing from the current page to another page of the content; extracting fingerprint information from the user input; determining whether the content of the another page is or is not accessible based on the extracted fingerprint information; if all of the content of the another page is determined to be accessible based on the extracted fingerprint information, displaying the another page; and if any of the content of the another page is determined not to be accessible based on the extracted fingerprint information, displaying a page following the current page without displaying content of the another page that was determined not to be accessible.
System and method for authenticating a user
According to an embodiment, a system is provided comprising a memory and a processor. The memory may be operable to store a master image associated with a user account. The master image may comprise an image of a physical, non-living object. The processor may be coupled to the memory and may be operable to receive a request to perform a transaction associated with the user account. The processor may be further operable to receive an image that is scanned in real-time in conjunction with the request to perform the transaction. The processor may be further operable to compare the scanned image with the master image associated with the user account and to perform the transaction if the scanned image is substantially similar to the master image.
Method for playing digital contents protected with a DRM (digital right management) scheme and corresponding system
A method for playing DRM-protected contents, the protected contents being downloaded by a user device from a media server in the form of protected segments, comprises executing a DRM proxy inside the user device, the DRM proxy interfacing the media server and a player configured to implement the HLS protocol; executing an HLS server in the DRM proxy; registering the DRM proxy to handle HTTP requests; producing by the DRM proxy a playlist in HLS format including a list of URLs locating the individual protected segments on the user device; processing the playlist in the player; in the DRM proxy, acquiring a license to access the protected segment identified by the URL of a current request; decrypting the protected segment in the DRM proxy based on the license; and returning a segment based on the decrypted segment to the player in response to the current URL request.
Reducing a size of a security-related data object stored on a token
Embodiments of the present invention provide a method and system, including a client and security token, for reducing a size of a security-related object stored in the token. The object is stored in a storage structure that is indexed according to an identity reference to a certificate associated with the object and a private key identifier identifying a private key assigned to an owner of the token. A request to access an encrypted data object results in accessing the private key identifier in the storage structure using only the identity reference as an index.
Defensive techniques to increase computer security
Among other disclosed subject matter, a computer-implemented method includes executing a plurality of virtual machines on a physical machine, wherein a first virtual machine of the plurality of virtual machines executes an encryption process. Execution of a hostile process that is configured to compromise the encryption process is detected, wherein the hostile process executes in a second virtual machine of the plurality of virtual machines. Migrating at least the second virtual machine to a different second physical machine based on the detection of the execution of the hostile process.
Online fraud detection dynamic scoring aggregation systems and methods
In some embodiments, an online fraud prevention system combines the output of several distinct fraud filters, to produce an aggregate score indicative of the likelihood that a surveyed target document (e.g. webpage, email) is fraudulent. Newly implemented fraud filters can be incorporated and ageing fraud filters can be phased out without the need to recalculate individual scores or to renormalize the aggregate fraud score. Every time the output of an individual filter is calculated, the aggregate score is updated in a manner which ensures the aggregate score remains within predetermined bounds defined by a minimum allowable score and a maximum allowable score (e.g., 0 to 100).
Systems and methods for risk rating and pro-actively detecting malicious online ads
Methods and systems for risk rating and pro-actively detecting malicious online ads are described. In one example embodiment, a system for risk rating and pro-actively detecting malicious online ads includes an extraction module, an analysis engine, and a filter module. The extraction module is configured to extract a SWF file from a web page downloaded by the system. The analysis engine is communicatively coupled to the extraction module. The analysis engine is configured to determine a risk rating for the SWF file and send the risk rating to a web application for display. In an example, determining the risk rating includes locating an embedded redirection URL and determining a risk rating for the embedded redirection URL. The filter module is configured to determine, based on the risk rating, whether to block the SWF file and send a warning to the web application for display.
Secure system for allowing the execution of authorized computer program code
Systems and methods for selective authorization of code modules are provided. According to one embodiment, a whitelist containing cryptographic hash values of code modules that are approved for loading into memory of a computer system and execution on the computer system is maintained by a kernel mode driver of the computer system. At least a subset of the cryptographic hash values has been included within the whitelist based upon results of application of one or more behavior analysis techniques to a corresponding subset of code modules. The kernel mode driver monitors a set of events occurring within one or more of a file system accessible by the computer system and an operating system that manages resources of the computer system. The kernel mode driver causes a cryptographic hash value of a code module relating to an observed event of the set of events to be authenticated with reference to the whitelist. When the cryptographic hash value matches one of the cryptographic hash values of approved code modules within the whitelist, the code module is allowed to be loaded and executed within the computer system.
Reassembly-free deep packet inspection on multi-core hardware
Some embodiments of reassembly-free deep packet inspection (DPI) on multi-core hardware have been presented. In one embodiment, a set of packets of one or more files is received at a networked device from one or more connections. Each packet is scanned using one of a set of processing cores in the networked device without buffering the one or more files in the networked device. Furthermore, the set of processing cores may scan the packets substantially concurrently.
Methods and systems for internet protocol (IP) packet header collection and storage
A computer-based method for providing information about a potential security incident ascertained from received internet protocol (IP) packets is described. The method includes capturing IP packets from a computer network, stripping packet header data from the captured IP packets, reviewing the stripped packet header data for multiple occurrences of matching packet header data, and storing, in a database, only a single instance of packet header data for any reviewed packet header data that is determined to have occurred multiple times.
Method for producing dynamic data structures for authentication and/or password identification
A method for generating a changing authentication input or password for a user is provided for accessing a computing device such as a smartphone or computer. Using objects displayed in sequential positions on a graphic display, and input strings of text or alphanumeric characters the user has related to each object, a password can be generated by placing the input strings in an order the same as the sequence. The password can be varied easily for each access attempt by changing the objects displayed and/or the sequence.
Security-enhanced computer systems and methods
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each with their own processing units and memories, and a defined set of interfaces that interconnect the two sub-systems and the external world. One sub-system is designed to provide a familiar environment for running computer applications. The other sub-system is designed to provide a secure bridge between the first sub-system and users via input and output devices.
Network security protection
A method and system for providing security to a Network Job Entry (NJE) network. A first NJE node and a third NJE node are connected by a second NJE node. The second NJE node conducts a security check of NJE packets traveling between the first and third NJE nodes. The security check performed by the second NJE node includes checking the userid of the person or job that sent the NJE packet, as well as the NJE data type. The NJE data type may be classified by the type of operation being performed, such as a batch job, sysout, command, message, as well as what application is being used. In one preferred embodiment, the security check includes checking the security level of the source of the data being transferred, such as a sensitive application. The security check can be based on the size of the data packet, such that excessively large data packets from a particular user are not permitted to be transmitted outside a secure NJE network.
Policy-based content filtering
Methods and systems are provided for processing application-level content of network service protocols. According to one embodiment, one or more content processing configuration schemes are defined within a firewall device. Each of the one or more content processing configuration schemes including multiple content processing configuration settings for one or more network service protocols. The one or more content processing configuration schemes are stored by the firewall device. One or more of the stored content processing configuration schemes are associated with a firewall policy by the firewall device.
Automating network reconfiguration during migrations
Automating network reconfiguration such as firewall reconfiguration in migrations may include determining network reconfiguration needs in one or more network functionalities of the target environment based on the discovering; and applying the network reconfiguration needs to the one or more network functionalities in the target environment.
System and method for the management of secure electronic correspondence sessions
A system and method for the management of secure electronic correspondences. The system includes at least one directory, at least one domicile server, at least one processing operator and at least one certification operator. The correspondence sessions are opened by a strong authentication procedure comprising the routing of a secret code over a channel different from the session channel and an identifier specific to the current session. In addition, in order to allow the delivery of correspondence to be sent, it is necessary for the validity of the trust attributes of the sender, the recipients and those involved in the document processing chain be certified by the certification operator for the level required for delivery. The compliance of the processing operations with the operator's specifications is checked by sending, acknowledging and returning certification tokens specific to each of the processing steps.
Anonymous personal content access with content bridge
An online content publishing and consumption environment can be modeled such that communities of content consumers (users), such as educational institutes and libraries, are categorized as Content Brokers; content providers, such as book, music, and multimedia publishers, and news sources, are categorized as Content Providers; and a Content Bridge, a standalone component providing the functionalities of the presently claimed invention in the online content publishing and consumption environment. The Content Bridge allows a simpler and loosely-coupled integration with lowered integration cost and effort, as the Content Broker is required to integrate once only with the Content Bridge instead of having to integrate individually with every Content Provider.
Authenticating use of a dispersed storage network
A method begins with a managing unit authenticating an access request regarding a set of encoded data slices, which represents an encoded data segment. The method continues, when the access request is authenticated, by generating storage unit access requests based on the access request regarding the set of encoded data slices. The method continues with the managing unit authenticating the storage unit access requests. When the storage unit access requests are authenticated, the method continues with the storage units executing the storage unit access requests to fulfill the access request regarding the set of encoded data slices.
Methods and systems for completing, by a single-sign on component, an authentication process in a federated environment to a resource not supporting federation
A system for distributed authentication includes a client machine, in a first domain in a federation, that receives from a user a first set of authentication credentials. The system also includes an intermediate machine in a second domain in the federation, a server, also in the second domain, a password management program executing on the server and a non-federated resource. The intermediate machine authenticates the user responsive to receiving the first set of authentication credentials and identifies a second set of authentication credentials. The server in the second domain authenticates the user, responsive to the second set of authentication credentials. The password management program, executing on the server, retrieves a third set of authentication credentials associated with the user. The non-federated resource authenticates the user, responsive to receiving, from the password management program, the third set of authentication credentials.
Configuration of accessories for wireless network access
A portable computing device can enable an accessory to access a wireless network. In particular, the portable computing device can provide a wireless network access credential to the accessory. The accessory can thereafter use the wireless network access credential to access a wireless network. The portable computing device can additionally configure an access point that manages the wireless network to permit the accessory to join the wireless network.
Method and apparatus for controlling the number of devices installed in an authorized domain
The number of devices installed in an Authorized Domain is controlled by a master device functionality. This master devices stores ceiling values for the total number Totaljimit of devices to be installed in the AD; the total number Localjimit of devices to be installed in a local proximity with the master device and the total number Remotejimit of devices to be installed remotely from said master device. The master device also stores current values of the number Local_count of devices installed in the AD in local proximity with the master device; and the number Remote_count of devices installed in the AD remotely from said master device. When a new device is to be installed in the AD, the ceiling values are checked with respect to the current values and it is checked whether the device is in local proximity with the master device to authorize or not its installation in the AD, either locally or remotely.
System and method for capturing network traffic
In certain embodiments, a method includes receiving, by a capture device, traffic flows transmitted by a plurality of client devices, each of the traffic flows being associated with one of the plurality of client devices and comprising encrypted data. The method further includes receiving, by the capture device, flow information communicated from a proxy server communicatively coupled to the capture device, the flow information comprising an identification of a particular traffic flow and a session key associated with the particular traffic flow. The method further includes storing, by the capture device, encrypted data of the particular traffic flow identified by the flow information supplied by the proxy server; storing, by the capture device, the session key associated with the particular traffic flow; and discarding, by the capture device, any of the plurality of received traffic flows not identified in the flow information received from the proxy server.
Affluent social networking website
A system that includes at least one processor and computer executable instructions readable by the at least one processor and operative to host at least one affluent social networking web site, provide at least one artificial intelligence assistance service to a user of the at least one affluent social networking web site, and use a biometric identifier to verify the identity of the user or restrict access to at least a portion of the affluent social networking website.
Modular device authentication framework
Systems, methods, and computer-readable media provide a requesting device with access to a service. In one implementation, a server receives a request to access a service, and the request includes a device type identifier of a device requesting access to the service. The server extracts the device type identifier from the request and determines a corresponding device type for the requesting device. An authentication module is selected from a plurality of authentication modules based on the device type identifier, and the selected authentication module implements an authentication scheme for the device type of the requesting device. The server authenticates the request using the selected authentication module to determine whether the requesting device is permitted to access the service, and provides access to the service based on at least a determination that the requesting device is authorized to access the service.
Applying network traffic policy to an application session
Applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway; determining by the security gateway a user identity of the application session using information about the application session; obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session.
Multimodal computing device
Technologies described herein generally provide a multimodal device capable of providing at least dual usage. In an example, the multimodal device may include base hardware and a hypervisor that runs on the base hardware. A work virtual machine may include a work operating system that is configured to operate on the hypervisor. A home virtual machine may include a home operating system that is configured to operate on the hypervisor. The work virtual machine may further include an arbitrator operating system that is configured to operate on hypervisor. The arbitrator operating system may be configured to run a smart arbitrator server. The smart arbitrator server may be configured to provide a gateway between the work virtual machine and the home virtual machine. The smart arbitrator server may also be configured to enforce various policies between the work virtual machine and the home virtual machine.
Mobile communication device surveillance system
A mobile communication device surveillance system is described. The system includes a gateway, a web server, a wireless mobile communication device, and a client device. The web server introduces the wireless mobile communication device to a gateway. The gateway authenticates the wireless mobile communication device. The gateway receives media data from the wireless mobile communication device and monitoring data from a security device connected to the gateway. The gateway aggregates the media data and the monitoring data, and communicates the aggregated data to the client device authenticated with the gateway.
Virtual security boundary for physical or virtual network devices
A method and apparatus is disclosed herein for using a virtual security boundary. In one embodiment, the method comprises receiving information from a virtual machine after the virtual machine has been moved from a first physical location in a network to a second physical location in the network, where the information identifies the virtual machine as one previously assigned to a security boundary; determining that access to the virtual machine at the first physical location was permitted by the security gateway; assigning the virtual machine at the second physical location to the security boundary, and applying a security policy associated with the security boundary to communications between the network and the virtual machine at the second physical location.
Methods, systems, and computer readable media for providing nested policy configuration in a communications network
Methods, systems, and computer readable media for providing nested policy configuration in a communications network are disclosed. The method is performed at a policy and charging rules function (PCRF) node. According to one method, first policy profile information associated with a first identifier is obtained from a policy profile database, where the first identifier is associated with a first subscriber and where the first policy profile information includes a second identifier. Second policy profile information associated with the second subscriber is obtained, using the second identifier obtained with the first policy profile information, from the policy profile database.
Audio/video storage/retrieval system and method
An audio/video storage/retrieval system and method that permits efficient and cost-effective simultaneous recording of multi-channel A/V information from a variety of sources is disclosed. The system/method may be broadly described as generally incorporating baseband conversion of source RF modulated A/V information followed by analog-to-digital conversion and storage on a storage device utilizing a dual port interface that incorporates an additional computer access port to permit transparent storage access by a computer system. Retrieval of stored A/V programming from the storage device via the dual port interface permits the stored A/V data to be converted to analog and RF modulated for presentation to an A/V presentation device. Additional A/V source and/or target selectors may be incorporated into the system/method to permit recording a plethora of A/V sources such as raw A/V signaling, OTA broadcasts, clear/encrypted cable QAM broadcasts, cable set top boxes (STBs), and the like.
Data tunneling via closed captioning
An example apparatus that processes DTVCC data has a demultiplexer that extracts DTVCC data packets from an DTV signal. A parser receives the DTVCC data packets and parses the data packets by: passing normal DTVCC data to a CC decoder; detecting ancillary data in the DTVCC data packets; and separating the ancillary data from the DTVCC data for output to an ancillary data process. An example apparatus that processes DTVCC data has an ancillary data packager that packages data ancillary to DTV data for insertion into the DTVCC data packets. A DTVCC data packager receives CC data from a CC data source into DTVCC data packets and packages the ancillary data together with the DTVCC data into DTVCC data packets. A multiplexer multiplexes the DTVCC data packets from the DTVCC data packager with non-CCDTV data to produce DTV signal data. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.
Resolution recommendation for displaying content items
When a request for a content item is received from a device, the resolution parameters of the device are identified. Based on the resolution parameters of the device, a selection is made as to a version of the content item to recommend from a plurality of versions of the content item. Each version of the content item has a different resolution. A recommendation is provided to the user of the device that the selected version of the content item be displayed on the device.
Method and system for receiving and processing digital content
An intelligent device is configured to receive a DTV signal that includes audio/visual information as well as data signals in a datacast format. The datacast format includes web pages, e.g., in the HTML (hypertext markup language) format of the world wide web. An intelligent filter modifies itself based on user behavior and user preferences in terms of the web pages that a viewer routinely visits. The intelligent filter is then used to identify certain web pages of the pages that are being broadcast and these identified web pages are stored in a cache memory for later use by the viewer. A second tuner can be used to poll multiple channels when updating the cached contents. Cached web pages avoid broadcast latencies (due to periodic updating) and thereby are displayed faster to the viewer.
Method and system for region-based monitoring of video assets
A method and system for monitoring video assets provided by a multimedia content distribution network (MCDN) includes an expert test monitoring platform (ETMP) configured to emulate MCDN client systems at a facility of an MCDN service provider. The ETMP may be used to test monitor MCDN performance by acquiring a baseband video signal and performing a test operation including at least one check point condition. The check point condition may be associated with a masked region of the video signal and may also involve a test of an audio channel. A plurality of test operations and/or check point conditions may be defined and executed on the baseband video signal, while the results of the test operation may be logged.
Methods and apparatus for business-based network resource allocation
Methods and apparatus for optimizing the distribution and delivery of content within a content-based network based on e.g., business or revenue considerations. In one embodiment, the network comprises a cable television network that utilizes a Global Session Resource Manager (GSRM). The GSRM processes subscriber program viewing requests to identify options available to fulfill the request (including, e.g., providing free on-demand (FOD), standard definition on-demand (SVOD), and/or high definition on-demand (HDVOD) content), and evaluate these options to determine the one that optimizes network revenue or profit. The GSRM performs this identification and evaluation process by considering various parameters including network resource (e.g., bandwidth) availability, and different revenue and profit implications for different classes of service, the individual or collective demographic or other profile of network subscribers, and other business or operational rules programmed by the operator of the network. Business methods based on such network optimization are also described.
Methods, systems and apparatus for providing video transmissions over multiple media
Various embodiments of the invention provide novel apparatus, methods and systems for providing relatively high-speed bandwidth to enable, inter alia, video transmission services over media previously unable to support such services. In accordance with certain embodiments, a device located at the telecommunication service provider can logically couple two or more physical media to provide a single, consolidated source of bandwidth, which can be used to transmit data, which can represent a video signal. In accordance with other embodiments, a device located at the subscriber's location can be used to receive the data from each of the two physical media and recreate the video signal from the data, such that the video signal can be transmitted to a display device, such as a television, monitor, etc.
Method of integrating content on guest device with hospitality media system, and hospitality media system thereof
A hospitality media system includes a media system controller and a plurality of media devices located in a plurality of rooms and coupled to the media system controller. Each room has one or more in-room media devices located therein for performing a media function. A connection port allows a user of a room to establish data communications between the media system controller and a guest device. The media system controller is coupled to the connection port and configured to catalogue guest content available on the guest device to thereby form a guest content list, associate the guest content with one or more associated rooms at least including the user's room, and perform the media function utilizing content selected from the guest content list only on the in-room media devices located within the one or more associated rooms.
Data on demand using a centralized data storage device
Herein described is a system and a method of storing and distributing multimedia data selections to the tenants or occupants of a multi-unit building. The multi-unit building may comprise a hotel, motel, office complex, or apartment complex, for example. The storage capacity of the data storage device may be easily expanded by way of adding one or more additional hard disk drives. The data storage device may be conveniently located in a front office or manager's office of the multi-unit building. The system distributes one or more of the stored multimedia data selections to one or more display devices communicatively coupled to the data storage device. Each of the one or more display devices may be located in corresponding units of the multi-unit building. The one or more display devices are used to view the multimedia data selections requested by a tenant or occupant.
Video rotation interface
According to the invention, a program delivery system for playing a plurality of video vignettes, which correspond to a plurality of video programs is disclosed. The program delivery system includes a first store, a second store a command signal. In one example, a method for selecting the types and order of video vignettes to be played can be selected. The first store holds a number of programs, where the number of video programs includes a first and second video programs. The second store holds a number of video vignettes that correspond to the number of video programs. The number of video vignettes includes a first and second video vignettes. The first video vignette promotes at least the first video program, and the second video vignette promotes at least the second video program. The command signal causes playing the first video vignette, but switches to cause playing the second video vignette when either a manual command is detected from a user or a triggering event automatically occurs.
Media content retrieval system and personal virtual channel
A system is disclosed for media content search and retrieval, and a virtual television channel capable of using that system. The present system may be implemented on a computing device, such as for example a media service server, and a client device, such as for example a set top box for a television system, a mobile telephone, a personal digital assistant or a gaming console. A first aspect of the present system relates to a media download control engine which enables a client device with limited capabilities to play media content which comes from a website in a format not supported by the client device. A second aspect of the present system may make use of the media download control engine to obtain media content and create customized virtual channels. The second aspect in particular relates to a virtual channel engine that schedules a continuous stream of content for the user, which content is selected based on topics of interest to the user.
Content with customized advertisement
The invention provides a method and system for customizing advertisements to the individual viewer or user receiving a content which may be generic or customized, subject to or independent of, a broadcast schedule.
A system and a method for playing a photograph-based game are provided. The method includes establishing a communication link between a game playing system and one or more game playing devices, each of which is operated by a respective player. Game rules are presented to the player(s) on the respective game playing device(s). The game rules include at least one task for the submission of at least one photographic image. Provision is made for receiving a photographic image in the game playing system which has been submitted via the established link from the game playing device in response to the presented task. An image signature is computed for the submitted photographic image based on visual features extracted from the image and a relevance to the task is computed, based on the computed image signature. A score for the game is output for each player, based on the computed relevance of the submitted images for each of the tasks.
Methods and apparatus to identify exposure to 3D media presentations
Methods and apparatus are disclosed to identify exposure to 3D media presentation. An example apparatus includes 3D glasses components to enable presentation of a 3D media presentation. The example apparatus includes 3D glasses to enable viewing of a 3D media presentation. The example apparatus includes a motion sensor carried by the 3D glasses to generate a movement signal. The example apparatus includes a transmitter carried by the 3D glasses to transmit the movement signal.
Method and system for electronic commerce using internet protocol television (IPTV) and mobile terminal
An electronic commerce method and system using an Internet Protocol Television (IPTV) and a mobile terminal are provided. In an electronic commerce method and system, an IPTV or mobile terminal transmits binding information to a server where a purchaser selects product information, the server determines a purchaser authority using the received binding information, and transmits sales information for the selected product information to the mobile terminal in response to the purchase authority being valid, and the mobile terminal makes an offer to purchase the product to the server using the received sales information.
Clamping apparatus for carrying a disk in an optical disk drive
A clamping apparatus for being disposed in an optical disk drive and carrying a disk is provided. The clamping apparatus includes a base, a spindle assembly, a pawl and a buffer element. The spindle assembly is disposed on the base and rotating about an axis. The pawl is assembled to the spindle assembly. The disk is configured to be locked to the pawl, such that the spindle assembly drives the pawl and the disk to rotate about the axis. The buffer element is assembled to the spindle assembly, and the buffer element is located above the pawl. The buffer element interferes with the disk when the disk is separated from the pawl.
Software technique to correlate conceptually similar entities
Various technologies and techniques are disclosed for providing a framework with a common set of domain-specific entity identifier types that object models representing conceptually similar entities from a domain can use to correlate to model-specific object instances. A particular model-specific object instance of a particular one of the object models can be retrieved using a common set of domain-specific entity identifier types. An instance of a particular domain-specific entity identifier type can be retrieved from a corresponding one of the model-specific object instances. One or more extensibility mechanisms allow third parties to extend the set of domain-specific entity identifier types.
Predicting the impact of change on events detected in application logic
A search facility is used to predict the impact of change on events detected in application logic, where the change may involve a computing resource used by or referenced by the application logic and/or by event detection logic. The search may be performed prior to making a change, in order to judge potential impact of the change, or after the change has been made. The search makes the prediction by evaluating semantics of conditions that specify when and/or and how an event will be detected at run-time.
Audio feedback for command line interface commands
A system for providing audio feedback for command line interface (CLI) commands in a computing environment. Auditory notifications are generated for indicating a completion of CLI commands. The auditory notifications are configurable by user preferences.
CORBA embedded inter-orb protocol (EIOP)
A non-transient computer-readable storage medium that stores computer program code is provided. When this code is loaded into a computer system and executed thereon, it causes the computer to compile an interface definition language (IDL) configured to provide a custom inter-orb protocol (custom IOP), configure a message header for a message in accordance with to a specification in the IDL for at least a custom-IOP message header, and define a custom-IOP message header to replace the corresponding Common Object Resource Broker Architecture (CORBA) General Inter-Orb (GIOP) message header, wherein the custom-IOP message header requires fewer bits overall than the corresponding GIOP message header by changing or eliminating at least a portion of the fields in the corresponding GIOP message header.
Work plan prioritization for application development and maintenance using pooled resources in a factory
A computer implemented method, system and/or computer program product schedules execution of work requests through work plan prioritization. One or more work packets are mapped to and assigned to each work request from a group of work requests. A complexity level is derived for and assigned to each work packet, and priority levels of various work requests are determined for each entity from a group of entities. A global priority for the group of work requests is then determined. The global priority and the complexity levels combine to create a priority function, which is used to schedule execution of the work requests.
System and method to optimize OS scheduling decisions for power savings based on temporal characteristics of the scheduled entity and system workload
In some embodiments, the invention involves a system and method to enhance an operating system's ability to schedule ready threads, specifically to select a logical processor on which to run the ready thread, based on platform policy. Platform policy may be performance-centric, power-centric, or a balance of the two. Embodiments of the present invention use temporal characteristics of the system utilization, or workload, and/or temporal characteristics of the ready thread in choosing a logical processor. Other embodiments are described and claimed.
Virtual machine updates
Various systems, processes, and products may be used to update virtual machines. In particular implementations, a system, process, and product for updating virtual machines may include the ability to determine whether a change to a portion of an operating system for a virtual machine is available and identify a virtual machine using the operating system. The system, process, and product may also include the ability to determine when the virtual machine is modifiable and update the portion of the operating system for the virtual machine when it is modifiable.
Compiling apparatus and method of a multicore device
An apparatus and method capable of reducing idle resources in a multicore device and improving the use of available resources in the multicore device are provided. The apparatus includes a static scheduling unit configured to generate one or more task groups, and to allocate the task groups to virtual cores by dividing or combining the tasks included in the task groups based on the execution time estimates of the task groups. The apparatus also includes a dynamic scheduling unit configured to map the virtual cores to physical cores.
Inverse virtual machine
A plurality of devices self-assemble their respective resources into a pool for hosting one or more virtual machines (VMs). An inverse virtual machine architecture enables a pool of resources to be assembled for hosting one or more VMs independent of an application-level control program, such as a host OS and/or other application-level program, executing on the host system. In certain embodiments, the plurality of independent physical resources are operable to autonomously join together in forming the pool of resources for VM(s). In certain embodiments, each device comprises VM core logic for self-assembling the devices into the resource pool. The VM core logic may be implemented at a BIOS level of the devices, wherein an operating system is not required to be launched on any of the devices that self-assemble into the resource pool for hosting the VM(s).
Migration of functionalities across systems
Some embodiments of a method and an apparatus to migrate functionalities across systems have been presented. In one embodiment, a system call from an application running on a first system is detected. The first system has a first version of an operating system, but the system call requires a functionality that is not available in the first version of the operating system. The functionality is available in a second version of the operating system running on a second system. Therefore, the system call is reflected from the first system to the second system.
Software replacement method and related software replacement system
The present invention relates to a Software replacement method, for replacing a first software package that comprises a command handling interface which is present at a computer system, by a second software package over a connection between an operator terminal and this command handling interface. At first the second software package is installed besides the first software package at the computer system. Subsequently, the second software package is activated. Then a contacting part of the second software package, after activation of this second software package, contacts the command handling interface. The command handling interface at contacting of the command handling Interface by the contacting part of the second software package, switches from the first software package towards the second software package and keeps open the connection between the operator terminal and the command handling interface.
Branch pruning in architectures with speculation support
According to one example embodiment of the inventive subject matter, the method and apparatus described herein is used to generate an optimized speculative version of a static piece of code. The portion of code is optimized in the sense that the number of instructions executed will be smaller. However, since the applied optimization is speculative, the optimized version can be incorrect and some mechanism to recover from that situation is required. Thus, the quality of the produced code will be measured by taking into account both the final length of the code as well as the frequency of misspeculation.
Method and apparatus for associating user-specified data with events in a data space profiler
A system and method for profiling a software application may include means for operating on context-specific data and costs. The system may include a descriptor apparatus for specifying identifiers of extended address elements to be profiled and locations for storing corresponding data values. In some embodiments, a list of variables to be included in profiling may be registered with an event agent and values of the variables may be captured in response to detection of a system event. Registering variables to be profiled may involve conveying a list of the variables or a pointer to such a list to the event agent. The event agent may associate the values of the registered variables with the detected system event and may store them in an event space database. The database may be accessed by a data space profiler to identify performance bottlenecks dependent on one or more registered variable values.
Running multiple copies of native code in a Java Virtual Machine
A method for running multiple copies of the same native code in a Java Virtual Machine is described. In one embodiment, such a method includes providing a class to enable segregating multiple copies of the same native code. The method defines, within the class, a native method configured to dispatch operation of the native code. The method further includes generating first and second instances of the class. Calling the native method in the first instance causes a first copy of the native code to run in a first remote execution container (e.g., a first process). Similarly, calling the native method in the second instance causes a second copy of the native code to run in a second remote execution container (e.g., a second process) separate from the first remote execution container. A corresponding computer program product is also disclosed.
Identifying globally consistent states in a multithreaded program
In a method of identifying a globally consistent state in a multithreaded program, a plurality of locally consistent states is identified, in which a locally consistent state of a thread comprises a set of memory locations and their corresponding data values accessed between points in the multithreaded program where no locks are held. Globally consistent states are identified based at least in part on the locally consistent states.
Visual representation of a difference between Cartesian product models
A method, apparatus, and product for assisting in the use of functional models. The method comprises obtaining two or more functional models comprising variables, domains and restrictions, the two or more functional models defining a test-space comprising legal tasks; determining a difference between the test-spaces defined by the two or more functional models, wherein the difference comprises at least one task which is covered by one functional model and not the other; and displaying to a user a visual representation of the difference.
System and method for testing a software unit of an application
A system, computer readable storage medium including instructions, and a computer-implemented method for testing a software unit of an application is described. A method signature for a method of the software unit of the application is received. A generic test specification for a generic test of the method is identified based on the method signature, the generic test specification being one of a plurality of test specifications, wherein the generic test specification includes a definition for at least one reference input parameter value of the method and a definition for at least one reference output parameter value of the method. The method is executed using the at least one reference input parameter value to produce at least one test output parameter value. A test result is determined based on a comparison between the at least one test output parameter value and the at least one reference output parameter value.
Global resource conflict management for an embedded application design
A design tool provides global resource conflict management. The design tool identifies a conflict in requested values of a global resource during development of an embedded application. The design tool further calculates new values of the global resource, and proposes the new values of the global resource as an alternative to the requested values to assist a user in resolution of the conflict.
Optimized design verification of an electronic circuit
A method includes reading, through a processor of a computing device communicatively coupled to a memory, a design of an electronic circuit as part of verification thereof. The method also includes extracting, through the processor, a set of optimized instructions of a test algorithm involved in the verification such that the set of optimized instructions covers a maximum portion of logic functionalities associated with the design of the electronic circuit. Further, the method includes executing, through the processor, the test algorithm solely relevant to the optimized set of instructions to reduce a verification time of the design of the electronic circuit.
Method and apparatus for automatically configuring memory size
A logic design system operable to configure an integrated circuit device using custom logic design data is disclosed. The disclosed logic design system includes a computer-aided design tool that may be used to determine a memory space estimate based on a custom logic design data analysis. A memory size analysis may be performed on the custom logic design data to determine the maximum amount of stack memory that is required to execute procedures in the device. The logic design system may also monitor for changing memory requirements of the custom logic design. The logic design system may configure the device with the custom logic design data based on the memory space estimate.
Flexible pin allocation
A system includes a memory and a controller. The controller may include a group of pads and an allocation register. The controller is configured to receive input signals corresponding to the group and allocate each one of the pads to output one of the input signals based on a configuration of pins of the memory. The controller is also configured to redirect the input signals, within the controller, based on the allocation of the pads and output the input signals from the controller into the pads.
