Product authentication using end-to-end cryptographic scheme
A system is provided for inside-to-outside or outside-to-inside cryptographic coding that facilitates product authentication along a distribution channel. An association of authenticated, secured codes is generated between inner items (e.g., pharmaceutical doses such as pills, capsules, tablets) and outer items (e.g., packaging containing inner items). For instance, an inner code associated with a first item is used to generate (at least partially) an outer code associated with a second item that contains one or more first items. This process may be repeated multiple times with codes for outer items being a function of codes for inner items. The sequence of items may be authenticated by the dependent relationship between their codes.
Image storage in electronic documents
A computer-implemented method for controlling access to digital media involves receiving a URL at a computer server system, decoding the URL, extracting a user ID of a user who submitted the URL and an image ID of an image that is accessible by the server system, using the user ID to determine whether the user who submitted the URL is authorized to access the image, and controlling access to the image by the user based on the determination of whether the user who submitted the URL is authorized to access the image.
Security domain in virtual environment
A system, method and computer program product for an isolated security domain which is a bounded area of the VM for protected objects. The objects include executable code and/or data, hardware units (e.g., ports) or a combination thereof. The secure units in this area are accessible using secure rules used to ensure that objects are not malware. Authentication for connections to security domain is required and certain areas of the domain are made to be read only.
Secure vault service for software components within an execution environment
Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.
Assessing risk of information leakage
There is disclosed a technique for use in assessing the risk of information leakage. The technique receives a set of facts that have references to individuals associated with an organization. Based on the received facts, a link is detected between an individual associated with the organization and an occurrence indicative of risk. A connection is identified between the individual and confidential information within the organization. Based on the detected link and the identified connection, the risk is determined of the confidential information being leaked in an unauthorized manner by the individual.
Automatic analysis of software license usage in a computer network
Apparatus and method for analyzing usage of a software license. A computer system is configured to execute a software product that is activated, subject to a software license, by a first license key. The computer system includes a license use determining module that is adapted to communicate with a group of other computer systems on the same computer network, store first license key-related information that is derived from the first license key, send the first license key-related information to be received by each computer system of the group, and receive any messages sent by responders of the group in response to reception of the first license key-related information. Each of the messages is indicative of a corresponding responder having a copy of the software product that is activated by the first license key.
Operation of a dual instruction pipe virus co-processor
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a method for virus processing content objects is provided. A content object is stored within a system memory by a general purpose processor using a virtual address. Most recently used entries of a page directory and a page table of the system memory are cached within a translation lookaside buffer (TLB) of a virus co-processor. Instructions are read from a virus signature memory of the co-processor. Those of a first type are assigned to a first of multiple instruction pipes of the co-processor. The first instruction pipe executes an instruction including accessing a portion of the content object by performing direct virtual memory addressing of the system memory using a physical address derived based on the virtual address and the TLB and comparing it to a string associated with the instruction.
Interdicting malicious file propagation
An approach is provided for interdicting malicious file propagation. Packets of a message being transferred to a destination device are received. In response to packet(s) of the message being received, the packet(s) are scanned by determining whether the packet(s) match a corresponding portion of a malicious file. If any of the scanned packet(s) do not match the corresponding portion of the malicious file, a transfer of subsequent packet(s) of the message to the destination device is permitted without performing a scan of the subsequent packet(s). If the scanned packet(s) including a last one or more packets of the message match corresponding portions of the malicious file, a transfer of the scanned packet(s) to the destination device is permitted, except a transfer of the last one or more packets of the message to the destination device is not permitted.
Multi-network virus immunization
An apparatus, device, methods, computer program product, and system are described that determine a virus associated with a communications network, and distribute an anti-viral agent onto the communications network using a bypass network, the bypass network configured to provide transmission of the anti-viral agent with at least one of a higher transmission speed, a higher transmission reliability, a higher transmission security, and/or a physically-separate transmission path, relative to transmission of the virus on the communications network.
Method and system for antivirus by SIM card combined with cloud computing
The invention provides a method and a system of antivirus solution by using a SIM card combined with cloud antivirus. The method comprises that the signature data of a file of a present mobile device is sent to a cloud server; the cloud server receives the file the signature data and checks the received file the signature data by using a cloud virus database stored at the cloud server; and the cloud server sends the checking result back to the SIM card of the mobile device via OTA (Over-the-Air).The invention has the advantage of using the SIM card as the media of antivirus and communication so as to be convenient for the cooperation between a telecommunication service provider and an antivirus software vendor.
Event-based attack detection
Event-based attack detection is described. In some implementations, an attack on a computing device can be detected by identifying unusual events, or unusual sequences of events, that occurred on the computing device. A computing device can log events that occur on the computing device. In some implementations, the unusualness of an event, or sequence of events, on the computing device can be determined based on a comparison of events logged by the computing device and events logged by other computing devices. Other implementations are described.
Secure notification on networked devices
A system, device and method to securely notify a user of a compromise of a device are provided. The system, device and method may include a detection device adapted for determining a compromise of the device communicatively coupled to the first path, a user database including at least information regarding the device and other devices associated with the user, and the secure signal path to at least one of the other devices.
Method and system for sharing mobile security information
Methods and systems for sharing mobile security information are disclosed. According to an embodiment, a method for sharing mobile security information includes: providing to a user of the mobile device an option to share the mobile security information, extracting content from mobile security information upon receiving the user's selection, and posting the extracted content to a social network service.
Device, system and method for defending a computer network
A device, system, and method for defending a computer network are described. network communications are received by a traffic filter, which dynamically determines whether the communications include an anomaly (i.e., are “anomalous” communications), or whether the communications are normal, and do not include an anomaly. The traffic filter routes normal communications to the correct device within its network for servicing he service requested by the communications. The traffic filter routes any anomalous communications to a virtual space engine, which is configured to fake a requested service (e.g., to entice deployment of a malicious payload). Anomalous communications are analyzed using an analytical engine, which can dynamically develop rules for handling anomalous communications in-line, and the rules developed by the analytical engine can be employed by the traffic filter against future received communications.
Providing particular level of access to one or more items in response to determining primary control of a computing device
A computationally implemented system and method that is designed to, but is not limited to: determining which of a plurality of users detected in proximate vicinity of a computing device has primary control of the computing device; and providing a particular level of access, via the computing device, to one or more items, the particular level of access to be provided to the one or more items being in response, at least in part, to said determining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
Tunneled security groups
A method for providing security groups based on the use of tunneling is disclosed. The method includes assigning a security group identifier (SGI) to a packet and classifying the packet based on the packet's SGI.
Filtering kernel-mode network communications
Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system.
System and method for building intelligent and distributed L2-L7 unified threat management infrastructure for IPv4 and IPv6 environments
A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically identified application programs responsible for producing and/or consuming the network traffic and to enforce policies in accordance with network traffic classifications. The appliance includes an on-box anti-virus/anti-malware engine, on-box data loss prevention engine and on-box authentication engine. One or more of these engines is informed by an on-box dynamic real tie rating system that allows for determined levels of scrutiny to be paid to the network traffic. Security gateways of this type can be clustered together to provide a set of resources for one or more networks, and in some instances as the backbone of a cloud-based service.
Local proxy system and method
A local proxy system includes a storage device having a local proxy and a physical port connection. The local proxy is part of a split proxy configuration having a local proxy and a remote proxy. The physical port connection is operative to receive commands from a host via an internet application protocol; and to transmit commands to the host via a modem control protocol, to thereby function as a gateway for conveying these commands to a remote proxy, via the host. Also provided is a method of optimizing communication over a network; and a local proxy system that includes a storage device having a local proxy. The storage device is in connection with a host via a physical port connection complying with a standard storage device interface.
Selecting image or video files for cloud storage
A method responsive to receiving a data from a computing device connected to the computer in a cloud computing system or data center, identifies a criteria associated with the computing device, responsive to identifying the criteria, determines whether the data is authorized for transmission to a storage in the cloud computing system or data center, and responsive to determining that the data is authorized for transmission to the storage, forwards the data to the storage.
Roaming services network and overlay networks
Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device detects one or more available roaming networks for a service on a network; connects to a roaming services network center via an access network; and sends available roaming network information to the roaming services network center.
Propagating user privacy preferences across multiple applications
Methods and systems for maintaining user privacy preferences based on one or more user identifications across a plurality of applications are provided. Two or more user identifications are received with associated user privacy preferences. The received user identification is compared against other user identifications to determine if the user identifications relate to the same user. It may be determined that two user identifications are related if they have at least one browser property in common. A consolidated data stream of the user privacy preferences for the related user identifications is created. The consolidated data stream is communicated to one or more applications and propagated to maintain the user privacy preferences across the applications relating to the user identification.
Using an image to provide credentials for service access
A method for providing at least one credential to access a service includes receiving an image from a camera that is included in a user device that also includes a processor and a communications device. The image is analyzed using an optical character recognition engine coupled to the processor. The analyzing the image includes determining that the image includes potential credential information that includes at least one credential including at least one character string. The at least one credential from the potential credential information is provided, using the communications device, to a service in order to access the service. In an embodiment, the user device may include a limited input device that is free of a physical keyboard having alphanumeric characters, and the determination and use of the at least one credential from the image simplifies the accessing of the service by minimizing or eliminating the need to use the limited input device.
Interworking between first and second authentication domains
To interwork between a first authentication domain and a second authentication domain, a bridge module performs a first authentication procedure in the first authentication domain for a mobile station, wherein the first authentication domain is part of a wireless access network. Based on information collected in the first authentication procedure, the bridge module performs a second authentication procedure is performed, on behalf of the mobile station, in the second authentication domain.
Systems and methods for identifying security risks in downloads
A computer-implemented method for identifying security risks in downloads may include (1) identifying a request to download a file that is subject to a security assessment, (2) determining that a first segment of the file is required for the security assessment, (3) based on determining that the first segment of the file is required for the security assessment, retrieving the first segment of the file before retrieving a second segment of the file, and (4) determining, based at least in part on the first segment, that the file includes a security risk. Various other methods, systems, and computer-readable media are also disclosed.
Station-to-station security associations in personal basic service sets
A personal basic service set (PBSS) includes a first device configured to communicate in the PBSS and a second device configured to communicate in the PBSS. The first device is configured to establish a robust security network association (RSNA) with the second device (i) without associating with a PBSS control point (PCP) and (ii) without associating with the second device.
Restricting access to hardware for which a driver is installed on a computer
Users of a computer are prevented from directly accessing certain hardware for which a driver is installed on the computer. The users are provided a limited, indirect manner to access the hardware for a specific purpose or to do a specific job. One example of such hardware is a wireless hardware communication interface. The wireless activity of the computer may be restricted so that the wireless hardware communication interface is prevented from communicating with any devices compatible with the wireless hardware communication interface other than one or more specific devices.
Dynamic application charging identification
The present invention relates to a solution for handling charging and statistics of use of applications in a wireless communication network (100) and in particular identifying type of service provided in a safe manner. This is provided by providing an authenticated application identifier in data packets communicated between user equipment (101) and an application service (104) in a packet based network (106). This authenticated application identifier is obtained by packet inspection of data packets in a network gateway (103). Furthermore, use information is stored in a database (105) for statistical and/or charging purposes.
System and method for applying authentication and security policies in a SIP environment
The present disclosure provides a system and method for applying authentication and security policies in a SIP environment. In accordance with one embodiment, there is provided a method for use on a SIP server, comprising: establishing a persistent connection with a user agent (UA); initiating an idle connection timeout countdown timer; performing authentication of an initial REGISTER request using a first level of authentication; and terminating the persistent connection when the initial REGISTER request is not validated before expiry of the idle connection timeout countdown timer.
Method and apparatus for managing transmit power for device-to-device communication
A method and apparatus for managing transmit power for device-to-device communication is provided. According to an embodiment of the invention, a UE uses a component carrier of one cell to engage in D2D communication. In parallel with its D2D communication, the UE uses one or more other component carriers of one or more other cells to engage in cellular communication. The UE configures its D2D transmit power as well as its cellular transmit power so that its total transmit power does not exceed the UEs maximum power limit, and so that the transmit power on a component carrier of a cell does not exceed the maximum power limit for the cell that provides the component carrier.
Methods and apparatuses for processing wake events of communication networks
Methods, apparatuses, and computer program products that respond to wake events of communication networks are disclosed. One or more embodiments comprise setting a wake password of a computing device, such as a notebook computer or a server. Some of the embodiments comprise receiving a wake request from a communications network, establishing a secure communication session, and setting the wake password with the secure communication session. Some embodiments comprise an apparatus having a network controller to allow a platform to communicate via a communications network, non-volatile memory that stores a wake password, and a management controller that may communicate with a management console via a secure communication session to update the wake password. One or more embodiments the network controller may wake management hardware and/or wake the management controller while keeping one or more of the devices in the power conservation mode.
Method and system for preserving privacy related to networked media consumption activities
A method and system for preserving privacy related to networked media consumption activity including: Source privacy zones are defined and associated with privacy standards. Privacy standards include frequency criteria governing the storage of datasets including information associated with networked media consumption activity collected from the source privacy zone. Transaction requests including a networking protocol address are received over a network from a client device at a target location by a networked privacy system. The source privacy zone associated with the client device is identified. Using the networking protocol address to access characteristics having characteristic value(s), a dataset can be created including associating the networked media consumption activity with the characteristic and characteristic value(s). The dataset is pre-processed to comply with the privacy standards. The networking protocol address is discarded. The pre-processed dataset can be stored in a filtered database on a physical storage device at a storage location coupled to the networked privacy system.
Mobile enterprise server and client device interaction
A system includes an application server that hosts a plurality of enterprise applications and stores enterprise data associated with each of the enterprise applications. A client device executes a client application that can provide access to each of the enterprise applications. The client application includes a memory protection engine that allocates a first memory location for the enterprise data transmitted to the client device so the enterprise data is accessible to each of the plurality of enterprise applications through the client application. A second allocated memory location is allocated for non-enterprise data. A mobile enterprise server transmits the enterprise data to the client device.
Attack protection for trusted platform modules
A trusted platform module stores information in a protected object having an associated policy. A program requesting access to the information is allowed to access the information if the policy is satisfied, and is denied access to the information if the policy is not satisfied. The trusted platform module uses one or more monotonic counters associated with the protected object to track attempts to access the information. If a threshold number of unsuccessful requests to access the information are received, then the trusted platform module locks the information to prevent the program from accessing the information for an indefinite amount of time.
Sending out-of-band notifications
Out-of-band notifications are used to inform users of clients of security policy enforcement actions, such as enforcement of a data loss prevention (DLP) policy. Code for instantiating a notification agent at a client used by a user is inserted into network traffic inbound to the client. Outbound network traffic sent from the client to a server is monitored for compliance with one or more security policies. If it is determined that the network traffic violates a security policy, an enforcement action is taken. An out-of-band notification message describing the enforcement action is inserted into a response to the outbound network traffic and sent to the client. The notification agent at the client receives the notification message and presents the message to the user.
Method for discovering a security policy
Techniques for mapping at least one physical system and at least one virtual system into at least two separate execution environments are provided. The techniques include discovering an implicitly enforced security policy in an environment comprising at least one physical system and at least one virtual system, using the discovered policy to create an enforceable isolation policy, and using the isolation policy to map the at least one physical system and at least one virtual system into at least two separate execution environments. Techniques are also provided for generating a database of one or more isolation policies.
Access policy analysis
Software tools assist an access-policy analyst or creator to debug and/or author access policies. An access request contains a query that evaluates to either true or false depending on whether access is to be allowed. Abduction may be used to generate assumptions that, if true, would cause the access request to be true. The tool may perform analysis on the generated assumptions, such as: comparing the assumptions with tokens to detect errors in the tokens or to suggest changes to the tokens that would cause the query to be satisfied, or comparing the assumptions to a meta-policy. The tool may allow an analysis, policy author, or other person to interactively walk through assumptions in order to see the implications of the access policy.
Method, system and device for synchronization of media streams
Methods and systems for synchronizing a first and second media stream are describe, wherein said first and second media stream are being transmitted by at least one media source in a network via a first and second media path to one or more terminals. The method comprises: measuring timing information associated with arrival times of media packets in said first and second media stream using a measuring module positioned at a first location in said first and second media paths; in said network generating buffer instructions for at least one buffer on the basis of said timing information, said buffer being positioned at a second location in at least one of said first or second media path; and, delaying one or more media packets transmitted over said media path to said one or more terminals such that arrival times of media packets at said one or more terminals are substantially synchronized.
Method and apparatus for transmitting and receiving UHD broadcasting service in digital broadcasting system
A method and apparatus for transmitting and receiving Ultra High Definition (UHD) broadcasting service in a digital broadcasting system are provided. The method includes receiving a TS through a transport channel, determining whether or not the TS includes information about an association relation with other TSs, analyzing the information about the association relation from the TS, determining whether or not the TS includes information about a program provided in association with the other TSs based on the information about the association relation, extracting the information about the program from the TS, and obtaining the program based on the information about the program. In accordance with the present invention, high definition broadcasting service can be provided because a broadcasting program having a great transmission bandwidth can be transmitted and received in a digital broadcasting system.
System and method to facilitate repeat broadcasts of content
A system for delivering content to users from a content provider including a transmission system for transmitting content in a series of segments and a plurality of receivers, each of the receivers comprising a memory, a processor, and an output driver. The memory may have stored therein instructions that, when executed, will cause the processor to perform the following steps: (1) comparing each of the received segments to any previously stored segments to determine whether each received segment has been previously stored; (2) for a particular received segment that has not been previously stored, storing the segment in the memory; (3) for a particular received segment that has been previously stored, determining whether the received segment is missing data and, if it is, retrieving the missing data, if available, from the corresponding previously stored segment; and (4) providing each of the received segments to the output driver along with any missing data retrieved from the memory. In preferred embodiments, the system is useful for enabling the smooth provision of content to a user as any missing data contained in a received data stream can be obtained, if available, in the memory.
Multiple reduced-bandwidth processing paths to achieve a full and continuous output band for multiple channel CATV upconversion
A method of channel processing is provided wherein multiple reduced-bandwidth “processing blocks” may be combined at RF to allow for the continuous and flexible placement of multiple-channels across the full or partial CATV output band. Each reduced-bandwidth processing block is associated with a fixed-frequency upconversion. In order to allow for continuous agile channel placement, the processing blocks overlap one another in frequency at RF. In the case where it is not necessary that the full CATV band be available to the combined output, the number of required processing blocks and upconversion paths is reduced and individual processing blocks and upconversion paths may be used to cover multiple non-contiguous frequency bands.
Moving-picture image data-distribution method
The present invention relates to a moving-picture image data-distribution method that suppresses increases in processing loads at respective information terminals without being affected by an uneven distribution status of processing loads that changes over time or by a bandwidth status of a connected network. During a distribution operation of moving-picture image data from transmission-side information terminals (120, 130) to a reception-side information terminal (110), when the reception-side information terminal (110) repetitively issues a transmission requirement for moving-picture image data at a predetermined time interval to the transmission-side information terminals (120, 130), the reception-side information terminal (110) calculates, in advance, at least any one data amount of an own receivable amount of image frames and an own permissible load amount as reception-limit information, and subsequently sequentially notifies the transmission-side information terminals (120, 130) of an upper limit of at least any one of the data amount and a data structural element that is used as a basis for calculation of the data amount.
Method and system for providing location aware tracking and services via an IP multimedia residential gateway
In an IP multimedia gateway, locations corresponding to communicatively coupled communication devices are determined and transmitted to a service provider device (SPD) that provides services to the communication devices. Communication devices receive location based service profiles from the (SPD) based on the determined locations. Services content from the (SPD) is communicated with the communication devices and/or with the (SPD), based on the profiles. The determined locations are received from communication devices which may be local or remote. A device location map is generated to be displayed by communication devices. The gateway may be integrated in an STB/DTV that displays the determined locations. Content is communicated to communication devices based on their location. The (SPD) may provide content and/or control information for communication device services. Locations are associated with client devices for detecting cloned client devices where determined locations are different than associated locations and/or for restricting services based on location.
System and method of managing video content quality
Disclosed is a system and method of managing video content quality. The method includes receiving performance data at a video quality prediction system where the performance data is related to a plurality of network elements of a network path linking a video-head end with a set-top box device. The method also includes predicting, based at least partially on the performance data, a quality of video content received at the set-top box device and determining whether the predicted quality of video content is greater than or equal to a video quality threshold. In addition, the method includes identifying at least one of the plurality of network elements not satisfying a performance requirement, based on the performance data, when the predicted quality of video content is less than the video quality threshold. Further, the method includes outputting data indicating the at least one network element not satisfying the performance requirement.
Method and system for digital content transmission
Disclosed embodiments include a method and an apparatus for digital content transmission that comprise: (a) partitioning the digital content into a plurality of sequential segments; (b) selecting a plurality of transmission time instants for each of the sequential segments as a function of their order; (c) generating a plurality of linear combinations of the plurality of sequential segments during the plurality of transmission time instants resulting in a plurality of linearly combined coded segments; and (c) transmitting the plurality of linearly combined coded segments from a server to a plurality of clients. In particular embodiments, the method and apparatus further comprise performing error correction based on an implicit error correction (IEC) method that employs the redundancy present in the linearly combined coded segments to perform error correction at the client side without extra bandwidth cost.
Apparatus, systems and methods for quick speed presentation of media content
Media content quick speed presentation systems and methods are operable to present selected portions of a media content stream at a quick speed presentation rate. An exemplary embodiment receives the media content stream; identifies a normal speed scene in the received media content, wherein the normal speed scene is presented at a normal speed presentation rate; and identifies a quick speed scene in the received media content, wherein the quick speed scene is presented at a quick speed presentation rate.