Partitioning designs to facilitate certification
This disclosure relates generally to field-programmable gate arrays (FPGAs). Some implementations relate to methods and systems for partitioning FPGA circuit designs to facilitate certification. In one aspect, a method includes generating a hardware description language (HDL) implementation of a circuit design. The method additionally includes partitioning the design into a first portion and a second portion. In some implementations, the second portion corresponds to a safety-critical portion of the design while the first portion corresponds to a non-safety-critical portion. The method additionally includes generating first configuration settings for the first portion and generating second configuration settings for the second portion. The method additionally includes verifying, or providing to a third-party certification body for verification, the first configuration settings for the first portion and the second configuration settings for the second portion. The method further includes providing the configuration settings for the second portion for programming into a PLD.
Self-aligned via interconnect using relaxed patterning exposure
Self-aligned via interconnects using relaxed patterning exposure. In accordance with a first method embodiment, a method for controlling a computer-aided design (CAD) system for designing physical features of an integrated circuit includes accessing a first pattern for first metal traces on a first metal layer, accessing a second pattern for second metal traces on a second metal layer, vertically adjacent to the first metal layer and accessing a precise pattern of intended interconnections between the first and second metal traces. The precise pattern of intended interconnections is operated on to form an imprecise via pattern that indicates a plurality of general areas in which vias are allowed. The imprecise via pattern is for use in an integrated circuit manufacturing process to form, in conjunction with operations to form the first and second metal layers, a plurality of self-aligned vias for interconnecting the intended interconnections.
Computing device mismatch variation contributions
A system, method, and computer program product for computing device mismatch variation contributions to circuit performance variation. Embodiments estimate which individual devices in a simulated circuit design have the largest impact on circuit performance, while requiring far fewer simulations than traditional multivariate linear regressions. An ordered metric allocates output variance contributions for each input mismatch parameter in a linear model. The embodiments summarize the output variance in each device, and rank the mismatch contributions based on the summarized contributions. Additional sensitivity analysis can derive a final accurate linear contribution. Embodiments can reduce required simulations by a factor of ten.
Conflict detection with function models
Systems and methods for detecting design conflicts of a product or process are disclosed. A method for detecting design conflicts includes processing a function model of a product or process to identify a plurality of descriptions of functions to be performed by the product or process. The method includes detecting in the plurality of descriptions a first description and a second description in which the first description includes a first design component name that matches a second design component name of the second description, a first descriptive noun that matches a second descriptive noun of the second description, and a first active verb that does not match a second active verb of the second description. The method further includes flagging a relationship between the first description and the second description as a first conflict type and displaying, on a display device, information regarding the first conflict type.
Automatic approximation of assumptions for formal property verification
One embodiment provides a system, comprising methods and apparatuses, for simplifying a set of assumptions for a circuit design, and for verifying the circuit design by determining whether the circuit design satisfies a set of assertions when the simplified set of assumptions is satisfied. During operation, the system can simplify the set of assumptions by identifying, for an assertion in the set of assertions, a first subset of assumptions which, either directly or indirectly, shares logic with the assertion. Furthermore, the system can modify the first subset of assumptions to obtain a second subset of assumptions which either over-approximates or under-approximates the first subset of assumptions. Then, the system can refine the second subset of assumptions to either prove or falsify the assertion.
Analog fault visualization system and method for circuit designs
An apparatus and method for visualizing faults in a circuit design includes simulating faults for a circuit design in a layout and a schematic, editing the layout and schematic to include the simulated fault, and linking the layout and schematic with the fault simulation.
Method and apparatus for cost function based simultaneous OPC and SBAR optimization
Described herein is a method for obtaining a preferred layout for a lithographic process, the method comprising: identifying an initial layout including a plurality of features; and reconfiguring the features until a termination condition is satisfied, thereby obtaining the preferred layout; wherein the reconfiguring comprises evaluating a cost function that measures how a lithographic metric is affected by a set of changes to the features for a plurality of lithographic process conditions, and expanding the cost function into a series of terms at least some of which are functions of characteristics of the features.
Methods and apparatus for processing application windows
An apparatus may include one or more memories and one or more processors. The one or more processors may be configured to execute instructions to facilitate providing a first application window for display. The instruction may facilitate receiving a switching input. The instructions may facilitate, in response to the switching input, providing a plurality of application windows for concurrent display. The providing a plurality of application windows may include changing a display view from the first application window to the plurality of application windows. The plurality of application windows include the first application window and one or more additional application windows. The instructions may facilitate touching and sliding, off the display view, one of the plurality of application windows. The sliding may cause permanently removing the one of the plurality of application windows from application windows available for display. Methods for displaying windows and machine-readable storage medium are also disclosed.
System and method for disambiguating item selection
A software module provides multiple individually selectable items via a user interface. The software module detects a contact with an area on the user interface that includes several of the individually selectable items in a first relative arrangement. The software module determines that the contact corresponds to an attempted selection of a single item. The software module provides a disambiguation menu for selecting the single item from among the several individually selectable items within the area, and arranges the several individually selectable items in the disambiguation menu according to a second relative arrangement different from the first relative arrangement.
Keyboard navigation among visual elements in a user interface
A system navigates among visual elements of a user interface. The system receives a keystroke indicating navigating from a current visual element in a first direction, determines a next visual element that is substantially near the current visual element and in the first direction, and navigates to the next visual element.
Method and apparatus for presenting a first person world view of content
An approach is provided for presenting a global view of content. A content mapping platform determines a viewing location of a device with respect to a user interface, wherein the user interface depicts a three-dimensional object in which a surface closest to the viewing location is transparent to show, at least in part, an opposite surface of the three-dimensional object. Further, the content mapping platform then determines at least one target location associated with at least one content item. Furthermore, the content mapping platform causes, at least in part, a rendering of the at least one content item on the opposite surface of the three-dimensional object based, at least in part, on the at least one target location.
Dynamic icons associated with remote content
Dynamic icons associated with remote content provide one or more pieces of information to a user by changing the appearance of the icon based on changes to data of a data source associated with the icon. For example, when the icon represents data available from a Really Simple Syndication (RSS) feed, the icon may be represented as an image extracted from the RSS feed, which may change when the RSS feed is updated or includes new content. In some embodiments, the icon may by dynamically updated based on user information and/or device information, such as an icon for a weather forecast that is based at least in part on a location of a device and thus directs the icon to show imagery and/or information based at least in part on the respective location.
Virtual multiple sided virtual rotatable user interface icon queue
An apparatus generally directed to controlling a video game. The apparatus preferably includes a tablet computer, an electronic game communicating with the tablet computer, and an input device for controlling movement of a virtual object provided by the electronic game. Preferably, the input device includes a pair of opposing side structures adjacent opposing sides of a plurality of sides of the tablet computer. The input device further preferably includes a plurality of input switches, wherein said input switches are adjacent each of the at least two opposing sides of the plurality of sides of the tablet computer, and a bridge structure disposed between the pair of sides to form a three sided structure. The third structure mitigates inadvertent removal of the tablet computer from the three sided structure when the tablet computer is fully nested within the three sided structure.
Multimedia content information display methods and device
A method of displaying available multimedia content items includes receiving a request to display a set of available content items. In response to the request, a first set of icons are provided for display, where each icon corresponds to a type of available multimedia content. The icons are displayed in an approximately circular arrangement, providing for easy viewing and manipulation. In response to selection of an icon, a second set of icons is displayed in an approximately circular arrangement, where each icon of the second set corresponds to a sub-type of the available multimedia content. The user can continue to select icons based on the type of desired multimedia content until a list of available multimedia content items are displayed. Accordingly, the user is able to quickly locate and view multimedia content of a desired type, resulting in an improved user experience.
Method and device for enhancing scrolling operations in a display device
A method and device for enhancing scrolling operations in a display of a device is disclosed. The method includes detecting a scrolling operation on a list of objects in a linear direction. During the scrolling operation, it is determined whether the list of objects is reaching an end and at least one object at the end of the list of objects is extended in the linear direction in response to reaching the end of the list of objects. Further, the method includes determining that the object(s) is reaching a peak length of extension in the linear direction and retracting the object(s) in a reverse linear direction in response to reaching the peak length or in response to detecting that the scrolling operation is terminated.
System and method for dynamic zoom to view documents on small displays
A system and method for dynamic zoom adjustment based, in part, upon: the raster data in the user selected local area is disclosed; and/or the knowledge of a prevailing font size in a user selected region such that the text in that region is enlarged to be just readable. To achieve this, the detail in the local area is examined and a zoom factor is calculated that depends on the image detail and/or the viewing screen resolution. A document server may be employed to develop the information needed to enable this functionality. In one embodiment, the information is developed by RIPping the document, and then storing a spatial map of localized details (e.g., font sizes at several display resolutions) to automatically adjust a zoom level or factor and thereby facilitate navigation and reading.
Managing windows through policies
Methods, systems, and apparatus, including computer program products feature receiving, from a client application running in a virtual machine and displayed within a first window of a graphic display, a request to create a second window within the graphic display. In an example implementation, a first set of one or more parameters is received in association with the request. The request and some or all of the first set of one or more parameters are provided to a host application. An indication of a determination is received from the host application as to whether the second window has been created. The determination is based on a policy of the host application. The indication of the determination is provided to the client application. If the indication of the determination indicates that the second window has been created, the indication further includes an identifier associated with the second window.
Combined properties dialog from different sources
An illustrative embodiment of a computer-implemented method to manage properties in a dialog from various sources creates a widget properties dialog and receives properties and validation rules from each source associated with the widget properties dialog to form received information. The computer-implemented method further creates a group of tabs in the widget properties dialog using the received information, wherein the group of tabs contains a general tab and a group of content tabs, wherein each content tab is specific to an instance of content provider and content type.
Dynamic generation of soft keyboards for mobile devices
Devices and methods are disclosed which relate to improving the efficiency of text input by dynamically generating a visually assistive virtual keyboard. Exemplary variations display a soft keyboard on a touchscreen of a text-entry device. The touchscreen works with the soft keyboard as a form of text input. Keyboard logic on the text-entry device is programmed to change the visual appearance of each key within the soft keyboard based on the prior entry. The keyboard logic assigns a prediction value to each key based on a statistical probability that the key will be entered next. The touchscreen displays a visually enhanced keyboard based on these prediction values. Enhancements include resizing keys relative to their prediction value, rearranging the keys a distance from the previous key entered inverse to its prediction value, etc.
Systems and methods for displaying and manipulating images of floor covering elements
A system, tool or method permitting a prospective purchaser of floor coverings or other surface coverings to engage in the contemporaneous manipulation and evaluation of various combinations of surface patterns, designs, colors, shapes, and the like as well as placement or orientations of the floor covering or surface covering elements prior to actual purchase and installation. For example, simulated tile elements having surface patterns corresponding to the surface patterns of the actual floor covering tile elements are provided in a manner such that each of the simulated tile elements may be rotated or replaced to simulate at least one alternative arrangement or layout.
Managing evelopment of an enterprise application
An improved solution for managing development of a multi-tiered enterprise application. In particular, a plurality of logical tiers for the enterprise application are identified and a corresponding set of components for each of the logical tiers is obtained. An enterprise application view is generated based on the logical tiers and sets of components to provide an end-to-end graphical view of the enterprise application. The enterprise application view can be integrated with various development tools that are used to develop the components for the enterprise application. To this extent, the invention can automatically integrate component development artifacts for deployment. As a result, the invention can provide a truly integrated development environment for developing the enterprise application.
Website with user commenting feature
A system and website for delivering services via the internet, including a server, a database including a plurality of data records corresponding to one or more clients, software executing on the server for generating and displaying reports of at least a portion of the data records to a client via the website, software executing on the server for displaying at least one input field via the website for receiving a comment pertaining to a first one of the data records, software executing on the server for storing a comment received via the input field, software executing on the server for displaying the comment via the website, and software executing on the server for managing access to the data records and comments, wherein viewing access to the comment via the website to is restricted to a first group of users and editing of the comment is restricted to a second group of users.
Method and system for delivering digital content
A method, computer program, and system for delivering digital content to a user interface. A method according to an embodiment includes: generating a starting content on the user interface including at least one clickable content, each of the at least one clickable content being previously associated with a first key; upon selection of a clickable content associated with a first key, determining a second key, associated with a destination content, from the first key; determining an executable asset program from the second key, an execution of the asset program generating the display of a predefined asset content; attaching the second key to the executable asset program according to a hiding mechanism; executing the executable asset program to display the predefined asset content, and releasing the second key during the execution of the program.
Multi-instance, multi-user virtual reality spaces
A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. Avatars are animated within different ones of the parallel dimensions using input from respective users to provide virtual-reality data. The virtual-reality data may be configured to cause remote clients to output an animated display of a corresponding one of the parallel dimensions and avatars therein.
Method for determining effective core aspect ratio for display of content created in an online collage-based editor
In an online collage-based editor, a method for determining an effective aspect ratio for a selected project orientation that includes a group of two or more available page sizes having different aspect ratios and displaying a project page at a derived aspect ratio in the GUI during editing includes the steps (a) determining for each page size in the group, the viewable area of each page, (b) recording the aspect ratios of the viewable areas of step (a), (c) using a mathematical function, describing a total amount of error present amongst the available aspect ratios of step (b) for a given aspect ratio, (d) using a mathematical program, process, or automated calculation tool, finding the effective aspect ratio that minimizes the function and hence the error value of step (c), and (e) displaying the project page at the selected effective aspect ratio.
Spreadsheet software services
Embodiments of the present invention include the creation of spreadsheet software services. In one embodiment, the features and functionality of a spreadsheet may be transformed into a software service, such as a web service, for example. In one embodiment, the present invention includes a method of generating a software service comprising analyzing a spreadsheet to extract an output schema corresponding to at least a portion of the spreadsheet, generating a software service interface description comprising the output schema and the description of the output data, wherein the software service interface is accessible over a network, and accessing the functionality of the spreadsheet using the software service interface description.
Ranking graphical visualizations of a data set according to data attributes
A computer-implemented system, method and computer readable medium to generate graphical visualizations corresponding to a data set populated in a web-based document, such as a spreadsheet. The spreadsheet is accessible in an interne or cloud-based system, and enables users to automatically create graphical visualizations or representations based on recommendations by a spreadsheet application. The graphical visualizations may be automatically ranked such that the system provides the recommendations to the user for display. Automatic ranking is accomplished, for example, by determining data types from identifying column type, differentiating column types, and extracting data sets having attributes corresponding to various graphical visualizations.
Page modules and providing content
A method of providing content to a user uses a browser, connects to a server; and performs a check. The method provides a set of modules, and thereby forms a page of modules. The method customizes a first module in the set of modules, saves the customization, and executes a function provided by a module in the set of modules. Initially, the set of modules may include a default set of modules, which includes the first module and a second module. The first module may assume several shapes, and content presented by the first module automatically adjusts according to the shape of the first module to maximize a field of view of the content for the user. Preferably, the first and second modules are stacked such that a horizontal dimension of the first and second modules spans the width of a browser window.
Viterbi device and method using a posteriori information
New and useful methods and systems for providing improved performance of a Viterbi device are disclosed. For example, in an embodiment a Viterbi device includes metric circuitry configured to determine branch metrics using at least one of a variance signal based on both received data and detected data of the Viterbi device and a priori probabilities of available state transitions within a trellis of the Viterbi device.
Programmable error correction capability for BCH codes
An embodiment of the invention relates to a BCH encoder formed with linear feedback shift registers (LFSRs) to form quotients and products of input polynomials with irreducible polynomials of a generator polynomial g(x) of the BCH encoder, with and without pre-multiplication by a factor xm. The BCH encoder includes multiplexers that couple LFSR inputs and outputs to other LFSRs depending on a data input or parity generation state. The BCH encoder can correct up to a selectable maximum number of errors in the input polynomials. The BCH encoder further includes LFSR output polynomial exponentiation processes to produce partial syndromes for the input data in a syndrome generation state. In the syndrome generation state the LFSRs perform polynomial division without pre-multiplication by the factor xm. The exponentiation processes produce partial syndromes from the resulting remainder polynomials of the input data block.
Coding apparatus, coding method, decoding apparatus, decoding method, program and transmission system
Disclosed herein is a coding apparatus, including: a calculation section adapted to calculate, based on information of a transmission object, a linear code to be used for error detection of the information; a production section adapted to produce coded data including a plurality of sets of the information and the linear code calculated by the calculation section; and a transmission section adapted to transmit the coded data to a reception apparatus.
Using a data ECC to detect address corruption
A system for detecting an address or data error in a memory system. During operation, the system stores a data block to an address by: calculating a hash of the address; using the calculated hash and data bits from the data block to compute ECC check bits; and storing the data block containing the data bits and the ECC check bits at the address. During a subsequent retrieval operation, the memory system uses the address to retrieve the data block containing the data bits and ECC check bits. Next, the system calculates a hash of the address and uses the calculated hash and the data bits to compute ECC check bits. Finally, the system compares the computed ECC check bits with the retrieved ECC check bits to determine whether an error exists in the address or data bits, or if a data corruption indicator is set.
Memory system and operating method thereof
A memory system includes a nonvolatile memory device and a memory controller configured to control the nonvolatile memory device and configured to provide the nonvolatile memory device with error flag information including error location information of an error of data read from the nonvolatile memory device.
Decoding device, decoding method, and program for generating a substitute signal when an error has occurred during decoding
A decoding device including a decoding unit which decodes encoded data, an inverse orthogonal transformation unit which performs inverse orthogonal transformation for the encoded data and obtains a time series waveform element in a unit of blocks, a correlation calculation unit which obtains a correlation between a time series waveform element of a block arranged immediately before an error block which is a block in which an error has occurred during decoding by the decoding unit and a time series waveform element of a block arranged a predetermined number of blocks before the block, a cycle calculation unit which obtains a basic cycle of a block unit of the error block based on the correlation obtained by the correlation calculation unit, and a generation unit which generates a substitute signal of the time series waveform element of the error block.
Wireless communication apparatus, wireless communication control apparatus, wireless communication method, wireless communication program storage medium, wireless communication control method, and wireless communication control program storage medium
A wireless communication apparatus that uses a communication protocol to transmit and receive data with a data check bit, including a received data determining section that performs a data check for received data by using the data check bit to determine whether the data is error; a received result transmitting section that, when determined to be error, discards the data and transmits a retransmission request to other wireless communication apparatus of the transmitting origin, whereas determined to be not error, transmits a message indicating that the data is normal to the other wireless communication apparatus of the transmitting origin; and a retransmission asking section that determines whether a format of the data is incorrect or normal, and when determined to be normal, passes the data to predetermined processing, whereas when determined to be incorrect, discards the data and asks the received result transmitting section to request retransmission of the data.
Error concealment for sub-band coded audio signals
A decoder and method of decoding a sub-band coded digital audio signal. The decoder comprises: an input, for receiving sub-band coefficients for a plurality of sub-bands of the audio signal; an error detection unit, adapted to analyze the content of a sequence of coefficients in one of the sub-bands, to derive for each coefficient an indication of whether the coefficient has been corrupted by an error of a predefined type; an error masking unit, adapted to generate from the sequence a modified sequence of coefficients for the sub-band, wherein errors of the predefined type are attenuated; a coefficient combination unit, adapted to combine the received coefficients and the modified coefficients, in dependence upon the indication of error; and a signal reconstruction unit, adapted to reconstruct the audio signal using the combined coefficients.
Test mode signal generation circuit
A test mode signal generation circuit includes a pre-decoder block configured to output first and second control signals and test address signals in response to first and second address signals, and a signal generation block configured to decode the test address signals in response to the first control signal and generate first and second test mode group signals each including a plurality of test mode signals.
Determining whether a right to use memory modules in a reliability mode has been acquired
Examples disclosed herein relate to determining whether a right to use memory modules in a reliability mode has been acquired. Examples include determining whether the right to use a plurality of memory modules in a reliability mode has been acquired, if a performance mode is selected for operation of the plurality of memory modules.
Field control devices having pre-defined error-states and related methods
Control apparatus having pre-defined error-states and related methods are described. An example method of controlling a field control device described herein includes receiving, via a controller coupled to the fluid control device, a communication from a control system remotely located from the controller to operate the field control device during a non-error condition, detecting whether an error condition has occurred, and operating the field control device based on a pre-determined error-state instruction stored in the controller when the error condition is detected.
Fast, non-write-cycle-limited persistent memory for secure containers
Techniques for providing fast, non-write-cycle-limited persistent memory within secure containers, while maintaining the security of the secure containers, are described herein. The secure containers may reside within respective computing devices (e.g., desktop computers, laptop computers, etc.) and may include both volatile storage (e.g., Random Access Memory (RAM), etc.) and non-volatile storage (NVRAM, etc.). In addition, the secure containers may couple to auxiliary power supplies that are located externally thereto and that power the secure containers at least temporarily in the event of a power failure. These auxiliary power supplies may be implemented as short-term power sources, such as capacitors, batteries, or any other suitable power supplies.
Fault tolerant computing systems using checkpoints
A computer system configured to provide fault tolerance includes a first host system and a second host system. The first host system is programmed to monitor a number of portions of memory of the first host system that have been modified by a guest running on the first host system and, upon determining that the number of portions exceeds a threshold level, determine that a checkpoint needs to be created. Upon determining that the checkpoint needs to be created, operation of the guest is paused and checkpoint data is generated. After generating the checkpoint data, operation of the guest is resumed while the checkpoint data is transmitted to the second host system.
Method for system recovery and apparatus supporting the same
A system recovery method and an apparatus supporting the same are disclosed. A software image is downloaded, and a system is loaded with the downloaded software image, and the system is recovered by a software image used before the updating, if the system loading fails.
Systems and methods for load balancing via a plurality of virtual servers upon failover using metrics from a backup virtual server
The present invention provides methods and systems for performing load balancing via a plurality of virtual servers upon a failover using metrics from a backup virtual server. The methods and systems described herein provide systems and methods for an appliance detecting that a first virtual server of a plurality of virtual servers having one or more backup virtual servers load balanced by an appliance is not available, identifying at least a first backup virtual server of a one or more backup virtual servers of the first virtual server is available, maintaining a status of the first virtual server as available in response to the identification, obtaining one or more metrics from the first backup virtual server of a one or more backup virtual servers, and determining the load across the plurality of virtual servers using the metrics obtained from the first backup virtual server associated with the first virtual server.
Methods and systems for two device failure tolerance in a RAID 5 storage system
Methods and systems for two device failure tolerance in a RAID 5 storage system. Features and aspects hereof provide for allocating a spare storage device in the storage system for use with a standard RAID level 5 storage volume to form an enhanced RAID level 5 volume. Additional redundancy information is generated and stored on the spare storage device such that the enhanced RAID level 5 volume is operated by the storage controller so as to survive a failure of up to two of the storage devices of the enhanced volume. The allocated spare storage device may be reallocated by the storage controller for another purpose in which case the storage controller continues to operate the enhanced volume as a standard RAID level 5 volume that can only tolerate a single failure of a storage device of the volume.
Locality based quorums
Disclosed are various embodiments for distributing data items within a plurality of nodes. A data item update request is replicated from a master node in a plurality of nodes to a plurality of slave nodes within the plurality of nodes. The replicated data item update request is determined to be locality-based durable. Responsive to the determination that the replicated data item update request is locality-based durable, the data item update request is confirmed to a client, wherein the client had originated the data item update request. Upon failover of the master node to another node within the plurality of nodes, a fault-tolerant failover quorum ensures that all previously confirmed updates are found and recognized by the new master node.
Systems and methods for recovering from the failure of a gateway server
Disclosed is a method for recovering from the failure of a gateway server. In some embodiment, the method includes: receiving, at a backup gateway server, a message transmitted from a client, the message comprising a network resource previously allocated to the client by the gateway server that failed; determining whether the network resource is free; and transmitting, from the backup gateway server to the client, an acknowledgment indicating that the client may continue using the network resource in response to a determination that the network resource is free.
Apparatus and methods for low-skew channel bonding
One embodiment relates an apparatus which includes a plurality of local synchronous divider circuits, each local synchronous divider circuit being configured to receive a serial clock signal and a reset signal and generate a local clock signal. The apparatus further includes a clock distribution network configured to distribute the serial clock signal to the plurality of local synchronous divider circuits and a signal distribution network configured to distribute the reset signal to the plurality of local synchronous divider circuits. Another embodiment relates to a method of distributing a serial clock signal and a reset signal to a plurality of local synchronous divider circuits and generating a local clock signal at each of the plurality of local synchronous divider circuits. Other embodiments, aspects, and features are also disclosed.
Controlling power sequence in a blade center environment
For controlling power sequence in a blade center environment, a relationship component module creates a topology of interdependent relationships of devices in the blade center environment. The devices include server blades, storage blades, and switch modules. A sequence module defines a sequence of the devices in the blade center environment to power off and on based on the topology of interdependent relationships. The sequence includes an order of a first independent blade server, each dependent storage blade of the first independent blade server, and a second independent blade server. A monitor component module monitors a command from an Advanced Management Module (AMM) to regulate power for the devices in the blade center environment. The AMM regulates power within the blade center. A validation module validates that the command does not violate the interdependent relationships and the sequence of devices or else blocks the command if the command is not validated.
Memory power manager
Controlling access to memory includes receiving a plurality of memory access requests and assigning corresponding time values to each. The assigned time values are adjusted based upon a clock pulse and a priority access list is generated. Factors consider include missed access deadlines, closeness to missing access deadlines, and whether a page is open. The highest ranked client is then passed to a sequencer to allow the requested access. Time values may be assigned and adjusted according to client ID or client type (latency or bandwidth). A plurality of power modes of operation are defined wherein operation in a selected power mode of operation is based at least in part on the assigned or adjusted time values. The processing is performed in hardware in parallel (at the same time) by associated logic circuits.
Dynamic utilization of power-down modes in multi-core memory modules
Various embodiments of the present invention are directed to methods that enable a memory controller to choose a particular operation mode for virtual memory devices of a memory module based on dynamic program behavior. In one embodiment, a method for determining an operation mode for each virtual memory device of a memory module includes selecting a metric (1001) that provides a standard by which performance and/or energy efficiency of the memory module is optimized during execution of one or more applications on a multicore processor. For each virtual memory device (1005), the method also includes collecting usage information (1006) associated with the virtual memory device over a period of time, determining an operation mode (1007) for the virtual memory device based on the metric and usage information, and entering the virtual memory device into the operation mode (1103, 1105, 1107, 1108).
Detecting wake-up events for a chip based on an I/O power supply
A device is provided that includes a chip having a processor and wake-up logic. The device also includes power management circuitry coupled to the chip. The power management circuitry selectively provides a core power supply and an input/output (I/O) power supply to the chip. Even if the power management circuitry cuts off the core power supply to the chip, the wake-up logic detects and responds to wake-up events based on power provided by the I/O power supply.
Processor voltage regulation
A voltage regulator module (VRM) includes a first interface configured to couple to a first substrate interface at a first voltage. The VRM also includes a second interface configured to couple to a first processor interface at a second voltage. A first regulator module couples to the first interface and to the second interface. The first regulator module is configured to receive power at the first interface, to convert power to the second voltage, and to deliver power to the first processor interface at the second voltage. A method for providing power to a processor includes receiving power from a first substrate interface at a first voltage. The received power is regulated to generate power at a second voltage. The regulated power is provided to a processor at a first processor interface coupled to the processor. The processor interface delivers power to a logic group of a plurality of logic groups of the processor.
Secure execution of a computer program using binary translators
Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein to provide a computing device with cooperative first and second binary translators in first and second execution environments having first and second security levels, respectively. The second security level may be more secure than the first security level. Encrypted instructions of the computer program may be loaded into the first execution environment, and the first binary translator may provide, to the second binary translator, an execution context of the computer program for use by the secondary binary translator to decrypt and execute a first portion of the computer program in the second execution environment. The second binary translator may provide, to the first binary translator, another execution context of the computer program for emulation, by the first binary translator, of execution of a second portion of the computer program in the first execution environment.
Memory managment method
In the conventional method of maintaining the confidential a program, wherein a program to be executed in an information processing device is stored in a hard disk, etc., in an encrypted state and the program is decrypted when it is executed, because a decrypted program is written in memory, the program may be illicitly analyzed by a third person. Provided is memory management method wherein code information or data of a program written in a virtual memory is data which is encrypted and inaccessible by a CPU, and when code fetching or data access to the encrypted area occurs, an interruption process is performed wherein with respect to a management unit of the memory management device including the area, an inaccessible state is changed to an accessible state to perform decryption.
Method and apparatus for trusted execution in infrastructure as a service cloud environments
The present disclosure presents a method and apparatus configured to provide for the trusted execution of virtual machines (VMs) on a virtualization server, e.g., for executing VMs on a virtualization server provided within Infrastructure as a Service (IaaS) cloud environment. A physical multi-core CPU may be configured with a hardware trust anchor. The trust anchor itself may be configured to manage session keys used to encrypt/decrypt instructions and data when a VM (or hypervisor) is executed on one of the CPU cores. When a context switch occurs due to an exception, the trust anchor swaps the session key used to encrypt/decrypt the contents of memory and cache allocated to a VM (or hypervisor).
Method for performing searchable symmetric encryption
Disclosed is a method for searchable symmetric encryption. The method for performing searchable encryption and searching for encrypted data includes: setting all necessary variables and preparing a secret key necessary for encryption; encrypting a data using the secret key and a given data and generating an index to be used for later search, to store the encrypted data and the index; generating a trapdoor to be used to search the encrypted data by using the secret key and a keyword to be used for the searching; and searching a desired data using the generated trapdoor and the stored index.
Method and apparatus for storing data
According to an aspect of an embodiment, a method comprises providing a matrix comprising m rows and n columns, each of the rows and columns comprising elements of zero and one, dividing data into n data blocks, associating each of the data blocks with each of the columns, calculating an exclusive-OR of selected data blocks in reference to one of the rows, the selected data blocks being determined by the element of one in the associated columns in the one of the rows, repeating the calculating in other rows and storing separately the calculated data resulting from the exclusive-OR of data blocks in association with the associated rows, respectively.
Secured client-server computer system for interactive applications
A client-server type computer system for graphical applications is provided, that is to say, for displaying data in the form of software units called “widgets” on display screens called “display units”, said system being intended to control the operation of a machine, the machine including at least one human-machine interface allowing interaction with the widgets, said system managing critical data or functions. The computer system includes a securing engine controlling the integrity of the display of the critical widgets, the sending of commands which is performed by means of the human-machine interface, the input and display of the critical data. The main provisions of this securing engine are the use of computer “signatures”, the provision of “feedback” circuits and the use of guard mechanisms or dedicated confirmation dialog boxes. Preferably, the machine is an aircraft, the computer system is the avionics on board said aircraft and the display screens are the cockpit display systems.
User authentication method and user authentication system
A system for registering a password derivation pattern for deriving a password to be used in user verification includes a terminal device and a server. The terminal device is configured to display a presentation pattern, the presentation pattern including a plurality of elements, each of the plurality elements being assigned with predetermined characters, so as to cause the user to input a character assigned to a specific element with respect to the presentation pattern. The server is connected with the terminal device via a communication channel. The server is configured to repeat the process of displaying a new presentation pattern until the password derivation pattern is specified based on the character inputted by the user. The server is configured to store the specified password derivation pattern.
Method, system and apparatus for accessing a resource based on data supplied by a local user
A method, comprising: acquiring candidate data in association with a request for accessing a resource, the candidate data comprising first data and second data; processing the first data with a first key in an attempt to effect decryption of the first data, thereby to obtain first processed data; processing the second data with a second key in an attempt to effect decryption of the second data, thereby to obtain second processed data; and granting the request if a pre-determined portion of the first processed data is derivable from the second processed data. The method may further comprise extracting from the first processed data a group identifier and the pre-determined portion of the first processed data, and effecting a comparison of the group identifier to a reference group identifier in order to conclude whether the first data has been successfully decrypted based on an outcome of the comparison.
Methods and systems for state synchronization over a non-reliable network using signature processing
Systems and methods for facilitating confirmation of completion of a transaction(s) for state synchronization over a non reliable network using signature processing are described. One of the methods includes receiving a read request from a first client, sending a last known signature with a context object to the first client in response to receiving the read request, and receiving an appended signature from the first client with a context object for a transaction at the first client. The appended signature includes the last known signature and an increment by the first client. The operation of receiving the appended signature occurs upon execution of the transaction at the first client. The method further includes updating the last known signature to the appended signature and sending the updated last known signature to the first client to facilitate marking of the transaction as complete resulting in a definitive state synchronization.
A program (MC), which can be executed by a programmable circuit, is protected in the following manner. An instruction block (IB) is provided on the basis of at least a portion (MC-P) of the program. A protective code (DS) is generated that has a predefined relationship with the instruction block (IB). The instruction block (IB) is analyzed (ANL) so as to identify free ranges (FI) within the instruction block that are neutral with respect to an execution of the instruction block. The free ranges comprise at least one of the following types: bit ranges and value ranges. The free ranges that have been identified are used for embedding (SEB) the protective code (DS) within the instruction block (IB).
Method for reading an attribute from an ID token
The invention relates to a method for reading at least one attribute stored in an ID token (106, 106′) using first (136), second (150) and third (100) computer systems, wherein the third computer system comprises a browser (112) and a client (113), and wherein a service certificate (144) is assigned to the second computer system, wherein the service certificate comprises an identifier which is used to identify the second computer system, wherein the ID token is assigned to a user (102), having the following steps: —a first cryptographically protected connection (TLS1) is set up between the browser of the third computer system and the second computer system, wherein the third computer system receives a first certificate (176), —the first certificate is stored by the third computer system, —the third computer system receives a signed attribute specification (182) via the first connection, —a second cryptographically protected connection (TLS2) is set up between the browser of the third computer system and the first computer system, wherein the third computer system receives a second certificate (190), —the signed attribute specification is forwarded from the third computer system to the first computer system via the second connection, —the first computer system accesses an authorization certificate (186), wherein the authorization certificate comprises the identifier, —a third cryptographically protected connection (TLS3) is set up between the first computer system and the client of the third computer system, wherein the third computer system receives the authorization certificate containing the identifier via the third connection, —the client of the third computer system checks whether the first certificate comprises the identifier as proof of the fact that the first certificate matches the service certificate, —the user is authenticated with respect to the ID token, —the first computer system (136) is authenticated with respect to the ID token, —a fourth cryptographically protected connection with end-to-end encryption is set up between the ID token and the first computer system, —after the user and the first computer system have been successfully authenticated with respect to the ID token, the first computer system has read access to the at least one attribute stored in the ID token via the fourth connection in order to read the one or more attributes specified in the attribute specification from the ID token, —the first computer system transmits the at least one attribute to the second computer system (150) after said attribute has been signed.
System and method for controlling the upload of data already accessible to a server
Systems, methods, and machine-readable media for controlling an upload of a block of data associated with an upload command are described. In certain aspects, an interface module may be configured to obtain a cryptographic checksum for the block of data associated with the upload command. A checksum module may configured to compare the cryptographic checksum for the block of data associated with the upload command to a cryptographic checksum in an index storing cryptographic checksums identifying blocks of data previously uploaded to a server. If the cryptographic checksum for the block of data associated with the upload command matches the cryptographic checksum in the index, an upload module may be configured to cancel the upload of the block of data associated with the upload command.
Method, system and device for negotiating security capability when terminal moves
A method, user equipment (UE) and system are provided for negotiating a security capability during idle state mobility of the UE from a non-long term evolution (non-LTE) network to a long term evolution (LTE) network. The UE sends UE security capabilities supported by the UE to the LTE network for a non-access stratum (NAS) security algorithm selection use. The UE then receives from the LTE network selected NAS security algorithm. The UE further generates a root key from an authentication vector-related key stored at the UE and then derives, from the generated root key, a NAS protection key for security communication with the LTE network.
An authentication method of a first module by a second module includes the steps of generating a first random datum by the second module to be sent to the first module, generating a first number by the first module starting from the first datum and by way of a private key, and generating a second number by the second module to be compared with the first number, so as to authenticate the first module. The step of generating the second number is performed starting from public parameters and is independent of the step of generating the first number.
Luhn validation and data security across multiple active domains
Systems and methods for maintaining data security using Luhn validation in a multiple domain computing environment are presented. Each domain includes a token generator that can generate tokens associated with sensitive data such as credit card numbers. The token generation algorithm includes a Luhn validation routine for producing a tokenized data string that either passes or fails Luhn. The possibility of token collision is eliminated by a token generation algorithm that embeds a domain designator corresponding to the active domain where the token was created. When multiple tokens represent the same sensitive data, the token manager returns a set of all such tokens found.
Motor vehicle display device, motor vehicle electronic system, motor vehicle, method for displaying data and a computer program product
The invention relates to a motor vehicle display apparatus having an electronic appliance containing: a first memory area (117) for storing data (109), wherein the data contain a motor vehicle license number, a second memory area (119) for storing at least one first certificate (178), a first interface (103) for receiving a first signal (109′) and a signature (111′, 113′) for the first signal from a transmitter (107′), means (123) for checking the validity of the signature of the first signal using the first certificate, means (139) for generating a second signal on the basis of the reception of the first signal, means (127) for actuating a display apparatus (136) to reproduce the data stored in the first memory area and to visually output the second signal, wherein the second signal is generated and/or output only if the signature is valid.
Communications hub for use in life critical network
Secured communications between patient portable communicators (PPC) and a central authority (CA) via an unsecured network are implemented using software implemented by a communications device. The communications device provides for detecting, using a multiplicity of disparate communication protocols, presence of entities requesting a network connection and determining whether or not each of the entities is a PPC, establishing, only for the entities determined to be PPCs, a connection to the CA via the unsecured network using the disparate communication protocols, authenticating only the PPCs to the CA, and facilitating communication of PPC data between the PPCs and the CA via the communications device and the unsecured network upon successful PPC authentication. The PPC data comprises at least some patient implantable medical device data acquired by the PPCs.
System and method for local generation of streaming content with a hint track
Embodiments of a system and method for local generation of streaming content with a hint track are described. Embodiments may include receiving a first version of encrypted content comprising encrypted content samples that each include media content and non-content information. Embodiments may also include receiving a hint track including packet header information for a stream of media packets from which the media content was sourced, and offset information identifying locations of encrypted media content within the encrypted content samples. Embodiments may include generating a second version of the encrypted content for streaming, which may include, based on the information of the hint track, identifying the location of media content within the encrypted content samples. Embodiments may include generating media packets within the second version of the encrypted content, each of those media packets including header information from the hint track and the identified media content from the encrypted content samples.
Paradigm for hybrid network communications protocol morphing
Network interoperability is presently limited due to the existence of many different and often incompatible hardware implementations and communication protocols, where products from competing manufacturers are often not interoperable; and due to the number of protocols already in existence, there is little hope that standards can fully solve the problem in a reasonable time span. Vast potential benefits could be reaped if networks of various types could be accessed and shared regardless of their underlying network protocols and/or physical media, and also increased or unlimited interconnectivity would greatly increase the value of networks. The present invention proposes a novel method to achieve network protocol independence, consisting of a protocol-independent network communications model, that allows communication between device nodes belonging in networks based on diverse physical architectures and protocols, which can therefore be regarded together as hybrid networks.
Wireless multiband security
A network device includes a first physical layer (PHY) module, a second physical layer (PHY) module, and a security module. The first PHY module is configured to operate in a first frequency band. The second PHY module is configured to operate in a second frequency band. The security module is configured to establish security for the first frequency band responsive to the network device operating in the first frequency band. The security module is further configured to establish security for the second frequency band prior to the network device switching operation from the first frequency band to the second frequency band.
Method and system of using a non-native operating system for scanning and modifying system configuration data of a native operating system
Modifying system configuration data. At least some of the illustrative embodiments are methods including changing operation of a program on a computer system that comprises a native operating system stored on a long term storage device. In some cases, the changing by: reading system configuration data of the native operating system, the reading by a scan program executed under a non-native operating system booted on the computer system; identifying, by the scan program, the program on the long term storage device; and modifying, by the scan program, the system configuration data of the native operating system such that the change in operating of the program is implemented on a subsequent boot of the computer system under the native operating system.
Fan control method and apparatus for adjusting initial fan speed based on a discreteness level of installed devices and calibrating fan speed according to threshold power and adjusted initial speed
A fan control method for an information handling system is provided. The information handling system includes a device area and a fan for providing air flow to the device area. A plurality of devices is installed on the device area. The method includes the steps of: collecting thermal data of installed devices in the device area when booting up the information handling system; determining a threshold power of the installed devices and a discreteness level of the installed devices based on the thermal data; adjusting an initial speed of the fan based on the discreteness level; and calibrating the speed of the fan to obtain an optimized speed thereof based on the threshold power and the adjusted initial speed. A fan control apparatus for an information handling system is further provided.
Methods and systems for managing performance and power utilization of a processor employing a fully multithreaded load threshold
A method for managing performance and power utilization of a processor in an information handling system (IHS) employing a balanced fully-multithreaded load threshold includes providing a maximum current thread utilization (Umax) and a minimum current thread utilization (Umin) among all current thread utilizations of the processor and determining a current performance state (P state) of the processor. The method also includes increasing a current P state of the processor to a next P state of the processor towards a maximum P state (Pmax) of the processor when the current P state of the processor is between Umax and Umin and the current utilization rate of the processor is less than a first threshold utilization rate. The method further includes engaging the processor in a turbo mode when the current P state of the processor reaches the Pmax and the current utilization of the processor is greater than the first threshold utilization rate of the processor.
Method and apparatus for employing multi-bit register file cells and SMT thread groups
There are provided methods and apparatus for multi-bit cell and SMT thread groups. An apparatus for a register file includes a plurality of multi-bit storage cells for storing a plurality of bits respectively corresponding to a plurality of threads. The apparatus further includes a plurality of port groups, operatively coupled to the plurality of multi-bit storage cells, responsive to physical register identifiers. The plurality of port groups is responsive to respective ones of a plurality of thread identifiers. Each of the plurality of thread identifiers are for uniquely identifying a particular thread from among a plurality of threads.
Data processing device and method
A data processing device comprising a multidimensional array of coarse grained logic elements processing data and operating at a first clock rate and communicating with one another and/or other elements via busses and/or communication lines operated at a second clock rate is disclosed, wherein the first clock rate is higher than the second and wherein the coarse grained logic elements comprise storage means for storing data needed to be processed.
Garbage collection schemes for index block
Systems and methods are provided for handling uncorrectable errors that may occur during garbage collection of an index page or block in non-volatile memory.
User equipment buffer management in multiple-input multiple-output communication systems
Embodiments of the disclosure provide a system and method for dynamically allocating storage capacity in a user equipment buffer. In various embodiments of the invention, a plurality of transport blocks associated with a process are stored in a plurality of subpartitions of a partition of a buffer in a user equipment device.
Memory control apparatus
A memory control apparatus includes: a plurality of setting output units each configured to output setting information for setting operation of each of a plurality of memory cells; and a plurality of selection units each configured to select operation or stop of the operation of each of the plurality of memory cells in accordance with the setting information.
Counter architecture for online DVFS profitability estimation
A counter architecture and a corresponding method are provided for estimating a profitability value of DVFS for a unit of work running on a computing device. The counter architecture and the corresponding method are arranged for dividing total execution time for executing a unit of work on the computing device into a pipelined fraction subject to clock frequency and a non-pipelined fraction due to off-chip memory accesses, and for estimating the DVFS profitability value from the pipelined and the non-pipelined fraction.
Nonvolatile memory device and operating method thereof
Disclosed is a memory system which includes a nonvolatile memory device configured to store data information; and a memory controller configured to control the nonvolatile memory device. The memory controller provides the nonvolatile memory device with a program command sequence including program speed information according to an urgency level of an internally requested program operation.
Method and system for non-disruptive migration
Method and system for migrating a virtual storage system from a source storage system having access to a source storage device to a destination storage system having access to a destination storage device is provided. A processor executable management application estimates a likelihood of success for a migration operation before the migration operation enters a cut-over duration during which client access to the source storage system and the destination storage system is restricted. The migration operation enters the cut-over duration if there is high likelihood of success for completing the migration during the cut-over duration or aborted, if there is a low likelihood of success for completing the migration during the cut-over duration.
Cluster families for cluster selection and cooperative replication
An apparatus, system, and method are disclosed to create cluster families for cluster selection and cooperative replication. The clusters are grouped into family members of a cluster family base on their relationships and roles. Members of the cluster family determine which family member is in the best position to obtain replicated information and become cumulatively consistent within their cluster family. Once the cluster family becomes cumulatively consistent, the data is shared within the cluster family so that all copies within the cluster family are consistent.
Memory controller with external refresh mechanism
The invention relates to a memory controller for use in a System-on-Chip, wherein the System-on-Chip comprises a plurality of agents and an off-chip volatile memory. The memory controller comprises a first port (CBP) for receiving low-priority requests (CBR) for access to the volatile memory from a first-subset of the plurality of agents and a second port (LLP) for receiving high-priority requests (LLR) for access to the volatile memory from a second-subset of the plurality of agents, wherein the memory controller is configured for arbitrating between the high-priority requests (LLR) and the low-priority requests (CBR), wherein the memory controller is configured for receiving refresh requests (RFR) for the volatile memory via the first port (CBP), wherein the refresh requests (RFR) are time-multiplexed with the low-priority requests (CBR), wherein the memory controller is configured for treating the low-priority requests (CBR) and the refresh requests (RFR) the same. The effect is that the arbitration between the different requests is rendered less complex. In embodiments of the memory controller there is also an average latency reduction for the high-priority requests. The invention further relates to a System-on-Chip comprising the memory controller, to a method of a refresh request generator for use in such System-on-Chip. The invention also relates to a method of controlling access of a System-on-Chip to a volatile memory, wherein the System-on-Chip comprises a plurality of agents which need access to the volatile memory, and to a computer program product comprising instructions for causing a processor to perform such method.
Dual-granularity state tracking for directory-based cache coherence
A system and method of providing directory cache coherence are disclosed. The system and method may include tracking the coherence state of at least one cache block contained within a region using a global directory, providing at least one region level sharing information about the least one cache block in the global directory, and providing at least one block level sharing information about the at least one cache block in the global directory. The tracking of the provided at least one region level sharing information and the provided at least one block level sharing information may organize the coherence state of the at least one cache block and the region.
Storage system comprising RAID group
A pool that is a storage area group composed of a plurality of real pages based on a plurality of RAID groups is managed. The storage system carries out the rebuild processing that includes the steps of copying each of data that has been stored into all allocated real pages among all real pages based on a specific RAID group to an unallocated real page based on at least one RAID group separate from the specific RAID group, allocating a real page of each copy destination to each virtual page of an allocated destination of an allocated real page of each copy source, and canceling an allocation of an allocated real page of each copy source to a virtual page.
Nonvolatile memory device
A nonvolatile memory device includes: N (N is an integer equal to or greater than 2) number of nonvolatile memory cells disposed in a flag area of a page, N number of flag page buffers configured to input and output flag data to and from the nonvolatile memory cells of the flag area, and a data input/output control unit configured to select R number of flag page buffers so that the flag data is inputted and outputted from the R selected flag page buffers and no flag data is inputted and outputted through unselected N-R number of flag page buffers, wherein no one flag page buffer of the R selected flag page buffers is immediately adjacent to another one of the R selected flag page buffers.
Data writing method, and memory controller and memory storage device using the same
A data writing method for a rewritable non-volatile memory module containing physical blocks is provided. The method includes: configuring virtual block address to map to at least a part of the logical blocks; receiving a write command which instructs to write file data to the first virtual block addresses, and the first virtual block addresses are mapped to first logical blocks of the at least the part of the logical blocks. The method further includes: writing the file data into the physical blocks mapped to a plurality of second logical blocks; determining whether a program failure is occurred during the writing period; and if the program failure is not occurred, the first virtual block addresses are remapped to the second logical block. Accordingly, the method can ensure the update completeness of the file data.
Memory system and computer program product
According to an embodiment, a memory system includes semiconductor memories each having a plurality of blocks; a first table; a receiving unit; a generating unit; a second table; and a writing unit. The first table includes a plurality of memory areas each associated with each block and in each of which defect information is stored. The generating unit generates a set of blocks by selecting one block to which data are to be written in each semiconductor memory based on an index number indicating one of a plurality of rows in the first table and the first table. In the second table, an index number and a channel number are stored for each logical block address in association with one another. When a write command is received by the receiving unit, the writing unit writes data to a block associated with a selected channel number among blocks constituting the set.
Expanded electronic bus communication capacity
In an embodiment, an apparatus comprises a bus network having a set of lines, and a number of communication system devices associated with a number of electronics equipment connected to the bus in which each communication system device configures the electronics equipment to send and receive a plurality of signals on a line of the set of lines in a noise region of the set of lines.
Online calibration method and device for universal serial bus system
An online calibration method and device for a universal serial bus system is disclosed in the present invention. The method comprises following steps: providing a plurality of chirp JK pairs; detecting the plurality of chirp JK pairs, and loading a power on a terminal resistor of a USB device end of the universal serial bus and its coupled to a terminal resistor of a USB host end of the universal serial bus; detecting a voltage level variation of the chirp JK pair; and processing the online calibration according to the voltage level variation to maintain the voltage level within a preset range.
Method of dispatching and transmitting data streams, memory controller and storage apparatus
A method of dispatching and transmitting data stream, which is used for a memory storage apparatus having a non-volatile memory module and a smart card chip, is provided. The method includes configuring a plurality of logical block addresses, and a plurality of specific logical block addresses are used for storing a specific file. The method also includes receiving a response data unit from the smart card chip and storing the response data unit in a buffer memory. The method also includes, when a logical block address corresponding to a read command from a host system belongs to one of the specific logical block addresses and the buffer memory stores a response data unit, transmitting the response data unit stored in the buffer memory to the host system. Accordingly, the method can make the host system to correctly receive the response data unit from the smart card chip.
Information processing apparatus, information processing method, and recording medium storing computer program
An information processing apparatus includes a transceiver unit transmitting and receiving information to and from an external device is provided. The apparatus includes a setting information storage unit storing setting information related to an operating environment in association with user identification information, a judging unit judging whether the information that the transceiver unit transmits to or receives from the external device includes given information, an extraction unit extracting the given information from the information including the given information, a specifying unit specifying a user on the basis of the given information, and a setting unit reading the setting information stored in the setting information storage unit in association with the user identification information and setting the user operating environment on the basis of the setting information.
Connector interface for data pipeline
Methods and systems for a connector interface in a data pipeline are disclosed. A pipeline comprising two data source nodes and an activity node is configured. Each data source node represents data from a different data source, and the activity node represents a workflow activity that uses the data as input. Two connectors which implement the same connector interface are triggered. In response, data is acquired at each connector from the corresponding data source through the connector interface. The data is sent from the connectors to the activity node through the connector interface. The workflow activity is performed using the acquired data.
Programmable video processing and video storage architecture
In an embodiment, a method includes receiving video into a video display device. The method also includes storing, by at least one processor, the video into a memory, upon determining that the video display device is in a storage mode. Additionally, the method includes performing enhanced image processing on the video with the at least one processor, upon determining that the video display device is in an image processing mode.
Dynamically configurable device host controller
Embodiments of the invention are directed towards scalable and dynamically configurable (and reconfigurable) device host controller solutions for system platform controller hubs (PCH). Embodiments of the invention may include logic or modules to detect a device coupled to a common I/O port (alternatively referred to as a converged I/O port) of a host system and determine its device type. Said logic or modules may further load host controller firmware for the device type from a memory to a processing core, such that the processing core will execute the host controller firmware to enable data transfer between the device and the host system. Said processing core may be configured and reconfigured based on the device type connected to the associated common I/O port.
Card and host apparatus
A host apparatus, into which a card having a nonvolatile semiconductor memory is inserted, issues a check command to the card. The check command instructs to send information on whether the card supports a termination process in which the card shifts into a state ready for a stop of power supply from the host apparatus.
Image capturing transfer apparatus that sends a flash on/off parameter instruction for a flash unit connected to the image capturing apparatus
An information processing apparatus that can communicate with an external apparatus includes an instruction unit configured to receive an instruction to change a parameter in the external apparatus, and a sending unit configured to send a control signal for causing the external apparatus to change the parameter in the external apparatus, to the external apparatus according to the instruction received by the instruction unit, in which the sending unit sends, when the instruction received by the instruction unit includes an instruction to change a plurality of types of parameters in the external apparatus, the control signal a plural number of times according to the types of the parameters to be changed, to cause the external apparatus to change the parameters in a predetermined order.
Management data input/output protocol with page write extension
A process to manage data between one or more MDIO manageable devices situated on the same bus utilizing the MDIO protocol. The data management efficiency can be increased through the use of an MDIO protocol that includes a page-write mode. The MDIO protocol including the page-write mode can reduce the overhead for a write operation by omitting various portions of the MDIO communication frame format, including the preamble, start-of-frame, operational code, port address, device address, and turn-around fields that generally precede data to be written. The MDIO protocol including the page-write mode may include a next-data code to initiate the page-write mode.
Method and apparatus for content-aware and adaptive deduplication
A method, a system, an apparatus, and a computer readable medium for transmission of data across a network are disclosed. The method includes receiving a data stream, analyzing the received data stream to determine a starting location and an ending location of each zone within the received data stream, based on the starting and ending locations, generating a zone stamp identifying the zone, the zone stamp includes a sequence of contiguous characters representing at least a portion of data in the zone, wherein the order of characters in the zone stamp corresponds to the order of data in the zone, comparing the zone stamp with another zone stamp of another zone in any data stream received, determining whether the zone is substantially similar to another zone by detecting that the zone stamp is substantially similar to another zone stamp, delta-compressing zones within any data stream received that have been determined to have substantially similar zone stamps, thereby deduplicating zones having substantially similar zone stamps within any data stream received, and transmitting the deduplicated zones across the network from one storage location to another storage location.
Context-specific unicode characters in shortened URLs
Methods, systems, and apparatuses for generating a shortened context-specific URL are provided. An exemplary method for generating a shortened context-specific URL includes identifying a first service associated with a first URL, where the first URL includes a first quantity of characters, and the first service maps to a first Unicode character that provides context for underlying subject matter found at the first URL. The exemplary method further includes generating a second URL that includes a second quantity of characters, where the second URL includes the first Unicode character as part of the domain name and at least one additional character outside the domain name, and the second quantity of characters is less than the first quantity of characters. The exemplary method also includes mapping the second URL to the first URL.
Content reproduction system, content reproduction apparatus, program, content reproduction method, and providing content server
A method, apparatus, encoder, and decoder for receiving, transmitting, encoding and decoding content is provided. The method includes receiving a first segment of the content, the first segment having a first format, receiving, from a transmitting apparatus, a second segment of the content, the second segment having a second format, monitoring a network status between the receiving apparatus and the transmitting apparatus, and selecting the first segment or the second segment based on the monitored network status.
Routing requests for location-to-service translation (LoST) services using proxy server
A method implemented by a proxy server is provided for routing requests for a Location-to-Service Translation (LoST) service without traversing a forest node structure. The method includes receiving a request for the LoST service initiated by a client, the request including a location of a user device and a requested service; identifying an authoritative LoST server configured to service the requested service and bounded by a service boundary that includes the location included in the request; and directly forwarding the request to the identified authoritative LoST server, without routing through any other LoST server.
System and method for distributed load balancing with distributed direct server return
Embodiments may include a load balancer that receives a request packet sent by a remote client to an original destination address of multiple network addresses serviced by the load balancer, and selects according to a load balancing protocol, a host computer of a plurality of host computers to process the request. The load balancer may, from among a plurality of ports on the selected host computer, select a particular port having a one-to-one association with the original destination address, the association specified by mapping information accessible to the load balancer, and send the request packet to the selected port on the selected host computer. The mapping information accessible to the selected host computer specifies a one-to-one association between the selected port and the original destination address. Sending the request packet to the selected port conveys that address to the selected server without that address being included in that packet.
System and method of streaming data over a distributed infrastructure
A system and method of streaming data in real time and, more particularly, a system and method of real time streaming of data over a grid network or other distributed infrastructure. The method and system includes updating a content directory of a root server with end resource information. The method and system further includes processing the end resource information to determine connection locations for streaming data to at least one requesting end resource in a network.
Accessing location-based content
Systems and methods for accessing location-based content include retrieving, via a web browser, a list of one or more trusted online services. The retrieved list may be used to determine whether an online service from which content is to be requested. If so, the location of the requesting device may be provided to the service in conjunction with the content request.
Device and method for secured communication
Devices and methods are provided for securing communication between a traffic management center (TMC) and a traffic controller via utilization of a field security device. In one embodiment, the field security device transmits a device identifier to the TMC upon being powered up or connected to the traffic controller. The device identifier is generally based on a combination of user-configurable and non-user-configurable parameters of the field security device. In response to the TMC authenticating the device identifier, the field security device establishes a secure private network (SPN) between the field security device and the TMC.
Method of and system for enforcing authentication strength for remote portlets
In a method of and system for enforcing authentication strength for remote portlets, a portlet is provided by a producer portal and consumed as remote portlet by a consumer portal. The producer portal defines an authentication strength level requirement for the portlet. A user requests the remote portlet from the consumer portal. The consumer portal authenticates the user with a particular authentication method that implies a particular authentication strength level. The producer portal authenticates the consumer portal with a particular authentication method that implies a particular authentication strength assertion level. The consumer portal requests the portlet from the producer portal with an assertion of the authentication strength level of the user. The producer portal rejects the request from the consumer portal if the authentication strength level of the user is less than the authentication strength level requirement for the portlet. The producer portal also rejects the request from the consumer portal if the authentication strength assertion level of the consumer portal is not high enough to assert the authentication strength level of the user. The producer portal accepts the request from the consumer portal only if the authentication strength level of the user is not less than the authentication strength level requirement for the portlet and the authentication strength assertion level of the consumer portal is high enough to assert the authentication strength level of the user.
Method of controlling a browser window
A method of controlling a browser window is disclosed. The method comprises the steps of associating the browser window to a token indicative of a personalized session; and repetitively, verifying said token; and, closing the browser window in dependence of said token. A valid token is generated at startup of the personalized session. The token is invalidated when the user logoffs from the personalized session. Upon detection of an invalid token all browser windows associated with said personalized session will be closed.
Data transmission system, destination management device, data transmission device, address book acquisition method and program
When a destination management device requests an address book of each user, a data transmission device transmits the address book to the destination management device. The destination management device stores the address book received from the data transmission device. If location information of destination information is included in the address book, the destination management device transmits the location information to the data transmission device. The data transmission device transmits the location information to an LDAP server to request the destination information. Upon receipt of the destination information, the data transmission device transmits the destination information to the destination management device.
Method and apparatus for providing shared connectivity
An approach is provided for providing shared path connectivity among devices. A connection sharing platform determines to specify at least one group of devices, the at least one group including at least a first path to establish a network connection and a second path to establish a local connection among the devices. The connection sharing platform also determines to cause at least in part an activation of one or more of the devices to establish the network connection, wherein one or more unactivated devices share the network connection over the local connection.
Managing user state of cloud desktops
A mechanism is described for provisioning remote desktops in a cloud based infrastructure while maintaining user personalization. In cloud based systems, a user may not always reconnect to the same VM endpoint. In one embodiment, the virtual hard disk assigned to a user is mounted to the endpoint assigned to the user. The virtual hard disk includes the user's personal data and personalization information (e.g., settings, profiles, files, etc.). When the user disconnects from the remote desktop, the virtual hard disk is demounted from the endpoint. The virtual hard disk thus provides information regarding the user's state when the user is disconnected.
Service scripting framework
Receiving and executing at a server a script provided by a client, e.g., in a service request sent by a web services or other service client and/or consumer, is disclosed. In various embodiments, the script is configured to cause the server to do one or more of the following: pre-process at least a portion of the services request; post-process a response data associated with the services request; and replace an operation comprising the service at least in part with a replacement operation defined or identified at least in part in the script.
Adjusting the quality of service based on network addresses associated with a mobile device
Implementations and techniques for adjusting the quality of service on an application-by-application basis based at least in part on a plurality of network addresses associated with a given mobile device are generally discussed.
Managing computing environment entitlement contracts and associated resources using cohorting
Mechanisms are provided for managing computing resources relative to a computing environment entitlement contract. These mechanisms generate one or more computing environment entitlement contract (CEEC) data structures, each CEEC data structure defining terms of a business level agreement between a contracting party and a provider of the data processing system. A CEEC cohort is generated comprising a collection of CEECs having similar terms. Utilization of a collection of computing resources in accordance with the similar terms of the collection of CEECs is monitored to identify a usage pattern within the CEEC cohort. Membership of a CEEC in the CEEC cohort based on the identified usage pattern is modified based on the monitored utilization.
Integration of an application server and data grid
Described herein are systems and methods for providing a software application executing on an application server direct access to at least one of a distributed data or distributed service provided by a data grid. The system includes an application server having software applications executing thereon, and a data grid including a plurality of nodes, wherein each of the plurality of nodes is adapted to provide at least one of a distributed data or distributed service. A resource configuration specified by one of a resource annotation added in the software applications or a resource reference defined in a deployment descriptor of said software applications is provided. Upon deployment of the software applications, the resource configuration is used by the system to provide the software applications direct access the distributed data and the distributed services provided by the data grid.
Method and system for managing and distributing digital media
A system and method that integrates a plurality of media service systems offering different multimedia services such as media storage, syndication, delivery, and billing services. The system and method also provides automated file transcoding. In embodiment, a method of the present invention includes receiving a plurality of physical media files, organizing the plurality of physical media files so that different bit-rates and formats of a single source material are organized into a media database entity, receiving user specified delivery settings for the distribution of the physical media file, generating a release database entity storing the delivery settings of the physical media file, generating an address indicating the storage location of the release, and transmitting the address to a remote computing device.
Enhanced human interactive proof (HIP) for accessing on-line resources
A method is provided for protecting an on-line resource using a HIP challenge. The method includes receiving a request to access the on-line resource from a remote client. A HIP challenge is presented to a user associated with the remote client. If a successful response to the HIP challenge is received from the user, a previous response pattern of the user is compared to known response patterns of humans and machines. The user is allowed to access to the on-line resource if the comparison indicates that the user is likely a human.
Controlling an apparatus
An apparatus in a LAN has first and second hardware interfaces to connect to the LAN. First and second monitoring request messages are transmitted to one or more devices in a first VLAN and one or more devices in a second VLAN respectively, via both the first and second hardware interfaces. The monitoring request messages use the Address Resolution Protocol (ARP) or the Neighbor Discovery Protocol (NDP). First and second monitoring response messages are received via the first and/or second hardware interfaces in response to the first and second monitoring request messages respectively. A selection is made between the first and second hardware interfaces for performing data communication, based on the first and second monitoring response messages. The selection is performed independently for data communication via the first and second VLANs based on at least one characteristic of the first and second monitoring response messages respectively.
Network delay estimation apparatus and a network delay estimation method
A network delay estimation apparatus capable of creating a metric tree with high accuracy and in a short time. Network delay estimation apparatus (302) includes first-round measurement target node selection section (306) that selects one pair or a plurality of pairs of nodes located at a long distance from each other from a known metric tree as first-round measurement target nodes and measures a distance from an arbitrary node, second-round measurement target node selection section (310) that selects a node whose distance from the arbitrary node is estimated to be short as a second-round measurement target based on the distance and a known metric tree and measures a distance from the arbitrary node, and an optimum tree processing section (314) that creates a network metric tree including the arbitrary node based on the distance and the known metric tree.
Server-initiated bandwidth conservation policies
In one embodiment, a social networking system maintains a moving average of the number of connection problems, including socket timeouts and failed uploads, per client in a geographic area to determine whether the wireless data network serving the geographic area is overloaded. In response to detecting a network overload, the social networking system may transmit an instruction to the clients in the particular geographic area to enter one of a plurality of traffic throttling modes. In particular embodiments, the social networking system maintains a historical log of network overload conditions, and uses the historical log to generate an estimate of the wireless network capacity serving a geographic area. Thus, the social networking system may preemptively transmit instructions to clients to enter a bandwidth-conservation mode when the estimated traffic demand exceeds the estimated capacity for a particular geographic region.
Workflow processes and systems
A federation of workflow management systems and corresponding method. A method includes maintaining a master workflow process definition in a first workflow management system. The method includes publishing the master workflow process definition to an object directory services server. The method includes importing a replica workflow process definition, corresponding to the master workflow process definition, to a second workflow management system. The method includes modifying the master workflow process definition to produce an updated master workflow process definition. The method includes sending an updated replica workflow process definition, corresponding to the updated master workflow process definition, to the second workflow management system.
Feedback-based symptom and condition correlation
Feedback data can be received from client agents running on client computer systems. The feedback data can include data on the symptoms and conditions for rules that relate computer system symptoms to computer system conditions. The feedback data can be analyzed to produce correlation information that quantifies a degree of correlation between the symptom(s) and condition(s) related by the rule(s). It may be determined whether analysis of the feedback data warrants including one of the rules in correlation mappings to be applied to monitored computer systems. If so, then that rule can be included in the mappings. Information representing the correlation mappings may be transmitted to the monitored computer system(s). Additionally, information representing the correlation mappings may be transmitted to the monitored computer system(s), and types of feedback data collected from the client agents can be altered on the basis of the correlation information.