Methods and apparatus for providing multi-source bandwidth sharing management
Methods and apparatus for providing one or more services such as video on-demand, switched digital video, or Internet services using shared bandwidth. Exemplary embodiments include methods and apparatus for providing video on-demand and switched digital video to a set of customer premise equipment devices using a first dedicated portion of the bandwidth to provide video on-demand services, a second dedicated portion of the bandwidth to provide switched digital video services, and a third portion of the bandwidth to provide both switched digital video and video on-demand services wherein the size of the bandwidth made available to provide video on-demand within the third shared portion of bandwidth varies as a function of requests for video on-demand and switched digital video services and the priorities of the new requests versus the existing operating services. Bandwidth management occurring in accordance with bandwidth sharing policies, priorities and rules generated by a bandwidth sharing mechanism.
Apparatus and method for managing a presentation of media content
A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller to detect a media device operating externally to the communication device actively engaged in presenting media content, detect an incoming communication session initiated by another communication device, present a notice identifying the media device and the media content being presented by the media device, detect a directive to modify an operation of the media device to mitigate interrupting a communication session with the other communication device, and instruct the media device to modify its operation according to the directive. Other embodiments are disclosed.
Method and apparatus for improving reception of wireless signals using spartial redundancy
Data for one, or more, services is encoded using a scalable channel code and divided for transmission over N transmitters such that reception by a receiver of at least M of the transmitted signals, where M
System and method of scheduling an event related to an advertisement
A method includes transmitting media content to a set-top box. The media content includes an advertisement having a selectable reminder indicator related to an event. The method further includes receiving an input selection related to the selectable reminder indicator from the set-top box, sending a first menu to the set-top box including at least one option to schedule a reminder associated with the event, and sending a second menu to the set-top box in response to receiving a selection of the at least one option. The second menu includes a device menu including an option to specify a device order in which to send the reminder to a plurality of devices.
System and method in a local television system for responding to user-selection of an object in a television program
A system and method in a local television system for responding to user-selection of an object in a television program, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
Launching an application from a broadcast receiving apparatus
An apparatus for receiving a broadcast stream, and a method for use of the apparatus, are disclosed. The apparatus includes an application portal for launching a predefined application. The apparatus receives application information including identification ID information which identifies an application and protocol information which indicates a protocol to be used to launch the identified application, and launches the predefined application from the application portal in response to the ID information identifying the predefined application and the protocol information indicating the application portal. The apparatus may be arranged to only launch the identified application from the portal in response to the predefined application has at least the minimum version number. The application information can be received as an Application Information Table (AIT), and the ID information can be provided as organization_id and application_id fields in the AIT.
Method and apparatus to determine broadcast content and scheduling in a broadcast system
The disclosed broadcast system includes a server that broadcasts meta-data to a plurality of clients. The meta-data describes a plurality of data files that are to be broadcast or potentially broadcast later by the server. Each client receives the broadcasted meta-data from the server and updates and maintains a local meta-data table and a content rating table. Based on the meta-data, previous access habits of the user and optional user classifications, the client system selectively receives and/or stores the data files that are later broadcast by the server. In one embodiment, the client systems transmit back to the server ratings of each one of the data files described by the meta-data based on the user's previously accessed data files and optional user classifications. The server then determines the data files to be broadcast and the broadcast schedule based on the ratings received from the clients.
Program guide generation apparatus, program guide generation method, and program guide generation program
A program guide generation apparatus includes: a program-related information acquisition unit that acquires program-related information including information related to a start time of a broadcast program, information related to a broadcast duration length being the length of the duration of the broadcast of the broadcast program; a program display frame size calculation unit that calculates a time-base size obtained from the broadcast duration length and calculates an inside content size; a program guide generation unit that generates layout data of the program display frame in accordance with the time-base size calculated by the program display frame size calculation unit; and a display update unit that, upon a program display frame being selected by an operation input inputted via an input device, changes a size of the selected program display frame to the inside content size.
Signal processing apparatus and methods
A unified system of programming communication. The system encompasses the prior art (television, radio, broadcast hardcopy, computer communications, etc.) and new user specific mass media. Within the unified system, parallel processing computer systems, each having an input (e.g., 77) controlling a plurality of computers (e.g., 205), generate and output user information at receiver stations. Under broadcast control, local computers (73, 205), combine user information selectively into prior art communications to exhibit personalized mass media programming at video monitors (202), speakers (263), printers (221), etc. At intermediate transmission stations (e.g., cable television stations), signals in network broadcasts and from local inputs (74, 77, 97, 98) cause control processors (71) and computers (73) to selectively automate connection and operation of receivers (53), recorder/players (76), computers (73), generators (82), strippers (81), etc. At receiver stations, signals in received transmissions and from local inputs (225, 218, 22) cause control processors (200) and computers (205) to automate connection and operation of converters (201), tuners (215), decryptors (224), recorder/players (217), computers (205), furnaces (206), etc. Processors (71, 200) meter and monitor availability and usage of programming.
Estimating demographic compositions of television audiences from audience similarities
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for estimating demographic compositions of television audiences from audience similarities. In an aspect, pairwise cosine similarities of segment of viewers of rated and unrated television programs are determined, demographic information of rated programs is attributed to the unrated programs from the cosine similarity measures and demographic information for the rated programs.
Method and apparatus for reproducing audio and/or video data for use in at least one checkout environment
The invention involves a procedure and a system for reproducing or alternatively creating audio and/or video data in a location (12, 14, 16) in which sales are made, such as a restaurant or a business, which includes at least one data source (28) for audio and/or video data; at least one replay station (20); one control system (10), which is connected to the storage device and the replay station; at least one pay station (18), which is connected with the control system; at least one storage unit (30, 32); which control system creates correlation data sets from the data previously stored and contains a time correlation between the data that have been played. Or, alternatively between the applications and programs that created them and the pay station sales, and the control system takes account of these correlation data sets in replaying the data or in selecting the programs or applications.
System and method of message notification and access via a video distribution network
A method includes receiving video content via an access network of a video distribution network at a set-top box device associated with a subscriber. One or more communication devices are associated with the subscriber. The method includes sending the video content to a display device coupled to the set-top box device. The method includes receiving a notification of a message directed to a particular communication device of the one or more communication devices at the set-top box via the access network. The method includes selecting a message indicator based on configuration settings associated with the subscriber. The method also includes sending the message indicator to the display device to overlay a portion of the video content.
Call stack sampling to obtain information for analyzing idle states in a data processing system
A computer implemented method, apparatus, and computer usable program code for sampling call stack information. Monitoring for an event is performed during an execution of a plurality of threads by a set of processors. A portion of the plurality of threads is identified based on a policy to form a set of identified threads in response to an occurrence of the event. Call stack information is collected for the set of identified threads using an under utilized processor in a set of processors in response to identifying the portion of the plurality of threads, wherein the call stack information is used to profile a processor in the set of processors.
Synchronization of communication connection state with communication user interface
A method, system, computer system and computer program product determine that a communication connection has switched between an active state and an inactive state and cause a user interface for communicating via the connection to be updated asynchronously to correspond to the current state. For example, the user interface can indicate that the connection is active or inactive and allow or disallow initiation of communication via the connection accordingly. For example, consider a call center agent using a computer system as the user interface to the telephone channel, but the user does not click a “hang up” button when the caller hangs up the telephone. The disconnection of the telephone is determined and the user interface is asynchronously updated, thereby allowing the agent to make another call. In one embodiment, a communication server determines the change in state and causes a web browser user interface to be updated asynchronously.
Inter-application communication on mobile platforms
Applications executing in a mobile device utilize a protocol for inter-application communication to overcome restrictions of a sandboxed environment. Applications advertise their exposed capabilities using structured definition files, which are consumed by other applications. Applications can invoke the advertised capabilities by exchanging inter-application communication (IAC) messages in the form of URLs or other platform-specific mechanisms. URL messages are formatted according to parameters and URL schemes specified by the provided definition files.
Automated cloud workload management in a map-reduce environment
A computing device associated with a cloud computing environment identifies a first worker cloud computing device from a group of worker cloud computing devices with available resources sufficient to meet required resources for a highest-priority task associated with a computing job including a group of prioritized tasks. A determination is made as to whether an ownership conflict would result from an assignment of the highest-priority task to the first worker cloud computing device based upon ownership information associated with the computing job and ownership information associated with at least one other task assigned to the first worker cloud computing device. The highest-priority task is assigned to the first worker cloud computing device in response to determining that the ownership conflict would not result from the assignment of the highest-priority task to the first worker cloud computing device.
Utilization of special purpose accelerators using general purpose processors
A novel and useful system and method of improving the utilization of a special purpose accelerator in a system incorporating a general purpose processor. In some embodiments, the current queue status of the special purpose accelerator is periodically monitored using a background monitoring process/thread and the current queue status is stored in a shared memory. A shim redirection layer added a priori to a library function task determines at runtime and in user space whether to execute the library function task on the special purpose accelerator or the general purpose processor. At runtime, using the shim redirection layer and based on the current queue status, it is determined whether to execute the library function task on the special purpose accelerator or on the general purpose processor.
Scheduling of threads by batch scheduling
In accordance with the disclosed subject matter there is provided a method for segregating threads running in a computer system, and executing the threads according to this categorization.
Parallel execution of batch data based on modeled batch processing workflow and contention context information
Systems, methods and machine-readable mediums for batch process straight through modeling are provided. The systems may include a storage device and a processor. The storage device may store at least one batch process model. The processor may be programmed to display a graphical user interface for graphically defining the batch process model with at least one flowchart, and receive a selection of at least one activity step for inclusion in the at least one flowchart, each activity step corresponding to a predefined execution logic. The processor may be also programmed to determine the batch process model from the at least one activity step selected, and display the at least one activity step in the at least one flowchart.
Automating sequential cross-application data transfer operations
Illustrative embodiments disclose performing a task between software components. A computer executed process identifies a first region of a source software component as a source location for the task. The computer also identifies a second region of a target software component as a target location for the task. The computer responsively identifies a set of data in the source location. The computer determines a set of actions to perform the task between the source and the target software components. The set of actions to perform the task includes at least a first action to select a portion of the set of data in the source location, a second action to perform on the selected portion of the set of data that generates new data, and a third action using the new data in the target location. The computer performs the set of actions for the task.
Image forming apparatus, storage medium, and program system determination
An image forming apparatus includes a memory configured to store programs installed in the image forming apparatus and having plural states; a condition storing unit configured to store at least one condition defining a set of states of one or more of the programs; a state obtaining unit configured to obtain state information indicating current states of the programs; and a condition examination unit configured to examine the condition based on the obtained state information to determine whether the condition is satisfied and to output a result of the determination.
Network communications over shared links in a virtualized environment
A method of data processing includes a physical host executing a virtual machine monitor (VMM) that instantiates a plurality of virtual machines (VMs). The VMM supports processing of a virtual link manager (VLM) that deploys and configures a plurality of Layer 2 virtual links sharing bandwidth of a Layer 2 physical link between the physical host and an access switch. The VMM communicates parameters of the plurality of virtual links with the access switch.
Virtual computer management method and virtual computer management system
It is an object of the present invention to provide a technique that can comprehensively manage plural kinds of network addresses allocated to virtual computers. In various embodiments, a MAC address, an IP address, and virtual communication interface identification information are allocated anew to a virtual computer to be created anew and the MAC address, the IP address, and the virtual communication interface identification information are set to be unable to be allocated anew.
Virtual appliance deployment
A method, article of manufacture, and apparatus for efficiently processing information. In some embodiments, this includes determining a physical appliance to virtualize, creating a virtual appliance based on the physical appliance,and storing the virtual appliance in a storage array. In some emdodiments, creating the virtual appliance includes creating the virtual appliance from a template.
Accessing vendor-specific drivers for configuring and accessing a self-virtualizing input/output device
A vendor independent interface is provided between a hypervisor and an adjunct partition associated with a self-virtualizing IO resource to effectively abstract away vendor-specific interface details for the self-virtualizing IO resource and its adjunct partition. By doing so, vendor-specific implementation details may be isolated from the configuration and management functionality in a hypervisor, thus minimizing the changes to vendor specific firmware in order to manage new or revised self-virtualizing IO resources.
Protection of virtual machines executing on a host device
Technology is described for protection of virtual machines executing on a host device having host processors and host memory. The system can include a hypervisor configured to enable the virtual machines to execute concurrently on the host device. An emancipated partition can be provided with a communication channel to the hypervisor. A primary partition can be configured to interface with the emancipated partition through the communication channel via the hypervisor. In addition, an emancipated memory space and virtual register state for the emancipated partition can be protected from direct access by the primary partition.
Method and apparatus for tamper resistant communication in a virtualization enabled platform
A method to communicate information between components in a virtualization enabled platform. In one embodiment, a component exchanges data via a communication page which only integrity protected components can access. In another embodiment, an integrity protected communication broker exchanges data from a communication page of one component to another communication page of another component.
System and method for automatically updating the software of a networked personal audiovisual device
A method for automatically updating software executed by an electronic device is disclosed herein. The method includes receiving, at the electronic device, an update indication from a server that updated software is available for the electronic device. The method further includes modifying, in response to the update indication, a boot state of the electronic device and initiating operation of the electronic device in an update mode. The updated software is received, at the electronic device, during operation in the update mode. The method further includes initiating, upon determining the updated software has been correctly received, operation of the electronic device in a normal mode.
Selecting updates for deployment to a programmable execution service application
A test environment is created for use in selecting updates for deployment to a programmable execution service (“PES”) application. The test environment is created in one embodiment by replicating a production network and one or more production virtual machine instances executing the PES application. Once the test environment has been created, the test environment is utilized to test and select updates for deployment to the PES application. The updates may be selected by deploying the updates to the test environment and using the test environment to determine whether the deployed updates are compatible with the PES application, permit the PES application to continue to operate performantly, and/or permit the PES application to meet one or more business performance metrics. Once the updates have been selected, the updates may be applied to production virtual machine instances executing the PES application.
Efficiently solving the “use-def” problem involving label variables
A method for efficiently solving the “use-def” problem involving label variables performs a data-flow analysis on a control flow graph that includes calculating an inset for each node as follows: if a predecessor node directly branches to the node, the method includes an outset of the predecessor node in the inset of the node; if a predecessor node indirectly branches to the node via a label variable and the node is in definitions of the label variable in the outset of the predecessor node, the method includes the outset of the predecessor node in the inset of the node; if a predecessor node indirectly branches to the node via a label variable and the node is not in definitions of the label variable in the outset of the predecessor node, the method does not include the outset of the predecessor node in the inset of the node.
Compiler optimization based on collectivity analysis
An embodiment is directed to determining, by a compiler, that a call to a named barrier is matched across all of a plurality of threads, and based at least in part on determining that the call to the named barrier is matched across all of the plurality of threads, replacing, by the compiler, the named barrier with an unnamed barrier.
String cache file for optimizing memory usage in a java virtual machine
A method, system and computer program product for optimizing memory usage associated with duplicate string objects in a Java virtual machine. The method comprises scanning a heap of the Java virtual machine at the end of the start-up process of the virtual machine to identify duplicate strings associated with the virtual machine, storing the identified strings in a string cache file, and determining whether a new string that needs to be created during start-up already exists in the string cache file. The duplicate strings are added to an interned strings table. A reference to a duplicate string is returned if a string to be created is already in the string cache file.
Evaluating and enforcing software design quality
Evaluation and enforcement of software design quality, in which a system applies design quality rules to a design of a software application to detect violations and provides output describing one or more violations of the design quality rules detected. Based on the output, the system receives user input to address the one or more violations of the design quality rules and, subsequent to receiving the user input, evaluates code developed for the software application for violations of the design quality rules to assess quality of the code being developed for the software application based on the design of the software application.
Debugging extensible markup language
Disclosed is a method and system for debugging XML files or documents by inserting a breakpoint into an XML file and converting the XML file into a bytecode format, where the breakpoint is propagated into the bytecode format and stored in runtime libraries. During runtime, on encountering the breakpoint, the location of the breakpoint is internally determined in the bytecode and points to the location of the breakpoint in the XML file.
Time-based breakpoints in debuggers
A time-based breakpoint facility is provided for debugging a program upon expiration of a timer. More particularly, encountering a break exception during an execution of a program results in determining if the break exception is raised by a trigger or by a breakpoint. If the break exception is raised by the trigger, steps include breaking the program execution, starting a timer and resuming the program execution without passing control to a user interface thread until the started timer expires. If the break exception is raised by the breakpoint, steps include breaking the program execution, passing control to the user interface thread, performing a debugging operation, and resuming the program execution upon indication of the user interface thread.
Code coverage-based taint perimeter detection
A code coverage-based taint perimeter detection system and method for testing software code by determining code coverage and detecting new coverage of the code. Embodiments of the system and method perform tainted data flow analysis on execution traces of the code to determine tainted branch targets. The tainted branch targets may be filtered to remove any tainted branch targets that have already been covered. New coverage can be determined by monitoring the filtered tainted branch targets, which in some embodiments involves the use of software breakpoints that are automatically placed at the locations in the tainted branch targets at runtime. Embodiments of the system and method use an iterative process to ensure that only tainted branch targets that have not already been covered or tested are examined.
Capturing test data associated with error conditions in software item testing
In a method of testing a software item, an automated test of a software item is conducted. In response to occurrence of an error condition during the test, test data associated with the error condition is captured. A portion of the captured test data is forwarded to a designated electronic notification location.
Programmable controller system and development system
To make it possible to perform efficient program development, a development system includes a label managing unit configured to update, when an execution program D2 is regenerated, a label information table D3, which corresponds to the execution program D2, for generating execution screen data D5 and executes or does not execute, according to update content of the label information table D3, update of ID information associated with the label information table D3 and the regenerated execution program D2 and a drawing apparatus configured to associate, when execution screen data D5 is generated based on the label information table D3, ID information of a value same as the ID information, which is associated with the label information table D3 at a point when the execution screen data D5 is generated, with the generated execution screen data D5.
Automated build process and root-cause analysis
A method, executed by a processor, for automatically integrating tracks into a software build receives a track to be integrated and determines if all tracks dependent upon the received track have been integrated into the software build. If all tracks dependent upon the received tracks are determined to have been integrated, the method automatically creates build scripts according the received track. If not all tracks dependent upon the received tracks are determined to have been integrated, the method notifies owners of the received track and any unintegrated dependent tracks. The method automatically starts build processes according to the build scripts. If all the build processes are successful, the method marks the received track and all the dependent tracks as good and ready for a product build.
Method for generating a transport track through a software system landscape and computer system with a software system landscape and a transport track
A method for generating a transport track for routing transport requests through a software system landscape comprising a central control system and a plurality of logical systems interconnected by logical transport paths, a transport request defining a software service to at least one of the code and the data of a system in the landscape, is described. The method includes selecting a group of systems for a software service project according to a project definition; analyzing in the central system the transport paths between the systems of the group for finding a suitable route through all systems of the group; and generating in the central system a transport track according to the analysis, the transport track defining a route for transport requests through all systems of the group in a particular order, the transport track specifying one source system in which software services are permitted, pairs of adjacent interconnected systems, and at least one target system.
Method and apparatus for derived layers visualization and debugging
A computer-implemented method, system and computer program product for visualizing derived layer shapes of an integrated circuit design are disclosed. The computer-implemented method, system and computer program product include visualizing the derived layer shapes on a layout canvas; providing a step by step process for visualizing each derived layer shape as each derived layer shape is generated; and providing a hierarchy of intermediate derived layers based upon the step by step process.
Dielectric reliability assessment for advanced semiconductors
Embodiments relate to methods, computer systems and computer program products for performing a dielectric reliability assessment for an advanced semiconductor. Embodiments include receiving data associated with a test of a macro of the advanced semiconductor to a point of dielectric breakdown. Embodiments also include scaling the data for the macro down to a reference area and extracting a parameter for a Weibull distribution from the scaled down data for the reference area. Embodiments further include deriving a cluster factor (α) from the scaled down data for the reference area and projecting a failure rate for a larger area of the advanced semiconductor based on the extracted parameter, the cluster factor and the recorded data associated with the dielectric breakdown of the macro.
Semiconductor integrated circuit and pattern layouting method for the same
A semiconductor integrated circuit and a pattern lay-outing method for the same are disclosed, which can suppress bending or partial drop-out of a dummy pattern even when a mechanical stress acts on the dummy pattern in CMP. The semiconductor integrated circuit includes predetermined functional areas and a dummy pattern formed in a space area. The space area is positioned between predetermined functional areas. The dummy pattern includes a first metal portion formed in the shape of a frame and defining an outer edge of the dummy pattern, a second metal portion positioned on an inner periphery side of the first metal portion and formed so as to be continuous with the first metal portion, and a plurality of non-forming areas positioned in an area where the second metal portion is not formed on the inner periphery side of the first metal portion.
Method of global design closure at top level and driving of downstream implementation flow
System-on-chip (SoC) designs include large amounts of interconnected intellectual property blocks and standard-cell logic using complex bus fabrics. Today SoC design-closure that validates design targets of area, timing, congestion and power constraints is accomplished post routing as over 80% of validation problems are due to global-interconnect. A method is disclosed that allows the designers to achieve global design-closure and physical topology constraints, early in the design cycle, at much higher levels of abstraction. In particular, logic hierarchy of the design is converted into a physical hierarchy of functional-related clusters of locally-connected logic. The clusters and inter-cluster global connections can be refined to meet design constraints in order to generate a top-level floor-plan in the form of library and constraint files. Using the results of this top-down global design-closure method the designers can use the generated floor-plan to guide downstream tools to achieve predictable and correlatable design implementation.
Reducing runtime and memory requirements of static timing analysis
Systems and methods for performing static timing analysis during IC design. A method is provided that includes obtaining canonical input data. The method further includes calculating at least one input condition identifier based on the canonical input data. The method further includes comparing the at least one input condition identifier to a table of values. The method further includes that when a match exists between the at least one input condition identifier and at least one value within the table of values, retrieving previously calculated timing data associated with the at least one value, and applying the previously calculated timing data in a timing model for a design under timing analysis.
Power state transition verification for electronic design
Various implementations of the invention may be applied to generate an auxiliary verification statement. The auxiliary verification statement defines properties that check if the power domains are active at appropriate times is generated. Particularly, the auxiliary verification statement checks to ensure that power domain transitions do not interfere with the operation of the device design. With various implementations of the invention, an auxiliary verification statement may be generated by first determining a set of properties instantiated in a verification statement and then synthesizing the auxiliary verification statement based upon the determined properties, the corresponding device design and the power domains. In some implementations, the auxiliary verification statement instantiates properties that check if the power domains related to the properties in the verification statement are active when the verifications statement is exercised. In various implementations, this is accomplished by substituting select ones of the properties in the verification statement with select properties corresponding to the power domain.
Specifying circuit level connectivity during circuit design synthesis
Exemplary embodiments include a method for modifying a circuit synthesis flow having automated instructions, the method including receiving circuit design input for a circuit design, receiving custom specifications to the circuit design input, synthesizing high level logic from the circuit design input, placing logic on the circuit design, refining the circuit design and generating a circuit description from the circuit design.
Determining overall optimal yield point for a semiconductor wafer
A computer determines a component optimal yield point for each component of the plurality of components, where the component optimal yield point represents the process parameter values where maximum yield is achieved for a component. The computer determines a weight factor for each component of the plurality of components, where the weight factor represents an importance of a component to the semiconductor device. The computer then determines an overall optimal yield point based on the component yield point and weight factor determined for each component of the plurality of components, the overall optimal yield point representing the process parameter values where maximum yield is achieved for the semiconductor device.
Pattern designing method, pattern designing program and pattern designing apparatus
A pattern designing method, including the steps of carrying out transfer simulation calculation and step simulation calculation by using physical layout data produced from circuit design data, and comparing a result of the transfer simulation calculation and the step simulation calculation with a preset standard; and carrying out calculation for electrical characteristics by using parameters obtained from the physical layout when as a result of the comparison, the preset standard is fulfilled, and carrying out calculation for the electrical characteristics by reflecting the result of the transfer simulation calculation and the step simulation calculation in the parameters when as the result of the comparison, the preset standard is not fulfilled, thereby extracting the parameters.
Pointer tool for touch screens
Pointing tools for use in connection with touch screen displays are described. The pointing tools are provided with a visually offset pointer tip that can be rotated easily by user manipulation provided to the computing device through an interface. The pointing tools may include one or more buttons. The button(s) may be visually connected with the pointing tool on the display screen and/or logically associated therewith. The pointing tools described provide for accurate and precise inputs, and are useful in many applications, such as those where fine positioning and input within a touch screen environment is desirable.
Methods and system for modifying parameters of three dimensional objects subject to physics simulation and assembly
A set of atomic three dimensional objects that can be joined together in a workspace to form one or more complex three dimensional objects, each atomic object includes one or more object join features parameterized to enable joining with one or more parameterized join features of another atomic object in the set of objects, and a shape that may be modified according to one or more parametrically defined constraint attributes. A user may reshape and or resize one or more of the atomic three dimensional objects prior to joining the three dimensional objects together at the appropriate parameterized join features to form one or more of the complex three dimensional objects.
Mobile terminal and data extracting method in a mobile terminal
A mobile terminal and data extracting method therein are disclosed, by which specific data meeting a specific condition can be selected and extracted conveniently and quickly in the course of displaying a data list constructed with a plurality of data. The present invention includes receiving an input of a touch action for selecting specific data and a classification condition corresponding to the specific data using a displayed data list upon receiving the input of the touch action, selecting at least one data including the specific data as the data including the classification condition from a plurality of data, receiving an input of an extraction command signal for extracting the selected at least one data, and extracting the selected at least one data upon receiving the input of the extraction command signal.
Apparatus and method for displaying image in portable terminal
Provided are an apparatus and method for displaying an image in a portable terminal. The apparatus includes a display unit for displaying an image; a display buffer that stores the image to be displayed; a zoom buffer that temporarily stores an enlarged thumbnail to provide a better image quality; a memory that stores an original image of the thumbnail as a compressed image file; an interface unit that upon receiving an image enlargement request while the thumbnail is being displayed on the display unit, enlarges and stores the thumbnail, stored in the display buffer, in the zoom buffer, and sends an image quality improvement request to a decoder that continuously improves the image quality of the enlarged thumbnail stored in the zoom buffer by a predetermined amount.
Method and system for visually indicating a replay status of media items on a media device
A computer-implemented method and system are provided for visually indicating a replay status of media items on a media device. Aspects of the method and system include displaying in a graphical user interface (GUI) of the media device a representation of a first media item; displaying a profile score of the first media item that is based on user preferences; and displaying a replay score for the first media item that affects replay of the first media item.
Systems and methods for transitioning between user interface environments
A computer-implemented method for transitioning between user interface environments. The method may include determining that a user is interacting with a first user interface environment of a computing system and identifying a trigger associated with switching from the first user interface environment of the computing system to a second user interface environment of the computing system. The method may also include, in response to the trigger, swiveling into the second user interface environment by presenting the second user interface environment to a user in a manner that enables the user to interact with the second user interface environment. Various other methods, systems, and computer-readable media are also disclosed herein.
Information processing device, table, display control method, program, portable terminal, and information processing system
An information processing device includes a touch panel that detects a first user input, a communication unit that communicates with a portable terminal which detects a second user input, a data obtaining unit that obtains content data including an operable object, a display output unit that outputs a content image which displays the object, and a control unit that controls an operation of the object displayed in the content image, wherein the control unit executes a first operation of the object if the first user input is detected by the touch panel, and executes a second operation of the object if the second user input is received from the portable terminal by the communication unit.
Data visualizations including interactive time line representations
Interactive data visualization features are provided, including an interactive graphical data representation, but the embodiments are not so limited. An exemplary computer-implemented method provides an interactive data visualization interface that includes a graphical time line representation and a number of visual change indicators used in part to provide symbolic cues and highlight changes made to adjustable aspects of the graphical time line representation. An exemplary computing architecture includes at least one client and server including a data communication interface used in part to provide visualization data to display an interactive time line representation as part of providing an interactive data visualization tool. Other embodiments are included and available.
Method and system for providing visual instructions to warehouse operators
A method in a warehouse management system for providing instructions to a user, comprising: receiving a table in a database of the warehouse management system, the table defining the instructions, one or more of the columns of the table containing data and image references pertaining to respective warehouse storage items associated with the instructions; adding an expression column to the table, the expression column for defining a combination of the data and image references pertaining to the respective warehouse storage items in accordance with the instructions; adding markup language code to the expression column for customizing a graphical presentation of the combination; generating the graphical presentation of the combination from the markup language code; and, displaying the graphical presentation on a display screen of the warehouse management system, thereby providing the instructions to the user in a graphical format.
Electronic apparatus, program, and control method
An electronic apparatus includes a display unit, a sensor, and a controller. The display unit includes a screen. The sensor is configured to detect a user operation with respect to the screen and output a signal corresponding to the user operation. The controller is configured to cause a data icon to be displayed on the screen, judge a drag operation with respect to the data icon based on the signal from the sensor, judge, based on the signal from the sensor, a user operation different from the drag operation for one of copying and moving data related to the data icon based on the drag operation, and execute processing for one of copying and moving the data according to the user operation.
Secure HTML components for building client-side user interface
A method performed by a server device includes receiving a request from a client, the request including data to identify a component of a graphical user interface (GUI) application; and determining that an updated version of the component is available. The method also includes retrieving, from a memory associated with the server device, the updated version of the component and providing the updated version of the component to the client.
Generating a visual user interface
An interface engine is configured to generate a user interface on a display coupled to an electronic device. The interface engine is configured to display characters, in the user interface, that may input into the electronic device. The interface engine is configured to generate the user interface to include character sections. The interface engine is configured to associate a sub-set of the characters with each character sections. The sub-set of characters included in each character section can be based on the frequency that the characters are used and/or the patterns in which the characters are used. Additionally, the sub-set of characters associated with each character section can be selected by the user.
Device, method, and graphical user interface for navigation of multiple applications
A method a multifunction device with a touch-sensitive display includes: detecting a first user input on a first application icon on the display; in response to detecting the first user input: activating and displaying a first application associated with the first application icon in a first region of the display and displaying a partial view of a second application in a second region of the display without activating the second application; detecting a second user input on the partial view of the second application on the display; in response to detecting the second user input: suspending the first application and activating a full view of the second application on the display; detecting a third user input to deactivate the second application; and, in response to detecting the third user input: deactivating the second application and resuming the first application on the display.
Techniques for providing a shared clipboard to participants in a conversation are provided. The shared clipboard is specific to the conversation to which it is associated in that the shared clipboard does not “spill over” from one conversation to another. When a conversation between two or more participants is established, a shared clipboard becomes available to the participants of the conversation. The shared clipboard facilitates the sharing of data between the participants in the conversation. During the conversation, each participant in the conversation is provided access to the shared clipboard, including its contents. When a participant joins or is added to the conversation, the added participant is also provided access to the shared clipboard and its contents.
Users as actors in content
A method may include receiving a plurality of images of a face of a user, wherein each image of the face of the user is associated with one of a plurality of different expressions. The method may also include receiving a first video, wherein the first video comprises images of an actor including images of a face of the actor, wherein each image of the face of the actor is associated with one of the plurality of different expressions. Further, the method may include replacing the images of the face of the actor with corresponding images of the face of the user in a same expression to create a second video and transmitting the second video to the user.
A central computer server keeps a record of a set of display parameters related to particular web pages visited by a web browser, and sends this information to the browser for displaying a particular web page according to the received information from the server.
System, method, and computer program for generating a graphical representation of at least a portion of a synchronized network model
A system, method, and computer program product are provided for generating a graphical representation of at least a portion of a synchronized network model. In use, a network model of a network is identified. Additionally, an inventory model of the network is identified. Further, the network model and the inventory model are synchronized to identify differences between the network model and the inventory model. Moreover, a graphical representation of a variant model associated with the network is generated, utilizing the differences between the network model and the inventory model, where the variant model includes the network model with the differences between the network model and the inventory model.
Management of rotating browser content
A rotating content history controller detects a web page from a server over a network, wherein the web page comprises at least a portion of the web page specified for displaying a plurality of pages of rotating content within at least one rotating content space within the web page. The rotating content history controller stores the plurality of pages of rotating content. The rotating content history controller updates a history display interface to comprise a separate selectable option for each of the plurality of pages of rotating content. In addition, responsive to a user selection of a particular one of the separate selectable options, the rotating content history controller displays the particular page of rotating content within a web page display interface, such that a user may selectively access the rotating content independent of a web page display of the rotating content.
User interface to define and/or communicate space between objects
Briefly, in accordance with one embodiment of the invention, an object may be utilized to define, communicate, and/or control a spatial relationship between at least two other objects. Such an object may be somewhat analogous to a spring in that a minimum margin between the two other objects may be defined to allow the two other objects to approach one another until the minimum margin is reached, and a flexible margin may allow movement of the two other objects within the flexible margin relative to each other, optionally up to a maximum distance of separation.
Systems and methods for website optimization
Webpages are optimizing through the use of experiments that compare the responses of viewers that are either presented with the original webpage or a variant thereof. One or more variants are first defined through the use of a browser-based editor application that initially examines the webpage for a snippet of code. The snippet can be added to the webpage, if missing, and the webpage returned to the editor application. Changes made to the webpage to define a variant are saved in variation code. When the webpage is later requested by multiple viewers, in each instance the viewer receives the webpage with the snippet, the snippet instructs the browser to download a file, and the instructions of the file determine whether the viewer will see the variant or the original webpage. Tracking viewer responses to the webpage and the variant allow a statistical basis for comparison to be developed.
System and method to capture and manage input values for automatic form fill
A system for automatically completing fields in online forms, such as login forms and new user registration forms, which employs a Master Cookie File containing sets of records associated with the user, his or her accounts or web sites, and registered values associated with form tags (e.g. username, password, address, email, telephone, etc.). When the user encounters another form, the MCF is automatically searched for matching values and form tags, primarily from the same account or web site, or alternatively from other accounts or sites. A flowing pop-up menu is displayed nearby the form fields from which the user can select values to automatically complete the form. Automatic account information updating, value expiration management, mapping of favorite values, and sharing of values are optional, enhanced functions of the invention.
Determining an aspect value, such as for estimating a characteristic of online entity
Among other disclosed subject matter, a computer-implemented method for determining an aspect value includes identifying a first entity associated with a first aspect that has a first value. The method includes identifying a second entity as connected to the first entity. The method includes determining a second value for a second aspect of the second entity. The method includes determining, for a third entity, a third value for the first aspect, the third value determined using at least the determined second value. Implementations can be used to evaluate truthfulness of self-reported information from members of online communities, to name one example.
Secure error detection and synchronous data tagging for high-speed data transfer
Embodiments of the present invention provide a system for secure error detection and synchronous data tagging for high-speed data transfer (e.g., utilizing a set of SSD memory disk units). Specifically, in a typical embodiment, the system comprises a SSD memory disk unit in communication with a device driver. A first encoded communication stream will be generated with the device driver and sent via PCI-based channel (e.g., full duplex) to the SSD memory disk unit. The stream is received, synchronized, and decoded on the SSD memory disk unit. In turn, the SSD memory disk unit can generate and send a second encoded communication steam to the device driver.
Methods of performing error detection/correction in nonvolatile memory devices
Methods of operating nonvolatile memory devices include testing strings of nonvolatile memory cells in the memory device to identify at least one weak string therein having a higher probability of yielding erroneous read data error relative to other strings. An identity of the at least one weak string may be stored as weak column information, which may be used to facilitate error detection and correction operations. In particular, an error correction operation may be performed on bits of data read from the strings using an algorithm that modifies a weighting of the reliability of one or more data bits in the bits of data based on the weak column information. More specifically, an algorithm may be used that interprets a bit of data read from the at least one weak string as having a relatively reduced reliability relative to other ones of the data bits.
Methods and apparatuses for saving power during transport block decoding in UMTS systems
The present disclosure describes methods and apparatuses for improved transport block decoding in devices capable of wireless communication, which may include user equipment and network entities. For example, the present disclosure presents methods and apparatuses for decoding a code block from a plurality of code blocks corresponding to a transport block, obtaining a reliability indicator that identifies a reliability of the decoding of the code block, comparing the reliability indicator to a reliability threshold, and determining whether to decode a subsequent code block from the plurality of code blocks based on the comparing. Furthermore, these methods and apparatuses may include determining not to decode at least one subsequent code block of the transport block where the comparing indicates that the reliability indicator is less than the reliability threshold. As such, device power is not unnecessarily consumed by decoding likely superfluous code blocks.
Application layer FEC framework for WiGig
A method and apparatus perform forward error correction in a wireless communication device in a wireless communication network. Application layer forward error correction (AL-FEC) capability information is transmitted during a capabilities exchange. A set of source packets are reshaped to k equal-sized source symbols. Systematic packets for the source symbols and at least one parity packet is encoded using a single parity check (SPC) AL-FEC code on the k source symbols. A header of each encoded packet includes a parity packet indicator. The encoded packets are processed in a media access control (MAC) layer and a physical (PHY) layer for transmission.
Access control apparatus, storage apparatus, and method
An access control apparatus for controlling an access to a storage device, the access control apparatus includes a measuring unit configured to measure the time to erase data stored in the storage device, and a determination unit configured to determine a data size of an error correcting code added to data stored in the storage device in accordance with the time measured by the measuring unit. The access control apparatus includes a generation unit configured to generate the error correcting code having the data size determined by the determination unit, and an access controller configured to write the data and the error correcting code generated by the generation unit into the storage device.
Error correction apparatus and error correction method
A plurality of error correction circuits connected in series include a calculator circuit that corrects the codeword when the determination results of a determination circuit indicate that the error correction circuit at the present stage is to correct the codeword, and a determination circuit at a subsequent error correction apparatus determines whether the error correction circuit at the subsequent stage is to correct the codeword when the determination results of the determination circuit indicate that the error correction circuit at the present stage is not to correct the codeword.
Encoding and decoding techniques using low-density parity check codes
Some embodiments include apparatus and methods for encoding message information. Such apparatus and methods can include using a parity check matrix of a low-density parity check (LDPC) code to generate a first matrix having an upper triangular sub-matrix. Parity information to encode the message information can be generated based on the first matrix if a total number of rows of the upper triangular sub-matrix is equal to the rank of the parity check matrix. If the total number of rows of the upper triangular sub-matrix is less than the rank of the parity check matrix, then a triangularization operation can be performed on a second sub-matrix of the first matrix to generate a second matrix. Parity information to encode the message information can be generated based on the second matrix. Other embodiments including additional apparatus and methods are described.
Communication system and method for transmitting or receiving packets therein
A communication system and a method for transmitting or receiving packets are provided. The method includes transmitting the packet from a transmitting Radio Link Control (RLC) entity to a receiving node via a transmitting Medium Access Control (MAC) entity, transmitting an Hybrid Automatic ReQuest (HARQ) failure signal from the transmitting MAC entity to the transmitting RLC entity if the transmitting MAC entity receives a HARQ Negative ACKnowledgment (NACK) signal from the receiving node, and re-transmitting the packet from the transmitting RLC entity to the receiving node via the transmitting MAC entity if the transmitting RLC entity receives the HARQ failure signal.
System and method for scan chain re-ordering
A system for re-ordering a scan chain of an electronic circuit design using an electronic design automation (EDA) tool includes a processor and a memory in communication with the processor. The scan chain includes a plurality of scan cells. All connections of the scan chain are disconnected. An output port of a first scan cell is connected to input ports of other scan cells to form a first set of scan cell combinations. A first scan cell combination is selected from the first set of scan cell combinations based on weighted averages of ordering parameters of each of the first set of scan cell combinations. The process is repeated to re-order the scan chain.
Core circuit test architecture
A scan test architecture facilitates low power testing of semiconductor circuits by selectively dividing the serial scan paths into shorter sections. Multiplexers between the sections control connecting the sections into longer or shorted paths. Select and enable signals control the operation of the scan path sections. The output of each scan path passes through a multiplexer to compare circuits on the semiconductor substrate. The compare circuits also receive expected data and mask data. The compare circuits provide a fail flag output from the semiconductor substrate.
Read only memory (ROM) with redundancy
A read only memory (ROM) with redundancy and methods of use are provided. The ROM with redundancy includes a programmable array coupled to a repair circuit having one or more redundant repairs. The one or more redundant repairs include a word address match logic block, a data I/O address, and a tri-state buffer. The word address match logic block is provided to the tri-state buffer as a control input and the data I/O address is provided to the tri-state buffer as an input. An output of the tri-state buffer of each redundant repair is provided as a first input to one or more logic devices. One or more data outputs of a ROM bit cell array is provided as a second input to a respective one of the one or more logic devices.
Advance clocking scheme for ECC in storage
A system for clocking a decoder is disclosed. The system includes: a channel front end configured to receive input data, a first clock configured to provide a first clock signal as input to the channel front end, a decoder configured to receive intermediate data associated with the output of the channel front end, and a second clock configured to provide a second clock signal as input to the decoder. In some embodiments, the second clock signal is not derived from the first clock signal.
Dynamically allocating multitier applications based upon application requirements and performance reliability of resources
The present disclosure relates to dynamically allocating multitier applications based upon performance and reliability of resources. A controller analyzes resources and applications hosted by the resources, and collects operational data relating to the applications and resources. The controller is configured to determine an allocation scheme for allocating or reallocating the applications upon failure of a resource and/or upon rollout or distribution of a new application. The controller generates configuration data that describes steps for implementing the allocation scheme. The resources are monitored, in some embodiments, by monitoring devices. The monitoring devices collect and report the operational information and generate alarms if resources fail.
Computer system and detecting-alarming method thereof
A computer system and a detecting-alarming method thereof are provided. The computer system includes a device and a basic input/output system (BIOS) unit. The BIOS unit has a current device table. The BIOS unit detects the device of the computer system to obtain a detecting result in a start procedure, and compares the detecting result with the current device table. If the detecting result does not match the current device table, the BIOS unit gives an alarm.
System and method for root cause analysis
Systems and methods for determining the root cause of an event in a data center are presented. The system includes a data center management device coupled to a network and configured to receive an indication of the event from a physical infrastructure device via the network, determine a first generic cause model for the event by accessing an event cause model data store, determine a first event profile by adapting the first generic cause model to the data center using data center profile information stored in a data center profile data store and display a first probability that a potential cause defined by the first event profile is the root cause.
Cloud-based test execution
In some implementations, a testing service receives a test execution request for executing test operations on a test target. The testing service may map the test execution request to a particular type of supported test framework from among a plurality of types of supported test frameworks. The testing service may obtain a test package provided by a user that requested the testing, such as from a cloud storage location. The testing service determines a computing capacity for executing the testing and appropriates a plurality of workers in a cloud computing service. The testing service configures the plurality of workers for executing the test operations based on at least one of the test framework, the test execution request or the test package. The testing service provides test execution chunks from the test package to the plurality of workers for executing the testing on the test target.