Pre-fetching of network page content
Disclosed are various embodiments for pre-fetching of resources referenced on a network page. A predicted next network page is retrieved by a computer system. The predicted next network page references at least one resource. At least one attribute of the resource is evaluated according to at least one retrieval criteria. At least one resource is retrieved if the attribute meets the retrieval criteria.
Network-assisted peer discovery
Techniques for performing network-assisted peer discovery to enable peer-to-peer (P2P) communication are described. In one design, a device registers with a network entity (e.g., a directory agent) so that the presence of the device and possibly other information about the device can be made known to the network entity. The network entity collects similar information from other devices. The device sends a request to the network entity, e.g., during or after registration. The request includes information used to match the device with other devices, e.g., information about service(s) provided by the device and/or service(s) requested by the device. The directory agent matches requests received from all devices, determines a match between the device and at least one other device, and sends a notification to perform peer discovery. The device performs peer discovery in response to receiving the notification from the network entity.
Method for internetworked hybrid wireless integrated network sensors (WINS)
The Wireless Integrated Network Sensor Next Generation (WINS NG) nodes provide distributed network and Internet access to sensors, controls, and processors that are deeply embedded in equipment, facilities, and the environment. The WINS NG network is a new monitoring and control capability for applications in transportation, manufacturing, health care, environmental monitoring, and safety and security. The WINS NG nodes combine microsensor technology, low power distributed signal processing, low power computation, and low power, low cost wireless and/or wired networking capability in a compact system. The WINS NG networks provide sensing, local control, remote reconfigurability, and embedded intelligent systems in structures, materials, and environments.
Predicting long-term computing resource usage
Techniques are described for performing automated predictions of program execution capacity or other capacity of computing-related hardware resources that will be used to execute software programs in the future, such as for a group of computing nodes that execute one or more programs for a user. The predictions that are performed may in at least some situations be based on historical data regarding corresponding prior actual usage of execution-related capacity (e.g., for one or more prior years), and may include long-term predictions for particular future time periods that are multiple months or years into the future. In addition, the predictions of the execution-related capacity for particular future time periods may be used in various manners, including to manage execution-related capacity at or before those future time periods, such as to prepare sufficient execution-related capacity to be available at those future time periods.
Query optimization in a parallel computer system with multiple networks
A database query optimizer optimizes a query that uses multiple networks. The database query optimizer optimizes a query that uses multiple networks to satisfy the query by splitting the query execution to use multiple networks. Thus, the query optimizer rewrites or optimizes a query to execute on multiple nodes or networks to more efficiently execute the query and reduce network traffic on a network. The query optimizer uses plan cache statistics to determine whether to use multiple networks to optimize the query.
Aggregation of multiple media streams to a user
A media stream aggregation mechanism receives and analyzes multiple media streams and creates an aggregate media stream output based on user preferences. In this manner a media provider that uses the media stream aggregation mechanism potentially may provide a customized presentation to each user based on user preferences. By providing the aggregation of multiple media streams to a user, the user's experience is customized according to user preferences.
Method for managing address spaces at an opening of a communications tunnel, corresponding tunnel end-point, and storage means
A method is proposed for providing a remedy to the problem of address conflict when setting up a communications tunnel between a first tunnel end-point of a first communications sub-network and a second tunnel end-point of a second communications sub-network distinct from said first sub-network, in proposing an efficient method for the dynamic management of the address spaces of each sub-network, implemented by a tunnel end-point upon detection of a request for linking two sub-networks by a tunnel.
Tracking changes in on-line spreadsheet
A computer-implemented method for method for tracking changes in an internet-accessible document is disclosed. The method includes providing, with a presentation server system, data for producing a display of a document at a client computing device; receiving, at the presentation server system from a data server system, a timestamp that is sent by the data server system in response to an indication by a user of the client computing device to record changes to the document, wherein the timestamp indicates a time after which changes have been made to the document; and providing from the presentation server system to the data server system data indicating changes made to the document since a time corresponding to the timestamp.
Reducing fetching load on cache servers in adaptive streaming
In one embodiment, a method that receives at a cache server device a request from a client device for a first representation of a content chunk; determines whether the first representation is available at the cache server device; responsive to determining that the first representation is available at the cache server device, provides the first representation to the client device; responsive to determining that the first representation is unavailable at the cache server device, determines whether a congestion-like condition is present in an upstream network; and responsive to determining that the congestion-like condition is present in the upstream network, provides a second representation of the content chunk.
Network scanner and method of providing uniform resource locator
A network scanner and a method of providing a URL corresponding to an image of document, when a user scans a document in a network scanner that includes an IP address. The method includes scanning a document in the network scanner that includes the IP address, generating the image of the document, storing the image of the scanned document, generating a URL to connect to the stored image, and providing the generated URL.
System and method for restrictively exchanging and controlling vehicular data between communication devices of a private network
A novel and non-trivial system and method for restrictively exchanging and controlling vehicular data between communication devices of a private network is disclosed. A processor in communication with a plurality of user communication devices is used for controlling and restricting the exchange of vehicular data. In such network, the processor may establish a communication connection with an initiating communication device of an initiating user, receive initiating vehicular data from the initiating communication device and corresponding first users (e.g., defined trusted users) data, provide the initiating vehicular data to at least one available first user communication device, receive responding vehicular data responsive to the initiating vehicular data, and provide the responding vehicular data to the initiating communication device. Additionally, the processor may provide interested users who have not been defined as trusted users with the initiating product data and receive responding vehicular data from such interested users.
Data backup for a mobile computing device
A system and method of backing up a data file from a mobile computing device is disclosed. The method can include receiving a data file from the mobile computing device at a server computer and storing the data file on a storage device. The method can include receiving data indicative of changes made to the data file on the mobile computing device. The method can further include changing the data file stored on the storage device based on the data indicative of changes made to the data file on the mobile computing device.
The various embodiments are directed towards enabling a versioned coalescer to defer when data blocks cached in unstable storage may be flushed to stable storage. In at least one of the various embodiments, deferring the flushing of cached data blocks until they are read may avoid having to periodically suspend cache operations to flush all cached data from unstable storage to stable storage. In at least one of the various embodiments, if data blocks may be written, a versioned coalescer may cache the data blocks in a high-performance node cache that may be dedicated to a node in a distributed file system. Further, if a process requires a snapshot of at least a portion of the file system a versioned coalescer may examine the node caches for each node. If a node cache contains relevant data blocks the versioned coalescer may insert a snapshot sentinel into the node cache.
Method and system for secure mobile file sharing
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.
Method and system for transmitting an application message between nodes of a clustered data processing system
A method and system for transmitting an application message between nodes of a clustered data processing system is disclosed. According to one embodiment, a method, embodied within a machine-readable medium, is provided according to which a determination is made whether one or more application messages to be transmitted to a first node of a plurality of nodes from a second node of the plurality may be currently transmitted. The method of the described embodiment further includes the processing of the one or more application messages in response to a determination whether the one or more application messages may be currently transmitted.
Method for a mobile email client to access to a server, and mobile terminal thereof
Disclosed are a method for communications between a terminal and a base station. The method comprises: determining a type of an access point that connects the mobile email client and the server according to information of the access point; establishing a data link between the mobile email client and the server according to the determined type of the access point; performing data exchange between the mobile email client and the server. The solution enables a mobile terminal to send and receive mobile emails as long as the access point is an access point that the mobile emails can use, no matter what kind of access point that the user selects, and no matter what kind of access point that the client account configuration information, which is transmitted by a mobile operator, adopts, thereby ensuring the normal use of the mobile email in a mobile terminal better.
Method, system and apparatus for processing calendar events
According to embodiments described in the specification, a method, system and apparatus for processing calendar events are provided. The method comprises: receiving a calendar event invitation message addressed to at least one recipient device and storing the calendar event invitation message in a memory; determining, at a processor, whether to disable at least one recipient device function; when the determination is affirmative, generating a recipient policy including a recipient device function identifier, and a rule associated with the function identifier; and deploying the recipient policy for the at least one recipient device such that the function is disabled at the recipient device for at least a period of time.
Transferring application state across devices with checkpoints
A first client device executes a plurality of actively running applications, each having one or more checkpoints, each checkpoint identifying an execution breakpoint at which a respective application can be suspended and subsequently resumed. The first client device detects a transfer triggering condition, stores an application state for each of the plurality of actively running applications, and transmits the stored application state for each of the plurality of actively running applications to a second client device or system. The stored application state for each respective application of the plurality of actively running applications corresponds to a checkpoint of the respective application. Optionally, the transfer triggering condition includes presence of the second client device or system within a predefined proximity of the first client device or system, wherein the predefined proximity is a predefined proximity for near field communication.
Scanning a message-list
A method for scanning a message-list accessible to a plurality of processors includes retrieving, from a cache associated with a scanning processor from the plurality of processors, information identifying a starting message-slot. This information is then used to begin a scan of the message-list at that starting message-slot. The information indicating the starting message-slot is obtained by identifying, in the message-list, a message-slot containing a message intended for a recipient processor from the plurality of processors and obtaining, from the identified message-slot, information indicative of a location of a succeeding message-slot in the message-list. This information is then cached, for retrieval during a subsequent scan of the message-list.
System and method for synchronizing electronic poll book voter databases
The present invention is directed to a system and method for synchronizing electronic poll book voter databases. The system includes a plurality of electronic poll books in communication over a network, each poll book having a unique identifier and each including a voter database of voter information. Each poll book is operable to transmit its unique identifier in an information packet and receive information packets from other poll books. Each poll book arranges the transmitted and received unique identifiers in order according to a predetermined ordering scheme, and establishes communication with two other poll books and exchanges voter database information to ensure all databases have updated information. With the communication established as described, the poll books form a ring network and database information is propagated from poll book to poll book to synchronize the databases between all of the poll books.
Asset sharing within an enterprise using a peer-to-peer network
A method and system for sharing an asset in a peer-to-peer network. Meta data and a source node identification are received. The meta data specifies properties and content of the asset to be shared by the source node. The received source node identification and the meta data are locally stored as a couple in a catalog. Subsequently, content specifying the asset and a request to search for and retrieve the asset based on the content is received. The locally stored catalog is loaded and searched to detect the couple that includes the source node identification and meta data, where the received content matches the meta data. The source node is identified based on the detected couple. A request is sent to the source node to retrieve and share the asset, and in response, the asset is received.
Computer program, method, and system for collecting and analyzing data for special needs children
A computer program for directing operation of a computer system for use in collecting data for special needs students. The computer program comprises a code segment for receiving data representative of an incident for a special needs student from a portable electronic device operated by a first person; and a code segment for sending a notification of the incident to a portable electronic device operated by a second person to prevent duplicate reporting of the incident by the first and second persons.
System and method for content validation
A method includes receiving at a directory server a notification from a client system, where the notification indicates that the first client received a corrupt packet of a playfile from a first peer. The method also includes determining if the first peer is a poor quality peer, updating a first peer score for the first peer if the first peer is not a poor quality peer, identifying a second peer that is not on a blacklist, and providing a peer identification associated with the second peer to the client system.
Trusted maps: updating map locations using trust-based social graphs
A system and method for updating and correcting the location of geospatial entities, the method comprising receiving at a server from a mobile device operated by a first user, a proposed location for a geospatial entity, the proposed location determined by a wireless location system, and based upon a current location of the mobile device; providing information about the proposed location for the geospatial entity to a first plurality of other users; receiving votes from the first plurality of users as to whether the proposed location is correct and responsive to the received votes, determining whether to update the location information for the geospatial entity.
Automated screen saver with shared media
Embodiments of the present invention provide users in a social network with a screen saver constructed by media shared by their contacts and groups in a social network. The present invention provides a shared photo album that displays images from a user's own photo collection, and that of their social network automatically. For a user, the social network service queries its database to retrieve a list of photo sources. The sources of images may be online photo sharing services, other computers with photos on their local hard drives, and public peer-to-peer storage services. The images may be displayed to the user and optionally may be accompanied with information, such as the owner of the photo or descriptive phrases or comments about the photo. The social network service may be configured to continuously or periodically request photos to update the screen saver.
Establishing future start times for jobs to be executed in a multi-cluster environment
Start times are determined for jobs to be executed in the future in a multi-cluster environment. The start times are, for instance, the earliest start times in which the jobs may be executed. The start times are computed in logarithmic time, providing processing efficiencies for the multi-cluster environment. Processing efficiencies are further realized by employing parallel processing in determining the start times.
Calculation of trigonometric functions in an integrated circuit device
Circuitry for computing a trigonometric function of an input includes circuitry for relating the input to another value to generate an intermediate value, circuitry for selecting one of the input and the intermediate value as a trigonometric input value, circuitry for determining respective initial values of a plurality of trigonometric functions for the trigonometric input value, and circuitry for deriving, based at least in part on a trigonometric identity, a final value of the first trigonometric function from the respective initial values of the plurality of trigonometric functions. The trigonometric function may be any of sine, cosine and tangent and their inverse functions. The trigonometric identities used allow a computation of a trigonometric function to be broken into pieces that either are easier to perform or can be performed more accurately.
Filter processing device and semiconductor device
The present invention provides a technique for changing the number of taps in filter processing without the need for execution of branch processing. A filter processing device comprises: an arithmetic circuit that performs arithmetic processing for filtering operation; an internal register that retains data to be subjected to arithmetic processing in the arithmetic circuit and that receives the result of arithmetic processing from the arithmetic circuit as data to be written back thereto; and a data generator that generates data to be fed to the arithmetic circuit through use of the data retained in the internal register. Further, in the filter processing device, there is disposed a tap number control circuit that is capable of controlling the number of taps in filter processing according to a tap control signal applied thereto. In this configuration, no branch processing is required for controlling the number of taps by the use of the tap number control circuit.
String hashing using a number generator
In one embodiment, a mechanism for string hashing using a random number generator is disclosed. In one embodiment, a method includes dividing an input stream provided to a hashing module into a plurality of subsets of ‘n’ bits, entangling, by a mixer of the hashing module, one of the subsets of ‘n’ bits by a next sequential output of a pseudo-random number generator (PRNG), adding a product of the entangling to an accumulator of the hashing module, repeating the entangling and adding until all subsets of the plurality of subsets have been processed, and returning a value in the accumulator as a hash result value.
Scalable storage for virtual machines
A method and system is disclosed for providing storage services to Virtual Machines (VMs) and the Hypervisor Platforms that host them. NAS referrals are used to control selection of NAS proxy servers that are optimized for the support of VMs and the Hypervisor Platforms accessing directories that are exclusively used in conjunction of a single VM. Referrals are dynamically controlled in a manner specific to the target environment to provide an optimal combination of local and network storage in support of VMs. A method of using named attributes allows referrals to subsets of a directory. The overhead of using a NAS proxy is tailored to the smallest set of accesses required to gain beneficial result from the use of local storage, and using direct access to shared network storage when local storage is not allocated. Most of the new suggested techniques are transparent to the existing NAS clients; some techniques may require modification of the NAS client software.
System for permanent file deletion
A system for permanent data deletion is provided. The file deletion system consists of a permanent deletion unit, an analysis module, a database of rules for forming deletion algorithm and an algorithm forming unit. A file to be deleted is passed into the system and the system permanently deletes the file. The system dynamically forms the deletion algorithm based on algorithm forming rules. The rules are selected from the database according to file parameters and user criteria. The file parameters are determined by the analysis module. A user has an access to algorithm forming rules and can edit the rules. Algorithm forming rules can be based on an arbitrary number of complex conditions.
Method and system for establishing and using a social network to facilitate people in life issues
Embodiments described herein provide numerous applications and implementations of a social network to facilitate individuals to resolve various life issues. These issues may include issues that arise when individuals or families relocate, including logistic problems, assimilation of family members in a community, and roommate pairings. As will be described, embodiments described herein greatly facilitate corporations in relocating their employees logistically, and also assist employees and their families with life issues that may determine whether the employees' relocation will be a success.
Computer database with adaptive storage space architecture
A computer database having adaptive storage space architecture is provided. The database has a storage space architecture which has a grid having grid lines, intersections of the grid lines forming nodes which provide space for storing data, each node being assembled from a plurality of cells arranged in at least one group of cells forming a storage space structure of the node, each cell being suitable for storing simple data. Additionally, selected groups of cells within the nodes may be designated as replicable, i.e. being able to replicate itself in response to an external signal. A corresponding database processing unit for processing data stored in the database, a graphical user interface for input and output of the data, and method of forming the database are also provided.
Systems, methods and apparatus for assessing compliance and federating databases
Systems, methods, and apparatus as discussed herein, provide for enabling a user to select containers and parent level requirements to be retrieved. A navigation panel is provided that enables a user to navigate through the selected containers. A sieve module filters non applicable requirements in the containers based on the selected parent level requirements. The system further joins and integrates compliance information stored within in the Compliance Database, and the associated requirements stored in the containers. The system further stores, manages and reports compliance information associated with specific requirements located in the identified container. Additionally, a federation module may enable user to link requirements located in different containers, and may copy requirements from one container and paste into another container.
Information exchange engine providing a critical infrastructure layer and methods of use thereof
A virtual record manager and a data exchange engine are provided for dynamically defining data records in a database and for dynamically allocating instances of defined data records. These components are capable of mediating between the database and application and client interface layers to facilitate exchange of information over a network. Embodiments are configured to allow complex data records having a plurality of related fields, and to allow management and exchange of information at both the data field level and data record level.
Taxonomy based database partitioning
In one aspect of the invention, a memory is described for facilitating splitting data by taxonomy. The memory is accessed by an application program, and includes one or more top-level categories, where each top-level category comprises a subset of the items; and also includes a category group corresponding to at least one of the top-level categories and the subset of the items belonging to the top-level categories.
Unique attribute constraints for versioned database objects
Methods and apparatus for ensuring uniqueness of database object attributes are disclosed. An example computer-implemented method includes receiving a request to insert, update or delete a versioned database object having a first identifier (ID) in a main database table. The method further includes determining, based on the request, whether to fire an insert trigger, a delete trigger or an update trigger for the main database table. In the event an insert trigger is fired, the method includes performing, in a secondary database table, a record insertion process. In the event a delete trigger is fired, the method includes performing, in the secondary database table, a record deletion process. In the event an update trigger is fired, the method includes performing, in the secondary database table, at least one of the record insertion process for a post-update versioned database object and the record deletion process for a pre-update versioned database object.
Story generation methods, story generation apparatuses, and articles of manufacture
Story generation methods, story generation apparatuses, and articles of manufacture are described. According to one aspect, a story generation method includes displaying a user interface which is configured to assist a user with writing a story; accessing a plurality of words of the story inputted by the user interacting with the user interface; using at least one of the words of the story, selecting one of a plurality of different graphical images which corresponds to the at least one word of the story; and generating a plurality of pages of the story which include the words of the story, and wherein at least one of the pages includes the one graphical image which corresponds to the at least one word of the story.
Machine assisted query formulation
Architecture for completing search queries by using artificial intelligence based schemes to infer search intentions of users. Partial queries are completed dynamically in real time. Additionally, search aliasing can also be employed. Custom tuning can be performed based on at least query inputs in the form of text, graffiti, images, handwriting, voice, audio, and video signals. Natural language processing occurs, along with handwriting recognition and slang recognition. The system includes a classifier that receives a partial query as input, accesses a query database based on contents of the query input, and infers an intended search goal from query information stored on the query database. A query formulation engine receives search information associated with the intended search goal and generates a completed formal query for execution.
System and method for tracking and rewarding users
Systems and methods of tracking and rewarding users of search engines, content networks, communication networks, other networks and/or combinations of networks are described. In many embodiments, users create accounts and control when and the type of information that is tracked. The tracked information can be used to provide rewards, customize offers and rewards and to improve services provided to the user. One embodiment includes receiving secure identification information from the user, retrieving user account information using the secure identification information, receiving a search query from the user, crediting the user account with a reward that is directly related to providing the search query, and returning search results.
Data processing device and data processing method
When a failure occurs in data matching processing, a quick data backup processing is required. For such an object, the data processing apparatus includes a data distribution part which stores a file data group in a normal data holding area of the j-th matching node and performs a backup processing by dividing the file data included in the file data group in the backup data holding area in the matching nodes other than the j-th matching node. The backup processing is performed by distributing each of the file data in the file data group to the backup data holding area in turn from a least backup data holding area where a file data being currently stored is least among the matching nodes.
Face photograph-based dating recommendation system
Methods and apparatus for vision based dating recommendations which analyze face photographs in a members database and recommends potential dating partners. A user selects faces the user finds attractive or unattractive from an objectively diverse group of member photographs. Member faces are mapped and compared with defining data extracted from the attractive and unattractive face selections made by the user to present to the user a ranking of photographs from most to least attractive. The user may continue to select attractive and unattractive face photographs allowing for a more refined and accurate ranking of faces attractive to the particular user. The ranked face data may be combined with narrative compatibility data to present to the user members the user is most likely to find compatible as well as attractive.
Processing contact information
Systems and methods for processing contact information are described. In one embodiment, an entity name is identified from an event associated with an article, wherein the entity name is associated with an entity and the event is associated with a user, contact information associated with the entity name is identified, the entity name and at least some of the contact information is indexed, and the entity name and at least some of the contact information is stored.
Bitemporal relational databases and methods of manufacturing and use
A method of reducing the time taken to manufacture a bitemporal relational database is disclosed. The method involves designing business database tables with relational rules stored in a relational kernel or referential rule dictionary, and designing those tables so as to be without start date and end date columns for start of valid time and end of valid time for entities, and designing the system to be without history tables recording the history of relationships between entities in the database; the system being designed as a current view with primary key and unique key constraints, and time-related issues being taken care of by the S$, T$, and E$ tables automatically generated as the data structure of the system is populated with data.
Time based ordering of provided mobile content
A method, system, and apparatus are directed to providing information over a network. A search query may be received. If the search query includes at least one keyword matching a pattern associated with a specific search engine, a plurality of search results is retrieved from the specific search engine based on the keyword, and the plurality of search results is provided. A plurality of potential search or source engines may be determined based on a current time information. At least one of the potential search or source engines may be a personalized source engine. At least one plurality of results may be retrieved from at least one of the potential search or source engines. The result may be based on the search query. An aggregated result may be determined based on a time rule and/or the current time information. The aggregated result may comprise the plurality of results.
Temporally-correlated activity streams for conferences
Techniques are provided for capturing events and activities that occur during a conference, generating metadata related to the events, and correlating the metadata with specific points in time, within the conference, at which the corresponding events occurred. The resulting temporally-correlated event metadata may be stored as part of the conference recording, or separate from the conference recording. Once the temporally-correlated event metadata has been stored for a conference, the conference may be indexed based on the metadata. The index may then be used to not only to locate a conference that satisfies specified search criteria, but to identify the points or snippets, within the conference, that correspond to the search criteria.
Systems and methods for extracting phases from text
Systems and methods for extracting phrases from text are disclosed. In an exemplary embodiment, a method may include preprocessing desired phrases into at least one phrase indexing data structure for efficient matching. The method may also include scanning text to construct a hash table including keys and corresponding entries. The method may also include locating suffix trie trees for each word in the hash table. The method may also include matching each position in the hash table against the suffix trie trees, and outputting phrases matched in the scanned text.
Method and apparatus for maintaining and navigating a non-hierarchical personal spatial file system
A self-organizing personal file system is disclosed that evaluates the “importance” of terms and phrases in a document in a personal corpus relative to usage in a reference corpus. A personalized term weighting scheme assigns a weight to terms or phrases based on the frequency of occurrence of the corresponding term or phrase in a reference corpus. Documents are positioned in a visual file space associated with a personal corpus by storing each of the documents with an indication of the term weight for terms appearing in the corresponding document. A singular value decomposition is performed based on the term weights to position a given document in the visual file space based on a relative frequency distribution of terms of the document compared to the occurrence of such terms in a reference corpus.
Method for recommending best information in real time by appropriately obtaining gist of web page and user's preference
Disclosed is an information recommendation method for providing a construction method for a classified word database capable of rapidly accommodating changes in associations between words. The disclosed information recommendation method basically is based on the finding that, by analyzing occurrence frequency information of an arbitrary word in a Web site having an arbitrary classified word in real-time and obtaining the real-time degree of similarity between the classified word and the arbitrary word, it is possible to construct a database that is capable of being sensitive in responding to changes in associations between words. The disclosed information recommendation method relates to a method of extracting classified words indicating a main idea of text included in a Web page, accumulating the classified words, and constructing a real-time tag database; an information recommendation method for using the tag database to reflect the main idea of the Web page in real-time; and an information matching method of advertisements for using the tag database to reflect the main idea of the Web page and tastes of users in real-time.
Content reproducing apparatus, content reproduction method, and program
Music contents assigned to play lists are reproduced so as to correspond to user's preference. A music content database 7 has stored a plurality of music contents. A CPU 3 creates genre ranks such that music contents that have been more frequently, for example, reproduced are more highly ranked. In addition, the CPU 3 creates play lists corresponding, for example, to tempos and stores the created play lists in a play list database 8. The CPU 3 selects a play list corresponding to a moving tempo obtained from a tempo detection section 9 and selects music content categorized as a highly ranked genre in the genre ranks from those corresponding to the selected play list. The selected music content is supplied to a decoder and amplifier section 12 and then reproduced from a head phone 14.
System and method of displaying related sites
A system facilitates the display of thumbnail images containing images of websites related to a website currently being viewed by a user. The system may include several different components to provide the thumbnail images to the user, such as a graphical user interface, an input interface, and a processor. The graphical user interface may display a website for viewing by a user and the input interface may receive an input representative of a request for a related website. The processor may transmit the request for the related website to a search engine, and, in response, the processor may obtain a search result representative of the related website. Moreover, the search result may include several components, such as a related website image representative of the related website and a uniform resource locator (“URL”) representative of a location of the related website.
Method and apparatus for providing context-based obfuscation of media
An approach for sharing and/or viewing one or more remixes of content based on the preferences of a user is described. A segmentation platform causes, at least in part, a segmentation of content into one or more segments, wherein the one or more segments are associated with one or more content labels. The segmentation platform also causes, at least in part, a rendering and/or sharing of one or more remixes of the content based, at least in part, on at least one subset of the one or more segments based, at least in part, on profile information, context information, or a combination thereof associated with one or more viewers of the content, one or more owners of the content, one or more sharers of the content.
Search results ranking using editing distance and document information
Architecture for extracting document information from documents received as search results based on a query string, and computing an edit distance between the data string and the query string. The edit distance is employed in determining relevance of the document as part of result ranking by detecting near-matches of a whole query or part of the query. The edit distance evaluates how close the query string is to a given data stream that includes document information such as TAUC (title, anchor text, URL, clicks) information, etc. The architecture includes the index-time splitting of compound terms in the URL to allow the more effective discovery of query terms. Additionally, index-time filtering of anchor text is utilized to find the top N anchors of one or more of the document results. The TAUC information can be input to a neural network (e.g., 2-layer) to improve relevance metrics for ranking the search results.
Automatic and dynamic design of cache groups
A system and method is provided for automatic and dynamic adaptation of cache groups in a database system having one or more processors. The method includes analyzing a database query and determining if a set of predicates in a predicate pattern are suitable for inclusion in one or more cache groups, with the one or more cache groups having one or more cache tables; mapping value-based predicates in the predicate pattern to a filling column in the one or more cache tables; and mapping equi-join predicates in the predicate pattern to a referential cache constraint in the one or more cache tables. New cache groups can be created for predicate patterns occurring more frequently and existing cache groups can be deleted if the frequency of the predicate pattern falls below a predetermined threshold value.
Mechanisms for performing database queries are provided. With these mechanisms, in response to a query request, a query plan intended for minimum query response time and a query plan intended for minimum query total time for the query request are obtained execution of the minimum query response time query plan and the minimum query total time query plan is started. Before the execution of the minimum query total time query plan reaches a specified point, an initial query result obtained from the execution of the minimum query response time query plan is output. In response to the execution of the minimum query total time query plan reaching the specified point, continuing the execution of the minimum query total time query plan to output remaining query results.
System and method for outer joins on a parallel database management system
There is provided a computer-executable method of executing an outer join on a parallel database management system. An exemplary method comprises receiving an outer skewed values list (SVL). The outer SVL may comprise values that are indicated to be skewed. The exemplary method further comprises receiving an inner SVL. The inner SVL may comprise values that are indicated to be skewed. Additionally, the exemplary method comprises partitioning the outer table and the inner table across a plurality of join instances, based on the outer SVL and the inner SVL. A missing skew value is identified. The missing skewed value may be a value of the inner SVL that is not found in the inner table. The outer join is performed using the plurality of join instances, based on the missing skewed value.
Management of interesting database statistics
A method, system, and computer program product for managing database statistics are provided. The method, system, and computer program product provide for receiving a query for optimizing, collecting statistics specific to the query prior to generating any access plans for executing the query, and generating an access plan for executing the query based on the collected statistics.
Distributed crawling of hyperlinked documents
Techniques for crawling hyperlinked documents are provided. Hyperlinked documents to be crawled are grouped by host and the host to be crawled next is selected according to a stall time of the host. The stall time can indicate the earliest time that the host should be crawled and the stall times can be a predetermined amount of time, vary by host and be adjusted according to actual retrieval times from the host.
System for locating an object owner
Systems, methods, and computer program products are provided for locating an object owner. The system provides a microchip database that stores a plurality of microchip records containing microchip identification codes, owner contact information and the like. Microchips are embedded in objects such that when the object is scanned the microchip identification code can be retrieved and used to search and retrieve contact information from the microchip database using one or more search engines. When using the microchip identification code to conduct a search a link to a website displaying information associated with the microchip record is presented first in the list of search results.
Methods and apparatus for identifying and providing information sought by a user
Some embodiments relate to techniques for performing a search for content, in which a user may issue a search query, and the search engine or engines to which that query is provided may be determined dynamically based on any of a variety of factors. For example, in some embodiments, the search engine or engines to which the query is provided may be determined based on the content of the search query, and/or auxiliary information such as the user's location, demographics, query history and/or browsing history.
Analysis and reporting of collected search activity data over multiple search engines
A tracking system passively tracks and records searches conducted by actual search engine users. The recorded data for each search event preferably includes the search query submitted, the search engine used, the search result item (e.g., web page) selected, the position (e.g., page number) of this item, and the user's IP address. The collected data is aggregated and analyzed to generate data regarding the search queries used to locate and access particular destinations (e.g., web pages and sites). This data may be used for various purposes, such as (1) to generate reports showing, e.g., how users reach a particular destination from different search engines and geographic locations, (2) to select content to display on a destination page, such that the content is relevant to search queries commonly used to locate that page, and (3) to update the database of one search engine to reflect searches conducted on other search engines.
Method and apparatus to reorder search results in view of identified information of interest
Various embodiments described herein provide systems, methods, and software to automatically reorder search results presented to users based on information specific to the user or the computing environment of the user. Some embodiments include a data store holding user or environment specific data that is used to identify search results that are more likely to be relevant to the user. These and other embodiments are described in greater detail herein.
Information processing apparatus and computer readable medium for performing history cancellation processing
An information processing apparatus includes a detecting unit and a history processing unit. The detecting unit detects a first operation and a second operation. The first operation is an operation of inputting a document to an electronic tray. The second operation is an operation of retrieving a document from the electronic tray. The history processing unit performs a predetermined process related to cancellation history in a case where an operation detected by the detecting unit is the second operation, if history information indicates that the first operation has already been performed, if document identification information indicating a document on which the first operation has been performed matches document identification information indicating a document on which the second operation has been performed, and if operator identification information indicating an operator who has performed the first operation matches operator identification information indicating an operator who has performed the second operation.
Detecting and combating attack in protection system of an industrial control system
A method for detecting and combating an attack in an industrial control system includes sending a command stream from a protection network of an industrial control system to at least one zone, the command stream comprising at least one command; concatenating the at least one command into at least one sequential command package comprising units of work; passing the at least one sequential command package to a crypto hash generator; generating at least one of unit of work hash codes or sequence hash codes; comparing the generated hash codes against a database of existing valid unit of work hash codes and sequence hash codes; and if a command stream fault is detected, generating an alert and accessing a database comprising emergency procedures.
Time-outs with time-reversed linear probing
A current key is received at a current arrival time at a computer. An index in an array corresponding to the current key is determined using a hash function. A previous key and a previous arrival time are retrieved from the array at the index. The array is transformed by replacing the previous key and the previous arrival time with the current key and the current arrival time in the array at the index. The previous key and the previous arrival time are inserted into a nearest eligible sequential index in the array.
Method and system for text interpretation and normalization
A system and method for text interpretation and normalization is presented. The method for text interpretation and normalization may include receiving a reference data entry that includes one or more strings of text and one or more associated numeric codes, creating a plurality of tokens from the one or more strings of text, each token being tied to an associated numeric code, formatting the plurality tokens with operations codes (opcodes) that provides additional information about the tokens, retrieving configuration data including the plurality of tokens, the opcodes, and numeric codes associated with the tokens, selecting one inbound, non-reference string for interpretation, comparing tokens from the configuration data to the non-reference string to determine the best matching token, and applying, using the processor, the numeric code associated with the best matching token to the non-reference string in order to normalize the non-reference string.
Systems, methods, and computer program products for scheduling processing to achieve space savings
A method performed in a system that has a plurality of volumes stored to storage hardware, the method including generating, for each of the volumes, a respective space saving potential iteratively over time and scheduling space saving operations among the plurality of volumes by analyzing each of the volumes for space saving potential and assigning priority of resources based at least in part on space saving potential.
Efficient data backup
A method, article of manufacture, and apparatus for efficiently backing up information is disclosed. In an embodiment, this comprises receiving data and analyzing the received data. In an embodiment, the data may be deduped. File headers, corresponding file metadata and corresponding file blocks are then created based on analyzing the data. In an embodiment, the data is discarded. The file headers, corresponding file metadata and corresponding file blocks are then organized into a self contained datastream. The self contained datastream is then stored in a storage device. File headers are used to indicate the start of a new file in the self contained datastream. File blocks contain the information necessary to reconstruct the files in the datastream. File metadata describes how to reconstruct the file, such as which file blocks are required for the file, and the location of each file block in the self contained datastream, among others.
Database archiving using clusters
A technique for archiving a relational database having tables of rows may use clusters. Transaction identifiers may be assigned to each of the rows in each of the tables such that all rows belonging to the same application transaction share a unique transaction identifier. Plural hierarchies may be determined, each hierarchy having high level nodes corresponding to the rows in a single table and dependent nodes corresponding to rows in other tables to which the rows in the single table are related in the database. The plural hierarchies may be merged to form plural clusters, one cluster for each unique transaction identifier. Each cluster may have high level nodes corresponding to the plural hierarchies but only those dependent nodes from the plural hierarchies whose transaction identifiers correspond to that of the cluster. The clusters may be stored in one or more files to form an archive.
Context-driven model transformation for query processing
In an information management system, multiple models are utilized to characterize stored information. A query directed to the stored information is received, and at least one contextual indicator is extracted, inferred or otherwise determined from the received query. The contextual indicator determined from the received query is applied to a meta-model that includes linkages between attributes of respective ones of the multiple models, where each of the linkages comprises one or more associated contextual properties, in order to generate a transformed meta-model specifying an authoritative policy result for processing the query responsive to the contextual indicator. The query is then processed in accordance with the authoritative policy result specified in the transformed meta-model.
Storage control system and method
A storage system having a plurality of storage devices including a first type storage device and a second type storage device, a reliability attribute and/or a performance attribute of the first type storage device being different from a reliability attribute and/or a performance attribute of the second type storage device. The storage system also has a control unit and managing a plurality of virtual volumes. If necessary, a storage area allocated to a first portion of a virtual volume of the plurality of virtual volumes is changed from a first type storage area of the plurality of first type storage areas to a second type storage area of the plurality of second type storage areas while another first type storage area of the plurality of first type storage areas is allocated to a second portion of the virtual volume.
Backup service and appliance with single-instance storage of encrypted data
One implementation of a method for providing backup storage services for encrypted data includes receiving signatures of convergently encrypted portions of data from client computers, determining whether the encrypted portions are already present on a backup storage, and obtaining only the needed portions. Users unassociated with a particular user account are denied access to information backed up in that account. The backup storage also stores password protected key files holding signatures of the unencrypted portions of data. One implementation of a system includes a memory, a single-instance storage circuit, a user account management circuit, and a signature index. The memory holds a user-account database and backup copies of convergently encrypted portions of data. The single-instance storage circuit uses the signature index to prevent duplicative backup copies. The user account management circuit responds to download requests after authenticating the user information associated with the requested data.
System, method and computer program product for synchronizing data using data identifying messages
In accordance with embodiments, there are provided mechanisms and methods for synchronizing data using data identifying messages. These mechanisms and methods for synchronizing data using data identifying messages can enable embodiments to provide notification of a need to synchronize one instance of data with changes made to another instance of data, without necessarily communicating the changes to be made to the other instance of the data. The ability of embodiments to provide synchronization based on such a notification can allow more efficient data synchronization while ensuring that synchronizations are based on up-to-date information.
Schedule based data lifecycle management
A system and method for defining a separate lifecycle policy for each of one or more data images. A backup server is configured to select a first point-in-time value, which indicates when to begin moving a data image from a first data storage medium to a second storage medium. The point-in-time value corresponds to a calendar date and an hour or hours of the day. The backup server is configured to continue selecting a respective point-in-time value for each data storage medium within a tiered storage hierarchy in order to define the lifecycle policy. The backup server may be further configured to delete a copy of the data image on a source data storage medium when completion of a move of the data image to a destination data storage medium is detected. Further, the backup server may detect scheduling conflicts between two or more lifecycle policies.
Systems and methods for assessment of fatigue-related contextual performance using historical incident data
Disclosed herein are methods for transforming numerical output of mathematical-fatigue models into contextual performance metrics, including without limitation, performance, incident and/or accident-related metrics associated with particular activities and/or with particular environments, such as but not limited to: the number and severity of injuries or cost of repairs associated with a particular incident, increases in insurance premiums, a performance rate, an error rate and/or the like.
Identifying categorized misplacement
The present disclosure provides methods and devices for identifying category misplacement. In one embodiment, an example device obtains a word frequency of each respective word in a product title under a current category, calculates an overall word frequency of the product title under the current category based on the word frequency of each respective word under the current category, and compares the overall word frequency of the product title with a threshold of the current category to determine an existence of category misplacement. The techniques can accurately identify category misplacement and reduce the probability of missing identifying category misplacement. The techniques also require less system resources and improve calculation efficiency.
Exemplary methods and systems are disclosed that apply feedback-based machine learning in order to more intelligently use context information to automate certain actions. An exemplary method involves: determining a first context based on a combination of two or more context signals, using a context-to-action mapping to determine a first action that corresponds to the first context, initiating the first action, after initiating the first action, receiving a data signal corresponding to a user-action, analyzing the data signal to determine a feedback relationship between the user-action and the first action, and based at least in part on the feedback relationship, updating the context-to-action mapping.
Memristive adaptive resonance networks
A method for implementing an artificial neural network includes connecting a plurality of receiving neurons to a plurality of transmitting neurons through memristive synapses. Each memristive synapse has a weight which is initialized into a conductive state. A binary input vector is presented through the memristive synapses to the plurality of receiving neurons and the state of one or more of the memristive synapses modified based on the binary input vector.
Hierarchical based sequencing machine learning model
A hierarchical based sequencing (HBS) machine learning model. In one example embodiment, a method of employing an HBS machine learning model to predict multiple interdependent output components of an MOD output decision may include determining an order for multiple interdependent output components of an MOD output decision. The method may also include sequentially training a classifier for each component in the selected order to predict the component based on an input and based on any previous predicted component(s).
Predictive service for third party application developers
Disclosed is an apparatus, method and computer program device which send a prediction request to a prediction service to construct a prediction result, receives a prediction result and an estimation of accuracy of the prediction result from the prediction service and configures an application to adapt to at least one of user preferences, behavior and habits based upon the prediction result and estimation of accuracy of the prediction result. The prediction service can include an over-the-air server which is coupled to a prediction server or a dedicated API residing on one or more user devices and configured to access a prediction server.
Growing simulated biological neural circuits in a simulated physical volume
A first array of simulated neurons having trees of output branches and a second array of simulated neurons having trees of input branches are generated. Thereafter, the output branches of one or more of the simulated neurons of the first array and the input branches of one or more of the simulated neurons of the second array are grown and connections are formed between individual output branches of the simulated neurons of the first array and individual input branches of the simulated neurons of the second array that grow to within a vicinity of each other.
Domains for knowledge-based data quality solution
The subject disclosure relates to a knowledge-driven data quality solution that is based on a rich knowledge base. The data quality solution can provide continuous improvement and can be based on continuous (or on-going) knowledge acquisition. The data quality solution can be built once and can be reused for multiple data quality improvements, which can be for the same data or for similar data. The disclosed aspects are easy to use and focus on productivity and user experience. Further, the disclosed aspects are open and extendible and can be applied to cloud-based reference data (e.g., a third party data source) and/or user generated knowledge. According to some aspects, the disclosed aspects can be integrated with data integration services.
Sharing social network information
Social network information may be shared across online service providers. Thus, one online service provider M that maintains a membership separate from a second online service provider N may nevertheless use the social network maintained by the second online service provider N to tailor content and/or services based on such social network information.
E-wallet with cross-border capability
Local shipping addresses in a first country are assigned to a plurality of consumers having physical addresses in at least one country other than the first country. A request is obtained, from an e-commerce retailer, for a corresponding one of the local shipping addresses. Product information, an indication of a desired form of shipping from the e-commerce retailer to the corresponding one of the local shipping addresses, and an indication of a desired form of shipping from the corresponding one of the local shipping addresses to a corresponding one of the physical addresses in the at least one country other than the first country are obtained. An indication of an estimated fully landed cost associated with the on-line shopping session is dispatched.
System and method for virtual piggybank
A method of providing control preferences for a prospective Internet user, the method comprising the steps of establishing a first account, the settings of the first account being stored in a database; establishing a second account, the settings of the second account being stored in the database; linking the first and second accounts such that control settings of the second account are determined through the first account; and making a purchase from the second account consistent with the control settings of the second account.
Process and data integration of additional funds into cash handling device and reconciliation
A cash recycler or other currency handling device includes a flexible capacity module for adding additional storage capacity to the cash handling device. In some arrangements, all bills of one denomination, i.e., all one dollar bills, may be stored in, deposited into, and/or dispensed from the flexible capacity module. The bills stored in the flexible capacity module may not be debited or credited to a client account at a financial institution because the bills may not be considered part of the inventory of the cash handling device. However count data for the bills in the flexible capacity module may be integrated with data from the cash handling device in order to facilitate balancing, reconciliation, and the like.
System and method for an implied alpha model and investor preferences
The instant invention relates generally to a group of computer-based methods preferably utilized in an implied alpha model and investor preferences to detect and address a preference drag problem. The computer-based method starts with an implied alpha model, which is derived from an existing portfolio. An implied alpha model can be treated as a preference aggregation when its factors represent investors' preferences on the portfolio. In this case, the model is also called an implied preference model. After an implied preference model is developed from a portfolio, a drag problem can be detected by checking whether the model has persistent and negative returns. If a drag problem exists in a portfolio, it can be solved by modifying the portfolio under assistance from the model.
Charging for a communication system
A communication method for use in a communications system includes at least one user. The method includes a step of establishing a session for permitting a user to communicate with at least one entity. The method also includes the steps of using a first charging method for one part of the session and using a second charging method for a different part of the session.
Tax-return preparation systems and methods
In an embodiment of the invention, a tax preparation method is implementable in an electronic system coupled to an electronic device, which is, in turn, coupled to a display device. A web page displayable on the display device is served to the electronic device. The displayed web page includes a user interface, which, in turn, includes a tab bar, with a plurality of tabs. In each tab at least one accordion is present. In each of the accordions there preferably exists at least one text box for explaining or receiving tax information, having a title, an input box and a flyout, the flyout providing tax assistance information to a the user. Once a desired amount of the text boxes have been completed and a completed tax document has been developed, a tax return may be filed with a government agency.
Techniques for generating an electronic shopping list
Techniques are disclosed for generating an electronic shopping list based on a digital photograph of a handwritten shopping list. The techniques include obtaining a digital photograph of a handwritten shopping list and identifying a handwritten text portion in the digital photograph. The techniques further include determining a set of candidate items corresponding to the handwritten text portion, each candidate item of the set of candidate items representing a different item that may have written in the handwritten text portion of the handwritten shopping list and being indicative of a product sold by a retailer. The techniques further include selecting one of the set of candidate items for inclusion in the electronic shopping list. The techniques can be performed by a mobile computing device or by a shopping list server.
Client-to service compatibility framework
A client-to-service compatibility framework is described that allows online entities to provide a single set of service offerings for client devices of multiple different brands and/or models, such as televisions, set-top-boxes, game consoles, and portable media players, for example. Generally, the client-to-service compatibility framework comprises a plurality of plug-ins or adapters that translate communications from client devices to a form compatible with the online entity's service offerings and vice versa. In this manner, online entities are able to insulate their service offerings from the changing communication needs of client devices.
Computerized information collection and processing apparatus
Computerized information acquisition and processing apparatus. In one embodiment, the apparatus includes a video apparatus with image capture and digitization capability, and multiple wireless interfaces for accomplishing various purposes, including e.g., streaming the digitized video data to another device for viewing and/or storage thereon. In one variant, one of the wireless interfaces is a short range passive RFID-based interface which generates replies to interrogation signals, the replies including user-specific information.
Adjustment of a security level of a transaction system based on a biometric characteristic of a customer
Methods and systems for adjusting a security level of a transaction system based on biometric characteristics of a customer are disclosed. According to an aspect, a method includes interacting with a customer at a transaction terminal. The method also includes determining a biometric characteristic of the customer based on the interaction with the customer. Further, the method may include adjusting a security level of a transaction system based on the biometric characteristic.
Automatic generation of change orders
A method for automatically generating change orders may be performed at a point of sale system. The point of sale system may determine an amount of funds in the point of sale system and whether additional funds are necessary. If so, a change order may be automatically requested from a back office system (e.g., a cash recycler) or a financial institution. The back office system may determine whether it is able to fulfill the change order request and if not, forward the request to the financial institution. In one or more arrangements, a notification that a change order request has been received may be transmitted to a manager or other change order personnel. The change order request and funds delivered to the point of sale system in response thereto may be reconciled with the back office system.
Method and apparatus for publishing literature
A method of publishing a work of literature on a network includes transmitting a published portion of the work of literature to a device via the network. The published portion includes an indication that a keyword has been sold to a purchaser for at least one appearance of the keyword in the published portion. The method also includes adding a new installment to the published portion, and updating the published portion to include the indication that the keyword has been sold for at least one appearance of the keyword in the new installment at no additional monetary cost to the purchaser of the keyword.
Methods, systems, and products for managing advertisements
Methods, systems, and products are disclosed for managing advertisements. An advertisement time slot is categorized as overrideable or non-overrideable. The overrideable advertisement time slot categorization allows an associated advertisement to be replaced with a different advertisement. The non-overrideable advertisement time slot may not allow replacement of the associated advertisement. When an advertiser requests to replace the advertisement, and when the advertisement time slot is categorized as overrideable, then the advertisement is replaced with the different advertisement.
Automated tanning system
A self-service tanning system and method allows salon owners to offer tanning customization in order to meet the personal needs of various customers and to meet the various FDA regulations associated with each state. The present invention allows salon owners to customize each tanning customer session to prevent over exposure for new patrons, while allowing patrons who are already tanning to tan at a more progressive rate. In addition to tanning customization, the present invention offers built-in safety features, payment options, and networkability.
Method and apparatus for parking lot metering
A method and apparatus for parking lot metering. The present invention allows multi-space meters to separately manage and control premium parking spaces, such as those for charging electric vehicles or those which supply electric power for engine block heaters in both pay-by-space and pay-an-display systems. Such premium spaces can be managed together over large areas (e.g., a city or region), or may be managed over smaller areas (e.g., the domain of an individual kiosk), or individually per parking space. Management includes pricing, time limits, hours, seasons of operation, and restrictions by vehicle type, and alternative pricing and restrictions for non-premium hours.
Environmental stewardship based on driving behavior
A method and system for managing driving patterns by charging a variable incentive and/or disincentive based on individual driving behaviors. Distances detected between a vehicle and other vehicles are detected within a time period. N tailgating incidents are identified based on the detected distances being less than a threshold value for distance. A variable toll is determined by evaluating a function of a base amount and N. The driver of the vehicle is charged the variable toll. Charging the variable toll provides an incentive to the driver to encourage driving that does not include tailgating or a disincentive to the driver to deter tailgating.
Method of analyzing credit card transaction data
A method of analyzing debit and credit card transaction data to provide interpretations of customer purchasing patterns for use by third parties, such as financial services marketers, in providing offers and incentives to targeted groups of consumers. Bulk credit card or debit card transaction data that has been gathered for a large sample of cardholders is obtained, a multi-step process is applied to prepare the data for analysis, multiple categories of marketing “intelligence” or decisions are attached to each transaction contained in the bulk transaction data, a summation of all of the different intelligence categories for each cardholder and for the entire sample is performed to create comparative normalizations, and a score in vector form is generated for each customer based on differences or variations in the way in which that customer shops relative to the bulk-derived normalized data for each field or dimension within the comparative normalization.
Service evolution approach in SOA
Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for managing the evolution of a service-oriented architecture service over a service lifecycle. An implemented SOA service is evaluated with respect to each of a plurality of line-of-business business-scope attributes and to each of a plurality of different line-of-business functionality attributes. Sets are determined of each of the business-scope attributes and different functionality attributes, wherein each attribute of each determined set is applicable to the implemented service as a function of the evaluating. Sets of business attribute-service evolution factors and technical attribute-service evolution factors associated with the respective determined attribute sets are selected, and both of the sets of selected business attribute-service evolution factors and technical attribute-service evolution factors are used to re-factor the implemented service into a mature enterprise service in response to a service revision.
Model-based promotion and price computation system and method
A system and method for providing model-based promotion and price computation is described in which promotional offers in the form of promotion information from a manufacturer are combined with price determination parameters from the retailer to calculate a final retail price. The system prevents fraud by eliminating the heavy dependence on unverifiable trust between the retailer and manufacturer and by assuring that the consumer will receive the benefit of the promotions intended by the manufacturer.
Method and system for load balancing a sales forecast by selecting a synchronous or asynchronous process based on a type of event affecting the sales forecast
In accordance with embodiments, there are provided mechanisms and methods for selecting a synchronous or asynchronous process to determine a forecast. These mechanisms and methods for such synchronous/asynchronous process selection can enable embodiments to determine forecasts for multiple users (e.g. with hierarchical relationships, etc.) over an arbitrary time interval. The ability of embodiments to provide forecasts that involve such a large amount of data in an effective way can enable forecasting that was otherwise infeasible due to resource limitations.
Method and system for determining the impact of crowding on retail performance
The present invention is a system, method, and apparatus for determining the impact of crowding on retail performance based on a measurement for behavior patterns of people in a store area. The present invention captures a plurality of input images of the people by at least a means for capturing images, such as cameras, in the store area. In the captured plurality of input images, each person's shopping path is detected by a video analytics-based tracking algorithm. A subset of the people is identified as a crowd in the store area. In relation to the crowd, the behavior patterns of the target person are measured. After aggregating the measurements for the behavior patterns over a predefined window of time, the present invention can calculate a crowd index and a crowd impact index for the store area based on the measurements. A crowd index shows the level of crowd density in the store area caused by a crowd, including traffic count of the crowd in the store area. A crowd impact index comprises a traffic count of the target people who make trips to the store area and a shopping time index, such as average shopping time changes of the target people, in relation to a crowd in the measured store area.
System and method for risk detection reporting and infrastructure
A method, a system, and a device for monitoring risks associated with at least one business process, including: evaluating at least one of a plurality of document instances, wherein each of the document instances includes, in association therewith, a plurality of document values, against a plurality of risk categories; implementing the plurality of risk categories pursuant to at least one acceptable risk policy approved for the at least one business process; and qualifying at least one of the at least one of the plurality of documents pursuant to an approval rating of the at least one document in at least one risk category. The system, method, and device efficiently monitor risk, and allow for flexibility in modifying or updating risk policy.
System and method for scheduling tasks
Non-pending tasks having no pending due dates (e.g., past due tasks) are scheduled with pending tasks having pending due dates by first generating a hypothetical schedule and then an actual schedule. The hypothetical schedule is generated by distributing hours to complete pending tasks as evenly as possible over as many days as possible up to respective due dates; then scheduling non-pending tasks during hours normally available for work and which are not distributed to pending tasks; and then recording as quasi due dates for respective non-pending tasks the dates that the respective non-pending tasks would be completed on the hypothetical schedule. The actual schedule is then generated by scheduling non-pending tasks with pending tasks in chronological order, according to pending due dates for pending tasks, and quasi due dates for non-pending tasks.
Providing real-time test ahead work direction for manufacturing optimization
A system for generating a work unit test ahead candidate list. A list is generated of all potential candidate systems for test ahead operations. A system in the potential candidate list is selected. It is determined whether any work unit in the selected system is waiting for short parts. Determining that no work unit in the selected system is waiting for short parts, a complexity score is calculated for each work unit in the selected system. The calculated complexity scores are added to a total system complexity score. It is then determined whether an override exists for a work unit in the selected system. Determining that an override does exist, the selected system is removed from the potential candidate list. A candidate list is generated from remaining systems in the potential candidate list. Then, the candidate list is outputted to provide recommendations for optimizing work unit test ahead operations.
Method of and system for improving accuracy in a speech recognition system
A method for transcribing an audio response includes: A. constructing an application including a plurality of queries and a set of expected responses for each query, the set including a plurality of expected responses to each query in a textual form; B. posing each of the queries to a respondent with a querying device; C. receiving an audio response to each query from the respondent; D. performing a speech recognition function on each audio response with an automatic speech recognition device to transcribe each audio response to a textual response to each query; E. recording each audio response with a recording device; and F. comparing, with the automatic speech recognition device, each textual response to the set of expected responses for each corresponding query to determine if each textual response corresponds to any of the expected responses in the set of expected responses for the corresponding query.
Environment recognition of audio input
The present disclosure introduces a new technique for environmental recognition of audio input using feature selection. In one embodiment, audio data may be identified using feature selection. A plurality of audio descriptors may be ranked by calculating a Fisher's discriminant ratio for each audio descriptor. Next, a configurable number of highest ranking audio descriptors based on the Fisher's discriminant ratio of each audio descriptor are selected to obtain a selected feature set. The selected feature set is then applied to audio data. Other embodiments are also described.
Apparatus and method for modifying an input audio signal
An apparatus for modifying an input audio signal has an excitation determiner, a storage device and a signal modifier. The excitation determiner determines a value of an excitation parameter of a subband of a plurality of subbands of the input audio signal based on an energy content of the subband. Further, the storage device stores a lookup table containing a plurality of spectral weighting factors. A spectral weighting factor of the plurality of spectral weighting factors is associated to a predefined value of the excitation parameter and a subband of the plurality of subbands. The storage device provides a spectral weighting factor corresponding to the determined value of the excitation parameter and corresponding to the subband, the value of the excitation parameter is determined for. Further, the signal modifier modifies a content of the subband of the audio signal, the value of the excitation parameter is determined for, based on the provided spectral weighting factor to provide a modified subband.
Speech decoding and encoding apparatus for lost frame concealment using predetermined number of waveform samples peripheral to the lost frame
An audio decoding device capable of suppressing an information amount for a lost flame compensation process and encoding efficiency is provided. A decoded sound source generator generates a lost frame's CELP decoded sound source signal. A pitch pulse information decoder CELP decodes a pitch pulse position information and a pitch pulse amplitude information. A pitch pulse waveform learner learns a pitch pulse learning waveform in a past frame in advance from the lost frame. A convolution adjuster amplitude-adjusts the pitch pulse learning waveform according to the pitch pulse amplitude information by considering a predetermined number of waveforms peripheral to a peak position of the lost frame's CELP decoded excitation signal, and convolutes a pitch pulse waveform into a time axis which has been amplitude-adjusted according to the pitch pulse position information. A sound source signal corrector adds or replaces the pitch pulse waveform convoluted into the time axis to the lost flame decoded sound source signal.
Identifying related names
Provided are techniques for identifying related names. A collection of names from different languages is stored, wherein each of the names has a native orthographic form and a romanized form. An input name is received in a known encoding scheme. An alphabet of the input name is determined based on the known encoding scheme. One or more romanized names are generated based on the query name and the determined query name alphabet. Culture-sensitive regularization rules are applied to create an additional romanized name. The one or more romanized names and the additional romanized name are matched against the romanized names in the collection of names from the different languages. Data store records that have romanized names that match the one or more romanized names or the additional romanized name are returned.
Class-based language model and use
This disclosure describes novel generation and use of a class-based language model. For example, one embodiment herein includes detecting presence of a common word that is used in different contexts in a word pool and assigning the common word to each of multiple classes in a class-based language model. Generation of the class-based language model and assignment of the common word to multiple classes the class-based language model as discussed herein enables generation of a more accurate probability score indicating how likely the common word follows a give sequence of one or more words in a sample text input.
Techniques for performing language detection and translation for multi-language content feeds
A technique for translating a portion of a website includes receiving a language set of a user indicating a primary language of the user is received. A content feed to be displayed to the user is received and parsed to identify a text portion of a user generated content. The original language of the text portion is determined and compared with the one or more languages in the language set. When the original language of the text portion does not match the languages in the language set: (i) the text portion, the original language, and the primary language are provided to a translation engine, (ii) a translated version of the text portion is received from the translation engine, (iii) the translated version of the text portion is inserted into the content feed to obtain a modified content feed, and (iv) the modified content feed is displayed to the user.
Conceptual world representation natural language understanding system and method
A Natural Language Understanding system is provided for indexing of free text documents. The system according to the invention utilizes typographical and functional segmentation of text to identify those portions of free text that carry meaning. The system then uses words and multi-word terms and phrases identified in the free to text to identify concepts in the free text. The system uses a lexicon of terms linked to a formal ontology that is independent of a specific language to extract concepts from the free text based on the words and multi-word terms in the free text. The formal ontology contains both language independent domain knowledge concepts and language dependent linguistic concepts that govern the relationships between concepts and contain the rules about how language works. The system according to the current invention may preferably be used to index medical documents and assign codes from independent coding systems, such as, SNOMED, ICD-9 and ICD-10. The system according to the current invention may also preferably make use of syntactic parsing to improve the efficiency of the method.
Text display apparatus and recording medium recording text display program
Disclosed is a text display apparatus including: a display section; a dictionary storage section to store dictionary information composed of a headword of a first language corresponded to description information of a second language; a text storage section to store text data of the first language; a text/translation display control section to display text data and to display a portion of the description information as an initial translated word in the second language; a selection section to select a word; a description information display control section to display the description information; and a translated word selection section to select a portion of the description information as a selected translated word, wherein the text/translation display control section includes a selected translated word discrimination display section to replace the initial translated word to display the selected translated word with a display form different from the initial translated word.
Simulation that transfers port values of a design block via a configuration block of a programmable device
Approaches for simulating an electronic system. In one approach, a software co-simulation platform is configured to produce a first time sequence of values of a plurality of input ports of a design block of the electronic system, consume a second time sequence of values of a plurality of output ports of the design block, and generate access transactions for transferring the first and second sequences of values. The software co-simulation platform generates a plurality of reconfiguration transactions for transferring reconfiguration data for the design block. A PLD is configured to implement a communication block and a control block. The communication block receives the reconfiguration and access transactions from the software co-simulation platform, and the control block reconfigures programmable logic and interconnect resources of the PLD in response to the reconfiguration transactions. The control block also controls the emulation of the design block in response to the access transactions.
Designing digital processors using a flexibility metric
Techniques, structures, and systems are disclosed for implementing an efficient design of computer hardware using a top-to-bottom approach. In one aspect, a method for designing a processor includes generating an initial architecture for a processor to execute algorithms, simulating execution of the algorithms by the initial architecture to determine a modification to the initial architecture, and creating a processor design based on the modification to the initial architecture. The described method for implementing a hardware design tool provides a push-button transition from high level specification for algorithms to hardware description language.
Efficient method for inversion of geophysical data
A method for efficient inversion of measured geophysical data from a subsurface region to prospect for hydrocarbons. Gathers of measured data (40) are encoded (60) using a set of non-equivalent encoding functions (30). Then all data records in each encoded gather that correspond to a single receiver are summed (60), repeating for each receiver to generate a simultaneous encoded gather (80). The method employs iterative, local optimization of a cost function to invert the encoded gathers of simultaneous source data. An adjoint method is used to calculate the gradients of the cost function needed for the local optimization process (100). The inverted data yields a physical properties model (110) of the subsurface region that, after iterative updating, can indicate presence of accumulations of hydrocarbons.
Method for modeling biomechanical properties of an eye
Systems and methods are provided for predicting the results of a therapeutic intervention to an eye. An imaging system is configured to provide image data representing at least a portion of the eye of the patient. An input device is configured to permit a user to design a proposed therapeutic intervention for the eye of the patient. A finite element modeling component is configured to generate a finite element model representing the condition of the eye of the patient after the proposed therapeutic intervention according to the image data, the proposed therapeutic intervention, and at least one biomechanical property of tissue comprising the eye. The generated model is constructed as to have no a priori restraints on the motion of the corneal limbus. A display is configured to display the generated model to the user.
Waterflooding injectate design systems and methods
A method of designing an injectate to be used in a waterflooding operation is disclosed. One aspect includes specifying data representative of chemical characteristics of a liquid hydrocarbon, a connate, and a reservoir rock, of a subterranean reservoir. Charged species at an interface of the liquid hydrocarbon are determined based on the specified data by evaluating at least one chemical reaction. Charged species at an interface of the reservoir rock are determined based on the specified data by evaluating at least one chemical reaction. An extent of surface complexation between the charged species at the interfaces of the liquid hydrocarbon and the reservoir rock is determined by evaluating at least one surface complexation reaction. The injectate is designed and is operable to decrease the extent of surface complexation between the charged species at interfaces of the liquid hydrocarbon and the reservoir rock. Other methods, apparatus, and systems are disclosed.
Cooling circuit design
Methods for computer-aided design and corresponding systems and computer-readable mediums. A method includes receiving a CAD model including a plurality of intersecting fluid channels, and determining a fluid inlet for the fluid channels. The method includes displaying possible fluid flow directions at an intersection of fluid channels. The method includes automatically adding a cooling fitting to at least one of the fluid channels of the CAD model in response to a user selection of one of the possible fluid flow directions.
Use of wattmeter to determine hydraulic fluid parameters
Disclosed herein is an approach that uses a wattmeter to determine hydraulic fluid parameters. In one aspect, a controller uses the electric power measured by the wattmeter to determine the power delivered to hydraulic fluid delivered by a hydraulic pump unit to a hydraulic fluid consuming device and the volumetric flow rate of the hydraulic fluid delivered to the hydraulic fluid consuming device by the hydraulic pump unit.
Method for determining a virtual tool center point
In order to determine a virtual sensor tool center point sensor TCP of a light section sensor, the invention provides that: the sensor TCP is placed in sufficient concordance with a point on a line on a surface a so-called feature of a reference part with a known location; a normal to the surface of the reference part is determined; the Z direction of the sensor is brought in concordance with the normal of the surface of the reference part, and; a defined alignment of the sensor with the line of the feature is determined.
Systems and methods for genotyping by angle configuration search
Methods and systems for the analysis of genotyping data are presented. According to various embodiments of methods and systems, an angle configuration search may be performed. In various embodiments, an exhaustive search over the entirety of an angle configuration space may be performed to provide a fit to a plurality of angles determined for a plurality of points in a data set generated from a plurality of biological samples. For various embodiments, the angle configuration space may be defined to ensure that a global fit may be determined. According to various methods and systems, a data base of possible angle configurations may be searched, in which each angle configuration may include three angles. According to various methods and systems, a data base of possible angle configurations may include for each angle configuration a probability that the angle configuration may occur.
Method for achieving improved polypeptide expression
The present invention relates to methods of optimization of a protein coding sequences for expression in a given host cell. The methods apply genetic algorithms to optimise single codon fitness and/or codon pair fitness sequences coding for a predetermined amino acid sequence. In the algorithm generation of new sequence variants and subsequent selection of fitter variants is reiterated until the variant coding sequences reach a minimum value for single codon fitness and/or codon pair fitness. The invention also relates to a computer comprising a processor and memory, the processor being arranged to read from and write into the memory, the memory comprising data and instructions arranged to provide the processor with the capacity to perform the genetic algorithms for optimization of single codon fitness and/or codon pair fitness. The invention further relates to nucleic acids comprising a coding sequence for a predetermined amino acid sequence, the coding sequence being optimised with respect to single codon fitness and/or codon pair fitness for a given host in the methods of the invention, to host cells comprising such nucleic acids and to methods for producing polypeptides and other fermentation products in which these host cells are used.