Method and system for providing high availability to distributed computer applications
Method, system, apparatus and/or computer program for achieving transparent integration of high-availability services for distributed application programs. Loss-less migration of sub-programs from their respective primary nodes to backup nodes is performed transparently to a client which is connected to the primary node. Migration is performed by high-availability services which are configured for injecting registration codes, registering distributed applications, detecting execution failures, executing from backup nodes in response to failure, and other services. High-availability application services can be utilized by distributed applications having any desired number of sub-programs without the need of modifying or recompiling the application program and without the need of a custom loader. In one example embodiment, a transport driver is responsible for receiving messages, halting and flushing of messages, and for issuing messages directing sub-programs to continue after checkpointing.
Methods and structure for resuming background tasks in a clustered storage environment
Methods and structure for resuming background tasks in a storage environment. storage controller. The system is operable to receive host Input/Output (I/O) requests directed to a logical volume, and to couple with one or more of storage devices provisioning the logical volume. The system is further operable to process the host I/O requests directed to the logical volume, to initiate a background processing task distinct from the host I/O requests and related to the logical volume, and to store progress information on at least one of the one or more storage devices describing progress of the background processing task.
System and method for redundant object storage
Systems and methods for redundant object storage are disclosed. A method may include storing at least two copies of each of a plurality of objects among a plurality of nodes communicatively coupled to one another in order to provide redundancy of each of the plurality of objects in the event of a fault of one of the plurality of nodes. The method may also include monitoring access to each object to determine a frequency of access for each object. The method may additionally include redistributing one or more of the copies of the objects such that at least one particular node of the plurality of nodes includes copies of only objects accessed at a frequency below a predetermined frequency threshold based on the determined frequency of access for each object. The method may further include placing the at least one particular node in a reduced-power mode.
Automatic disk power-cycle
According to the presently disclosed subject matter there is provided, inter alia, a system and method which enable to identify, in a storage-system, malfunctioning disks, and in response, to activate a power-cycle process only for the specific failing disks, in order to bring these disks into proper operational mode. During the power-cycle process of a failing disk, other disks, which are not failing, remain operative and available.
Systems and methods for retiring and unretiring cache lines
The systems and methods described herein may provide a flush-retire instruction for retiring “bad” cache locations (e.g., locations associated with persistent errors) to prevent their allocation for any further accesses, and a flush-unretire instruction for unretiring cache locations previously retired. These instructions may be implemented as hardware instructions of a processor. They may be executable by processes executing in a hyper-privileged state, without the need to quiesce any other processes. The flush-retire instruction may atomically flush a cache line implicated by a detected cache error and set a lock bit to disable subsequent allocation of the corresponding cache location. The flush-unretire instruction may atomically flush an identified cache line (if valid) and clear the lock bit to re-enable subsequent allocation of the cache location. Various bits in the encodings of these instructions may identify the cache location to be retired or unretired in terms of the physical cache structure.
Method for determining transmission error due to a crosstalk between signal lines by comparing tuning pattern signals sent in parallel from a memory device with the tuning pattern signals pre-stored in a host device
A memory card includes a memory controller configured to perform control for sending and receiving a command signal, a response signal, a data signal, and a status signal in synchronization with a clock signal, and a memory-side pattern signal storage unit configured to store a tuning pattern signal to be sent to a host device. The tuning pattern signal is used by the host device to adjust the phase of the clock signal for use as a sampling clock signal. The memory card sends a first tuning pattern signal through a command line and a second tuning pattern signal through a data line concurrently.
Electronic device and method for detecting power statuses of electronic device
In a method for detecting power statuses of one or more power supplies in an electronic device. The method detects a power status of each power supply at a first time cycle when a baseboard management controller (BMC) of the electronic device is started up, and stores all the detected power statuses into the BMC. The method determines a change value of the power status of each power supply at a second time cycle by analyzing the detected power statuses of each power supply stored in the BMC, and stores the change value of the power status of each of the power supplies in the BMC.
USB self-idling techniques
USB self-idling techniques are described. In one or more embodiments, a Universal Serial Bus (USB) device comprises one or more modules to communicate via USB and self-idle by presenting an idle mode to a USB host and entering a suspend mode after the idle mode, the suspend mode being entered while the USB host is presented with the idle mode.
Systems and methods for reducing power consumption of a communication device
Generally, this disclosure describes an energy-efficient Ethernet communications approach. In at least one embodiment described herein, an Ethernet controller may be configured to operate in an active power state to transmit or receive data packets at a maximum available link speed. The maximum available link speed may be determined by a negotiation between the Ethernet controller and a link partner coupled to the Ethernet controller. Once the data packets are transmitted or received, the Ethernet controller may be configured to operate in an idle power state to reduce energy consumption.
Apparatus and method for shortening time for transitioning power mode of network communication device by utilizing a shared storage unit, a socket, and a socket wrapper
A network communication device includes a first control unit that has a first application, a second control unit that has a second application and a communication processing section, and a shared storage unit, wherein, in a first mode where the first control unit is in an operation state, the first application performs a predetermined process using the shared storage unit, and the communication processing section performs communication in response to an instruction from the first application, and wherein, if the first control unit transitions from the first mode to a second mode in which power consumption is lower than that in the first mode, the first application stops execution of the process, the second application performs a process based on data related to the first application, stored in the shared storage unit, and the communication processing section performs communication in response to an instruction from the second application.
Apparatus for transferring licensed digital content between users
Techniques are described for reselling digital data content, such as books, other types of documents, music, video, software and games. Such data are stored in a small portable digital rights management (DRM) device, such as a non-volatile memory card or flash drive, along with a license that defines the extent of the use permitted of the data. The content and license data are processed by a microprocessor that is included in the memory card or flash drive, including modification of the license in response to the data content being resold and transferred to another memory card or flash drive. The process is a digital version of selling a book, CD, DVD or the like in a second-hand market.
Secure cloud computing infrastructure
In one embodiment, a system for secure application hosting is provided. The system includes a memory, a first processor coupled to the memory, a second processor coupled to the first processor via a bus, and a data storage device and a network interface coupled to the second processor. The second processor is configured to perform cryptographic processing to provide an encrypted domain, in which the network interface and data storage device operate, and an unencrypted domain, in which the processor and memory operate.
Non-transitory computer readable medium, program protection apparatus, and program protection method
Provided is a non-transitory computer readable medium causing a computer to function as a designation receiving unit that receives designation of a protection target section, a movement arranging unit that moves and arranges the protection target section of a program to a second arrangement location different from a first arrangement location, and a changing unit that changes the protection target section of the program to a substitution code, wherein the substitution code causes a native environment to function as a reconstruction unit that reconstructs context of the native environment as virtual context for a virtual machine in a memory of the native environment, and a virtual machine execution unit that executes the virtual machine, and delivers information indicative of an address in the memory of the virtual context to the virtual machine, so that the virtual machine executes the protection target section using the virtual context.
Method for protecting computer programs and data from hostile code
A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can interact with other objects within the system. When an object is classified as untrusted, it can interact with other object within the system on a limited basis. A virtualized system is provided on the computer so that when the untrusted object attempts to perform an operation that is outside its scope of authorization, the virtualized system intercepts the operation but present the untrusted program with an indication that the requested operation has been performed. The method further includes processes to securely move a program from an untrusted group to a trusted group.
Personal digital key initialization and registration for secure transactions
A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key (PDK) is programmed using a trusted programming device to initialize and/or register the PDK for use. In one embodiment, the initialization and registration processes are administered by a specialized trusted Notary to ensure the processes follow defined security procedures. In a biometric initialization, the programming device acquires a biometric input from a user and writes the biometric data to a tamperproof memory in the PDK. In registration, the Programmer communicates to one or more remote registries to create or update entries associated with the user PDK. Once initialized and registered, the PDK can be used for various levels of secure authentication processes.
Secure biometric identity broker module
A biometric identity broker can obtain exclusive control of biometric sensors communicationally coupled to a computing device, and can create biometric unit components for each of the sensors. Each biometric unit component can utilize a sensor plug-in, a processing plug-in and a storage plug-in, that can either be provided with the sensor or can be default plug-ins, in order to provide a baseline level of functionality irrespective of the functionality provided by, or with, the sensor to which the biometric unit is associated. A factor-specific service provider can act across all biometric units associated with sensors directed to a common biometric factor and can arbitrate among multiple clients simultaneously awaiting input and can manage multiple identities associated with a single biometric template based on the sensor receiving the biometric input. The biometric identity broker, factor-specific service providers and biometric units can be part of the trusted computing base.
Optimized hierarchical integrity protection for stored data
A method for data integrity protection includes receiving items of data for storage in a storage medium. The items are grouped into multiple groups, such that at least some of the groups include respective pluralities of the items. A respective group signature is computed over each of the groups, thereby generating multiple group signatures. An upper-level signature is computed over the group signatures. Groups of the items, the group signatures, and the upper-level signature are stored in respective locations in the storage medium.
Article of manufacture for securing data in 2D bar codes using SSL
An article of manufacture comprises a printed document associated with a source entity. The printed document is readable by a software application of an electronic device. The printed document includes a plain text content portion and a two-dimensional code (2-D code) that includes data encoded therein which is readable by the software application of the electronic device. The encoded data includes a resource locator to an intent. The resource locator to an intent includes a protocol identifier designating a secure 2-D code which is detectable by the software application of the electronic device for electronic replacement by the software application with a protocol identifier used to access a secure server of the source entity located at a host portion of the resource locator. The protocol identifier is a protocol identifier associated with URL specifications.
Content access management using extracted watermark information
Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark extraction and content screening operations, which can include the application of content usage enforcement actions, may be organized such that some or all of the operations can be conducted at different times by different devices. These operations can be conducted by one or more trusted devices that reside in a networked environment. Real-time access to a content can also be facilitated by utilizing existing watermark extraction records. To facilitate real-time access to the content, the extraction records may contain segmented authentication information that correspond to particular segments of the content that is being accessed. Additionally, or alternatively, new watermark extraction operations can be conducted in real-time to produce new watermark extraction records.
Watermark extraction and content screening in a networked environment
Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark extraction and content screening operations, which can include the application of content usage enforcement actions, may be organized such that some or all of the operations can be conducted at different times by different devices. The watermark extraction results can be stored in a secure location and accessed by other devices at different times. These operations can be conducted by one or more trusted devices that reside in a home network. The home network can also include a gateway device that can coordinate the operations of the various network devices and/or delegate the various watermark extraction and content screening operations.
Web content access using a client device identifier
Systems and methods are provided for controlling access to online services. For example, the system may include an application running on a user computer (130) that collects platform data (e.g. physical device parameters) and generates a machine fingerprint (stage 602). The computer (130) may send the machine fingerprint to the authentication server (110). The server (110) may associate the received machine fingerprint with the appropriate online account information received from a host server (120) or the like (stage 604). The authentication server (110) may send the appropriate registration status signal to the host server (120), which in turn may update the online profile information to include the user's registration status (stage 606).
System and method for protecting a password against brute force attacks
In a system and method for authenticating a client device by an authentication device, the client device user is assigned a PIN generated by the authentication device. The user provides the PIN and a password to the client device, from which the client device generates a symmetric key and further generates a public/private key pair. The private key is encrypted using the symmetric key and stored in encrypted form only. The public key and a message authentication code generated from the PIN are provided to the authentication device, which stores the public key. Subsequently, when the user seeks to be authenticated, the user enters a password at the client device, which is used to generate a symmetric key to decrypt the encrypted private key. A message to the authentication device is signed using the resultant value. The authentication device uses the public key to verify the signature of the message.
Exchange of key material
A communication network manages key material. A method generates and provides session keys from a security node to an access node for further propagation during handoff procedures, without requiring the security node to take part in the handoff procedures.
Management of public keys for verification of public warning messages
Techniques are disclosed for managing one or more public keys used for verification of one or more messages transferred over a communication network associated with a public warning system. In one example, a method comprises the following steps. A computing device of a communication network obtains key material for at least one source of a message generated for a public warning system. The computing device also obtains an identity of the source. A public key is computed by the computing device from the key material and the identity of the source. The public key is thus useable by the computing device to verify a message received from the source that is digitally signed using a corresponding private key of the source. In one example, the computing device comprises user equipment.
System and method for virtual machine data protection in a public cloud
A method includes partitioning a disk image file into a plurality of segments. The method also includes generating a unique key for each segment, storing the unique keys in an image mapping file, and transmitting the image mapping file to a particular one of a plurality of nodes on a network. The method further includes transmitting a first segment and a second segment of the plurality of segments to different nodes of the plurality of nodes.
Secure remote support automation process
Secure Remote Support Automation Process wherein a remote support server receives a support task request and schedules a predefined task to a predefined actor who also has a predefined escalation policy and notifies the support actor of the scheduled task along with a key, a key seed, or a credential to use in authentication. The method enabling privileged access to an Internet security appliance using public/private key pairs through a firewall and network address translation by a support server and an assigned support task actor.
Security enhancement arrangement
Disclosed herein is a system for enhancing the security of wireless networks. In one aspect, a wireless access point that functions as a bridge between two networks is provided. The wireless access point is configured to establish separate associations for itself and each device connected to it. This provides for enhanced security in that each device connected to the wireless access point may be separately authenticated and in that separate encryption tunnels are established for each device connected to the wireless access point.
Network identity management system and method
Users of Internet services (e.g., SKYPE messaging service, GOOGLETALK messaging service, AOL INSTANT MESSENGER messaging service, and MICROSOFT MESSENGER messaging service) that are initially identified using separate identifiers that may be associated with respective service providers (e.g., email addresses) can manage network identities using a single unified set of account information managed by a registry service. The registry authenticates the user's request(s) to bind a service provider identity to his or her personal registry user record by presenting a random challenge to the user which the registry must then receive back from the service provider corresponding to the identity being added. Later, the registry may authenticate itself to service providers using information received from a service provider application as the service provider application authenticates itself to the service provider.
System and method for collaboration over shared storage
In accordance with one or more embodiments of the present disclosure, systems and methods disclosed herein enable synergy among a group of users by providing a real-time, secure collaboration environment that allows for cooperative interaction and decision making and provide the ability for users to simultaneously view, revise, and review a document or multimedia file that resides in a shared data storage location. Real-time, low latency, rich collaboration between producers and consumers provides organization efficiency, and this collaboration provides real-time, low latency transmission of data.
Automated workflow generation
In certain embodiments, a method includes accessing a template, the template comprising a plurality of static portions and a plurality of dynamic portions. A first set of parameters associated with a first node are accessed. The method includes generating a first set of instructions that configure a device to communicate with the first node. The first set of instructions includes the static portions and the first set of parameters. The first set of parameters are arranged according to the plurality of dynamic portions. A second set of parameters associated with a second node are accessed. The method includes generating a second set of instructions that include the static portions and the second set of parameters. The second set of parameters are arranged according to the plurality of dynamic portions. The first set of instructions and the second set of instructions include Business Process Execution Language.
Direct scatter loading of executable software image from a primary processor to one or more secondary processor in a multi-processor system
In a multi-processor system, an executable software image including an image header and a segmented data image is scatter loaded from a first processor to a second processor. The image header contains the target locations for the data image segments to be scatter loaded into memory of the second processor. Once the image header has been processed, the data segments may be directly loaded into the memory of the second processor without further CPU involvement from the second processor.
Remote management of UEFI BIOS settings and configuration
In an information handling system (IHS), remote management of basic input/output system (BIOS) settings and configuration includes maintaining a BIOS setting/configuration database, providing an application to communicate a BIOS setting/configuration from the database to a BIOS system, determining whether the BIOS setting/configuration communicated from the database to the BIOS system is a special BIOS configuration capsule packet, and validating BIOS setting/configuration.
Manufacturing information handling systems
Manufacturing a virtual information handling system (IHS) includes creating a virtual IHS including a component identifier. A boot process is then begun for the virtual IHS. A manufacturing operating system is then retrieved for the virtual IHS using the component identifier. The manufacturing operating system is then installed on the virtual IHS. Manufacturing a virtual IHS may also include determining a common operating system and a common software subset among a plurality of to-be-manufactured virtual IHSs. A first virtual IHS may then be created and the common operating system may be configured on the first virtual IHS. At least a portion of a first virtual IHS software may also be configured on the first virtual IHS. The configuration of the first virtual IHS software on the first virtual IHS is stopped when the common software subset is configured on the first virtual IHS. The first virtual IHS may then be cloned to create a cloned virtual IHS.
Multi-thread processors and methods for instruction execution and synchronization therein and computer program products thereof
Methods for instruction execution and synchronization in a multi-thread processor are provided, wherein in the multi-thread processor, multiple threads are running and each of the threads can simultaneously execute a same instruction sequence. A source code or an object code is received and then compiled to generate the instruction sequence. Instructions for all of function calls within the instruction sequence are sorted according to a calling order. Each thread is provided a counter value pointing to one of the instructions in the instruction sequence. A main counter value is determined according to the counter values of the threads such that all of the threads simultaneously execute an instruction of the instruction sequence that the main counter value points to.
Debugging multithreaded code by generating exception upon target address CAM search for variable and checking race condition
Mechanisms are provided for debugging application code using a content addressable memory. The mechanisms receive an instruction in a hardware unit of a processor of the data processing system, the instruction having a target memory address that the instruction is attempting to access. A content addressable memory (CAM) associated with the hardware unit is searched for an entry in the CAM corresponding to the target memory address. In response to an entry in the CAM corresponding to the target memory address being found, a determination is made as to whether information in the entry identifies the instruction as an instruction of interest. In response to the entry identifying the instruction as an instruction of interest, an exception is generated and sent to one of an exception handler or a debugger application. In this way, debugging of multithreaded applications may be performed in an efficient manner.
Prefix accumulation for efficient processing of instructions with multiple prefix bytes
In a microprocessor that has an instruction set architecture in which the instructions may include a variable number of prefix bytes, an apparatus for efficiently extracting instructions from a stream of undifferentiated instruction bytes. Decode logic determines which byte is an opcode byte for each instruction of a plurality of instructions within the stream of undifferentiated instruction bytes. The opcode byte is the first non-prefix byte of the instruction. The decode logic accumulates prefix information onto the opcode byte of the instruction for each instruction of the plurality of instructions. A queue holds the stream of undifferentiated instruction bytes and the accumulated prefix information. Extraction logic extracts the plurality of instructions from the queue in one clock cycle independent of the number of prefix bytes included in each of the plurality of instructions.
Methods, systems and computer readable medium for writing and reading data
A flash memory controller, a computer readable medium and a method for writing to a flash memory device, the method may include receiving multiple logical pages, each logical page having a logical address; determining to write a logical page into a selected physical page of the flash memory device; calculating a hash value for each logical page of the multiple logical pages in response to (a) a logical address of the logical page and (b) a physical page index, to provide multiple hash values of the multiple logical pages.
System and method for storing data in a virtualized memory system with destructive reads
A system and method for providing high-speed memory operations is disclosed. The technique uses virtualization of memory space to map a virtual address space to a larger physical address space wherein no memory bank conflicts will occur. The larger physical address space is used to prevent memory bank conflicts from occurring by moving the virtualized memory addresses of data being written to memory to a different location in physical memory that will eliminate a memory bank conflict. To improve memory performance destructive read operations are used when reading data but the data is written back into the physical memory in a later cycle.
Interacting with data in hidden storage
Unused storage space within a data storage is utilized to store data while effectively making it appear to the operating system, other programs, and the user that the space is still available or unused. The space used to store the hidden data remains available for use by the operating system, other programs and uses upon a request. File system requests are monitored such that the hidden storage area remains hidden from unauthorized processes as well as to restrict operations within the hidden storage area that are attempted by unauthorized processes.
Method for securely storing data in a memory of a portable data carrier
A method for securely storing data in a multilevel memory of a portable data carrier. The multilevel memory includes one or several multilevel memory cells (SZ) which can assume respectively at least three levels (E, NE). The at least three levels represent a different data content, regarding which respective levels (E, NE) of a memory cell (SZ) are defined as valid or invalid. The levels (E, NE) of a respective memory cell (SZ) are selectively defined as valid or invalid in dependence on a required security level.
Microprocessor having internal secure memory
An apparatus providing for a secure execution environment. The apparatus includes a microprocessor that is configured to execute non-secure application programs and a secure application program, where the non-secure application programs are accessed from a system memory via a system bus. The microprocessor has a non-secure memory and a secure volatile memory. The non-secure memory is configured to store portions of the non-secure application programs for execution by the microprocessor, where the non-secure memory is observable and accessible by the non-secure application programs and by system bus resources within the microprocessor. The secure volatile memory is configured to store the secure application program for execution by the microprocessor, where the secure volatile memory is isolated from the non-secure application programs and the system bus resources within the microprocessor. The secure application program is decrypted using a processor unique key and is written to the secure volatile memory.
Controlling data lag in a replicated computer system
A method and system is provided for measuring, guaranteeing, and reducing replication data lag time between a primary system and one or more standby systems. Each standby system determines the lag time between the generation of a consistent version of data on the primary system and the time that the consistent version is applied on the standby system. Applications can request and be guaranteed to receive data from a standby system that is identical to the state on the primary system at the time of the query, or lag the primary state only by a maximum tolerable amount. A standby system may also publish a service that guarantees a maximum lag time and withdraw the service offer when the actual lag time exceeds the guaranteed lag time.Implications for implementing synchronous and asynchronous replication as well as performance optimizations are also discussed.
Storage control system and control method for the same
A storage control system judges whether the data pattern of data exchanged with a higher-level device (hereafter “data”) conforms to one or a plurality of write-excluded data patterns comprised in write-excluded data pattern information prepared in advance. If a negative judgment result is obtained, the storage control subsystem stores the data in a logical device formed on a disk storage device. If, on the other hand, a positive judgment result is obtained, the storage control subsystem erases the data without storing in a logical device.