Method and system for patient-specific modeling of blood flow
Embodiments include a system for determining cardiovascular information for a patient. The system may include at least one computer system configured to receive patient-specific data regarding a geometry of the patient's heart, and create a three-dimensional model representing at least a portion of the patient's heart based on the patient-specific data. The at least one computer system may be further configured to create a physics-based model relating to a blood flow characteristic of the patient's heart and determine a fractional flow reserve within the patient's heart based on the three-dimensional model and the physics-based model.
Personalized wireless-based interactive diabetes treatment
This is a system for integrating a system of education, monitoring and advising on glucose testing, diet, exercise and drug administration, by a wireless link, or GPRS system, using a device which is lightweight and portable (and easily carried by the patient) and which is capable of: glucose testing and recording the results; providing some feedback and advice from internal programs based on the results and on patient preferences; and transmitting the glucose testing results for external recording (e.g., on a server) and external analysis, feedback and advice from the server, and for feedback and advice from an appropriately knowledgeable and health care experienced party.
Transmission and compression of genetic data
A method, computer product and computer system of transmitting a compressed genome of an organism: a computer at a source reading an uncompressed sequence and a reference genome from a repository; the computer comparing nucleotides of the genetic sequence of the organism to nucleotides from a reference genome, to find differences where nucleotides of the genetic sequence of the organism which are different from the nucleotides of the reference genome; the computer using the differences to create surprisal data, the surprisal data comprising a starting location of the differences within the reference genome, and the nucleotides from the genetic sequence of the organism which are different from the nucleotides of the reference genome; and the computer transmitting, to a destination, a compressed genome comprising: surprisal data and an indication of the reference genome, discarding sequences of nucleotides that are the same in the sequence of the organism and reference genome.
Melatonin suppression extent measuring device
The present invention provides a melatonin suppression extent measuring device, which is able to receive and process a light signal to a spectral data, process the spectral data to a percent value of melatonin suppression based on a reference wavelength parameter and a reference quanta parameter through a conversion module, and display the percent value of melatonin suppression; therefore, users can exactly know how many melatonin suppression extent are caused by the light environment which is exposing themselves body.
Dose distribution modeling by region from functional imaging
Functional imaging information is used to determine a probability of residual disease given a treatment. The functional imaging information shows different characteristic levels for different regions of the tumor. The probability is output for planning use and/or used to automatically determine dose by region. Using the probability, the dose may be distributed by region so that some regions receive a greater dose than other regions. This distribution by region of dose more likely treats the tumor with a same dose, allows a lesser dose to sufficient treat the tumor, and/or allows a greater dose with a lesser or no increase in risk to normal tissue. The dose plan may account for personalized tumors as each patient may have distinct tumors. Probability of dose application accuracy may also be used, so that a combined treatment probability allows efficient dose planning.
Deep-reading electromagnetic data acquisition method
A method of measuring a parameter characteristic of a rock formation is provided, the method including the steps of obtaining crosswell electromagnetic signals between two wells and using an inversion of said signals to investigate or delineate the presence of a resistivity anomaly, such as brine in a low resistivity background, wherein the resistivity anomaly is assumed to be distributed as one or more bodies characterized by a limited number of geometrical parameters and the inversion is used to determine said geometrical parameters. The method can also be applied to determine the trajectory of an in-fill well to be drilled.
Error detection for inertial measurement units
A system for detecting an error in an inertial measurement unit (IMU) is disclosed. The system may have a first IMU including a first plurality of accelerometers and a first rotational rate measurer. The first plurality of accelerometers may be configured to measure acceleration along a plurality of first axes, a first axis of the plurality of first axes being substantially collinear with a collinear axis. The first rotational rate measurer may be configured to measure a first rotational rate about a second axis of the plurality of first axes that is substantially perpendicular to the collinear axis. The system may also have a second IMU and an IMU error detector. The IMU error detector may be configured to receive measurement data from the first IMU and the second IMU; and detect an error based on the measurement data.
Method and apparatus for mixed static and dynamic routing
Techniques for mixed static and dynamic routing include determining a subset of less than all of a plurality of stopover points of an initial route of ordered stopover points. In the subset, all stopover points are marked as dynamic to indicate that their order is allowed to change. It is also determined whether there are at least two stopover points for which order may be changed. If there are at least two stopover points for which order may be changed, then a computed route is determined in which an order in the computed route of the stopover points of the subset minimizes a metric for the entire route compared to any other allowed order of the stopover points of the subset.
Multiobject fusion module for collision preparation system
A method for controlling a vehicle operating during a dynamic vehicle event includes monitoring a first input image, monitoring a first tracked object within the first input image in a first tracking cycle, monitoring a second input image, monitoring a second tracked object within the second input image in a second tracking cycle, and determining a dissimilarity measure comparing the first tracked object to the second tracked object. The dissimilarity measure estimates whether the first tracked object and the second tracked object represent a single tracked object proximate to the vehicle. The method further includes associating the first tracked object and the second tracked object based upon the dissimilarity measure, and utilizing the associated objects in a collision preparation system to control operation of the vehicle.
Electronic navigation device for a human and related methods
An electronic navigation device for a human user may include a housing to be carried by the human user, and at least one accelerometer carried by the housing and configured to sense acceleration during motion of the human user. The electronic navigation device may also include a controller carried by the housing and coupled to the at least one accelerometer. The controller may be configured to generate a plurality of acceleration sample values as the human user moves over a given distance, and determine an estimated distance traveled by the human user during movement over the given distance by at least multiplying each acceleration sample value by a scaling constant. The controller may also be configured to sum results thereof.
Fuel injection controller and internal combustion engine
An ECU of a fuel injection controller acquires information on a load of an internal combustion engine including a fuel injection valve. Based on the load information, a switch is made between low-load-condition control, in which a main injection is performed at a timing that avoids a spray injected by a pilot injection that drifts due to a swirl effect, and high-load condition control, in which the main injection is performed at a timing that interferes with (at least partially overlaps) a spray injected by the pilot injection that drifts due to a swirl effect. In the low-load-condition control, the spray injected by a pilot injection is diffused before the occurrence of ignition to reduce smoke. In the high-load condition control, the spray injected by the main injection is caused to interfere with the spray injected by the pilot injection that contains OH radicals, to reduce smoke.
Method and apparatus for operating an internal combustion engine
In a method and the corresponding apparatus for operating an internal combustion engine with a plurality of cylinders (Z1 to Z4) which are assigned in each case one injection valve (18) for metering in fuel, a control apparatus (25) is provided with in each case one output stage (25a) for actuating the injection valves (18) of the plurality of cylinders. Here, first of all work injection operations (P0 to P4) are determined for a cylinder (CYL_i) with the duration and positioning in relation to the crankshaft rotary angle. Following this, late injection operations (P5), which are required in certain operating modes, for the preceding cylinder (CYL_i−1) in the ignition sequence are arranged in a setpoint crankshaft angular range (SB) in such a way that no temporal overlaps occur between individual work and late injection operations.
Control device for internal combustion engine
An internal combustion engine control device the present invention provides is a control device that can realize both of request torque and a request A/F for each of cylinder groups with high precision, even when the request A/F differs at each of the cylinder groups. The present control device sets a reference A/F within a range from the leanest A/F to the richest A/F out of the request A/Fs to the respective cylinder groups. The present control device calculates a target air quantity for realizing the request torque under the reference A/F, based on data that defines a relation between engine output torque and an air quantity in relation to an A/F. The present control device controls a throttle opening in accordance with the target air quantity, and controls fuel injection amounts of the respective cylinders in accordance with the request A/F s to the respective cylinder groups.
Method of addressing and correcting mismatches between E-shift position and actual transmission gear
A method and apparatus for detecting and correcting mismatches between an electronic shifter position and a vehicle's actual transmission gear. The method and system implement a correction scheme that may initially set a period for manual correction, if possible, then initiate automatic correction if correction is required.
Oil pump control apparatus of vehicle
In an oil pump control apparatus of a vehicle includes a first driving power source for propelling the vehicle, a first oil pump driven by the first driving power source, a second oil pump driven by a second driving power source, and a hydraulically-operated portion supplied with working oil from the first and second pumps, a look-ahead vehicle speed estimation section is provided for estimating, based on a vehicle running condition, a look-ahead vehicle speed, which may occur a given elapsed time later. Also provided is a second-oil-pump control section configured to predict, based on the look-ahead vehicle speed, whether a lack in discharge pressure produced by the first pump from a required hydraulic pressure, and further configured to start up the second pump, when it is predicted that a lack in discharge pressure of the first pump from the required hydraulic pressure occurs.
Control apparatus for vehicular power transmitting system
A control apparatus for a power transmitting system of a vehicle provided with a transmission portion having a plurality of speed ratios to be established in steps, and an electric motor operatively connected to an input-side rotary member of said transmission portion and controlled to generate a regenerative torque in a decelerating state of the vehicle, the control apparatus is configured: to implement a shifting control to perform a shifting operation of said transmission portion under the condition of a determination in the decelerating state of the vehicle that an input torque of said transmission portion including said regenerative torque is substantially zero; and to implement the shifting control to perform the shifting operation of said transmission portion under the condition of an improvement of a fuel economy rather than the determination that the input torque of said transmission portion is substantially zero, when a target deceleration value of the vehicle is larger than a predetermined threshold value.
Method for learning reference position for transmission and vehicle
A method for allowing a controller of a transmission to learn a reference position of the transmission and a vehicle for which this method can be executed. By the method, when the shift lever is subjected to a predetermined input operation, the controller starts learning a reference position (for example, the gear end, the synchronization end, or the clutch engagement position) of the transmission.
System and method for payload estimation
A payload estimation system for a work machine is provided. The system includes a power source, a payload carrier, an actuator and a controller. The payload carrier is configured to contain a payload of material. The actuator is configured to effectuate movement of the payload carrier. The controller is configured to control an operation of the actuator. The controller is also configured to receive one or more parameters associated with the power source of the work machine, during an operation of the payload carrier. Further, the controller is configured to compare the one or more parameters with a pre-determined dataset to estimate a weight of the payload on the work machine.
Control device for an adjustable chassis system
A control device for an adjustable chassis system includes a connection to at least one sensor arrangement which provides at least one vehicle condition parameter of a vehicle. The measured vehicle condition parameter is spatially related to a position outside of the control device. The sensor arrangement is arranged inside the control device and forms a virtual miniature measurement plane which is extrapolated to an actual measurement plane.
Vehicular input manipulation apparatus
A vehicular input manipulation apparatus has a target parameter switchover manipulating device and a setup changeover manipulating device in order to change setup contents of several control parameters for drive control of an in-vehicle apparatus. The target parameter switchover manipulating device executes switchover to designate one of the control parameters as a change target control parameter. The setup changeover manipulating device changes a setup content relative to the change target control parameter. When a control mode of the in-vehicle apparatus is changed into a predetermined control mode, a control circuit automatically enforces switchover relative to the change target control parameter by automatically replacing the control parameter, which has been designated as the change target control parameter, with an enforcement change target control parameter, which is a predetermined control parameter associated with the predetermined control mode.
Vehicle electric power management apparatus, vehicle electric power management system, and vehicle electric power management program
A vehicle electric power management apparatus calculates a distance from a facility to a destination, from received vehicle-change request information. Distances through which vehicles parked at the facility can travel are calculated and vehicle information on parked vehicles capable of traveling through a distance longer than the distance to the destination are selected as next-useable vehicles in descending order of a residual amount of available battery power. A surplus distance indicating how far in kilometers the selected vehicles can each further travel on beyond the destination away from the facility is additionally calculated and this information is transmitted. After the selection of the next-useable vehicles by a computer of the facility, increment/decrements in the residual amount of available battery power between each selected next-useable vehicle and the vehicle that a user has used to arrive at the facility, and incentive information are calculated and displayed at the computer.
Arrangement and method for detecting failure of an electromechanical brake
The invention relates to an arrangement and method for detecting failure of an electromechanical brake in an electromechanical drive system. The arrangement being characterized in that it comprises a control unit arranged to: send a drive torque signal to an electrical traction motor in the electromechanical drive system while the electromechanical brake is in an active braking position, detect if said applied drive torque causes a driving movement in the electrical traction motor, and indicate a mechanical failure of the electromechanical brake in case a driving movement in the electrical traction motor is caused by said applied drive torque. The invention further relates to a method for detecting failure of an electromechanical brake in an electromechanical drive system, and an industrial truck comprising the arrangement.
Driving mode changing method and apparatus of autonomous navigation vehicle
A driving mode changing method and apparatus of an autonomous navigation vehicle that allows a driver to stably operate the autonomous navigation vehicle. The autonomous navigation vehicle may be stably operated by mounting an apparatus (a touch pad, a joystick, or the like) to operate the autonomous navigation vehicle on seats (a passenger seat and a rear seat) other than a driver seat of the autonomous navigation vehicle and providing various information (a near around view, a far around view, a critical level, vehicle information, and the like) to drive the autonomous navigation vehicle.
The different advantageous embodiments provide for identifying gas leakage in a platform. A processor unit identifies a rate of the gas of the substance leaking from a container in a first compartment for a platform. The processor unit also identifies an amount of gas that has leaked from the container at a selected time based on the rate of the gas of the substance leaking from the container and a total time. The processor unit identifies an amount of the gas of the substance present in a number of compartments associated with the first compartment using the amount of gas leaked from the container in the first compartment and a pressure for each compartment in the number of compartments. The processor unit determines whether the amount of gas in at least one of the first compartment and the number of compartments is outside of a desired amount for the gas.
Orientation-based wireless sensing apparatus
An orientation-based wireless sensor includes a transmitter unit having a body housing a microprocessor, a transmitter, and an accelerometer for detecting the orientation of the transmitter unit relative to one-, two- or three-axis of the direction of the pull of earth's gravity. The transmitter body is mounted on a feature of a vehicle that it is desirable to monitor. The transmitter will transmit orientation data at predetermined time intervals to a receiver on the vehicle, which will in turn process the information, adding additional information, such as GPS location, and wirelessly send the data to a database that is available to a customer over the Internet.
Control system for vehicle, vehicle having the control system, and controlling method thereof
A controller system for vehicle which has a plurality of driving modes which influence driving feeling, and performs selection from the driving modes and the regulation by inputs from a selecting switch, a forward sequence regulating switch, and a reverse sequence regulating switch. For each input from the selecting switch, changing to the driving mode according to a predetermined normal order. For each input from each of the regulating switches, the current controlled step is changed in a predetermined tendency direction. In a state where the controlled step reaches a final step, the state of the final step is maintained even when the same regulating signal is inputted.
Method for generating a vehicle identifier
Upon initial boot-up, a telematics device receives a PID map in response to a PID map request. The TCU may send multiple PID map requests for different mode and PID combinations over a vehicles communication bus, and then may append each received PID map to the already-received PID maps. The multiple PID maps appended to one another form a composite bit value, or composite PID map. The composite PID map is processed according to a hash algorithm, resulting in a pseudo-VIN. Upon subsequent boot-ups of the TCU, the TCU sends the multiple PID map requests over the vehicle's bus and generates a pseudo VIN following the same steps as it did at initial boot-up. The TCU compares the currently generated pseudo-VIN to the initial pseudo VIN; if it determines a mismatch, it sends a notification to an interested third party that indicates improper usage of the TCU.
Emotive engine and method for generating a simulated emotion for an information system
Information about a device may be emotively conveyed to a user of the device. Input indicative of an operating state of the device may be received. The input may be transformed into data representing a simulated emotional state. Data representing an avatar that expresses the simulated emotional state may be generated and displayed. A query from the user regarding the simulated emotional state expressed by the avatar may be received. The query may be responded to.
Heat sink verification
In one embodiment, a printed circuit board assembly comprises a printed circuit board including a processor, a heat sink mountable to the printed circuit board proximate the processor, and a memory module comprising logic instructions which, when executed by the processor, configure the processor to initiate a processor load routine, collect temperature gradient data during the processor load routine, and verify operation of the heat sink using the temperature gradient data.
Temperature measuring method and temperature measuring device of steel plate, and temperature control method of steel plate
A method and apparatus measuring temperature of a steel sheet. A reference plate including a temperature controller is disposed opposite to the steel sheet. The reference plate temperature of the reference plate is measured by a contact thermometer. A radiation pyrometer is trained on the steel sheet at an angle such that alternate reflection of radiation energy by the reference plate and the objective steel sheet occurs once or twice. The radiosity of the steel sheet is measured by the radiation pyrometer. A temperature obtained by converting the radiosity into a temperature of a blackbody that radiates energy equivalent to the radiosity is used as a radiosity temperature. The temperature controller executes a control operation to make the temperature of the reference plate coincide with the radiosity temperature. The radiosity temperature is used as the temperature of the steel sheet.
Supplying a resource to an entity from a resource actuator
In a method for supplying a resource to an entity from a resource actuator, a plurality of physics-based models pertaining to the resource actuator and the entity are developed, a condition detected at the entity is received, feedback control on a resource demand of the entity employed based upon the detected condition, feed forward control on the resource demand of the entity is employed based upon the detected condition and the plurality of physics-based models, a constraint optimization problem having an objective function and at least one constraint using the plurality of physics-based models is formulated, a solution to the constraint optimization problem is determined, in which the solution provides the actuator setting, and the resource actuator is set to the actuator setting to supply the entity with the resource from the resource actuator.
Portable cogeneration system incorporating renewable energy sources
A cogeneration system comprising a power generation unit, a thermal generation unit thermally coupled to the power generation unit, a plurality of renewable energy conversion units, and a power distribution unit configured to receive and distribute power from the power generation unit, thermal generation unit and the renewable energy conversion unit where the power distribution unit reduces the amount of power produced by the power generator based on the amount of power provided by the renewable energy conversion units.
Intelligently-controlled catalytic converter for biofuel-fired boiler
An intelligently controlled catalytic converter automatically monitors various operating parameters, such as water jacket temperature, catalytic input temperature, catalytic converter output temperature, oxygen level, ambient temperature, ambient humidity and/or ambient barometric air pressure, of a biofuel-fired device and automatically controls dampers, blowers and electric heaters in the device.
Input apparatus for medical minimally invasive robots or medical simulators and medical device having an input apparatus
The input apparatus (1) for medical minimally invasive robots or medical simulators consists of at least one handheld device (10) having a first operating part (12) and a second operating part (14), wherein the first and second operating parts (12,14) are connected to one another via a pivot joint (16), a measuring system (20) having one or more sensors for determining an angle between the first and second operating parts (12,14), for contactlessly detecting the spatial position of the handheld device and for contactlessly detecting the orientation of the handheld device, and a computer unit (22) which can be connected to the handheld device (10) via a data link.
Method and apparatus for changing carriage speed on a closed-loop track
A method and apparatus for managing different traffic speeds of carriages moving along a closed-loop track is disclosed. The closed-loop track has at least four different speed zones, which include a slow speed zone, a fast speed zone, an acceleration zone, and a deceleration zone. A computerized control system monitors and controls the movement of the carriages along the different speed zones of the closed loops track, so different traffic speeds are maintained along the closed loop track, simultaneously, with no collisions.
Vacuum process device and vacuum process method
An efficient method of controlling transportation in a linear tool type vacuum process device in a state that a length of time required for a process is not stable. For each process chamber, the number of unprocessed wafers that are in process or are being transported to the process chamber is counted, and in deciding a transport destination of a wafer, when the number of unprocessed wafers is equal to or larger than a charge limit amount, a transport destination of a wafer is decided excluding the process chamber. Also, a wafer holding mechanism on a transport path to a process chamber is reserved, and a transport destination of a processed member to be transported next is decided according to a status of reservation.
Semiconductor manufacturing process modules
A method is provided. The method includes disposing a plurality of robotic facilities to form a semiconductor handling system, controlling the semiconductor handling system with a controller to handoff a workpiece between neighboring robotic facilities, and providing a software interface for the controller, wherein the software interface permits a user to view alternate configurations of the handling system in order to optimize a characteristic of the handling system.
Sequential scanning of multiple wavelengths
A system is provided for identifying at least one physical characteristic of items in a stream of items moving along a path through an inspection zone, and for separating items from the stream of items based upon the at least one physical characteristic. The system includes a movable transversely scanning mirror arranged to reflect electromagnetic energy from the inspection zone onto an array of detectors. The detectors of the array are arranged to sequentially receive electromagnetic energy so that on each transverse scan of the mirror for any given sub-zone within the inspection zone the detectors of the array receive electromagnetic energy reflected from the mirror at different times. The controller is then operable to correlate input signals from the various detectors corresponding to detected levels of electromagnetic energy received at different times from each given sub-zone within the inspection zone.
Signal transforming method, transforming device through audio interface and application program for executing the same
A signal transforming method receives external analog audio signal through an audio I/O interface on a mobile device. The mobile device installs an application program therein, and the mobile device transforms the received analog audio signal into a digital signal according to a predetermined decoding reference via the application program. The mobile device can then execute corresponding works according to the transformed digital signal. In the other hand, the mobile device can also transform any type of digital signal into analog audio signal and transmits and receives the transformed analog audio signal via the audio I/O interface on the mobile device, therefore, the arrangement of other data transmitting interfaces of the mobile device can be saved.
Method and apparatus for controlling a location automation system via a calendar database
A method and apparatus for controlling a location automation system via computing device having access to a calendar database is provided. Calendar data, from the calendar database, is processed to determine that at least one location automation event controlled by the location automation system is affected by the calendar data. The location automation setting data is updated, based on the calendar data, such that the at least one location automation event occurs according to the calendar data.
Cranial burr hole plug with anti-skewing clamping mechanism
A burr hole plug comprises a plug base configured for being mounted around a burr hole. The plug base includes an aperture through which an elongated medical device exiting the burr hole may pass. The plug base is configured to accommodate a variety of cranium forms without requiring deformation of the plug base. A plug base holding tool is used to secure the plug base to the cranium, wherein the tool aligns fasteners with the plug base for insertion through the plug base and into the cranium. The burr hole plug further comprises a retainer configured for being mounted within the aperture of the plug base to secure the medical device. The retainer includes a clamping mechanism that secures the elongated medical device in the burr hole plug, wherein the movement of the clamping mechanism is controlled to prevent skewing of the clamping mechanism.
Current steering for an implantable stimulator device involving fractionalized stimulation pulses
A method for configuring stimulation pulses in an implantable stimulator device having a plurality of electrodes is disclosed, which method is particularly useful in adjusting the electrodes by current steering during initialization of the device. In one aspect, a set of ideal pulses for patient therapy is determined, in which at least two of the ideal pulses are of the same polarity and are intended to be simultaneous applied to corresponding electrodes on the implantable stimulator device during an initial duration. These pulses are reconstructed into fractionalized pulses, each comprised of pulse portions. The fractionalized pulses are applied to the corresponding electrodes on the device during a final duration, but the pulse portions of the fractionalized pulses are not simultaneously applied during the final duration.
Control of neural modulation therapy using cervical impedance
An implantable apparatus can comprise an electrical test energy delivery circuit configured to provide an electrical test signal to a cervical location in a patient body. A detector circuit can use the electrical test signal to detect cervical impedance and generate a cervical impedance signal representing fluctuations in the detected cervical impedance. The implantable apparatus can comprise a therapy delivery circuit, such as configured to provide electrical neural modulation therapy using a neural modulation timing parameter, and a processor circuit that can be coupled to the electrical test energy delivery circuit, the detector circuit, and the therapy delivery circuit. The processor circuit can be configured to determine a pulsatile signal or pulse pressure signal, such as using the cervical impedance signal, identify a characteristic of the pulsatile signal or pulse pressure signal, and control a neural modulation therapy using the timing parameter and the identified pulse pressure signal characteristic.
External device for an implantable medical system having accessible contraindication information
Disclosed is a remote controller for an implantable medical device having stored contraindication information, which includes information which a patient or clinician might wish to review when assessing the compatibility of a given therapeutic or diagnostic technique or activity with the patient's implant. The stored contraindication information is available through a display of the remote controller or via a wired, wireless, or portable drive connection with an external device. By storing contraindication information with the implant's remote controller, patient and clinician can more easily determine the safety of a particular therapeutic or diagnostic technique or physical activity with the patient's implant, perhaps without the need to contact the manufacturer's service representative.
RF telemetry link quality assessment system and method
A system comprises an implantable medical device (IMD), a external user interface device, and a radio frequency link quality assessment (LQA) device. The external user interface device and the IMD are adapted to potentially use one or more of a plurality of available wireless communication channels to communicate. The LQA device is positioned to receive a radio frequency communication between the IMD and the external user interface device. At least one of the IMD, the external user interface device, and the LQA device is adapted to evaluate signal and noise strength of the available channels to determine respective signal and noise levels for each channel by using the noise level for the target channel and interference potential for corresponding adjacent channels to the target channel as inputs to a function to provide a value for a LQA for the target channel, and select a preferred communication channel based on the LQA value for each of the available wireless communication channels.
Using a genetic algorithm to fit a medical implant system to a patient
Apparatus and method for at least partially fitting a medical implant system to a patient is described. These apparatuses and methods comprise executing a genetic algorithm to select a set of parameter values for the medical implant system. This genetic algorithm may comprise executing a tabu search wherein value sets that are determined to be bad are added to a tabu list that may be consulted to exclude tabu value sets from successive generations of the genetic algorithm.
System and method for reducing excitability of dorsal root fiber by introducing stochastic background noise
A method and neurostimulator for providing therapy to a patient is provided. In one technique, electrical background energy is conveyed to a first tissue region of the patient in accordance with stochastic parameter, thereby modulating the excitability of the first tissue region, and electrical stimulation energy is conveyed to the first tissue region when its excitability is modulated. In one example, the stimulation energy may be conveyed to a second tissue region of the patient, thereby therapeutically stimulating the second tissue region. In this case, the excitability of the first tissue region is decreased, thereby reducing any adverse effect that the conveyed stimulation energy has on the first tissue region. As another example, the conveyed stimulation energy stimulates the first tissue region, in which case, the excitability of the first tissue region may be increased, thereby enhancing the stimulation of the first tissue region by the conveyed stimulation energy.
Lead set for nerve stimulator and method of operation thereof
Single-use electrical leads for a nerve stimulator are disclosed. The leads include a status flag element such as a fuse, which is deliberately blown after use of the leads has begun to indicate that the leads are not to be reused. The nerve stimulator has a “test mode” that determines a current value for treatment, and a “therapy mode” that administers treatment with the chosen current value. If the fuse in the electrical leads is blown (not conducting), then the stimulator assumes that the leads have already been used and does not enter therapy mode, and optionally may not enter test mode. If the fuse in the electrical leads is intact (conducting), or not blown, then the stimulator assumes that the leads are as yet unused, and allows the user to enter either test mode or therapy mode. The fuse is deliberately blown after a particular amount of time spent in therapy mode. After the fuse is blown, the user may still complete the therapy mode, even though the fuse is non-conducting, although the user may not initiate another therapy mode (and optionally may not initiate another test mode) using the blown leads. Preferably the fuse is electrically isolated from the leads that contact the patient.
Electrical treatment of bronchial constriction
Devices, systems and methods for treating bronchial constriction related to asthma, anaphylaxis or chronic obstructive pulmonary disease wherein the treatment includes stimulating selected nerve fibers responsible for smooth muscle dilation at a selected region within a patient's neck, thereby reducing the magnitude of constriction of bronchial smooth muscle.
Implantable cardioverter defibrillator capacitor assembly with flex circuit
An implantable cardioverter defibrillator (“ICD”) comprises a battery, control circuitry and a capacitor assembly. The capacitor assembly includes at least one capacitor, a flex circuit for connection to the control circuitry of the ICD and a first and second support portions. The flex circuit is arranged between the first and second support portions and includes a plurality of tangs for connecting to the anode and cathode of the capacitor(s), as well as to the control circuitry of the ICD.
Method and system for stimulating a heart of a patient
In an implantable medical device and a method for stimulating a heart of a patient, at least one left atrial pressure (LAP) signal over a cardiac cycle is obtained. The A-wave is identified using the LAP signal and a maximum positive rate of change of the A-wave of the LAP signal is determined. The maximum positive rate of change of the A-wave corresponds to the rate which the pressure in the atrium raises as the atria contraction forces more blood into the ventricle during the very last stage of diastole. Further, AV and/or VV delay is adjusted in response to the maximum positive rate of change of the A-wave, wherein a reduction of the maximum positive rate of change of the A-wave indicates an AV and/or VV delay providing an enhanced hemodynamic performance.
Autonomic balance monitoring to control intermittent therapy
Various system embodiments comprise a myocardial stimulator, at least one sensor adapted for use in detecting heart rate to determine heart rate turbulence (HRT), and a controller connected to the myocardial stimulator and the at least one sensor. The myocardial stimulator is adapted to deliver pacing pulses through at least one electrode to provide cardiac pacing. The controller is adapted to intermittently deliver a sequence of stress-inducing pacing pulses adapted to increase sympathetic tone during the stress-inducing pacing. The controller is further adapted to determine HRT from the detected heart rate to assess cardiac stress to the stress-inducing pacing pulses, and adjust at least one parameter of the stress-inducing pacing pulses to adjust cardiac stress if the cardiac stress to the stress-inducing pacing pulses is undesirable.
This disclosure is directed to techniques for treating tachyarrhythmias, such as atrial or ventricular fibrillation, in which a number of electrodes are employed to deliver electrical stimulation to a patient's heart in a manner designed to terminate the tachyarrhythmia episode.
Method and apparatus for automated control of pacing post-conditioning
Pacing post-conditioning (PPC) therapy is applied to a patient to minimize ischemic injury associated with MI and/or reperfusion injury associated with a post-MI revascularization procedure. In various embodiments, a PPC therapy is delivered by executing a pacing protocol with pacing parameters determined and dynamically adjusted based on patient-specific factors to ensure efficacy and safety of the patient.
Method for detecting and treating insulation lead-to-housing failures
Disclosed is a method for the diagnosis of conductor anomalies, such as an insulation failure resulting in a short circuit, in an implantable medical device, such as an implantable cardioverter defibrillator (ICD). Upon determining if a specific defibrillation pathway is shorted, the method excludes the one electrode from the defibrillation circuit, delivering defibrillation current only between functioning defibrillation electrodes. Protection can be provided against a short in the right-ventricular coil-CAN defibrillation pathway of a pectoral, transvenous ICD with a dual-coil defibrillation lead. If a short caused by an in-pocket abrasion is present, the CAN is excluded from the defibrillation circuit, delivering defibrillation current only between the right-ventricular and superior vena cava defibrillation coils. Determination that the defibrillation pathway is shorted may be made by conventional low current measurements or delivery of high current extremely short test pulses.
Biological interface system with patient training apparatus
Various embodiments of a biological interface system and related methods are disclosed. The system may include a sensor having a plurality of electrodes for detecting multicellular signals emanating from one or more living cells of a patient, and a processing unit configured to receive the multicellular signals from the sensor and process the multicellular signals to produce a processed signal. The processing unit may be configured to transmit the processed signal to a controlled device that is configured to receive the processed signal. The system may also include a patient training apparatus configured to receive a patient training signal that causes the patient training apparatus to controllably move one or more joints of the patient. The system may be configured to perform an integrated patient training routine to produce the patient training signal, to store a set of multicellular signal data detected during a movement of the one or more joints, and to correlate the set of multicellular signal data to a second set of data related to the movement of the one or more joints.
Cardioverter/defibrillator and signal processing device for classifying intracardiac signals
The invention relates to methods of differentiating between ventricular tachycardias (VTs) and supraventricular tachycardias (SVT) with the assistance of morphology detection, and signal processing devices implementing such methods.
Orientation determination for an implantable medical device
An implantable medical device (IMD) is provided which is capable of sensing and determining its orientation, and of determining whether the IMD has been displaced over time away from its original or optimal position. Electronic components of the IMD, including a processor, digital memory, signal conditioning components, and a power supply, are preferably hermetically sealed within a biocompatible housing. At least three subcutaneous electrodes have fixed relative spacing for sensing electrical cardiac activity for various combinations of two electrodes, forming sensing vectors. Amplitude ratios and sign indicators associated with the sensing vectors are compared with a reference to determine an orientation of the device. In one embodiment, a telemetry unit transmits orientation data as a function of time to a remote device, and the remote device compares different stored orientations to detect displacement over time.
Imaging volumes with arbitrary geometries in contact and non-contact tomography
A method for tomographic imaging of diffuse medium includes directing waves into a diffusive medium, solving a surface-bounded inversion problem by forward field calculations through decomposition of contributions from the multiple reflections from an arbitrary surface within the diffusive medium or outside the diffusive medium into a sum of different orders of reflection up to an arbitrary order, and using contact or non-contact measurements of waves outside said diffusive medium to generate a tomographic image.