Cache collaboration in tiled processor systems
The present invention may provide a computer system including a plurality of tiles divided into multiple virtual domains. Each tile may include a router to communicate with others of said tiles, a private cache to store data, and a spill table to record pointers for data evicted from the private cache to a remote host, wherein the remote host and the respective tile are provided in the same virtual domain. The spill tables may allow for faster retrieval of previously evicted data because the home registry does not need to be referenced if requested data is listed in the spill table. Therefore, embodiments of the present invention may provide a distance-aware cache collaboration architecture without incurring extraneous overhead expenses.
Interruptible write block
A disclosed embodiment is an interruptible write block comprising a primary register having an input coupled to an input of the interruptible write block, a secondary register having an input selectably coupled to an output of the primary register and to an output of the secondary register through an interrupt circuit. The interrupt circuit is utilized to interrupt flow of new data from the primary register to the secondary register during an interrupt of a write operation, such that upon resumption of the write operation the secondary register contains valid data. A method of utilizing an interruptible write block during a write operation comprises loading data into a primary register, interrupting the write operation to perform one or more other operations, loading the data into a secondary register while loading new data into the primary register, and resuming the write operation using valid data from the secondary register.
Systems, methods, and software for interleaved data stream storage
Methods, systems, and software are provided herein that allow a user to store and retrieve data records. In one example, a method of storing data records is provided. The method includes initializing a shared write pointer to a first location in a shared memory of a data storage system, and receiving a plurality of data records transferred by a plurality of data sources for storage in the shared memory. The method also includes, beginning with a first of the plurality of data sources, writing in a cyclic sequence one of the plurality of data records for each of the plurality of data sources based on the shared write pointer, and incrementing the shared write pointer after each writing, and updating at least a header portion of the shared memory with the shared write pointer responsive to each writing.
Notification protocol based endpoint caching of host memory
An endpoint device (14) is registered in association with a host memory address in response to receipt of a request for a notification of a change in content state of the host memory address from the endpoint device (14). In response to a change in content state of the host memory address, a notification that the host memory address has changed content state is sent to the endpoint device (14). In response to receipt of the notification by the endpoint device (14), semantics associated with a change of content state of the host memory address by a data schema (42) is determined and an action is performed by the endpoint device (14) in accordance with the determined semantics.
Method, system and server of removing a distributed caching object
The present disclosure discloses a method, a system and a server of removing a distributed caching object. In one embodiment, the method receives a removal request, where the removal request includes an identifier of an object. The method may further apply consistent Hashing to the identifier of the object to obtain a Hash result value of the identifier, locates a corresponding cache server based on the Hash result value and renders the corresponding cache server to be a present cache server. In some embodiments, the method determines whether the present cache server is in an active status and has an active period greater than an expiration period associated with the object. Additionally, in response to determining that the present cache server is in an active status and has an active period greater than the expiration period associated with the object, the method removes the object from the present cache server. By comparing an active period of a located cache server with an expiration period associated with an object, the exemplary embodiments precisely locate a cache server that includes the object to be removed and perform a removal operation, thus saving the other cache servers from wasting resources to perform removal operations and hence improving the overall performance of the distributed cache system.
Coordinated writeback of dirty cachelines
A data processing system includes a processor core and a cache memory hierarchy coupled to the processor core. The cache memory hierarchy includes at least one upper level cache and a lowest level cache. A memory controller is coupled to the lowest level cache and to a system memory and includes a physical write queue from which the memory controller writes data to the system memory. The memory controller initiates accesses to the lowest level cache to place into the physical write queue selected cachelines having spatial locality with data present in the physical write queue.
Efficient processing of cache segment waiters
For a plurality of input/output (I/O) operations waiting to assemble complete data tracks from data segments, a process, separate from a process responsible for the data assembly into the complete data tracks, is initiated for waking a predetermined number of the waiting I/O operations. A total number of I/O operations to be awoken at each of an iterated instance of the waking is limited.
Replicating tag entries for reliability enhancement in cache tag arrays
Technologies are generally described for exploiting program phase behavior to duplicate most recently and/or frequently accessed tag entries in a Tag Replication Buffer (TRB) to protect the information integrity of tag arrays in a processor cache. The reliability/effectiveness of microprocessor cache performance may be further improved by capturing/duplicating tags of dirty cache lines, exploiting the fact that detected error-corrupted clean cache lines can be recovered by L2 cache. A deterministic TRB replacement triggered early write-back scheme may provide full duplication and recovery of single-bit errors for tags of dirty cache lines.
Waveform caching for data demodulation and interference cancellation at a node B
The present patent application discloses a method and apparatus for using external and internal memory for cancelling traffic interference comprising storing data in an external memory; and processing the data samples on an internal memory, wherein the external memory is low bandwidth memory; and the internal memory is high bandwidth on board cache. The present method and apparatus also comprises caching portions of the data on the internal memory, filling the internal memory by reading the newest data from the external memory and updating the internal memory; and writing the older data back to the external memory from the internal memory, wherein the data is incoming data samples.
Storing row-major data with an affinity for columns
A method, device, and computer readable medium for striping rows of data across logical units of storage with an affinity for columns is provided. Alternately, a method, device, and computer readable medium for striping columns of data across logical units of storage with an affinity for rows is provided. When data of a logical slice is requested, a mapping may provide information for determining which logical unit is likely to store the logical slice. In one embodiment, data is retrieved from logical units that are predicted to store the logical slice. In another embodiment, data is retrieved from several logical units, and the data not mapped to the logical unit is removed from the retrieved data.
SSD cache expansion using overprovisioned space
The invention provides for SSD cache expansion by assigning all excess overprovisioned space (OP) above a level of advertised SSD memory to SSD cache. As additional SSD memory is needed to provide the advertised SSD memory, an offsetting portion of the OP is reassigned from excess overprovisioned space to the SSD cache. In this manner, the advertised SSD memory is maintained while continuously allocating all available excess OP to cache. The result is that all of the available SSD memory is allocated to cache, a portion to maintain the advertised SSD memory and the balance as excess OP allocated to cache. This eliminates idle OP in the SSD allocation.
Conditional write processing for a cache structure of a coupling facility
A method for managing a cache structure of a coupling facility includes receiving a conditional write command from a computing system and determining whether data associated with the conditional write command is part of a working set of data of the cache structure. If the data associated with the conditional write command is part of the working set of data of the cache structure the conditional write command is processed as an unconditional write command. If the data associated with the conditional write command is not part of the working set of data of the cache structure a conditional write failure notification is transmitted to the computing system.
Flash memory device and data protection method thereof
A data protection method for a flash memory device. In one embodiment, the flash memory device comprises a flash memory for storing protected data. After the flash memory device is coupled to a host, a plurality of current read addresses of a plurality of read commands sent from the host to the flash memory device are recorded. The current read addresses are then compared with a plurality of predetermined read addresses. When the current read addresses are not identical to the predetermined read addresses, the flash memory device is made to enter a data protection mode. When the flash memory device is in the data protection mode, if the flash memory device receives a plurality of data access commands, the data access commands are processed according to a protection mode setting parameter to prevent the protected data from being accessed by the host.
Method of writing to a NAND memory block based file system with log based buffering
A method of operating a controller for controlling the programming of a NAND memory chip is shown. The NAND memory chip has a plurality of blocks with each block having a certain amount of storage, wherein the amount of storage in each block is the minimum erasable unit. The method comprising storing in a temporary storage a first plurality of groups of data, wherein each of the groups of data is to be stored in a block of the NAND memory chip. Each group of data is indexed to the block with which it is to be stored. Finally, the groups of data associated with the same block are programmed into the same block in the same programming operation.
Systems, methods and computer program products for operating a data processing system in which a file delete command is sent to an external storage device for invalidating data thereon
A data processing system that includes a host system and an external data storage device with an erase before write memory device thereon can be operated by sending a file delete command from the host to the data storage device for one or more files stored thereon. The file delete command may specify a logical address and data to be invalidated associated with the deleted file. The data storage device may identify one or more units of memory allocation in the erase before write memory as containing invalid data based on the specified logical address and data to be invalidated. The data storage device may maintain a data structure that associates physical addresses for units of memory allocation in the erase before write memory with indications of whether the units of memory allocation contain invalid data. The data structure may be used to mark units of memory allocation associated with deleted files as containing invalid data.
Method, program, and system for processing object in computer
A method, an article of manufacture, and system for heapifying an object. The method includes: storing, in a working set, a first address of a certain object in a stack frame, copying the certain object into the heap area and holding a second address of the certain object in the heap area, following each stack frame to find a pointer pointing to the first address stored in the working set, converting the address that the pointer points to into the second address, proceeding to a next stack frame, where the address conversion includes storing an address of another object in the working set if the converted address is stored as a value of a field of the other object in the stack frame, and terminating the process in response to a lack of pointers found in the stack frame to point to the addresses stored in the working set.
Baseboard management controller and method for sharing serial port
A baseboard management controller (BMC) connects with a COM serial port. The BMC includes an input queue and an output queue. If a basic input output system (BIOS) of the BMC has been initialized, the COM serial port is used by the BIOS. When a processor of the BMC sends a control command to a sharing system of the BMC, the input queue and the output queue are converted to time division multiplex (TDM) queues. The COM serial port may be used by the BIOS or by the BMC according to an ID flag of each element of the TDM queues.
Operation method for a computer system
A device receives a standard command. The device judges whether an address field and/or a data length field and/or a data field of the standard command includes at least one of a vendor command, a vendor data and a checkword. The device judges whether the address field and/or a data length field and/or the data field of the standard command matches a vendor predetermined pattern. If matched, the device performs a vendor operation based on the vendor command and/or the vendor data of the standard command.
Methods and apparatuses for trace multicast across a bus structure, and related systems
Systems and methods for trace multicast across a bus structure are provided. Preferably, the bus structure is that of a System-on-a-Chip (SoC), where the SoC includes a number of master components and a number of slave components connected via the bus structure. The bus structure supports a trace multicast feature. In one embodiment, the bus structure receives a bus transaction from a master component and, in response, outputs the bus transaction to a corresponding slave port. In addition, the bus structure determines whether a trace multicast is desired for the bus transaction. If a trace multicast is desired, the bus structure generates an additional bus transaction having one or more transaction attributes that include a translated version of the bus transaction and outputs the additional bus transaction to a trace slave port of the bus structure. The trace multicast feature provides a non-invasive mechanism for driver-level trace.
Determining extended capability of a channel path
A computer program product includes a tangible storage storing instructions for performing a method. The method includes receiving a request at a channel subsystem in a host computer system from an operating system in the host computer system to provide a channel path description for a channel path, the channel subsystem configured to direct information flow between memory and the control unit via the channel path; and outputting from the channel subsystem to the operating system, a channel path description block including the channel path description for the channel path in response to the request. The channel path description block includes: a descriptor field (DESC) indicating that the channel path supports a Fiber Channel protocol for commanding an I/O operation; and an extension support indicator field (F) specifying whether the channel path supports an extension to the Fiber Channel protocol.
Managing command line interface commands
A method is used in managing command line interface commands. Legacy CLI command information is received at a command line interface (CLI) provider. At the CLI provider, it is determined to convert the legacy CLI command information. The CLI provider has an adapter for performing the conversion. Updated CLI command information is derived by the adapter from the legacy CLI command information. The updated CLI command information is submitted to a plugin for processing.
Mobile device and computational system including same
A mobile device and a computational system including same are described. The mobile device includes a sensor unit having a motion sensor and/or a touch sensor that provides sensing information. The sensing information is applied to a universal serial bus user interface (USB UI) data generation unit and is changed into USB UI data before being output as USB UI data using a USB communication technique.
Virtual universal asynchronous receiver transmitter for server systems
In one embodiment, a monolithic integrated circuit includes a first UART, a second UART, and a multiplexer. The first UART has a parallel IO interface to couple to a host system to transceive parallel data and a serial IO interface. The second UART has a parallel IO interface and a serial IO interface coupled to the serial IO interface of the first UART. The first and second UARTs convert parallel data into serial data and serial data into parallel data. The multiplexer has an output coupled to the serial input of the first UART, a first input coupled to the serial output of the second UART, a second input coupled to a serial input of a serial communication port, and a select input coupled to a control signal selectively coupling serial interfaces of first and second UARTs together for remote terminal services at a remote computer system over a network.
Switch that processes a terminal data stream
A terminal data stream (TDS) is received and converted in a pixel-based representation. The pixel-based representation is stored in a frame buffer and a video signal based on the contents of the frame buffer is provided to a video multiplexor. The video multiplexor is also coupled to a video signal from a computer system, and the video multiplexor routes the video signal from the frame buffer to a display device.
Link sharing for multiple replication modes
Sharing at least one link among a plurality of processes includes determining a capacity of the at least one link based on a number of I/O operations per unit time supported by the at least one link as a function of the amount of data provided by each of the I/O operations, determining a requirement of each of the processes based on user specifications and an amount of data provided by each I/O operation for each of the processes, and apportioning link capacity among the processes according to the requirement of each of the processes. In response to a sum of requirements for each of the processes being less than the capacity of the at least one link, additional link capacity may be provided to at least some of the processes.
Systems and methods for intelligent system profile unique data management
Systems and methods are provided that may be implemented to manage machine-specific System Profile Unique Data (SPUD) information for one or more information handling systems. Such SPUD information may be managed and transported through in-band and/or out-of-band processing and communications, and may be employed to make restoration of machine-specific data possible either through network data communications and/or local system data communications.
Multimedia interface with content protection in a wireless communication device
In general, this disclosure relates to techniques for management of a multimedia connection between a wireless communication device (WCD) and one or more output devices. The connection may be a multimedia interface connection with content protection, e.g., High Definition Multimedia Interface (HDMI). In some cases, the multimedia interface connection with content protection may be inactive because the output device is no longer connected or the multimedia application is stopped or paused. The techniques include detecting a use mode of the multimedia interface connection with content protection between the WCD and one or more output devices. When the use mode of the multimedia interface connection with content protection is inactive, the WCD may reduce at least one of content processing or content protection processing. In this way, the techniques may reduce battery power consumption from multimedia processing by the WCD.
Method for optimizing control circuit for FC HDDS in a system and control circuit for FC HDDS in a system
A method for optimizing control circuit for FC HDDs in a system includes determining the number of subsystems supported in a FC loop and the number of HDDs to be supported in each of the subsystems, analyzing binary values of address of all HDDs for each of the subsystems, enumerating logical variations of the address selection signals according to the analyzed binary values to obtain logic combinations for the address selection signals, analyzing logic relations between these logic combinations and a system address signal, selecting logic components required according to the found logic relations, and calculating the total number of required logic components and the number of address selections signals that can share an output pin of each of the required logic components based on properties of output pins of the logic components and maximum input current of the address selection signals.
Method and structure enabling improved native command queueing in a data storage device
A data storage device accepts read and write commands with absolute command completion times based on queue-depth-of-one (qd=1) execution and stores them in an unsequenced commands memory. These commands are requests to access the data storage device and contain both locations on the storage medium where the data is located and whether the requested operation is read or write. For each pair of first and second commands in the memory, the time between execution of the first command and the second command is calculated and stored. A command selector then reads data from the memory based on a resequencing NCQ algorithm which inserts one or more commands from the command memory into the original qd=1 sequence whenever this insertion will not affect the execution time of commands in the original qd=1 sequence. The resequencing algorithm of the present invention increases IOPS and reduced read head actuator travel and wear.
Storage apparatus and command execution control method
A determination unit determines the type of a command received via a communication interface. A counting unit counts, among commands received via the communication interface, the number of commands currently being executed. A control unit performs, when the number of commands currently being executed is less than or equal to a limit value corresponding to the type of a command received via the communication interface, data access to a memory device according to the received command. In addition, the control unit prevents the data access according to the received command when the number of commands currently being executed exceeds the limit value corresponding to the type of the received command.
Systems and methods for sharing digital information between mobile devices of friends and family using multiple LAN-based embedded devices
A method for sharing digital information is provided. The method may include, at a first local area network (LAN)-based embedded device, inviting a second LAN-based embedded device to share digital information between the first and second LAN-based embedded devices; synchronizing the digital information between the first and second LAN-based embedded devices; and maintaining communication between the first LAN-based embedded device and the second LAN-based embedded device. Said inviting may include, at the first LAN-based embedded device: receiving an identifier of a second mobile device, and transmitting to the second mobile device a first WAN IP address and first access credential; and at the second LAN-based embedded device: receiving the first WAN IP address and first access credential from the second mobile device, and transmitting to the first LAN-based embedded device a second WAN IP address and second access credential.
Locating a provisioning server
A provisioning client can be configured to automatically locate a provisioning server in a provisioning environment in order to perform software provisioning. The provisioning client can locate the provisioning server by detecting the location of the provisioning server or by selecting the appropriate provisioning server from a record of available provisioning servers. Once located, the provisioning client can be configured to establish a connection with the provisioning server and to request or receive software provisioning.
Method and apparatus for delivery of adapted media
A method of transmitting media to a client by an infrastructure device in a packet-switched network includes receiving a media stream at the infrastructure device. The method also includes determining an adaptation strategy according to at least one of one or more pieces of network information associated with the packet-switched network, one or more pieces of client information associated with the client, or one or more policies. The method further includes adapting the media stream according to the adaptation strategy to produce an output media stream.
Dynamic transaction protocol upgrades
Including support for advanced protocols in propagation information transferred between applications. Transaction managers associated with the applications communicate with each other to complete a transaction. Rather than communicating using a standard protocol, embodiments of the invention enable a first transaction manager to identify advanced protocols supported by the first transaction manager to a second transaction manager using existing propagation tokens. The second transaction manager selects one of the supported protocols to communicate with the first transaction manager to complete the transaction.
Method for embedding meta-commands in normal network packets
A method for synchronizing different components of a computer network system using meta-commands embedded in normal network packets. The data communication channel between different components of a computer network system can be used to transport meta-commands piggybacked in normal network packets, without modifying or compromising the validity of the protocol message. Embodiments of the method can be used for embedding test synchronization and control commands into the network packets sent through a device or system under test. The device or system under test can be an edge device, with the data communication channel carrying normal packets containing meta-commands embedded in the packets to synchronize the test control of the test clients and the test servers connected to the edge device.
System and method for remote party restrictions in a communications system
A system and method for remote party restrictions in a communications system are provided. A method for controller operations includes receiving a request from a first communications device to replicate a media flow that is being transmitted to the first communications device from a second communications device during a session, where the replicated media flow is to be provided to a third communications device, and where the second communications device is operated by a remote user. The method also includes allocating resources to a transmission of the replicated media flow to the third communications device, notifying the remote user of the request, and determining a response of the remote user to the request.
Systems and methods to make a resource available via a local network
Methods and systems for making a resource available are disclosed. In a particular method, identification information associated with a portable device within a particular coverage area is received. A resource associated with the portable device is determined based on the identification information. An authentication message identifying the resource to a device is sent. Access control information is received from the device. The access control information indicates that access to the resource should be enabled via a local network. The resource is made available via the local network.
Systems and methods for establishing connections between devices communicating over a network
Systems and methods are described for establishing a connection between a client and a server that are each communicating via a network. The methods and techniques may be used, for example, to establish a media streaming connection between a media player and a placeshifting device when a firewall or other impediment to direct network connections exists. A relay server receives connection requests from the client and from the server via the network. In response to receiving the requests, a first connection is established between the relay server and the client and a second connection between the relay server and the server. Data received by the relay server on each of the first and second connections is relayed to the other of the first and second connections to thereby establish the connection between the client and the server via the relay server.
Edge traversal service dormancy
A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons.
Connection management for M2M device in a mobile communication network
There is provided a method that relates to the setting up and/or maintaining of a connection between a machine-to-machine (M2M) device and a mobile communication network. In order to be able to adapt the connection management to the requirements of the M2M device, the M2M device may transmit an indication that it is an M2M device to the mobile communication network. At least one network node of the mobile communication network controls the setting up and/or the maintaining of the connection based on the indication. The network node may route a request for setting up the connection to a further network node based on the indication.
Method and apparatus for establishing a streamed media session
A method and an arrangement for enabling a communication session for streamed media between a client terminal and a server. A request-to-establish message is sent (202) from the client terminal, supplemented with a checksum generated (200) for available SDP information. The checksum is compared to a checksum generated for correct SDP information available at the server. A response message indicating the result of the comparison is received from the server (204). If the comparison indicates that the SDP information available at the server is incorrect, the response message is supplemented with the correct SDP information, to update (210) the available SDP information. The client terminal is then sending a new request-to-message supplemented with the updated SDP information. On the other hand, if the available SDP information is correct, streamed media is started to be sent (208) from the server to the client terminal. Generating a checksum of SDP information available at the client terminal and supplement to a request-to-establishment message, enables for the server to check that the SDP information available at the client terminal is up to date, thereby achieving a fast and reliable establishment of a communication session for streamed media between a client terminal and a server.
Proximity routing for session based applications using anycast
Certain exemplary embodiments can comprise a method, which can comprise automatically providing content to an information device from a content distribution node of a plurality of content distribution nodes. The information device can be adapted to send a request for the content from the first content distribution node utilizing an Internet Protocol (IP) address of the content distribution node.
Command management in a networked computing environment
Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource.
Method and apparatus for provisioning storage to a file system
A storage area network (SAN), which includes one or more remote systems, a plurality of storage devices, a SAN fabric comprising a plurality of fabric components for coupling the remote systems to the storage devices, and a central system having a SAN management server configured to monitor an amount of available storage in a file system used in the remote systems, and automatically provision additional storage to the file system in the event the amount of available storage in the file system decreases below a predetermined amount.