Methods of optically monitoring wound healing
Optical changes of tissue during wound healing measured by Near Infrared and Diffuse Reflectance Spectroscopy are shown to correlate with histologic changes. Near Infrared absorption coefficient correlated with blood vessel in-growth over time, while Diffuse Reflectance Spectroscopy (DRS) data correlated with collagen concentration. Changes of optical properties of wound tissue at greater depths are also quantified by Diffuse Photon Density Wave (DPDW) methodology at near infrared wavelengths. The diffusion equation for semi-infinite media is used to calculate the absorption and scattering coefficients based on measurements of phase and amplitude with a frequency domain or time domain device. An increase in the absorption and scattering coefficients and a decrease in blood saturation of the wounds compared to the non wounded sites was observed. The changes correlated with the healing stage of the wound. The methodologies used to collect information regarding the healing state of a wound may be used to clinically assess the efficacy of wound healing agents in a patient (e.g., a diabetic) and as a non-invasive method to detect the progress of wound healing, particularly chronic wounds due to diabetes. The methodology applies to ischemic environments, impaired healing states, and emerging subsurface tissue deterioration, such as in pressure ulcers, venous ulcers, and ubiquitous ulcers.
Automatically supplying a pressurizing unit of a medical injection device with fluid
In general, this disclosure relates to techniques for automatically supplying a pressurizing unit (e.g., syringe) that is used with a powered medical fluid injection device with fluid. An example method performed by the medical fluid injection device includes obtaining operational state information of the medical fluid injection device, wherein the operational state information includes information other than a fluid delivery amount for a subsequent injection procedure. The example method further includes using the operational state information to determine whether the powered medical fluid injection device permits a fluid replenishment operation for the pressurizing unit. If the fluid replenishment operation is permitted, the method further includes automatically supplying the pressurizing unit with an amount of medical fluid. If the device includes multiple pressurizing units, the device may initiate an automatic fluid replenishment procedure for one or more of the pressurizing units during operation.
Portable StO2 spectrometer
Devices, systems, and methods for measuring tissue oxygen saturation (StO2) within the body are disclosed. A patient interface for use with a tissue measurement instrument can include a spring clip having a first arm and a second arm, a spring configured to bias the first and second arms together, and a means for optically connecting the patient interface to the tissue measurement instrument. The patient interface can be used in conjunction with an optical sourcing and receiving unit of a monitor for measuring tissue oxygen saturation at a measurement site on the patient. A testing interface on an external portion of the instrument housing and a testing module can be used to perform tests on the instrument.
Low loss joint for superconducting wire
A device and method for making a persistent joint allowing end terminations of superconducting MgB2 wire to be joined with a superconducting bridge. Superconducting electromagnetic coils may be joined in series or joining of coil assemblies to current sources and the two ends of a persistent switch. The device includes wire filaments with end preparation exposing reacted MgB2, inserted into a block and surrounded with Mg+B and/or MgB2 in powder, solid, slurry or sol-gel form and subsequently reacted to establish a bridge of superconducting MgB2 electrically connecting the superconducting MgB2 wires. Autonomous operation of the superconducting background magnet coils in magnetic resonance imaging (MRI) and nuclear magnetic resonance (NMR) devices are allowed, or similar devices where autonomous operation of an MgB2 based superconducting magnet is required. The low resistant joint will also be beneficial for other superconducting applications such as fault current limiters, motors, generators, etc.
An electronic apparatus includes: a first molded body; a second molded body which composes housing with the first molded body; a first conductive pattern provided in the housing; a second conductive pattern provided on an outer surface of the housing; and a first conductive member. The first conductive member passes through a gap of a mating face between the first molded body and the second molded body. The first conductive member connects the first conductive pattern and the second conductive pattern.
Mobile electronic device and mobile phone
According to the present invention, a mobile electronic device includes: a housing; a projecting unit for projecting an image, the projecting unit being mounted on the housing; a detecting unit for detecting a positional relation between the projecting unit and a projection surface on which an image projected by the projecting unit is to be displayed; a position changing unit for changing a position of the housing; and a control unit for controlling the position changing unit on the basis of the positional relation between the projecting unit and the projection surface detected by the positional-relation detecting unit.
Femto cell signaling gating
Signaling in a femto cell access point is managed. A pilot signal power profile, or pilot signal gating, determines transmitted a time-dependent pilot signal power. The power profile displays a duty cycle well below 100% and a power depth, which is the amplitude between maximum and minimum pilot signal power, determined partially upon radio link conditions. The time-dependent power profile can be established through a schedule based at least in part on attachment data or subscriber input; machine-learning method facilitate inferring the schedule. Pilot signal gating profile can be reused in a femto cell deployment to broaden femto cell identification and thus facilitate macro-to-femto handover. Activating/deactivating pilot signal in a femto cell in the scheduled and synchronized manner provided herein leads to macro-femto interference mitigation and mobility improvement(s), and improved battery life of wireless devices that operate in a wireless environment that includes femto cells.
Access point power control
There is described a method of controlling a basestation in a cellular wireless communications network, the method comprising, within the basestation, autonomously and dynamically adapting a maximum value for a total transmit power of the basestation, such that interference between the basestation and other access points in the vicinity is minimized.
Method for controlling transmission power in a multi-antenna wireless communication system
The present invention relates to a wireless access system, and more particularly, to a method for controlling uplink transmission power in consideration of a transmission rank in a multi-antenna environment. A method for controlling the transmission power of an uplink data channel at a transmitting end which supports a plurality of transmission ranks according to one embodiment of the present invention, comprises the steps of: determining a first transmission power using at least one rank variable dependent on the transmission rank in a specific subframe; comparing the determined first transmission power with a second transmission power which is the preset maximum transmission power; and determining the value judged to be smaller than the result of the comparison to be the transmission power of the data channel.
The present application relates to a wireless communication system and related methods and apparatuses for transmitting a signal from a source apparatus to a destination apparatus, via at least one intermediate apparatus. In particular, the present invention relates to techniques which seek to improve the throughput of data in multi-hop communication systems.
Method and system for interrupted floor recovery in push-to-talk over cellular network
As described above, when a particular PoC client participating in a PoC session requests media transmission to a PoC server during transmission of media from another PoC client, the PoC server transitions the PoC client with the floor to a suspended state by sending an MB Suspend message and grants the floor to the requesting PoC client. After media transmission of the interrupting PoC client, the PoC server returns the floor to the interrupted PoC client. Therefore, the privileged PoC client in a current PoC infrastructure interrupts the ongoing conversation and sends media, after which the floor is returned to the interrupted PoC client without issuing an explicit media request from the interrupted PoC client. Even in the pre-emptive case scenario where the pre-emptive PoC client interrupts the ongoing conversation, the conversation can be continued in a natural way.
Method and system for reducing inter-cell interference using intra-ENB downlink coordinated multipoint services
A system and method of cancelling downlink inter-channel interference between a first selected UE in one sector of a cell and a second selected UE in a second sector of said cell by using intra-eNB DL CoMP is described. UEs which are affected by ICI are identified in sectors which are adjacent to each other in the cell. A downlink CoMP operational set is formed for the identified UEs. Channel matrix blocks are estimated for the first and second selected UEs. The channel matrix blocks are representations of the channel characteristics between the first and second UE, in their respective sectors and the serving base station. The estimated channel matrix blocks are then loaded into a cross-sector channel block matrix. The inverse values of the channel matrix blocks are then calculated to form a sector specific cross-sector pre-coding matrix which is used to enable interference cancellation.
Method and apparatus for canceling introduced signal and cognitive radio communication apparatus using the same
The present invention relates to a wireless communication system and, more particularly, to a spectrum sensing method in cognitive radio communication. According to an aspect of the present invention, a method of canceling an introduced transmission signal includes generating a first signal, having an inverse phase, using a data transmission signal transmitted by a data transmission unit, adjusting a path and/or an amplitude of the first signal, and generating a first signal, having an inverse phase, using a data transmission signal transmitted by a data transmission unit, adjusting a path and/or an amplitude of the first signal, and canceling a second signal, introduced through a data receiving unit, and the first signal by the data transmission signal.
Methods and apparatuses for management of SMS message identifications in a multi-mode device
Aspects of the present disclosure propose systems and methods for managing assignment of short message service (SMS) message identifications (IDs) in a multimode device (e.g., mobile station). The proposed methods ensure that a unique message ID is assigned to each SMS transmitted by the mobile station (MS). Each retransmission of the SMS messages may be assigned a message ID similar to or the same as the previous transmission(s) of the SMS message. As a result, a network messaging center may be able to identify duplicate SMS messages that are marked with unique message IDs even if they are transmitted on different air interfaces and/or by different modems (modulators/demodulators).
Systems and method for recommending an application from a mobile station
Systems and methods for recommending an application from a mobile station are shown and described. Components of the network and components in communication with the network cooperate to confirm whether a mobile station recommended to receive the application is capable of executing the application and provisioning the application for transmission to the recommended mobile station.
Automated user check-in utilizing mobile computing devices
Various embodiments are directed to systems and methods for checking in at a business with a mobile computing device. For example, the mobile computing device may receive via a data network, location information for a venue. The mobile computing device may also determine whether a location of the mobile computing device is available. Conditioned upon the location of the mobile computing device being available, the mobile computing device may determine whether the location of the mobile computing device is within a threshold distance of the venue. Conditioned upon the location of the mobile computing device being within the threshold distance of the venue, the mobile computing device may send a check-in message to a server. The check-in message may indicate that the user of the mobile computing device is at the venue.
Wireless identifiers for proximity applications
A proximity matching system may use broadcast wireless identifiers transmitted by users' devices to match users with other nearby users. The identifiers may be collected by a plurality of agents, then the identifiers may be matched with pre-defined profiles to generate physically proximate users by a remote service. The group of proximate users may be provided to various applications and consumed with summarized properties or individual properties, depending on the approved privacy settings as selected by the users. In some embodiments, the broadcast wireless identifiers may be personal area network identifiers, local area network identifiers, cellular network identifiers, or other broadcast identifier. In some embodiments, the agents may not establish a peer to peer or other connection with the broadcasting device. The agents may be fixed or mobile agents, and the proximity of users may be generated through links between nearby agents in a meshed fashion.
Geo-fence entry and exit notification system
A method is provided for determining when a mobile communications device has crossed a geo-fence. The method comprises (a) providing a mobile communications device (209) equipped with an operating system and having a location detection application resident thereon, wherein the mobile communications device is in communication with a server (211) over a network (203), and wherein the server maintains a geo-fence database (213); (b) receiving, from the operating system, a notification that (i) the location of the mobile communications device has changed by an amount that exceeds a predetermined threshold, or (ii) that a period of time has passed; (c) querying the operating system for a data set comprising the general location of the mobile communications device and the corresponding location accuracy; (d) transmitting the data set to the server; and (e) receiving from the server, in response, a set of geo-fences (205) proximal to the general location.
Method and apparatus for indoor location measurement
An indoor location measuring method and apparatus are provided. An apparatus for sectionalizing an indoor area for indoor location measurement includes a reference coordinate inputting unit which receives an input of a reference coordinate corresponding to the indoor area; a sector number inputting unit which receives an input of a number of sectors per column or row in the indoor area; and a sectionalization calculating unit which sectionalizes the indoor area into a predetermined number of sectors based on the reference coordinate and the number of sectors per column or row, and calculates a coordinate of a point of a sector among the sectionalized predetermined number of sectors.
Methods, systems, and computer readable media for location-based policy enhancement
According to one aspect, the subject matter described herein includes a method for location-based policy enhancement. The method includes receiving a message containing location information identifying a current geographic location for a user device. The method also includes analyzing the location information to determine if the user device is located in a geographic region associated with a location based policy enhancement offer. The method further includes in response to determining that the user device is located in the geographic region associated with the location-based policy enhancement offer, generating a signaling message containing instructions to modify a policy attribute associated with the user device, wherein the policy attribute corresponds to the location-based policy enhancement offer. The method further includes communicating the signaling message to a policy control function associated with the user device.
System and method for predicting future locations of mobile communication devices using connection-related data of a mobile access network
A system and method for predicting future locations of mobile communication devices utilizes connection-related data from a mobile access network supporting the mobile communication devices to determine latest locations of the mobile communication devices, which are used to predict the future locations of the mobile communication devices. In addition to the determined locations of the mobile communication devices, carrier-provided location predictive indicators and/or non-carrier location predictive indicators may be used to improve the accuracy of the predicted future locations.
Method and system of determining position information of user equipment in a wireless communication environment
A method and system for obtaining position information of a User Equipment (UE) in a wireless communication environment is provided. The system includes a UE, a radio network wirelessly coupled to the UE, and a core network wirelessly coupled to the radio network and having a positioning server and a core network element. The UE generates a request to initiate a positioning session including a temporary session identifier from the UE. The core network element allocates a permanent session identifier for the positioning session upon receiving the request with the temporary session identifier and communicates the permanent session identifier and the temporary session identifier to the UE. Moreover, the positioning server receives transaction data from the UE during the positioning session associated with the permanent session identifier and estimates a geographic location and velocity information associated with the UE based on the received transaction data.
Mobile device locating in conjunction with localized environments
The subject matter disclosed herein relates to systems, methods, apparatuses, articles, etc. for mobile device locating in conjunction with localized environments. For certain example implementations, a method may comprise obtaining at a mobile device one or more signals comprising information indicative of a location thereof. The information may be transmitted to one or more servers. A location context identifier (LCI) may be received responsive to the transmitting, with the LCI corresponding to a localized environment at which the mobile device is located. The LCI may be transmitted to the one or more servers. Location-based data may be received responsive to the transmitting of the LCI, with the location-based data being associated with the LCI and pertaining to the localized environment. The location of the mobile device may be determined with respect to the localized environment based, at least in part, on the location-based data. Other example implementations are described herein.
Peer and composite localization for mobile applications
A system and method for peer based localization system using radio technology, such as Bluetooth or Wi-Fi ad-hoc technology that enables mobile devices such as cell phones, smart phones, laptops, handheld communication devices, handheld computing devices, satellite radios, global positioning systems, PDAs, etc. to discover their physical location relative to one another. In addition, the peer based localization can use a plurality of radio technologies to increase the accuracy of the physical location estimates. Additionally or alternatively, the peer based localization technique can be combined with infrastructure based location techniques, such as triangulation, GPS, or infrastructure based Wi-Fi localization in order to transpose virtual coordinates into physical coordinates.
Radio communication system, radio base station, and communication control method
A radio base station (eNB10-1) transmits a Resource Status Update message including first load information indicating the load level thereof to a radio base station (eNB10-2) when the load level thereof is less than a first threshold, and omits the transmission of the Resource Status Update message including the first load information when the load level thereof is the first threshold or more.
Method of controlling uplink synchronization state at a user equipment in a mobile communication system
A method of controlling uplink synchronization state at a user equipment in a mobile communication system is disclosed. The method of controlling an uplink synchronization state at a user equipment in a mobile communication system comprises receiving control information associated with controlling uplink synchronization state of the user equipment from a network, releasing uplink resources allocated from the network if the uplink synchronization state is shifted from a synchronization state to an asynchronous state based on the control information.
Control method of wireless irrigation
A wireless sensor probe for use in environmental monitoring and control includes a separable probe body and sensor mast. The probe body includes a void configured to house the sensor mast including one or more sensor devices for sensing a soil property surrounding the probe body when the probe body is inserted partially into the ground. The probe body includes a probe top part for encapsulating the probe body and the sensor mast. The sensor mast is inserted into the probe body to form the sensor probe. In another embodiment, a wireless sensor probe includes a housing containing one or more sensor devices. The probe further includes a collar situated near a top portion of the housing being used to anchor the housing to the top of the ground and a gasket formed on the outside perimeter of the housing for securing the housing in the ground.
Method for handling call conflicts in a communication network and apparatus thereof
The present invention provides a method for handling a call conflict at a call processing apparatus in a communication network, said call processing apparatus comprising a first call processing element which handles a first call initiated by a first terminal and a second call processing element which handles a second call initiated by a second terminal, when said second call processing element receives an incall message initiated by said first terminal and directed to communicate with said second terminal while said second terminal is in busy state, the method comprising: inquiring the called number in the call record of said second terminal; comparing initiating times of said first call and said second call, if said called number in said call record of said second terminal is the number of said first terminal contained in said incall message; and releasing the call with later initiating time and continuing setting up of the call with earlier initiating time, based on result of the comparison. Corresponding call processing apparatus and program product are also disclosed.
Method and evolved node base-station for avoiding occurrence of handoff between adjacent cell
A method and an Evolved Node Base-station (eNB) for avoiding an occurrence of a ping-pong handover between adjacent cells are provided. The eNB comprises: a statistics module, a storage module, a judging module and a parameter adjusting module. The method includes: during a statistics period, eNBs serving two adjacent cells involved in a ping-pong handover, making a statistics on times of the serving cell of the eNB being used as a source cell and a target cell in a second handover in a process of each ping-pong handover occurring between the two adjacent cells respectively; upon the end of the statistics period, if the eNB determines that the times of the serving cell of the eNB being used as the source cell in the second handover is greater than the times of as the target cell, the eNB increasing a value of a handover control parameter of this serving cell.
Method for performing a handover through zone-switching in a broadband wireless access system
The present invention relates to a broadband wireless access system, and more particularly, to a method for performing a handover through zone-switching. According to one embodiment of the present invention, the method in which an advanced mobile station (AMS) performs a handover from a legacy serving base station through zone-switching in a broadband wireless access system comprises: a step of receiving, from a legacy zone (L-zone) of a target advanced base station (ABS), a message of a response to a request for ranging (RNG-RSP), containing information on a zone-switching time: and a step of starting switching to an advanced mobile station support zone (M-zone) at the point of time indicated by the information on a zone-switching time.
Notification within a wireless communication network
Some embodiments of the present invention pertain to a method for notifying at least one mobile device of a wireless communication network about an update to a database, wherein the update notification is transmitted to the mobile devices by means of a dynamic host configuration protocol (DHCP) server.
Closed loop heterogeneous network for automatic cell planning
A system and methodology that can utilize measurement data collected by a set of femto access points (FAPs), during a network listen procedure, to detect one or more areas with weak macro network coverage and/or high interference. Moreover, an automatic cell planning (ACP) component can be employed to analyze the measurement data and update a transmission parameter(s) associated with a macro access point. After the update is implemented, the ACP component can trigger another network listen procedure at the set of FAPs and receive new measurement data. The ACP component can evaluate the new measurement data to dynamically verify that the implementation of the update resulted in an improvement of macro network coverage and/or interference within the one or more areas.
Systems and methods for assigning regional wireless communications handovers utilizing ancillary cell feedback
A networked computing system for assigning regional wireless communications based on ancillary device feedback. The network computing system includes a radio communications controller, one or more transceiver device(s), user equipment, and data communications network facilitating data communications amongst the wireless communications devices of the networked computing system. The radio communications controller may be configured to receive a feedback communication from a network transceiver device capable of detecting ancillary wireless communications, and then determine whether an alternate service provider resource exists for providing wireless data communications service to the user equipment within the data communications network, based on the received feedback communication.
Method and apparatus for transmitting paging message for M2M device in wireless communication system
A method and apparatus of receiving a paging message in a wireless communication system is provided. A machine-to-machine (M2M) device monitors paging messages including a group paging message and an individual paging message, and receives both the group paging message and the individual paging message from a base station (BS).
Dynamically creating a globally unique identified of a subscriber device based on an identified of an aggregation device and identification information of the subscriber device for circuit-switched and packet-switched communication systems
To register a mobile device located in a first network with a packet-switched services network, a registration request is received from an aggregation device in the first network. The registration request contains an identifier of the aggregation device and identification information of the mobile device, where the identification information is previously unknown to the packet-switched services network. A globally unique identifier of the mobile device is dynamically created based on the identifier of the aggregation device and the identification information of the mobile device, wherein the globally unique identifier is used for uniquely identifying the mobile device in the packet-switched services network.
Cell reselection mechanism for a base station with closed subscriber group
Embodiments of systems and methods for cell selection in a wireless network are generally described herein. Other embodiments may be described and claimed.
System and method for activating services on a wireless device
A system and method for activating services on a wireless device are provided that improve a user's experience and ease of activation/provisioning of services for the wireless device by providing a new provisioning channel for service activations. A user is simply required to input a short activation code(s) into the wireless device which is combined into an activation message along with other device-related information that is automatically retrieved from the wireless device. The generated activation message is then transmitted over the messaging provisioning channel accessible by inactive and/or unprovisioned wireless devices for delivery to a remote site for use in activating services on the wireless device. The services to be activated may include at least one of the following: out of the box activation, device upgrades, device reactivations, wireless number changes, wireless number porting, and the addition or purchasing of services including airtime, enrollments or content.
Communicating operator information to an external device
A controller of a mobile communication apparatus, such as a cellular phone, that detects operator information based on a radio signal transmitted from a base station and checks whether the operator information has changed while maintaining the same roaming status information. When the controller detects that the operator information changed, the controller transmits one of the same roaming status information and service status information to an external device which is connected via a short-range communication link.
Method of automatically indicating services to a mobile terminal
This invention relates to a method of indicating available services to a mobile telecommunications terminal roaming between a first geographic area and a second geographic area. When the terminal is authenticated in the second geographic area, a list which comprises the services physically available in the said second geographic area is determined and is transmitted to the terminal.
Method for providing private information to mobile user and associated wireless communication network and mobile station
A method for providing a private information to a mobile user and an associated wireless communication network and mobile station are provided to reduce the consumption of power and radio link bandwidth for transmission of the private information. The method, used in the wireless communication network, comprises paging a mobile station of the mobile user via a paging channel during a paging period to read the private information, and reading the private information by the mobile station via a non-dedicated channel during a reading period after the paging period.
Virtual instance architecture for mobile device management systems
System and method for remotely managing mobile devices. A virtual instance mobile device is maintained for each physical mobile device to be managed. Each virtual instance mobile device is executable in a computer runtime environment and includes a hardware emulation component configured to emulate the hardware components of the corresponding physical mobile device and a software emulation component corresponding to the software components of the physical mobile device, which is executable within the context of the hardware emulation component. Synchronization between the virtual instance mobile devices and their corresponding physical mobile devices is maintained, and data obtained from the physical mobile devices is stored. The physical mobile devices are remotely managed by utilizing their corresponding virtual instance mobile devices respectively.
Systems and methods for executing an application on a mobile device
The invention provides a method and system to execute applications on a mobile device. The applications may be compiled on a remote server and sent to the mobile device before execution. The applications may be updated by the remote server without interaction, by the mobile device user.
Changing the user interface at a telecommunications terminal
A technique is disclosed that changes one or more properties of a user interface at a telecommunications terminal based on an incoming call. When a first caller calls the telephone number of the terminal directly and the terminal answers the call, the terminal presents the direct call to the user through a first user interface. When a second caller calls a telephone number that is associated with a data-processing system and the call is then redirected to the terminal, the terminal presents the redirected call to the user through a second user interface. The telecommunications terminal can be a cell phone that belongs to a user, and the data-processing system can be a private branch exchange that serves an office enterprise network that the user belongs to, wherein the private branch exchange extends the call to the user's cell phone when the user is out of the office.
Single button mobile telephone using server-based call routing
A user may carry a wearable device and may push a button on the wearable device to initiate a voice call. A computing system receives the request to initiate a voice call and may analyze datasets provided by the wearable device. The computing system may dynamically route voice calls to different destinations based on datasets received from a wearable device.
Methods, apparatus and computer-readable media for providing caller identification information
A method, apparatus and computer-readable media for providing caller identification information. A server receives a call notification that identifies a call originating from a calling address for connection to a destination address associated with a wireless destination device. The server makes the determination that the wireless destination device is within a predetermined proximity of a media station. Based on the determination, the server communicates a caller identifier to the media station for presentation on a display device communicatively coupled to the media station.
Techniques for lawful interception in wireless networks
An embodiment of the present invention provides an apparatus, comprising a transceiver operable in a wireless network, wherein the transceiver is configured to enable wireless interception by a predetermined third party without the knowledge of a user of said transceiver, wherein the apparatus uses a secure external interface that is beyond the scope of the 802.16 wireless network, and wherein the operation of the wireless interception includes interception by a law enforcement agency by using a law interception server (LIS), Authentication Authorization and Accounting (AAA), Anchor Auth, Target lawful interception agent LIA and Serving lawful interception agent (LIA) and wherein the LIS first identifies a mobile station (MS) based on input from the law enforcement agency and once the MS is identified, the LIA for the MS is then identified by the LIS and once the LIA is identified, the LIA sends the security association for the MS session to the LIS which then sends this to the law enforcement.
Anti-theft mobile terminal and anti-theft method for mobile terminal
An anti-theft mobile terminal is disclosed, including: a setting module (10); an encryption module (11), configured to set a screen-lock password and an information return verification password of the mobile terminal; a password verification module (12), configured to verify a screen-unlock password input by a user; a detection module (18), configured to trigger a power management module (13) when detecting that an SIM card or battery has been pulled out, or the battery has run down longer than a preset duration; the power management module (13), configured to stop power supply from the battery of the mobile terminal and start a standby power supply to supply power to an information return module (14), an information deleting module (15), a positioning module (16), and an IMSI; the information return module (14), configured to verify a received information return verification password and return information saved in a set storage area after successful verification; the information deleting module (15), configured to delete the returned information; the positioning module (16), configured to position the mobile terminal, and periodically transmit positioning information to a network side or a specified mobile terminal. An anti-theft method for mobile terminals is also disclosed.
Communication apparatus providing communication by using stored identification information
A communication apparatus includes: an interface for reading out identification information regarding a communication carrier from a storage medium in which the identification information is stored; a communication unit for deciding the communication carrier based on the identification information read out by the interface and making communication by using the decided communication carrier; an authentication unit for making an authentication by using the identification information read out by the interface; a control unit for enabling a communicating operation by the communication unit according to a success in the authentication by the authentication unit; and a display control unit for allowing an authenticating display screen for making the authentication to be displayed onto a display apparatus. The display control unit decides a display language based on the identification information read out by the interface and changes a display language on the authenticating display screen according to the decided language.
Authentication request management
The different illustrative embodiments provide a method, computer program product, and apparatus for managing an authentication request. A determination is made whether additional authentication is to be performed responsive to receiving the authentication request to access an application from a mobile device. A phone number to call is sent to the mobile device responsive to a determination that the additional authentication is to be performed. A determination is made whether an incoming call to the phone number is from the mobile device and within a selected period of time. The authentication request to access the application from the mobile device is granted responsive to a determination that the incoming call to the phone number is from the mobile device and within the selected period of time.
Systems and methods for providing updated mobile station location estimates to emergency services providers
A wireless communication system, including apparatuses and methods, for handling emergency calls from wireless communication devices to emergency services providers and for automatically providing updated location estimates for the wireless communication devices to during such emergency calls absent any request therefor. The updated location estimates are generally provided in response to a detected occurrence of a triggering event within the wireless communication system. In the exemplary embodiments, such triggering events include the passage of a pre-determined threshold period of time and the handover of an emergency call between cells or sectors of the wireless communication system in response to movement of the wireless communication device from which the emergency call is being made. Further, according to at least one exemplary embodiment, the wireless communication system may selectively limit the provision of updated location estimates based on whether movement of a wireless communication device is substantial or insubstantial.
Method and/or apparatus for location privacy via uniform resource identifier provisioning
The subject matter disclosed herein relates in one particular implementation to a method, apparatus, and/or system for transmitting, by a location server, a location identifier to a mobile device. The location identifier may be transmitted from the mobile device to one or more trusted entities. Access to a location estimate of the mobile device may be selectively authorized at least partially in response to a request received at the mobile device from the location server including the location identifier.
Providing a user interface experience based on inferred vehicle state
A mobile device is described herein that provides a user interface experience to a user who is operating the mobile device within a vehicle. The mobile device provides the user interface experience using mode functionality. The mode functionality operates by receiving inference-input information from one or more input sources. At least one input source corresponds to at least one movement-sensing device, provided by the mobile device, that determines movement of the mobile device. The mode functionality then infers a state of the vehicle based on the inference-input information and presents a user interface experience that is appropriate for the vehicle state. In one scenario, the mode functionality can also infer that the vehicle is in a distress condition. In response, the mode functionality can solicit assistance for the user.
Method of handling call origination and related communication device
A method of handling call origination for a mobile device in a wireless communication system is disclosed. The method comprises the steps of originating a service, establishing a radio resource control (RRC) connection corresponding to the service, receiving a message from a network via the RRC connection, determining whether the network supports the service supported of a first service domain, according to the message and performing the service in a second service domain when the network does not support the service of the first service domain, whereby the RRC connection is not released by the mobile device.
Wireless peripheral device powered by harvested power generated by wireless communication
A powerless/wireless peripheral device is disclosed that engages in wireless communication such as near field communication (NFC) and/or far field communication with other communication devices capable of NFC and/or far field communication. The powerless/wireless peripheral device harvests power from the NFC and/or far field communication and operates of the harvested power eliminating the need for an internal battery and/or an external power supply. The powerless/wireless peripheral device supplements a computing device in enabling an operator to interact with the computing device. The powerless/wireless peripheral device is inexpensive, portable and easy to use.
Integrated voltage controlled oscillator-based transmitter
Methods and systems for an integrated voltage controlled oscillator (VCO)-based transmitter and on-chip power distribution network are disclosed and may include supplying bias voltages and/or ground to a chip utilizing conductive lines. One or more VCOs and low-noise amplifiers (LNAs) may each be coupled to a leaky wave antenna (LWA) integrated in the bias voltage and/or ground lines. One or more clock signals may be generated utilizing the VCOs, which may be transmitted from the LWAs coupled to the VCOs, to the LWAs coupled to the LNAs. RF signals may be transmitted via the LWAs, and may include 60 GHz signals. The LWAs may include microstrip and/or coplanar waveguides, where a cavity length of the LWAs may be dependent on a spacing between conductive lines in the waveguides. The LWAs may be dynamically configured to transmit the clock signals at a desired angle from a surface of the chip.
Independent PA biasing of a driver stage and a final stage
A radio frequency (RF) communications system, which includes power amplifier (PA) control circuitry and PA bias circuitry, is disclosed. The PA control circuitry identifies a selected communications mode of the RF communications system and a target output power from RF PA circuitry. The PA control circuitry selects a PA bias level of a driver stage of the RF PA circuitry and a PA bias level of a final stage of the RF PA circuitry based on the selected communications mode and the target output power. The PA bias circuitry establishes a PA bias level for the driver stage and a PA bias level for the final stage based on the selected PA bias levels of the driver stage and the final stage, respectively.
System and method for generating a defined pulse
Apparatus for generating a first signal (e.g., a pulse) including a current source adapted to generate a current based on a second signal that defines an amplitude of the current and a third signal that defines the timing of an amplitude change of the current, and an impedance element through which the current flows to generate the first signal. The impedance element may comprise a resonator having a resonant frequency approximate the center of the first signal frequency spectrum. An LO may be used to generate the third signal to control the timing of the amplitude change of the current. A detector may enable the current source in response to detecting a defined steady-state condition of the LO clock signal, and may disable the current source in response to the completion of the first signal. A controller may generate the second signal to control the current amplitude so as to perform power control and/or other functions.
Distribution of transmit signal to multiple transmit antennas for reduction of measured specific absorption rate
Various embodiments of the present invention recognize at least two zones of operation for a communication device. In a first zone, which is sufficiently spaced away from a human head or body that SAR limits will be met, transmit power delivered to an antenna of a communication device may be maximized within any other constraints under which the communication device operates. In a second zone, which is not sufficiently spaced away from a human head or body, transmit power is redistributed such that SAR limitations are met without affecting the transmit power control loop of the communication device. For example, a second antenna physically disposed at a different location within the communication device may be used either instead of, or in addition to, the first transmit antenna in order that the SAR limits are met.
Digital hybrid mode power amplifier system
A RF-digital hybrid mode power amplifier system for achieving high efficiency and high linearity in wideband communication systems is disclosed. The present invention is based on the method of adaptive digital predistortion to linearize a power amplifier in the RF domain. The power amplifier characteristics such as variation of linearity and asymmetric distortion of the amplifier output signal are monitored by the narrowband feedback path and controlled by the adaptation algorithm in a digital module. Therefore, the present invention could compensate the nonlinearities as well as memory effects of the power amplifier systems and also improve performances, in terms of power added efficiency, adjacent channel leakage ratio and peak-to-average power ratio. The present disclosure enables a power amplifier system to be field reconfigurable and support multi-modulation schemes (modulation agnostic), multi-carriers and multi-channels. As a result, the digital hybrid mode power amplifier system is particularly suitable for wireless transmission systems, such as base-stations, repeaters, and indoor signal coverage systems, where baseband I-Q signal information is not readily available.