Transient subscription records
Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the session management node, an initial request message, the initial request message including at least one subscription identifier; determining that the session management node does not have access to a subscription record associated with the at least one subscription identifier; generating a transient subscription record based on the initial request message; and processing the initial request message based on the initial request message and the transient subscription record.
System, method, and computer program product for contact center management
A system, method, and computer program product for customer contact management via voice, chat, e-mail and social network contacts includes a balanced service process (BSP) for maximizing first contact resolution (FCR) and CSAT. The BSP is incorporated within a contact center (single center, multiple centers and/or work at home), which receives voice calls, SMS messages, email, chat, or social media communications from customers. The BSP in real-time determines dispositions of such contacts, monitors and manages the performance of individual resolvers.
Distributed caching for resource and mobile network traffic management
Systems and methods for distributed caching for resource and mobile network traffic management are disclosed. In one aspect, embodiments of the present disclosure include a distributed proxy and cache system, including, means for, detecting a first data request made by a first mobile application on a mobile device; means for, retrieving cached elements stored in a local cache on the mobile device to respond to the first data request; means for, detecting a second data request made by a second mobile application on the mobile device, and/or means for, establishing connectivity of the mobile device to the wireless network to satisfy the second data request made.
Method for the automatic time synchronisation of devices in network-based systems
A method is based on a communication- and data network for the automatic time synchronization of field devices, namely fill-level measuring devices and pressure measuring devices as well as field-device control units. The method comprises the steps of: determining a current time value by the field device or by the field-device control unit, and providing a desired value in a central server. Furthermore, the method comprises the following steps: comparing the current time value with the desired value, and setting the current time value to the desired value when the desired value differs from the current time value by more than a predetermined threshold value.
Detecting anonymized data traffic
Computer implemented methods and apparatuses for detecting and/or blocking anonymized data even if the user employs a web server that is not known to the web filter to be an anonymizing web server (such as a user-hosted anonymizer). The anonymize attempt may be detected by monitoring for the HTTP 302 Moved message and parsing the HTTP 302 Moved message for URLs, which may then be checked for unapproved content. The anonymize attempt may, additionally or alternatively, be detected by looking the IP addresses in an IP address rating database to detect suspicious traffic.
System and method for analyzing the performance of multiple transportation streams of streaming media in packet-based networks
Streaming media network parameters are measured using an electronic system and displayed directly to a user or transmitted via an electronic interface such as an existing system network conduit, either in or out-of-band. A scalable hardware and/or software compute engine filters and reduces network parameters to simplify tracking the instantaneous and long term streaming media performance of the network. Hence, the entire set of active media streams is continuously monitored concurrently, thereby providing the ability to detect impairments as well as predict impending impairments. In one example, an existing packetized network conduit containing streaming media is tapped to concurrently and objectively analyze the streaming media streams, producing statistics (such as delay factor and media loss rate) and alarm-type events according to predetermined rules. Tapping the existing packetized network in multiple points provides comparison points and assists in pinpointing the source(s) of the impairment(s).
Handling a service request in a hybrid computer system
A method and associated systems for handling a service request in a hybrid computer system. The hybrid computer system includes an application server computer and at least two mainframe computers. The server computer receives a service request from a user application, determines that the service request does not request a memory-management function, associates the request with a single-digit numeric category, and selects one of the mainframe computers as being able to most efficiently provide the requested service. The server then translates the service request into a configuration compatible with the selected mainframe and with a mainframe operating system running on the selected mainframe, and transmits the translated request to the selected mainframe. The server receives a result from the mainframe and translates the result into a configuration compatible with the application server computer, with the user application, and with a server operating system running on the application server computer.
Method and system for providing remote access to applications
A method of remotely providing an application includes receiving, at an access server, a request for an application from a client. One or more application servers which are capable of providing the requested application are identified base at least in part on a resource of the identified one or more application servers. The client is provided with the identified one or more application servers which are capable of providing the application.
A computing system can include an interface that receives a URL responsive to a user activating an Internet link via an application where the URL includes metadata for an item specified by a country-based Internet store; circuitry that identifies a base country of the user by resolving an Internet Protocol address associated with the user; circuitry that decides if the base country of the user differs from the country of the country-based Internet store; and circuitry that formulates, if the base country differs, a URL for redirecting the user to a country-based Internet store for a country that corresponds to the base country of the user. Various other apparatuses, systems, methods, etc., are also disclosed.
Module and method for semantic negotiation
In various aspects, it is possible to provide an optimized service to a mobile terminal and a user, without prior knowledge of a service that the user prefers to use, or without a client module of a tightly coupled configuration. The optimized service may be provided by performing a semantic negotiation based on one or more ontologies. Also, it is possible to improve user convenience by automatically performing the semantic negotiation between the mobile terminal and a service server without user intervention.
Virtual-machine management program and method for managing virtual machines
A method for managing virtual machines, the method causing a management server having a database includes link relation information and connected to a plurality of physical servers, on which virtual machine hosts are installed, the method includes updating the link relation information in such a manner that a link between a virtual machine host and a first virtual machine guest is disconnected, when information regarding the first virtual machine guest cannot be acquired from the virtual machine host and updating the link relation information stored in such a manner that a link between a virtual machine host and a second virtual machine guest, when information regarding the second virtual machine guest is acquired from the virtual machine host.
Clear channel reporting and assisting orphaned nodes in a wireless network
In a wireless network, a device regularly communicates with at least one other node or device: generally this is its parent. If a problem with communication is detected, the device is preferably able to autonomously carry out a procedure to reacquire the network. In one embodiment, if a device is unable to communicate, it enters a temporary failsafe mode until that problem can be rectified. The device is suitably able to carry out a survey of local conditions in order to assist both it and the network to find a suitable alternative channel and, if a device is unable to immediately reconnect it broadcasts the result of its survey, the Network Environment Status (NES) message, in the hope that another device on the network will hear it. This Status message may then be used by the network to select an alternative channel.
Management and implementation of enclosed local networks in a virtual lab
Methods, systems, and computer programs for creating isolated environments that include virtual machines (VM) and networks in a virtual infrastructure are presented. The method includes an operation to define a configuration of a virtual system which includes VMs, virtual network interface cards (VNIC) in the VMs, and configuration local networks (CLN). Further, the method associates each VNIC with one of the CLNs and transmits instructions to the virtual infrastructure for deploying the configuration. Deploying the configuration includes instantiating VMs and CLNs in the virtual infrastructure. Each VM is instantiated in a host monitored by a virtual lab server, and the CLNs are instantiated in the same hosts where the VMs have been instantiated. Only VMs from the configuration can connect to the instantiated CLNs. The method further transmits instructions to the virtual infrastructure to customize the VMs by executing the customization instructions in the guest operating systems of the VMs to configure the VMs' VNICs.
Systems, methods and machine-readable mediums for integrated quality assurance brokering services
Systems, methods and machine-readable mediums for interfacing a plurality of service providers to address at least one service issue are provided. The systems may include a storage device and a processor. The storage device may store service provider data and service request data for a plurality of service providers. The service request data identifies at least one service issue with one or more of the plurality of service providers. The processor may be programmed to receive the service provider data from a plurality of service provider terminals, receive the service request data from at least one remote terminal, store the service provider data and the service request data in the storage device, and facilitate communication between the first service provider terminal and the customer terminal to address the at least one service issue. The computer readable mediums provide instructions to cause the processor to perform the operations above.
Apparatus and method for a dynamically extensible virtual switch
An apparatus and method for a dynamically extensible virtual switch. An apparatus or virtual switch includes at least one router and a data structure. The router utilizes the data structure to organize a connection between one or more virtual network interface cards (VNICs) to form a virtual network. The virtual switch also identifies a VNIC node of a data frame by its unique identifier, utilizes the unique identifier to index a collection of elements to retrieve a pointer to a virtual network head, and forwards the data frame to all VNIC nodes in a VNIC node listing associated with the virtual network head except for a VNIC node that relates to the unique identifier.
Information processing apparatus that controls device via network and method of controlling the apparatus, device control apparatus and method of controlling the apparatus, as well as device control system
An information processing apparatus capable of suppressing an increase in traffic on the network, and transmitting data even when the platform is different between a transmitting-side device and a receiving-side device. When a transfer request to the device is received from an upper layer software program, a virtualized controller extracts predetermined parameters necessary for controlling the device from parameters included in the transfer request, transmits the extracted parameters to the device, and stores the other parameters. When response parameters corresponding to the request parameters are received, a communication controller generates a transfer response by adding the stored parameters to the response parameters and transfers the generated transfer response to the upper layer software program.
System and method for processing medical information through medical terminal
Provided is a system and method for processing medical information through a medical terminal. The system includes a mobile cloud system unit and a service browser unit. The service browser unit is configured as an application in a user terminal to allow a user to use a medical information processing service, and induces access to the mobile cloud system unit taking charge of medication information processing.
System and method for supporting consumer entitlements in federate portal
A system and method can support a federated portal using a producer web application on a web server and a plurality of consumer web applications. The producer web application is a container web application that hosts a plurality of portlet applications that are deployed and maintained separately. Each consumer web application is adapted to collect and present available portlet applications hosted on the producer web application and offer them as a unified portal to end users. Upon receiving a request from a consumer web application, said producer web application can map the consumer web application to one particular role in a role set which includes a plurality of roles, check for portlet applications that are available based on the particular role, and response to the consumer web application with a message that describes the available portlet applications hosted in the producer web application.
Apparatus for displaying an image, system processing image data, and method of processing image data
An apparatus of the present invention for displaying an image comprises connected device controller 22 for notifying one of a plurality of apparatuses S1 to Sn for transmitting an image connected via a network 99 and that has made a first connection request after activation, of information that display authority that is a right to preferentially perform processing for displaying an image is granted and of information that image data may be transmitted at any time, and for notifying another one or more of the plurality of apparatuses for transmitting an image and that have made a connection request, of information that image data cannot be transmitted unless permitted.
Maintaining referential integrity
A method, computer program product, and system for maintaining referential integrity is described. A method may comprise migrating a migration document in a migration shard from a first location to a second location. The method may further comprise adding a first location identifier associated with the first location of the migration document to metadata associated with the migration shard. The method may also comprise adding a second location identifier associated with the second location of the migration document to the metadata associated with the migration shard. The method may additionally comprise adding one or more shard identifiers to the metadata associated with the migration shard, each of the one or more shard identifiers corresponding to a shard that includes a document that may be referenced by one or more documents in the migration shard.
Computation of caching policy based on content and network constraints
An apparatus comprising a first content oriented network architecture (CONA) node configured to couple to at least one second CONA nodes and implement collaborative caching in accordance with criteria comprising at least one content caching objective and at least one network operational objective, wherein the content caching objectives are in accordance with the network operational objectives. Also disclosed is a network component comprising a caching policy engine configured to receive network policy information and compute a caching policy in accordance with the network policy information, an inter-cache data transfer component coupled to the caching policy engine and configured to fetch a plurality of content object portions in accordance with the caching policy, a storage engine coupled to the inter-cache data transfer component and configured to cache the content object portions, and an eviction algorithm component coupled to the storage engine and configured to determine which, if any, of the cached content object portions are to be evicted.
Communications adaptable to mobile devices
A communication system is provided that is preferably a peer-to-peer (p2p) system. One or both of audio and video can be transferred among user terminals in the p2p system. The user terminals can include at least one master terminal, which could be an unhosted master terminal that does not communicate its own audio and/or video. In one embodiment, a first master terminal is included that controls video and/or audio transfers and an unhosted second master terminal is provided that communicates with at least two user terminals to provide desired connectivity involving such user terminals. In another embodiment, an unhosted master terminal is provided when the user terminals include mobile terminals in order to avoid power usage by mobile terminals. This communication system can be utilized with online game playing in which a game server is included, as well as having other communication applications.
Method for managing a distribution of bandwidth in a communications network, corresponding computer-readable storage medium and slave node
A method is proposed for managing a distribution of bandwidth in a communications network by means of a slave node of the network, said network comprising a set of nodes.The slave node is such that it performs steps for: determining a coarse representation and a detailed representation of the distribution of the bandwidth in said network, as a function of a piece or pieces of information relative to conditions of transmission in said network and/or relative to applications needs of transmission; receiving a coarse reference representation of the distribution of bandwidth in said network, coming from a master node of said network; comparing said determined coarse representation and said reference coarse representation; should said coarse representations be identical, applying said determined detailed representation; if not, applying said coarse reference representation.
Techniques for sender-validated message transmissions
Disclosed are various embodiments for filtering objectionable content from messages prior to transmission of the messages to recipients. A message is obtained for which a sender seeks to transmit, via a network, to one or more recipients. An examination is determined that is to be performed upon the message, where the examination is selected from among a set of available examinations. An action is initiated for the message, where the action is determined based upon a result of the examination. The action includes at least one of: transmitting the message to the recipients, requesting the sender to review the message, modifying the message, and deleting the message.
System and method for directing attention to Web site functionality
A system determines if functionality offered via a Web site is being underutilizing by a user, e.g., not being using at all or not being using with some desired degree of regularity. When it is determined that the functionality offered via the Web site is being underutilized by the user, the system provides an email to the user to direct the attention of the user to this functionality of the Web site.
A data processing device comprises a notification controller configured to provide notification to a user in response to a data processing event at that device or another device to which that device is connected; and a user interface by which the user can attend to a user notification to carry out a data processing task relating to the notified data processing event; the notification controller being configured to inhibit further notifications while the user is attending to a current notification using the user interface.
Processing of associated messages from plural social network services
The subject innovation relates to a method for presenting messages to a user of social network services. The messages are provided via an aggregation system, the aggregation system being connected to the social network services. An exemplary method comprises storing an identifier associated with a message in a user account of the user in the aggregation system. The exemplary method also comprises receiving messages from the social network services in the aggregation system, the messages being associated with the identifier. The exemplary method further comprises presenting the received messages to the user in response to a comparison between the identifier associated to the received messages and the identifiers stored in the user account.
Anti-phishing electronic message verification
Systems and methods are disclosed for allowing a recipient of an electronic message to verify the authenticity of the electronic message. A code can be included in the electronic message. The code can represent, or be associated with, an attribute of the electronic message. The recipient can navigate independently of the electronic message to a website familiar to the recipient and enter the code. In response, one or more attributes can be displayed to the recipient. The attributes are usable to verify the electronic message.
System and method for generating configurations used for accessing electronic mailboxes
A system and method generates configurations used for accessing electronic mailboxes. A database stores the configuration conventions that are sets of e-mail expressions formed by symbols. A transformer module expands configuration conventions stored in the database to generate configurations based on user supplied context data.
Policy based provisioning of Web conferences
A method, system and apparatus for the policy driven provisioning of a Web conference. A Web conference provisioning system can include a policy manager coupled to at least two different Web conferencing platforms over a computer communications network. The policy manager can have a configuration for processing a request for a Web conferencing from a communicatively linked end user to select one of the Web conferencing platforms to host the Web conference. Preferably, two of the different Web conferencing platforms can include a CPE based platform and a hosted platform.
Recipient address masking in computer communications
A messaging system for masking addresses from sending processes. The messaging system maintains a message service profile and a service-address profile. The messaging system accesses recipient data. Sending processes are able to send messages to the messaging system in a form such that each message has an message type and list of recipients. The messaging system is able to determine which of a set of sending services is to be used to send the message, based on the message-service profile. The service-address profile stores information about where in the structure of recipient data the appropriate address for the selected service is located. The addresses corresponding to the named recipients, for the services determined by the messaging system, can be retrieved by from recipient data. The message system can then provide the recipient address to the appropriate sending services to send the message.
Peer-to-peer file transfer between computer systems and storage devices
The disclosed embodiments provide a system that facilitates communication with a storage device. During operation, the system provides a physically operated mechanism for enabling detection of the storage device in proximity to a computer system using a discovery protocol. If detection of the storage device using the discovery protocol is enabled, the system uses the physically operated mechanism to establish a wireless peer-to-peer connection between the storage device and the computer system. The system then uses the wireless peer-to-peer connection to transfer a file between the storage device and the computer system.
Hydrocarbon well information portal
A networked information management system and architecture for managing files and documents pertaining to oil and gas wells and properties. On request by an authenticated user, a client workstation displays geographical information system (GIS) layers, via a web collaboration portal, for a region of the earth at which wells or properties may be located. The wells or properties within the displayed region enable links to documents or files associated with those wells and properties, and by way of which the system user can access the documents and files. Both structured and unstructured data elements can be accessed by the system. A collaboration portal allows for standardized access to the data, and also for simultaneous or collaborative access to the data. Workflow management capability is also implemented.
System and method for shared multimedia experiences across multiple subscriptions
A system and method for shared multimedia experiences across multiple subscriptions are provided. A method for application server operations includes receiving a first message from an application server, the first message including a request to initiate a collaborative session with a first communications device and a second communications device, examining a first profile of the first communications device and a second profile of the second communications device, establishing the collaborative session with the second communications device based on the first profile of the first communications device and the second profile of the second communications device, and sending a second message to the application server, the second message including information regarding the collaborative session.
Caching of digital contents in P2P networks
A method for enabling sharing of content files among nodes of a P2P network is provided. The P2P network comprises sub-networks each including a respective plurality of nodes capable of storing content files. Each sub-network has an associated corresponding hash table for indexing the content files stored in the nodes of the sub-network. The hash table is distributed among at least some of the nodes of the sub-network. The method comprises, for each content file stored in at least one node of a sub-network, storing in the hash table associated with the sub-network a criticality index providing an indication of the degree of sharing of the content file among the nodes of the sub-network. The method causes a node to cache at least one content file for sharing with other nodes of the sub-network based on the criticality index of the at least one content file.
Inferring user interests using social network correlation and attribute correlation
Methods and apparatus are provided for inferring user interests from both direct and indirect social neighbors. User interests are inferred from social neighbors by exploiting the correlation among multiple attributes of a user, in addition to the social correlation of an attribute among a group of users. Attributes of a user are inferred by obtaining an inferred set of attributes comprised of one or more attributes of social neighbors of the user. Thereafter, the inferred set is modified using a user attribute correlation model describing a probability that the attributes in the inferred set co-occur on the user and one or more of the social neighbors. An inference quality of the obtained attributes can optionally be obtained based on social network properties of the social neighbors. Interactions with the user and/or the social neighbors can be employed to solicit feedback to improve the one or more inferred attributes.
Composite services provision within a telecommunications network
The invention refers to a method of correlating a plurality of service instances by a service composition entity, wherein the services are performed by one or a plurality of servers of a telecommunications network. Thereto, the service composition entity performs the steps of invoking a composite service instance corresponding to the service request, and generating a composite service identifier identifying this composite service instance, contacting the one or a plurality of application servers for invoking the plurality of component service instances, wherein the plurality of component service instances are associated to the composite service instance, and sending a first service report comprising an information about the composite service instance to a service supervision system, wherein this information enables the service supervision system to identify reports about the component service instances as being associated to the composite service instance. The invention further proposes a service composition entity for correlating the plurality of service instances, and a service supervision system for monitoring, supervising or controlling the composite service instance.
Method for providing composed services in a peer-to-peer network
A method for providing a service containing facilities in a peer-to-peer network comprising peer devices is provided. The peer devices may be associated with groups, each group being defined by a pre-determined facility. The pre-determined facility may be executed by each peer device associated with a respective group, and a selected peer device of a group executes the respective facility. A sequence of facilities and specifications to be executed is publicized in the peer-to-peer network, on the peer devices executing the respective facility by a peer device requesting the combined service, and the selection of the selected peer devices is carried out according to the publicized sequence and the publicized specifications.
Providing state service for online application users
Online application state information is automatically saved for a user interacting with the application content. Saved states are presented to the user upon the user's return to the application. Upon the user's selection of a state, the user is presented with the online application populated with state information from prior interaction.
Method and apparatus for discovering internet protocol television service (IPTV) provider and IPTV service by using session initiation protocol
Provided are a method and apparatus by which a first entity receives information about one or more Internet Protocol Television (IPTV) service providers or information about one or more IPTV services from a second entity by using a Session Initiation Protocol (SIP) message.
Method and apparatus to generate audio versions of web pages
Audio files corresponding to a web page are generated by filtering a web page to remove characters that are non-audible. The audio files can be generated by a first server that receives a request for a web page or can be generated by a second server operating in cooperation with the first server. Additionally, web pages can be provided with a read me command button or other control object to allow audio versions of the web page to be selectively presented to a client terminal where the user desires to hear an audio version of the web page. Further, servers may maintain play lists of web pages, including audio versions thereof if desired. Some servers may maintain a preference list of web pages that users would like to hear audio versions of.
Defining force sensations associated with graphical images
Force feedback is provided to a user of a client computer receiving information such as a web page over a network such as the World Wide Web from a server machine. The client machine has a force feedback interface device through which the user experiences physical force feedback. The web page may include force feedback information to provide authored force effects. Force feedback is correlated to web page objects by a force feedback program running on the client and based on input information from the interface device, the web page objects, and the force feedback information. Generic force effects can also be provided, which are applied uniformly at the client machine to all web page objects of a particular type as defined by user preferences at the client machine. A web page authoring interface is also described that includes the ability to add force sensations to a web page. The user may assign force effects to web page objects and immediately feel how the web page will feel to an end user. A web page is output by the interface, including force information to provide the force effects at a client. The authoring tool can include or access a force design interface for creating or modifying force effects.
Method and apparatus for performing multiplicative functions
A new function for calculating the reciprocal residual of a floating-point number X is defined as recip_residual(X)=1−X*recip(X), where recip(X) represents the reciprocal of X. The function may be implemented using a fused multiply-add unit in a processor. The reciprocal value of X, recip(X), may be obtained from a lookup table. The recip_residual function may help reduce the latency of many multiplicative functions that are based on products of multiple numbers and can be expressed in simple terms of functions on each individual number (e.g., log(U*V)=log(U)+log(V)).
Radix-8 fixed-point FFT logic circuit characterized by preservation of square root-i operation
A system and method to reduce roundoff error of Fast Fourier transform (FFT) operation. Data which comes out as an irrational number (a square root) out of twiddle factors on a complex plane, included in a butterfly operation (8p) is preserved intentionally without being calculated in one stage of multiple stages of a multi-stage pipelined FFT, and when it occurs again in a later stage, an operation to multiply the two twiddle factors with each other is performed. This enables to eliminate roundoff errors during the butterfly operation 8p of radix-8. Other applications are also possible such as by overlaying a further stage by a butterfly operation of radix-2 or radix-4.
Systems and methods for reducing filter sensitivities
Various embodiments of the present invention provide systems and methods for reducing filter sensitivities. As an example, reduced sensitivity filter circuits are discussed that include a digital filter and a filter tap adaptation circuit. The digital filter is operable to filter a received input based at least in part on a plurality of filter taps, and to provide a filtered output. The filter tap adaptation circuit is operable to receive an error value and a weighting control value, and to adaptively calculate at least one of the filter taps using the error value and the weighting control value.
Enhanced knowledge repository
Embodiments of the present invention relate to knowledge representation systems which include a knowledge base in which knowledge is represented in a structured, machine-readable format that encodes meaning.
Translating an object-oriented data model to a YANG data model
Techniques in a data processor for translating an object-oriented data model to a YANG data model are described. In one embodiment, for example, a translator system is described for translating data representing an object-oriented data model construct to a data representing one or more YANG data model statements, the translator system comprises: an object-oriented data model construct identifier for identifying data representing an object-oriented data model construct; an object-oriented data model construct-to-YANG data model statement translator for translating the identified data to translated data representing one or more YANG data model statements; and a storing module for storing the translated data in one or more non-transitory computer-readable media.
Extensible access control list framework
Methods, systems, and products for governing access to objects on a filesystem. In one general embodiment, the method includes providing a framework in an operating system environment for support of a plurality of access control list (ACL) types, thereby enabling governing of access to objects on a filesystem according to an associated definition of an ACL type; and accepting definitions of ACL types. The associated definition may comprise a kernel extension.
Context-aware parameterized action links for search results
Parameterized actions are provided with search results to allow users to enter parameter values and perform the actions directly from the search results. By analyzing websites in a category, a parameterized action available at the websites and common parameters may be identified. When an end user performs a search that returns a web page result from a website having the parameterized action, an indication of the parameterized and common parameters may be provided as part of the search result. Additionally, user interface elements may allow the end user to enter parameter values to perform the parameterized action directly from the search result. In some instances, user context may be employed to pre-populate parameter values in the search result.
Content recommendation system, content recommendation method, content recommendation device, and information storage medium
The content recommendation system includes a user attribute information acquisition means for acquiring attribute information of a given user, a list acquisition means for acquiring at least one list from among lists of content sequentially generated over time on the basis of the attribute information of the given user acquired by the user attribute information acquisition means, a user preference information acquisition means for acquiring user preference information, which is feature information of content preferred by the given user, a content extraction means for extracting some content from content included in the list acquired by the list acquisition means on the basis of the user preference information acquired by the user preference information acquisition means, and a content presentation means for presenting the content extracted by the content extraction means to the given user.
Method and apparatus for generating and accessing metadata in media file format
Provided are a method and apparatus for generating and accessing metadata in a media file format. The method of generating metadata in a media file format includes generating a time-track map composed of a plurality of map nodes that are distinguished according to track and unit time, and generating media objects corresponding to each of the map nodes, in which each of the map nodes includes position information of the corresponding media objects, thereby facilitating real-time reproduction and modification of content.
Systems and methods for processing consumer queries in different languages for clinical documents
A computer implemented method of performing at least one document consumer query using a processor and a memory coupled to the processor, said method comprising the steps of: receiving at least one query for at least one clinical documents in a first query language from at least one document consumer; translating the query into a second query language to obtain a translated query; conducting the translated query in at least one database compatible with the second query language by the processor to obtain a first result; and providing the obtained first result to the document consumer. In some embodiments, the first query language is Digital Imaging and Communications in Medicine (DICOM) language, or the Hypertext Transfer Protocol (HTTP) language, and the second language is Cross-Enterprise Document Sharing (XDS) language.
Custom user parallel data import and export
Formatting data is disclosed. An indication of a specified data to be formatted between a format of a database and a format external to database is received. A formatter of the database is used to format the specified data between the format of the database and the format external to the database. The formatter has been integrated with the database using a formatter code defined external to the database.
Methods and apparatus for searching with awareness of geography and languages
A system that automatically discerning the best combinations of a user query's geographical origin and language, retrieving and displaying search results accordingly. A record on the system are associated with a geographic location and a language. A record could be composed of two or more records, each of which associates with a location and a language. A record could be in rich media format.
Facility management system using geographic information system
A facility management system has a facility GIS database configured with electronic map data and facility management GIS data containing data for identifying a location and a form of a facility located along a railway or a road, a facility register database configured to manage a name of a rail or a road, a kilometer post and attribute information in association with one another, and a kilometer post information management section configured to manage coordinate data of the facility on the general map and the kilometer post in association with each other. When searching for attribute information from the facility register database, the kilometer post information management section is referred to obtain kilometer post information by using the coordinate data of the facility and the attribute information of the facility is searched from the facility register database by using the kilometer post information.
Method and systems for efficient delivery of previously stored content
Systems and methods for reducing file sizes for files delivered over a network are disclosed. A method comprises receiving a first file comprising sequences of data; creating a hash table having entries corresponding to overlapping sequences of data; receiving a second file comprising sequences of data; comparing each of the sequences of data in the second file to the sequences of data in the hash table to determine sequences of data present in both the first and second files; and creating a third file comprising sequences of data from the second file and representations of locations and lengths of said sequences of data present in both the first and second files.
Anonymous information exchange
A third party facilitates exchange of customer data between first and second entities while maintaining customer privacy. Personally identifiable information (PII) and first entity customer attributes of a first set of customers are received from a first entity. PII for a second set of customers is received from a second entity. First and second set common customers are identified using the PII of the first and the second set of customers. Subsequently, a list of third set of customers is sent to the second entity. The list of third set of customers includes the common customers and a plurality of other customers from the second set of customers. Second entity customer attributes are received for each customer in the list of third set of customers. Further, the first entity customer attributes of the common customers and the second entity customer attributes of the common customers are linked.
Automated screen scraping via grammar induction
A method and a computer-readable medium are provided which perform screen scraping via grammar induction. The computer-readable medium stores instructions of the method, the instructions directing a computer processor to intercept display information transmitted to a computer-implemented display device representing information stored in a data source; induce a grammar via statistical analysis of the intercepted display information; provide the grammar to a parser-generator to generate a parser corresponding to the induced grammar; and perform screen scraping using the generated parser.
Ranking authors and their content in the same framework
One or more server devices may simultaneously calculate first ranking scores for a group of users and second ranking scores for a group of comments authored by the group of users. The calculating may occur during a same process. The one or more server devices may further provide one of a first ranked list that includes information identifying the group of users, the information identifying the group of users being ordered based on the first ranking scores, or a second group of comments of the group of comments, the comments in the second group of comments being ordered based on the second ranking scores.
Method and apparatus for searching for recommended music using emotional information of music
The present invention relates generally to a method and apparatus for searching for recommended music using the emotional information of music and, more particularly, to a method and apparatus that enable recommended music to be searched for using mixed emotions by extracting emotional values including a valence value and an arousal value from an input search condition when a predetermined search condition is input by a user, extracting an emotion rank combination corresponding to the extracted emotional value information using an emotion model that includes mixed emotions corresponding to the emotional values, searching a music emotion DB for music information corresponding to the emotion rank combination, and outputting a recommended music list based on the results of the search, thus improving the user's satisfaction with the results of the search.
Identifying trends from micro-posts
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying trends via representative micro-posts. One of the methods includes identifying query terms; selecting candidate documents that satisfy one or more of the terms of the query terms; selecting, from the candidate documents, candidate documents based on a weighted-coverage function for the query terms; pairing documents from the candidate documents based on a distance between the paired documents; generating one or more clusters from the paired documents, a cluster being associated with one or more topics of the query terms; selecting from the candidate documents, one or more particular documents, for one or more clusters, based on a diversity function; and providing for presentation the particular documents as representative documents that cover one or more topics associated with the one or more clusters.
Methods and systems for implementing fulfillment management
Embodiments of the invention include a method of implementing fulfillment management. The method includes receiving order information, wherein the order information includes one or more order lines, selecting at least one of the one or more order lines, scoring the one or more selected order lines, and accessing one or more rules assigned to the one or more order lines. The method further includes based on the assigned rules, defining a priority rank of each of the one or more selected order lines, specifying fulfillment of inventory based on the priority and scoring of each of the selected one or more order lines, and assigning inventory based on the specified fulfillment.
Systems and methods for classifying electronic information using advanced active learning techniques
Systems and methods for classifying electronic information or documents into a number of classes and subclasses are provided through an active learning algorithm. In certain embodiments, seed sets may be eliminated by merging relevance feedback and machine learning phases. Such document classification systems are easily scalable for large document collections, require less manpower and can be employed on a single computer, thus requiring fewer resources. Furthermore, the classification systems and methods described can be used for any pattern recognition or classification effort in a wide variety of fields, including electronic discovery in legal proceedings.
Methods and apparatus for distributed community finding
Methods and apparatus for a new approach to the problem of finding communities in complex networks relating to a social definition of communities and percolation are disclosed. Instead of partitioning the graph into separate subgraphs from top to bottom a local algorithm (communities of each vertex) allows overlapping of communities. The performance of an algorithm on synthetic, randomly-generated graphs and real-world networks is used to benchmark this method against others. An heuristic is provided to generate a list of communities for networks using a local community finding algorithm. Unlike diffusion based algorithms, The provided algorithm finds overlapping communities and provides a means to measure confidence in community structure. It features locality and low complexity for exploring the communities for a subset of network nodes, without the need for exploring the whole graph.
Labeling events in historic news
A system identifies a set of documents from a corpus of documents that are relevant to a word, phrase or sentence and that were published at approximately a same time period, where each document of the set of documents includes news content and has an associated headline. The system extracts headlines from the set of documents and derives a score for each headline of the extracted headlines based on how many times selected words in each headline occurs among all of the extracted headlines.
Systems and methods for web page grouping based on URLs
Systems and methods for webpage grouping based on URLS include receiving a uniform resource locator item; receiving a plurality of flow paths from a database, each flow path representing a path of web page visits by a user, each flow path comprising the uniform resource locator item, each flow path further comprising at least one other uniform resource locator item having a uniform resource locator prefix; defining a node for display based on the uniform resource locator prefix common to the plurality of flow paths; and generating display data comprising a representation of the uniform resource locator item and a representation of the defined node.
Method for determining constraint-based relationships between devices for interacting and sharing information
The system includes a registry server and devices. The registry server is coupled to the devices for publishing or registering spots, managing places and authenticating membership and places. The registry server includes a data store for constraint metadata, an authentication module, a spot manager module, a place manager module and a query response module. The devices are adapted to collect field values, create spots, access places, and interact and share information with other spots. In one embodiment, the devices include a constraint collection module, a spot creation module, a query module, a challenge creation module, a presentation module, a challenge response module, a spot action module and a spot communication module. The present invention includes methods for creating a spot, for generating and approving a challenge, for direct communication or sharing of documents, for performing an action based upon information space membership and for searching for available places.
Semantic metadata extraction
A method and apparatus for extracting metadata. The method includes the steps of capturing metadata of one or more data sources, capturing metadata of one or more data sets comprising the one or more data sources, capturing metadata of one or more fields comprising one or more of the data sets, and capturing metadata of content within zero or more of the fields. The extracted metadata is stored to a non-volatile computer readable storage medium.
Systems and methods to process enquires by receving and processing user defined scopes first
An apparatus for use in managing information content in a network-based communication system. The apparatus includes a processing element that includes a processor managed and operated by an operation system (OS) software and coupled to a memory. The processing element executes a first application to call a second application for permitting the user to enter a plurality of defining terms for the second application to apply the defining terms as search filters for searching and retrieving uniform resource locators for linking to contents relevant to the defining terms entered by the user. The second application further determines whether to call the OS depending on the search filters generated from the defining terms.
Method and system for storing, organizing and processing data in a relational database
A system and method of processing a data query in a data processing system is provided. The data in the data processing system includes a plurality of individual data elements. The data elements are grouped and stored in at least one data unit. The information about the at least one data unit is gathered and stored in at least one information unit. The method comprises receiving the data query to be executed; using the information in the at least one information unit to optimize and execute the query; resolving the data query; and returning results of the data query for use by the data processing system.
Embedding hot spots in electronic documents
A Mixed Media Reality (MMR) system and associated techniques are disclosed. The MMR system provides mechanisms for forming a mixed media document that includes media of at least two types (e.g., printed paper as a first medium and digital content and/or web link as a second medium). In one particular embodiment, the MMR system includes a method, system, and computer readable medium for embedding a hot spot in an electronic document. Marks corresponding to a designation for a hot spot in an electronic document are embedded, allowing for later capture of coordinates corresponding to a printed representation of the electronic document and the hot spot.
Automatic media article composition using previously written and recorded media object relationship data
Metadata is associated with media elements in a content store during automatic composition of media articles. The metadata includes relationship data indicating how what is portrayed by that media element relates to what is portrayed by one or more other media elements. Because relationship metadata is included media articles can be generated automatically with the need for the production of a detailed framework describing that media article.
Project resource qualification and keyword scoring
A system and method for facilitating determining and displaying search results and accompanying scores in an enterprise computing environment. The example method includes receiving a resource request that includes one or more search criteria. The one or more search criteria includes a specification of one or more keywords and one or more resource qualifications. The method further includes determining, based on the search criteria, a qualification score for each resource indicated in a database of resources; using the qualification score to determine search results responsive to the resource request; and displaying each search result proximate to a qualification score. In a specific embodiment, the method further includes calculating the qualification score by combining components of the qualification score according to an algorithm. The components of the qualification score include a competency component and a keyword component.
Interactive query plan visualization and optimization
A computer system affords a user the ability to interactively formulate, visualize, and modify query plans that are to be posed to a database. The computer system provides query visualization in the form of decision trees having nodes selectable/deselectable to search for alternative query plans with lower or minimum execution time. The estimated cost and/or the execution time of a subtree of a query plan may be mapped according to a rectangle area metaphore, with the area of a rectangle enclosed by a larger rectangle representing a parent node in the plan tree. Query plans may be saved by the system in order to facilitate their visualization, optimization, and/or modification at a later date.
Generic framework for historical analysis of business objects
The present disclosure describes methods, systems, and computer program products for analyzing historic changes to business objects. One method includes monitoring at least one business object for a modification made to at least one business object node attribute. In response to a monitored modification associated with a particular business object node attribute, a new historical version of the at least one business object node attribute is prepared, the new historical version of the at least one business object node attribute including the modified business object node attribute value. A previous historical version of the at least one business object node attribute is retrieved and updated in response to the monitored modification. The new historical version of the at least one business object node attribute and the updated previous historical version of the at least one business object node attribute are then stored.
Autonomic index creation, modification and deletion
An index advice record engine generates and stores index advice records. An index advice policy mechanism allows a user to define an index advice policy that specifies criteria for autonomic index creation, modification and deletion. An autonomic index mechanism reads the index advice records, compares this information with the criteria in the user-defined index advice policies, and determines whether an index should be created, modified or deleted based on the information in the index advice records and the index advice policies. By automating the process of creating, modifying and deleting indexes according to user-defined policies, the preferred embodiments alleviate human users from most of the work of manually creating, modifying and deleting indexes.
Customization of search results for search queries received from third party sites
A third party website provides a search interface to a general search engine. A site profile of the third party website describes various topics, keywords, or domains that are potentially relevant or of interest to users who access the third party website. The topics are associated with a topical directory, with domains associated with each topic; the domains in a given topic are given various weightings. When a search is submitted to the general search engine from the third party website via the search interface, the general search engine uses the site profile to customize the search results. The search results are customized by weighting the ranking of documents from websites associated with the topics in the site profile. The site profile can be manually or automatically constructed.
Method and means for browsing by walking
A mobile station is arranged to determine its location, which is searched against street addresses from a database, and at least one matching street address is retrieved. The street address is searched on the mobile station and/or over the network. The search engine conducts a search in the mobile station file system and/or the Internet and/or a file system over the network with the at least one query term, —at least one search result is arranged to be displayed to user on the screen of the mobile station. This facilitates on-demand effortless Mobile Internet Search that allows the users to access opportunities that they did not know about, or would not have had time to find out about with minimum effort as the software of the mobile phone is scanning the Internet and information pages for these opportunities and displaying the results dynamically on the mobile phone screen.
Neuroimaging database systems and methods
Systems for and methods of utilizing a neuroimaging database are presented. The systems and methods include techniques for analyzing the pathophysiological basis of a chronic brain disease and/or the effectiveness of a treatment for a chronic brain disease, obtaining data for research of a chronic brain disease, searching for chronic brain disease symptoms identified in a clinical patient, searching a database by comparing the brain scan images of patients with suspected indications of chronic brain disease with other patients in the database to identify sets of patients with similar indications in their brain scan images, displaying brain scan information regarding a person, and using image pattern matching to analyze the pathophysiological basis of a chronic brain disease and/or the effectiveness of a proposed or previously administered treatment for a chronic brain disease.
Method to increase content relevance using insights obtained from user activity updates
Embodiments are directed towards ranking candidate pieces of content for publication based on a weighted combination of an “activity score” and a “trending score”. In one embodiment, the activity score measures social activity related to the content, such as how much the content has been shared, viewed, or commented on. In one embodiment, the trending score indicates a measure of trending topics contained in the content. In one embodiment, trending topics are keywords derived from an analysis of social activities across the internet, such as blog posts, wall posts, tweets, comments, ratings, tags, videos, pictures, and the like. In one embodiment, a topic is trending if it surpasses a minimum absolute threshold of social activity as well as a percentage increase in social activity.
System and method for measuring the effectiveness of an on-line advertisement campaign
A system and method for modeling and optimizing the effectiveness of search engine optimization (“SEO”) initiatives and search engine marketing (“SEA”) campaigns is described. Several embodiments include methods and systems for classifying each of a plurality of websites using at least one of a plurality of classifications. Data associated with the plurality of websites is then acquired. The acquired data is then analyzed to achieve a result which may be used to model or optimize the effectiveness of the SEO initiatives and SEA campaigns.
Hash lookup table method and apparatus
A method includes generating an N-bit generated hash key for an M-bit search key. A data value associated with a matching hash key stored in a content addressable memory is retrieved. The matching hash key is then validated. The content addressable memory supports 2k entries, wherein M>N>k.
Automated viewable selectable change history manipulation
A set of edited changes associated with an editable file is displayed on a display associated with a computing device in response to receipt of a request via a user input device to display the plurality of edited changes. A contextual representation of the editable file is displayed. A context indicator is displayed within the contextual representation of the editable file that represents a location within the editable file associated with a first of the displayed set of edited changes. The context indicator is iteratively updated to represent a location within the editable file associated with each selected element of the displayed set of edited changes in response to detection of user selections of elements of the displayed set of edited changes received via the user input device.
Systems and methods for providing content aware document analysis and modification
Systems, methods and consumer-readable media for providing content-aware document analysis and modification are provided. A system for analyzing document content according to the invention may include a rules server that stores a set of expressions. Such expressions may define predetermined confidential information and/or patterns of confidential expressions. The system may further include a communication plugin that provides a platform for incorporating the set of confidential expression patterns as part of a document-producing application. Following incorporation of the communication plugin, an inline document monitor module according to the invention may form part of the document-producing application. The inline document monitor may monitor for the occurrence of at least one of the set of confidential expression patterns in a document.
Readable text-based compression of resource identifiers
Provided are techniques for compressing a text string that includes multiple parameter keys and multiple corresponding parameter values. In an example embodiment, the techniques include identifying the parameter keys and determining corresponding parameter key identifiers. In this embodiment, a first portion of a compressed URL is generated as a string of unique parameter key identifiers that corresponds to the plurality of parameter key identifiers. A second portion of the compressed URL is generated as a parameter value list that corresponds to the string of the plurality of unique parameter key identifiers and to corresponding ones of the plurality of parameter values. In addition to the foregoing, other techniques are described in the figures, description, and claims.
Optimized image archiving
An optimized backup image of a virtual machine is generated. The virtual machine is associated with a virtual disk. The virtual disk includes one or more virtual volumes. Generating the optimized backup image includes excluding one or more invalid sectors of the virtual disk from the optimized backup image.
System and device for data management, and method thereof
Provided are a data management method, device and system for synchronizing data without prior knowledge of the data's structure. When any application is activated, application data is created and also an application data change log is created to indicate a change in the application data. In addition, a schema table defining a data structure for storing the application data is created and also a schema table change log indicating a change in the schema table is created. Based on such data and logs, a client and a server can share data without a prior agreement in data schema.