Method and apparatus for dynamically processing an electromagnetic beam
A method and apparatus for processing a terahertz frequency electromagnetic beam are disclosed. For example, the method receives the terahertz frequency electromagnetic beam via a metamaterial having a plurality of addressable magnetic elements, where a resonant frequency of each of the plurality of addressable magnetic elements is capable of being programmably changed via an adjustment, and activates selectively a subset of the plurality of addressable magnetic elements to manipulate the terahertz frequency electromagnetic beam.
Apparatus and method for multi-signal interference-avoiding data transmission
The present technology provides an apparatus and a method for transmitting data via two or more FM signals in an interference avoiding manner. The apparatus comprises at least two FM transmitters. Each FM transmitter is configured to transmit a FM signal on a particular FM channel characterized by a certain carrier frequency that includes data and optionally one or more corresponding alternative frequencies (AFs). The apparatus further includes at least two receivers for receiving incoming electromagnetic radiation (EMR). At least one of the receivers is configured to receive incoming EMR associated with at least one of the FM channels, and another is configured to receive incoming EMR at least at frequencies outside of the FM channels. The controller is configured to separately control activation and deactivation of the FM transmitters and determine the carrier frequencies and the one or more AFs based upon incoming EMR.
Power savings and interference reduction for multimode devices
Power savings and interference reduction for multimode devices (e.g., base stations and relay nodes) is disclosed. In some embodiments, power savings and interference reduction for multimode devices includes selecting a power state of the multimode device selected from a plurality of power states, in which the multimode device is in a first power state (e.g., an active or serving power state), and in which the selected power state is a second power state (e.g., a reduced power state), and transitioning the multimode device from the first power state to the second power state.
Method and apparatus for downlink beam forming in TD-CDMA system
The present invention discloses a method and an apparatus for downlink beam forming in a TD-CDMA system. The method includes: acquiring the spatial covariance matrixes of all uplink slot interference user signals and the downlink slots in which the interference user signals locate; obtaining the interference spatial covariance matrixes of each downlink slot based on the downlink slots in which the interference user signals locate and the spatial covariance matrixes of the interference user signals; determining the beam forming weight coefficient of downlink expected user signals based on the interference spatial covariance matrixes of each downlink slot and the spatial covariance matrixes of the downlink expected user signals; implementing beam forming based on the beam forming weight coefficient of downlink expected user signals.
Near field communication device and method of controlling the same
An NFC device according to the present invention includes the following units. An antenna unit receives radio waves from a reader/writer by NFC. A first power source unit generates power from the radio waves. A second power source unit is a drive power source. A power-supply state holding unit holds information indicating a power-supply state of the second power source unit. An NFC unit performs NFC via the antenna unit to transmit the information indicating the power-supply state of the second power source unit. A power source switch unit switches the second power source unit to the first power source unit according to the power-supply state of the second power source unit, in order to supply power to activate at least the NFC unit and the power-supply state holding unit.
Memory arbitrator for electronics communications devices
Embodiments of the invention include electronic communications devices having a memory in near field communication device, a memory arbitrator and a host processor. The near field communication (NFC) devices are configured to receive data and drive power from the communication signal. The memory arbitrator is connected to the NFC device and the memory. The memory arbitrator is also configured to access the memory in response to an access request from the NFC device. Additionally, the memory is configurable to be accessed by both the host processor and the NFC device according to embodiments of the present invention.
Method and apparatus for providing broadband signals to a portable user device
A method and apparatus for providing broadband signals to a portable user device is disclosed. Broadband signals, such as satellite radio signals, are received at a base station having a plurality of antennas. The content of the broadband signals are then encoded using space time coding (STC), and the STC encoded broadband content is transmitted from the plurality of antennas via a first wireless network protocol. The STC encoded broadband content can be received at a portable user device having a plurality of antennas or at a wireless access point having a plurality of antennas, which then transmit the broadband signals via a second wireless network protocol.
Apparatus and method for providing media services subject to viewing restrictions
A system that incorporates teachings of the present disclosure may include, for example, determining that a communication device is outside of a restricted viewing area associated with media content and transmitting the media content for presentation at the communication device responsive to that determination. Other embodiments are disclosed.
Image-forming apparatus and multiple sheet curl correcting sheet-receiving units
A sheet discharge tray that forms a sheet-receiving unit in an image-forming apparatus includes a climbing slope from a sheet discharge direction start point to a sheet discharge direction end point. The sheet discharge direction end point is formed by a variable tray having a supporting portion provided on a side of the sheet discharge direction start point.
Image forming apparatus
The speed at which transfer-material enters a transfer region is controlled to prevent a phenomenon in which a toner image on an intermediate transfer belt is scraped by the leading edge of the transfer-material when the toner image is transferred onto the transfer-material. While the conveying speed of the transfer-material in a transfer nip coincides with the speed of the intermediate transfer belt, the transfer-material is conveyed at a speed lower than the peripheral speed of the intermediate transfer belt when the leading edge of the transfer-material comes into contact with the intermediate transfer belt, and the conveying speed of the transfer-material is increased by the time when the transfer-material enters the transfer nip.
Image forming method
An image forming method that can obtain a high fixing strength and reduce the occurrence of a document offset phenomenon is provided.In the image forming method the polyester resin forming the binder resin of the toner is obtained by condensing and polymerizing a carboxylic component containing at least one compound selected from chemical formula (1), (2) and (3) shown below that is an addition reactant of abietic acid and a carboxylic compound having an unsaturated double bond and an alcohol component, and the content of at least the one compound selected from the chemical formula (1), (2) and (3) in the carboxylic component is 5% by mass or more, and the fixing agent contains an alkylene carbonate which may have a substituent group or an aliphatic alkyl carboxylic acid ester which may have a substituent group.
Fixing device and image forming apparatus
A fixing device includes a first radiating portion that includes plural light sources arranged along a first direction at a determined interval, and radiates light on a recording medium on which a toner image is formed and which is transported in a second direction intersecting with the first direction, and an optical member that includes plural transmission regions through which the light radiated by the plural light sources is transmitted and includes plural light diffusion portions diffusing the light in the first direction on each of the plural transmission regions.
Image heating apparatus
The image heating apparatus includes an endless belt, a heater placed in contact with an inner surface of the endless belt, a holder made of resin, adapted to hold the heater, and provided with a supporting space to be fitted with the heater, where a through hole is formed in a heater receiving surface of the holder at a bottom area of the supporting space; and a back-up member adapted to form a nip together with the heater to pinch and convey a recording material through the endless belt. In the bottom area, hollow portions recessed from the bottom area are provided at opposite ends in a short direction of the holder, being located at locations in a longitudinal direction of the holder different from a location in which the through hole is formed. Consequently, even if the heater heats up abnormally, heater cracks can be prevented.
Belt device with mechanism capable of minimizing increase of rotation torque of endless belt and fixing device and image forming apparatus incorporating same
A belt device includes a flange assembly including a tube inserted into a loop formed by an endless belt at each lateral end of the endless belt in an axial direction thereof and a slip ring slidably contacting a groove mounted on the tube. An inner diameter ID 51 of the slip ring through a rotation axis of the slip ring is smaller than a minimum outer diameter OD50a of the tube through the rotation axis of the slip ring. The minimum outer diameter OD50a is smaller than a maximum outer diameter OD21 of a track of the endless belt rotating in a predetermined direction of rotation through the rotation axis of the slip ring. The maximum outer diameter OD21 is smaller than an outer diameter OD51 of the slip ring through the rotation axis of the slip ring.
Fixing device having gap between fixing belt and fixing roller, and image forming apparatus having fixing device
A fixing device and an image forming apparatus include, in a fixing nip region, a paper-passage region allowing paper to pass through and a non-paper-passage region located at opposite ends of the paper-passage region and not allowing paper to pass through. The non-paper-passage region is provided with a fixing belt movement restricting member arranged at a prescribed distance away from the fixing belt. Even when the fixing belt comes into abutment with the fixing belt movement restricting member, a prescribed gap is formed between the fixing belt and a surface of the holding member that is opposed to the fixing belt, in the paper-passage region.
Fixing apparatus fixing a toner image formed on a recording material having a cleaning unit including a cleaning fabric
A fixing apparatus for fixing a toner image formed on a recording material includes a fixing roller; a cleaning unit for cleaning the fixing roller, the cleaning unit including a first shaft, a second shaft, and cleaning fabric extended between the first shaft and the second shaft and wound on the first shaft and the second shaft to be fed out from the first shaft and wound up on the second shaft, wherein at the time of cleaning the fixing roller, an outer surface of the cleaning fabric wound on the first shaft contacts the fixing roller, and wherein an outer diameter of the cleaning fabric wound on the first shaft is larger than that wound on the second shaft irrespective of amount of the cleaning fabric on the first shaft.
Fusing apparatus and image forming apparatus
Disclosed is a fusing apparatus including: a fusing section including a nipping section which conveys a recording medium while applying pressure and heat to the recording medium; an injecting section which is provided on a downstream side of a conveying direction of the recording medium with respect to the nipping section and which injects gas between a recording medium conveyed by the nipping section and attached to the fusing section and the fusing section; a detecting section which detects jamming of the recording medium in a conveying path of the recording medium; and a separating section which separates the injecting section from the fusing section when jamming of the recording medium is detected by the detecting section.
Image forming apparatus
An image forming apparatus includes an image bearing member, a detector that detects a density of developer on the image bearing member, a support member supported in the image forming apparatus and removably supporting the detector, a separator disposed with a space from the detector, a first connected unit disposed on the support member between the separator and detector, a second connected unit disposed on the support member on an opposite side of the detector from the first connected unit, a fixing member including a first connecting unit that passes through the space and is supported by the first connected unit and a second connecting unit supported by the second connected unit, where the fixing member fixes the detector to the support member, and a disengagement restricting unit disposed on an opposite side of the detector from the separator so as to be adjacent to the second connecting unit.
Developer container, image forming apparatus, and developer container controlling method
A developer container includes a containing portion that is capable of containing a developer therein, the containing portion having an opening through which the developer passes; a first opening/closing member that is movable between a first open position at which the opening is open and a first closed position at which the first opening/closing member closes the opening; and a second opening/closing member that is movable between a second closed position at which the second opening/closing member doubly closes the opening by covering an outside of the first opening/closing member and a second open position at which the first opening/closing member is exposed to the outside, wherein a direction in which the second opening/closing member moves between the second open position and the second closed position is different from a direction in which the first opening/closing member moves between the first open position and the first closed position.
Charging unit and discharging unit
A charging and/or discharging unit for an image formation device may include a discharge wire extending in a lateral direction (a second direction) perpendicular to a first direction, the first direction corresponding to a moving direction of the surface of a photosensitive drum and parallel to the surface of the photosensitive drum. The discharge wire may be distanced from the surface of the photosensitive drum. Shield electrodes and a grid electrode are opposed to the discharge wire, with a distance therefrom and extending along the lateral direction. The shield electrodes and the grid electrode may include ribs extending in the lateral direction, respectively. In one or more examples, the ribs may correspond to recessed portions in a surface of the corresponding electrodes and may be located out of a specified circular area.
Sheet feeding device, and image forming apparatus provided with same
The sheet feeding device includes a housing, first and second feeding paths, and first and second covers. The first feeding path extends in a vertical direction within the housing. The second feeding path extends in the vertical direction within the housing, and a lower end thereof is connected to an upper end of the first feeding path. The first cover exposes, in an open state, the first feeding path outside of the housing. The second cover exposes, in an open state, the second feeding path outside of the housing. When both the first cover and the second cover are opened, the first cover and the second cover are respectively in the open state relative to the housing in a mode where a second opening angle of the second cover relative to the housing is smaller than a first opening angle of the first cover relative to the housing.
Image-forming apparatus including lower housing and upper housing disposed over the lower housing and movable between closed and open positions
An image scanner section is disposed above a printer section. The image scanner section is supported by the printer section in such a manner as to be pivotable about a pivotal axis. The printer section has a lower housing having a substantially rectangular shape as viewed from above. The image scanner section has an upper housing having a substantially rectangular shape as viewed from above. The upper housing and the lower housing are configured such that a second upper corner portion, which is a corner portion of the upper housing, projects beyond a second lower corner portion, which is a corner portion of the lower housing and is located just under the second upper corner portion.
Image forming apparatus and trapping device
An image forming apparatus includes a housing, an image forming section, an air passage that is disposed so as to be movable between a first position and a second position, the air passage having an interior through which air is allowed to flow while the air passage is in the first position, a trapping member that is mountably and dismountably disposed in the interior of the air passage, the trapping member trapping an object contained in the air flowing through the interior of the air passage, and a mounting system that mounts the trapping member, which is not completely mounted in the interior of the air passage, in the interior of the air passage by an operation of moving the air passage from the second position to the first position.
Image forming apparatus and power control device
An image forming apparatus that forms a color image by overlaying toner images formed on respective first, second, and third photoreceptors, comprising: first, second, and third voltage-applied members respectively facing the first, second, and third photoreceptors; a first AC power supply generating first AC voltage, and superimposing the first AC voltage on first DC voltage to generate first voltage for causing a first electric field between the first voltage-applied member and the first photoreceptor; a second AC power supply generating second AC voltage, and superimposing the second AC voltage on second DC voltage to generate second voltage for causing a second electric field between the second voltage-applied member and the second photoreceptor; and a composite circuit superimposing a composite of the first voltage and the second voltage on third DC voltage, to generate third voltage for causing a third electric field between the third voltage-applied member and the third photoreceptor.
Optical sensor with positioning reference surface and image forming apparatus incorporating optical sensor
An optical sensor attached to an apparatus includes a substrate and a light emitting element mounted on a first surface of the substrate. The light emitting element emits a light to a detection object in parallel to the substrate. A light receiving element is mounted on the first surface of the substrate. The light receiving element receives a regular reflection light reflected by the detection object. The said first surface serves as a positioning reference for positioning the optical sensor on an optical sensor mounting member provided in the apparatus.
Registration mark and image forming apparatus
In a registration mark, when toners of plural colors are divided into two groups of a low-reflectance group having a relatively low spectral reflectance and a high-reflectance group having a relatively high spectral reflectance in accordance with high and low levels of spectral reflectances with respect to light emitted by an optical sensor, a toner pattern that gives information of a toner-image formation position of a toner-image forming unit using the toner that belongs to the low-reflectance group includes a first pattern in which the toner that belongs to the high-reflectance group is distributed without a gap in a moving direction of the transferred member, and second patterns formed with the toner used by the toner-image forming unit, the second patterns being arranged on both sides of the first pattern in the moving direction of the transferred member without a gap with respect to the first pattern.
Image forming apparatus directing blown air toward a sheet conveying path between a pair of rollers
An image forming apparatus includes: a switch member that selectively switches a blowing direction of an air drawn by a fan and passing through a duct to a direction toward a conveying roller pair or a direction toward a sheet conveying path between the conveying roller pair and a fixing device; and a control portion that switches the switch member, based on a setting by an operation portion to that a gloss mode for an image to be formed on the sheet is set, so that when a mode for forming a high gloss image is set, the blowing direction of the air is switched to the direction toward the pair of rollers, and when a mode for forming a low gloss image is set, the blowing direction of the air is switched to the direction toward the sheet conveying path.
System for generating optical RZ signals based on electrical RZ signals
Consistent with the present disclosure, polarized optical signals having the same wavelength are modulated in response to ERZ drive signals, to thereby yield corresponding RZ optical signals. Each of the polarized RZ optical signals includes a plurality of RZ transitions wherein the power of the optical signal returns to zero or a minimal power between bits or symbols. The phase or timing of the ERZ drive signals, however, is controlled, so that the RZ transitions in one polarized optical signal remain interleaved with the RZ transitions of the other polarized optical signal. Alternatively, the RZ transitions of the two polarized optical signals may be controlled so that the two are temporally aligned with one another. Thus, the timing of the RZ transitions of one polarized optical signal relative to the other polarized optical signal may be adjusted to optimize system performance.
Method and arrangement for stabilizing a color coding method and optically transferring data
A method is provide for optically transferring data between a transmitter and a receiver employs a color coding method based on a plurality of elementary colors for encoding and transferring the data. Each elementary color is transmitted by one optical radiation source each on the transmitter side, and is received on the receiver side by one optical radiation receiver each. A control loop is formed between the transmitter and the receiver, wherein calibration messages are sent by the transmitter to the receiver, and wherein compensation information is determined by means of comparing at least one channel property of at least one received calibration message to a corresponding channel property of at least one previously transmitted calibration message, and wherein an adjustment of at least one transmitting parameter is made in the transmitter on the basis of the compensation information.
Two way burst mode digital optical cable communication system
A digital burst mode communication system operates at a fixed wavelength for transmission and reception of burst mode signals using a pair of transceivers and a single optical cable. The stray noise level in the system is significantly reduced by use of angled plate absorbers that receive scattered transmission burst signal from a 45 degree partially reflecting mirror. Isolation of received burst signal from transmitted burst signal is increased to better than 30 dB. The system operates by sending only data bits across the single optical cable without scrambling or encoding preambles, significantly improving the efficiency of high speed communication.
Optical transmission system
An optical transmission system comprises a metropolitan core network operated in a wavelength division multiplexing mode and connected via metro connection devices to access connections to optical network terminals connected by means of a passive optical splitter. The metro connection devices contain regenerators and wavelength converters, so that data regeneration takes place between the network terminals and the central management and switching unit. This makes it possible to cover distances around 100 km.
Optical network testing
A method includes generating a test signal and modulating the test signal. The method may also include transmitting the test signal on an optical path, where the optical path may include a number of add-drop multiplexer devices and amplifiers. The method may also include receiving the test signal at a destination device and converting the received test signal into an electrical signal. The method may further include identifying a portion of the electrical signal that is associated with the modulated test signal.
A camera rig system is configured to film in several overlapping directions at once. The camera rig system has a front rig having a first plurality of cameras arranged to film in a first set of overlapping directions. A trigger box is electrically coupled to the front rig and configured to receive data from the first plurality of cameras. A rear rig having a second plurality of cameras is electrically coupled to the trigger box and arranged to film in a second set of overlapping directions. The first set of overlapping directions and the second set of overlapping directions are configured such that images taken from the first plurality of cameras and the second plurality of cameras can reflect background images around the camera rig system.
Image stabilization apparatus, control method therefor, optical apparatus and imaging apparatus
An image stabilization apparatus, having a vibration correction unit that corrects image blur due to vibrations, detects an angular velocity of vibrations with a first vibration detection unit, calculates a rotational shake correction amount based on an output from the first vibration detection unit, detects vibrations with a second vibration detection unit, calculates a correction value from the outputs of the first and second vibration detection units, calculates a translational shake correction amount based on the correction value and the output of the first vibration detection unit, and drives the vibration correction unit based on at least one of the rotational or translational shake correction amounts. The image stabilization apparatus changes the translational shake correction amount to a smaller value when a main object accounts for a smaller proportion of an entire screen.
System and method for managing video recording based upon blackout events in a video data distribution system
A method is disclosed for managing digital video recording of alternative event data during a blackout of primary event data at a client device, the method including but not limited to receiving notification data indicating that a blackout has been cancelled for a primary event; proceeding with recording the scheduled digital video recording for the primary event; and graphically presenting the notification data of the cancelled blackout for the primary event at the client device. A system is disclosed for performing the method.
Continuous freeze-frame video effect system and method
A number of adjacent regions in input video and a corresponding number of adjacent regions in output video are defined. The adjacent regions are defined so that they span the path of motion of a subject as it moves across a scene in the input and output video. For each region, a plurality of sequential region frames defining video within the region are captured. For each region, playback of the captured plurality of sequential region frames is provided in a substantially continuous loop. The playback of the captured plurality of sequential frames defining video within each region is positioned in the output video adjacent the playback of the captured plurality of sequential frames defining video within an adjacent region in the output video so that the combined effect of the adjacent regions of played-back video is to provide output video that spans the scene.
Overlay to augment quality of currently playing media
Overlay to augment quality of currently playing media. The overlay operates to enhance the quality format of media so that it is output in a different quality format. As one example, when playing media content encoded in accordance with a standard definition television (SDTV) quality format, an appropriate overlay would operate to upgrade the quality format thereof to enhanced definition television (EDTV) quality format, high definition television (HDTV) quality format (or some other quality format). An appropriate overlay may also operate in accordance with audio content (e.g., upgrading a quality format of the audio content). With the advent of Blu-Ray discs (and other higher quality format discs), many individuals presently have libraries of media that are encoded with legacy/previous quality formats. An appropriate overlay that operates in conjunction with media encoded with a legacy/previous quality format allows the same content to be enjoyed in accordance with a newer/improved quality format.
Camera event logger
A camera event logger device coupled to a motion picture camera, including: a data port configured to receive control signals to manage the logger device including a particular receive frequency; a radio-frequency receiver configured to receive time signal of the particular receive frequency to enable fine adjustment of a timecode; a timecode manager including a plurality of timecode readers and at least one timecode generator, a first timecode reader of the plurality of timecode readers configured to receive the time signal from the radio-frequency receiver and make the time signal available to the at least one timecode generator, wherein the at least one timecode generator is configured to generate the timecode by conditioning the time signal, the timecode manager configured to receive camera timecode from the motion picture camera, and to send back adjusted camera timecode adjusted in accordance with the conditioned timecode; a processor configured to receive camera status information from the motion picture camera and the conditioned timecode from the timecode manager, wherein the camera status information is tagged with the conditioned timecode and processed to generate metadata files; and a storage unit configured to store the metadata files. Keywords include logger, timecode, and slate.
Optical transmission fiber with thermal management for high power applications
An optical transmission fiber including a core having a first index of refraction, a cladding material located around the core and having a second index of refraction less than the first index of refraction, a first coating material located around a first portion of the cladding material and having a third index of refraction greater than the second index of refraction, and a second coating material located around a second portion of the cladding material and having a fourth index of refraction less than the second index of refraction.
Multi-core optical fiber and method of producing the same
A multi-core optical fiber according to the present invention includes plural single-core optical fibers, and comprises an intermediate portion in which a side surface of each single-core optical fiber is covered with a resin layer, and a terminal portion in which the each single-core optical fiber is exposed from the resin layer. In the terminal portion of the multi-core optical fiber, the single-core optical fibers are separated from each other.
Optical fiber and optical transmission system
An optical fiber that propagates light over a use wavelength bandwidth of 100 nm or wider in a plurality of propagation modes is provided. The optical fiber has: a confinement loss equal to or less than 1 dB/km in each of the plurality of propagation modes over the use wavelength bandwidth; and a bending loss equal to or less than 100 dB/m in each of the plurality of propagation modes over the use wavelength bandwidth when the optical fiber is bent at a diameter of 20 mm.
Shading system using liquid lens and light waveguide
Techniques described herein generally relate to assemblies with selective optical transmissivity. In some examples, an assembly with selective optical transmissivity is described. The assembly can include a first layer and a second layer. The first layer can include a multiple number of liquid lens units. Each of the liquid lens units can be configured to selectively focus incoming optical rays within a focal range defined between a first focal length and a second focal length. The second layer can be spaced apart from the first layer and can include a multiple number of optical waveguides. Each of the optical waveguides can include one or more waveguide inlets such that the second layer includes a multiple number of waveguide inlets. Each of the waveguide inlets may be associated with a respective one of the liquid lens units and may be spaced apart from the respective one of the liquid lens units by a distance within the focal range.
Laser module manufacturing method and laser module
An optical semiconductor element is held in a junction-up state at an approach start position that is isolated from a mount face of a planar lightwave circuit, and the top-face height of the optical semiconductor element and the surface height of the planar lightwave circuit are aligned by bringing the optical semiconductor element closer towards the mount face. Further, the height of the active layer of the optical semiconductor element is aligned with the height of a waveguide of the planar lightwave circuit by bringing the optical semiconductor element towards the mount face for an amount of a difference between a reference value of a distance on design from the surface of the planar lightwave circuit to the center of the waveguide and a reference value of a distance on design from the top face of the optical semiconductor element to the center of the active layer.
Systems and method for routing optical signals
Systems and a method for routing optical signals are disclosed. One system includes a first large core hollow metal waveguide configured to guide a substantially coherent optical beam. A second large core hollow waveguide is optically coupled to the first waveguide with a coupling device. The coupling device is configured to divide the coherent optical beam into a transmitted beam and a reflected beam. Beam walk-off within the coupling device causes the transmitted beam to be shifted by an offset amount. The second large core hollow metal waveguide is shifted from the first large core hollow metal waveguide by approximately the offset amount to receive the shifted transmitted beam.
Optical fiber shape sensing systems
A method for measuring bending is provided. The method includes receiving a reflected signal from a strain sensor provided on an optical fiber; determining a spectral profile of the reflected signal; and determining bending of the optical fiber based on a comparison of the spectral profile of the reflected signal with a predetermined spectral profile.
Temperature sensor using an optical fiber
A method for measuring a physical parameter at a plurality of spaced locations in a subterranean formation using a temperature sensor that has an elongated sensing element having a length of at least 10 m, measured at a temperature of 20° C. The elongated sensing element includes an elongated jacket and an optical fiber mounted in the jacket and having an EFL of at least 0.35%, wherein the elongated sensing element has an average temperature error of less than 2° C.
Visualizing digital images on a map
A computer based, digital image management system that visually presents an entire archive in a manner that facilitates easy, non-textual, searching for specific images. In one embodiment, the system includes two elements: a file management methodology and a graphical user interface. The file management method utilizes reference files that contain multiple properties (metadata) relating to each image file. Image files are grouped into a multiplicity of collections based on user-defined associations of the properties. The graphical user interface visually represents the groups of image files on 2-dimensional or 3-dimensional graphic metaphors. In addition, the graphical interface uses multiple display variables such as icons, mnemonics, size, movement, color, and luminance to signify relationships between groups, and/or communicate key properties of individual or groups of images.
Extended depth of field and variable center of perspective in light-field processing
According to various embodiments, the system and method of the present invention process light-field image data in a manner that reduces artifacts and that yields 2-D images with extended depth of field, and with variable placement of the center of perspective. Center of perspective can be varied based on user input or on pre-specified parameters. Various techniques for improving the presentation of light-field images with variable center of perspective are described, and for performing other effects in connection with projection of light-field images.
Structured light for 3D shape reconstruction subject to global illumination
Depth values in a scene are measured by projecting sets of patterns on the scene, wherein each set of patterns is structured with different spatial frequency using different encoding functions. Sets of images of the scene is acquired, wherein there is one image for each pattern in each set. Depth values are determining for each pixel at corresponding locations in the sets of images. The depth values of each pixel are analyzed, and the depth value is returned if the depth values at the corresponding locations are similar. Otherwise, the depth value is marked as having an error.
Encoding device configured to generate a frequency component extraction signal, control method for an encoding device using the frequency component extraction signal, transmission system, and computer-readable recording medium having a control program recorded thereon
Disclosed is an encoding device, which is an encoding device that outputs an encoded signal including a signal in which an original signal is encoded, the original signal indicative of at least one of image and audio, which encoding device includes a frequency component extraction section that extracts a part of frequency components of the original signal from the original signal to generate a frequency component extraction signal and an encoding process section that encodes the frequency component extraction signal and the original signal while switching between the frequency component extraction signal and the original signal, and making the signal thus encoded be included in the encoded signal.
Systems and methods for evaluating robustness of saliency predictions of regions in a scene
Systems and methods for evaluating the robustness of objects within a scene or a scene itself.
Collaborative feature extraction system for three dimensional datasets
A collaborative feature extraction system uses crowdsourced feedback to improve its ability to recognize objects in three-dimensional datasets. The system accesses a three-dimensional dataset and presents images showing possible objects to a group of users, along with potential identifiers for the objects. The users provide feedback as to the accuracy of the identifiers, and the system uses the feedback to adjust parameters for candidate identifiers to improve its recognition of three-dimensional assets in future iterations.
Image recomposition from face detection and facial features
A computer implemented method for identifying one or more individual regions in a digital image that each include a human face, padding each of the one or more individual regions to form individual padded regions, and digitally defining at least one combined padded region each comprising one or more of the individual padded regions that overlap by a preselected amount.
Segmentation and identification of layered structures in images
Disclosed herein are systems and method for segmentation and identification of structured features in images. According to an aspect, a method may include representing an image as a graph of nodes connected together by edges. For example, the image may be an ocular image showing layered structures or other features of the retina. The method may also include adding, to the graph, nodes adjacent to nodes along first and second sides of the graph. The added nodes may have edge weights less than the nodes along the first and second sides of the graph. Further, the method may include assigning start and end points to any of the added nodes along the first and second sides, respectively. The method may also include graph cutting between the start and end points for identifying a feature in the image.
Method for determining frontal face pose
A method for determining a frontal face pose by using the symmetry of a face including detecting a face region in an image, detecting an eye region in the detected face region, normalizing the face region, analyzing the symmetry in the normalized face region, and determining whether a face pose is a frontal face pose based on an analysis of the symmetry.
System and method for scalar quantization error reduction
To reduce artifacts caused by quantization errors in image compression systems, an offset is added to quantized samples at low frequency sections of a macroblock. A decoder uses the offset after decoding to bring the decoded sample closer to the original pre-encoded and pre-quantized sample, thereby compensating for quantization errors.
Weighted entropy minimization for optimizing a log-chromaticity normal for use in an image process
In a first exemplary embodiment of the present invention, an automated, computerized method is provided for processing an image. According to a feature of the present invention, the method comprises the steps of providing an image file depicting an image defined by image locations, in a computer memory, generating a bi-illuminant chromaticity plane in a log color space for representing the image locations of the image in a log-chromaticity representation for the image, providing an estimate for an orientation of the bi-illuminant chromaticity plane and optimizing the estimate of an orientation as a function of a minimization of a weighted entropy.
Image processing apparatus and computer program product
An image processing apparatus uses an estimation operator to estimate a spectroscopic property. The image processing apparatus includes an effect extent analyzing unit which analyzes, based on the estimation operator, a relative extent of an effect on the spectroscopic property against a noise in a wavelength axis.
Methods for efficient classifier training for accurate object recognition in images and video
An object recognition system and method is provided which uses automated algorithmically determined negative training. Negative training with respect to a particular object classifier allows for more streamlined and efficient targeted negative training, enabling time and cost savings while simultaneously improving the accuracy of recognition based on the targeted negative training.
Learning device, learning method, identification device, identification method, and program
Provided is a learning device including: an acquisition section that acquires a plurality of image pairs in which the same subjects appear and a plurality of image pairs in which different subjects appear; a setting section that sets feature points on one image and the other image of each image pair; a selection section that selects a plurality of prescribed feature points, which are set at the same positions of the one image and the other image, so as to thereby select a feature extraction filter for each prescribed feature point; an extraction section that extracts the features of the prescribed feature points of each of the one image and the other image by using the plurality of feature extraction filters; a calculation section that calculates a correlation between the features; and a learning section that learns a same-subject classifier on the basis of the correlation and label information.
Classification of medical diagnostic images
The invention provides methods for automated classification of a medical diagnostic image of a lung according to its deduced probability of relating to a lung of a patient who is suffering from a diffuse parenchymal lung disease such as chronic obstructive pulmonary disease (COPD), cystic fibrosis, or severe asthma, or to a class of patients characterized by the severity of such a condition, or to a class of patients characterized by a prognostic likelihood of developing such a condition or severity of condition.
Position measurement method, position measurement device, and program
A position measurement method includes an exterior orientation parameter correcting step S11 for correcting exterior orientation parameters calculated in a step S10, based on difference between photographing timing of an image and obtaining timing of a photographing position and/or a photographing posture measured outside, a bundle-adjusting step S12 for simultaneously adjusting a bundle of the exterior orientation parameters of one or more images and three-dimensional coordinates of characteristic points, based on the exterior orientation parameters corrected by the step S11, a three-dimensional coordinate calculating step S13 for calculating three-dimensional coordinates of characteristic points subsequently detected in an area in which the density of the characteristic points is decreased, based on the exterior orientation parameters adjusted bundle thereof, and a repeating step for repeating processing from the steps S10 to S13 until the image becomes a final image.
Image generating apparatus and computer program
The present invention relate to an image generating apparatus for generating an image from a viewpoint specified by a user. According to the invention, the apparatus has a storage unit that stores data of a plurality of images, and a disparity map generating unit that generates a disparity map. The disparity map is associated with a pair of images including a first image and a second image, and indicates corresponding pixels in the first and second images.