Collaborative self-service contact architecture with automatic blog content mapping capability
Resolving an issue raised by at least one user includes establishing a contact session over a communication channel for servicing the issue. The Internet is searched for content related to providing a resolution for the issue using a customized query, when a search of a database does not return results. Content obtained from at least one Internet source as a result of searching the Internet using the customized query is restructured to prepare the resolution for the issue. The at least one Internet source from which the content was obtained is updated with the resolution.
Applying replication rules to determine whether to replicate objects
A source server maintains a replication rule specifying a condition for a replication attribute and a replication action to take if the condition with respect to the replication attribute is satisfied, wherein the replication action indicates to include or exclude the object having an attribute value for the replication attribute that satisfies the condition. For each of the objects, the replication rule is applied by determining an attribute value of the object corresponding to the replication attribute in the replication rule and determining whether the determined attribute value satisfies the condition for the replication attribute defined in the determined replication rule. The replication action on the object in response to determining that the determined attribute value satisfies the condition for the replication attribute.
Coalescing and capturing data between events prior to and after a temporal window
Systems and methods of coalescing and capturing data between events prior to and after a temporal window are disclosed. In an embodiment, a method includes determining a temporal window based on one or more of a user data and an automatically generated data, coalescing data between events prior to the temporal window using a processor and a physical memory and capturing data between events after the temporal window. The coalescing data between events prior to the temporal window may be determined by a set of overlapping operations to a data set, wherein certain operations have non-overlapping sectors which are not coalesced. Shifting a data view around a recovery point through a direction-agnostic roll algorithm that may use a roll-forward algorithm to shift the data view to a time after the recovery point and/or a roll-backward algorithm to shift the data view to a time before the recovery point.
Identifying user segment assignments
Disclosed are various embodiments for identifying segment assignments of users within segments of interest. Historical user behavior associated with users for whom segment assignments within segments of interest is analyzed. Probabilities associating possible segment assignments within a segment of interest with user behavior are calculated. User behavior of anonymous users and/or users for which segment assignments are unknown can be determined along with a confidence score.
Adaptive analytical behavioral and health assistant system and related method of use
This present disclosure relates to systems and methods for providing an Adaptive Analytical Behavioral and Health Assistant. These systems and methods may include collecting one or more of patient behavior information, clinical information, or personal information; learning one or more patterns that cause an event based on the collected information and one or more pattern recognition algorithms; identifying one or more interventions to prevent the event from occurring or to facilitate the event based on the learned patterns; preparing a plan based on the collected information and the identified interventions; and/or presenting the plan to a user or executing the plan.
Random walk on query pattern graph for query task classification
A classification process may reduce the computational resources and time required to collect and classify training data utilized to enable a user to effectively access online information. According to some implementations, training data is established by defining one or more seed queries and query patterns. A bi-partite graph may be constructed using the seed query and query pattern information. A traversal of the bi-partite graph can be performed to expand the training data to encompass sufficient data to perform classification of the present search task.
Active learning decision engines
Systems and methods for active learning decision engines in accordance with embodiments of the invention are disclosed. In one embodiment of the invention, an active learning decision engine includes equivalence class storage, hypotheses storage, edge storage, test storage, where tests are related to hypotheses, observation storage; and a processor, where the processor is configured to determine a plurality of equivalence classes containing one or more hypotheses, determine a set of edges utilizing tests, where the edges in the set of edges span hypotheses in distinct equivalence classes, determine weights for the determined edges, select a test based on the determined weights, perform the selected test and observe the results of the performed test, remove edges from the set of edges utilizing the observed results, and select a hypothesis from the one or more hypotheses using the set of edges.
Schedule management system using interactive robot and method and computer-readable medium thereof
An interactive robot may audibly communicate with a user, determine whether reasoning is performed according to a reasoning weight of a schedule if there is a schedule to be recommended by the interactive robot during conversation between the interactive robot and the user, perform reasoning using information collected in a database if reasoning is necessary, and provide schedule information to the user.
Map-based search for real estate service providers
A computer system for locating real estate service providers by navigating an aerial image map of a geographic region. The system determines a search region corresponding to the geographic region by use of geospatial information associated with the geographic region. Once the search region is determined, the system searches a database for real estate service providers that are associated with the search region and that satisfy certain predetermined criteria.
Unified identity verification
In some example embodiments, a system and method is shown that includes receiving a purchase request through an Electronic Payment Financial Network (EPFN), the purchase request including a token to identify a merchant server. The system and method further includes comparing the token against a merchant identifier value to determine that that token is assigned to the merchant server. Additionally, the system and method includes transmitting a purchase request authorization authorizing an online transaction, where the token and merchant identifier value are equivalent.
Digital data reproducing device
The present invention provides a digital data reproducing device having a simple configuration and being capable of protecting copyright of digital data such as video or audio. Content provider side embeds copyright management information (cumulative number of reproduction times, permissible number of reproduction times, etc.) into digital data that has been degraded by scrambling, and provides it to a content user. A reproducing device of the content user side causes copyright management information detection unit to detect the copyright management information, decreases the data degradation depending on result of the detection, and reproduces by data reproducing unit.
Systems and method for bin-based risk managed trading
Predefined exposure limits including an actual and a permitted maximum number of owned instrument units or that an entity is exposed are used to determine trade executability. A request for strips of financial instruments is received. A stepped graph is constructed for the financial instrument based on held positions, wherein one axis of the stepped graph represents a time period covering the strip of contracts and another axis represents a total exposure to the financial instrument. The received request is compared to the stepped graph to determine whether the permitted maximum number of investment units would be violated for one or more of the first units of time should the requested trade execute. The trade is then allowed to execute if no violation is determined, and blocked otherwise.
Method and system for an integrated approach to collections cycle optimization
Methods and systems are provided for an integrated approach to collections cycle optimization including optimizing personnel, communications, and collection resolutions, resulting in reducing the variability of the collections cycle, reducing instances of foreclosure in collections, while increasing borrower satisfaction with the collections process. Candidate loan officers are selected based on behavioral attributes, personnel history, and human resources information, among other factors. Scripts that improve the effectiveness of communication between loan collection staff and borrowers are generated. An optimized collection program to best suit the needs of a particular borrower is determined.
On-demand generating E-book content with advertising
A method of providing fixed computer-displayable content in response to a consumer request for content is presented. Upon obtaining a digital image corresponding to the requested content, an advertisement is selected. The advertisement is to be included in an on-demand electronic content corresponding to the requested content. The advertisement is included with the digital image corresponding to the requested content. A fixed computer-displayable content corresponding to the requested content is generated. The fixed computer-displayable content is then provided to the consumer.
Method and apparatus for timekeeping
For reporting, recording, and/or employee timekeeping, an exemplary time manager interface on a display of a communications device allows an employee to track his or her work time and activities. The time manager interface connects the employee to a central time manager system that tracks and records employee check-in and check-out times. The time manager interface may also permit employees to view their and other schedules. The time manager interface is able to compensate for the time spent initially connecting to the network and launching the interface by recording the network logon time as the check-in time when the difference between the network logon time and the actual reported time is below a predetermined threshold.
Automated processing of digital media collections for distributed e-commerce
A method and a network device for e-commerce on a seller's website, including maintaining by an e-commerce server a catalog of products wherein each product may be ordered in conjunction with a media item and wherein the price of a product varies in accordance with the media item, receiving, by a buyer's web browser, a web page from the seller's website, the web page including at least one image, each image corresponding to a media item, enabling the buyer to select an image, said image corresponding to a desired media item, and a product, sending information about the selected image and the selected product, to the e-commerce server wherein the e-commerce server has no previous price information about said desired media item, dynamically determining, the purchase price of the selected product in conjunction with the desired media item, and enabling the buyer to specify a purchase order for the product.
Method and system for location based hands-free payment
Certain aspects of a method and system for location based hands-free payment may include a network that comprises a plurality of mobile devices and a plurality of point of sale devices. A first mobile device may determine its location coordinates and communicate them to a selected point of sale device. An authorization to execute a payment transaction may be triggered on the first mobile device when it is within a defined proximity of the selected point of sale device. In another embodiment of the invention, a first point of sale device may determine the location coordinates of a selected mobile device and trigger a notification based on a generated geo-fence when the selected mobile device is within a defined proximity of the first point of sale device.
System and method for enabling an advertisement to follow the user to additional web pages
A computer-implemented method and system for advertising that performs the steps of delivering an electronic advertisement comprising one or more menu options and a reference to a network location for retrieving specified content associated with each menu option for inclusion in a first electronic document, receiving a selection of one or more menu options from the electronic advertisement and delivering a subsequent accessible document including content from the referenced network location associated with the menu option selected, the subsequent accessible document including the electronic advertisement.
Method and system for communicating location of a mobile device for hands-free payment
Certain aspects of a method and system for communicating location of a mobile device for hands-free payment may include a peer-to-peer ad-hoc network that comprises a plurality of mobile devices, a plurality of access points, and a plurality of point of sale (POS) devices. A first mobile device may determine its location coordinates and communicate them to a selected POS device via the peer to peer ad-hoc network. At least one of the plurality of mobile devices and/or the plurality of access points may be within a defined proximity of the selected POS device. In some instances, the first POS device may receive via one or more intermediate mobile devices in the peer-to-peer ad-hoc network, location coordinates and payment transaction information of a selected mobile device. At least one of the intermediate mobile devices may be within a defined proximity of the first POS device.
Systems and methods to provide information and connect people for real time communications
Methods and apparatuses to provide communication connections at a cost reduced via advertising. One embodiment includes: receiving a request from a first user over a data communication network; response to the request, initiating a first telephonic connection to the first user and a second telephonic connection to a second user to provide a telephonic connection between the first and second users; presenting an advertisement to at least one of the first and second users; and reducing a communication fee for the telephonic connection between the first and second users using a portion of an advertisement fee charged for the advertisement.
Services advertisement in a wireless mesh
A computing environment containing a mesh network that is adapted to provide a reliable transport mechanism over which services may be delivered. Nodes of the mesh can automatically select routable addresses without conflicts, which allows nodes of the mesh to be accessed, even as the mesh changes through the addition or deletion of nodes. Also, nodes communicate with a protocol that supports service advertisements. These advertisements can identify mesh nodes that supply services, such as file or print servers, for which devices that have not yet connected to the network may be searching. Advertisements can also identify services to be used by nodes in the network, allowing, for example, a node to select a gateway providing a reliable connection to an external network. The mesh network can be used as a transport for communication using protocols, such as TCP/IP, that generally exhibit poor performance when using unreliable transports.
Interactive use and athletic performance monitoring and reward method, system, and computer program product
A method, computer program product, and system for monitoring and rewarding athletic performance and use of a product worn by a person, thereby motivating use of the product and promoting customer loyalty. The present invention includes and system and method for measuring, tracking, and recording use of the product, preferably related to the athletic performance of an athlete, using a portable, remote device; transferring that data from the remote device to a common location, such as an Internet web site service; calculating, assigning, and tracking rewards based on the level of use determined from the data; and allowing the user to redeem his or her rewards or compare his or her performance level with other athletes using other remote devices.
System and method for analyzing and managing business performance
A system and method for analyzing and managing business performance by designing and evaluating the performance of a business process model comprising a flow of business tasks and artifact sources that generate business artifacts. Business processes may be parsed to identify transformation opportunities meeting transformation conditions specified in a transformation knowledge. One or more identified transformation opportunities may be adopted, and parts of the process may be transformed according to transformation rules specified in a transformation knowledge. Analytics and computer simulation may be employed to evaluate business performance metrics of each of said transformed business processes. Iterative changes may be made to said business processes to manage business performance, reiterating transformation and evaluation steps until a satisfactory business process model is obtained. The resulting output is finally produced as a business process model in machine-readable format and can be deployed to a business environment.
Adaptive direct transaction for network client group
Internet-based software and associated database provide group analysis overlay to monitor client-server web traffic and provide direct marketing to client group. Client car, patient, office or school sensor and interface provides overlay attribute for database comparison to classify usage pattern, location, timing, or family for targeted messaging for enhanced service from server source. Database group registry tracks client classification and provides adaptive context mapping according to set attribute relative to targeted on-line transaction.
Virtual participant-based real-time translation and transcription system for audio and video teleconferences
The present disclosure describes a teleconferencing system that may use a virtual participant processor to translate language content of the teleconference into each participant's spoken language without additional user inputs. The virtual participant processor may connect to the teleconference as do the other participants. The virtual participant processor may intercept all text or audio data that was previously exchanged between the participants may now be intercepted by the virtual participant processor. Upon obtaining a partial or complete language recognition result or making a language preference determination, the virtual participant processor may call a translation engine appropriate for each of the participants. The virtual participant processor may send the resulting translation to a teleconference management processor. The teleconference management processor may deliver the respective translated text or audio data to the appropriate participant.
System, methods and automated technologies for translating words into music and creating music pieces
Systems, methods and computer program products are provided for translating a natural language into music. Through systematic parsing, music compositions can be created. These compositions can be created by one or more persons who do not speak the same natural language.
Method and apparatus of transforming speech feature vectors using an auto-associative neural network
Provided is a method and apparatus for transforming a speech feature vector. The method includes extracting a feature vector required for speech recognition from a speech signal and transforming the extracted feature vector using an auto-associative neural network (AANN).
Method of removing contamination in acoustic noise measurements
A method for the automatic removal of speech contamination from an acoustic noise signal. The method includes the steps of: (a) receiving an input acoustic noise signal; (b) automatically detecting speech contamination in the received acoustic noise signal using a VAD; (c) automatically identifying uncontaminated segments of the received acoustic noise signal based upon a decision value output by the VAD; (d) automatically assembling a congruous uncontaminated acoustic noise signal from the identified uncontaminated segments of the received acoustic noise signal; and (e) outputting the congruous uncontaminated acoustic noise signal. Also, systems implementing such a method.
Method of estimating noise levels in a communication system
A method of estimating noise in data containing voice information and noise includes receiving the data as a sequence of input values; transforming the data by applying a first non linear mapping to the input values wherein the derivative function of the mapping decreases in magnitude as the input values increase in magnitude smoothing the transformed data; and transforming the smoothed transformed data by applying a second non linear mapping that is opposite to the first non linear mapping, to determine an estimate of the noise in the inputted data.
Time warped modified transform coding of audio signals
A representation of an audio signal having a first, a second and a third frame is derived by estimating first warp information for the first and second frames and second warp information for the second and third frames, the warp information describing pitch information of the audio signal. First or second spectral coefficients for first and second frames or second and third frames are derived using first or second warp information and a first or second weighted representation of the first and second frames or second and third frames, the first or second weighted representation derived by applying a first or second window function to the first and second frames or second and third frames, wherein the first or second window function depends on the first or second warp information. The representation of the audio signal is generated including the first and the second spectral coefficients.
Language classifiers for language detection
Techniques for determining one or more preferred languages for a user are provided. The preferred languages may be determined based upon a set of language indicators. The language indicators are analyzed using, for example, rules-based techniques, clustering, language classifiers, and the like, or combinations thereof. Language indicators can include or be derived from information about the user's behavior, location, preferences, social connections, or other data related to the user.
Disclosed are methods and apparatus for processing linguistic expressions (e.g., opinionated text documents). The linguistic expressions are processed by, firstly, detecting topics of interest discussed in the linguistic expressions. The sentiment, or sentiments, of an originator with respect to each of the topics detected in the linguistic expressions is then assessed. The originators are then grouped (or clustered) into one or more groups based on the similarities between the originators' respective sets of detected topics and corresponding sentiments. Semantic information is then associated with a given group. Finally, for a given member of a given group, a profile is created or updated. This profile comprises attributes that may be based on a degree of membership of the given member to the given group and the semantic information associated with the given group.
Bootstrap call router to other languages using selected N-best translations
Techniques disclosed herein include systems and methods for creating a bootstrap call router for other languages by using selected N-best translations. Techniques include using N-best translations from a machine translation system so as to increase a possibility that desired keywords in a target language are covered in the machine translation output. A 1-best translation is added to a new text corpus. This is followed by selecting a subset that provides a varied set of translations for a given source transcribed utterance for better translation coverage. Additional translations are added to the new text corpus based on a measure of possible translations having words not yet seen for the selected transcribed utterances, and also based on possible translation having words that are not associated with very many or semantic tags in the new text corpus. Candidate translations can be selected from a window of N-best translations calculated based on machine translation accuracy.
Detection of memory access violation in simulations
An apparatus and method for detecting memory access violations in simulations is disclosed herein. A detection tool is designed to automatically perform a violation check for each memory read or write operation simulated in a modeled system. The detection tool is capable of handling a modeled system including one or more memories and/or one or more processors.
Managing an infrastructure
In a method for managing an infrastructure, a utilization of a plurality of infrastructure components in performing an objective is simulated. In addition, a resource demand for the infrastructure associated with the simulated utilization of the infrastructure components is determined and a supply of resources by a plurality of available sources to meet the determined resource demand is simulated. Moreover, at least one metric associated with the determined resource demand and the simulated supply of resources by the plurality of available sources is determined.
Systems and methods for providing warning of anomalous alarm clock settings
Systems and methods relate to managing an alarm clock function of a device. The systems and methods for compare a time setting of a new alarm by a user to one or more previous times settings that the alarm has been set to determine whether to warn the user about and/or require the user to confirm the time setting of the new alarm. The systems and methods can detect a user input indicating a first time setting for the alarm clock function. Further, the systems and methods can examine the one or more previous time settings associated with the alarm clock function determine, based on the one or more previous time settings, whether to query the user to confirm an activation of the alarm clock function at the first time setting.
A bed device has a load measurement unit for generating a load signal; a first computation unit for computing a center-of-gravity variation or load variation on the basis of the load signal; a first determination unit for determining whether the computation result for the center-of-gravity variation or load variation is equal to or greater than a first threshold value; a totaling unit for totaling the number of times that the computation result is determined to be equal to or greater than the first threshold value; a second computation unit for multiplying the totaling results by coefficients for each time period and adding the results; and a second determination unit or determining a waking or sleeping state or determining a body movement or rest state of a user on the basis of whether a computation result of the second computation unit is equal to or greater than a second threshold value.
Misalignment indication decision system and method
Systems and methods for deciding whether or not to indicate misalignment. In some examples, an analysis of parametric data relating to tests sensitive to misalignment is performed in order to determine which data is incongruous and to identify corresponding probes or socket contacts as suspected misaligned. In some examples, additionally or alternatively, a spatial analysis quantifies the placement of a set of identified suspected misaligned probes, which were identified from pass/fail test data and/or parametric test data, with respect to a contiguous or non-contiguous area on one or more wafers.
Re-configurable test circuit, method for operating an automated test equipment, apparatus, method and computer program for setting up an automated test equipment
A re-configurable test circuit for use in an automated test equipment includes a test circuit, a test processor and a programmable logic device. The pin electronics circuit is configured to interface the re-configurable test circuit with a DUT. The test processor includes a timing circuit configured to provide one or more adjustable-timing signals having adjustable timing. The programmable logic device is configured to implement a state machine, a state sequence of which depends on one or more input signals received from the pin electronics circuit, to provide an output signal, which depends on a current or previous state of the state machine, to the pin electronics circuit in response to the signal(s) received from the pin electronics circuit. The test processor is coupled to the programmable logic device to provide at least one of the adjustable-timing signal(s) to the programmable logic device to define timing of the programmable logic device.
Ultrasonic inspection equipment and ultrasonic inspection method
Ultrasonic inspection equipment facilitates alignment of display positions of three-dimensional ultrasonic inspection data and three-dimensional shape data, and quickly discriminates between a defect echo and an inner-wall echo. A computer 102A has a position correction function of correcting a relative display position between three-dimensional shape data and three-dimensional ultrasonic inspection data. A display position of the three-dimensional ultrasonic inspection data or that of the three-dimensional shape data is moved by a norm of a mean vector along the mean vector that is calculated from a plurality of vectors defined by a plurality of points selected in the three-dimensional ultrasonic inspection data and by a plurality of points selected in the three-dimensional shape data. The three-dimensional shape data and the three-dimensional ultrasonic inspection data are displayed in such a manner as to be superimposed on each other on a three-dimensional display unit 103C.
Method and arrangement for voltage measurement
A method and an arrangement for voltage measurement with a transformer configuration comprising three single pole voltage transformers having tertiary windings open-delta connected with each other. The arrangement is configured to apply a correction to measured secondary voltages on the basis of one or more parameters of the voltage transformers and/or one or more quantities in a known relation to one or more parameters of the voltage transformers, one or more parameters of a circuit connected to the secondary windings and/or one or more quantities in a known relation to one or more parameters of the circuit connected to the secondary windings, and one or more parameters of a circuit connected to the tertiary windings and/or one or more quantities in a known relation to one or more parameters of the circuit connected to the tertiary windings.
Representing a plot with a mini-plot
A mini-plot is generated using the actual raw measurement data, and gives a preview of a full-sized plot which is displayed when a user expresses interest in the mini-plot. In some embodiments, the mini-plot is sufficiently resolved to provide the user with graphical information about the measurement data. In some embodiments, the mini-plot is updated upon receiving new measurement data from an ongoing experiment. In some embodiments, the mini-plot is a mini-chromatogram. In some embodiments, the mini-plot is displayed in a table along with textual and/or numerical measurement data for an experiment (e.g., in listing textual and/or numerical chromatography data).
Remote vehicle emissions sensing system and method for differentiating water from hydrocarbons
Water droplets in exhaust gas that is, or was, analyzed by a remote emissions sensing system are detected. The detection may be made using measurements generally captured by the remote emissions sensing system during typical operation. As such, the detection may be applied “on site” as remote emissions sensing analysis is ongoing, or may be applied post hoc from data previously acquired by a remote emissions sensing system. The detection may be implemented without requiring additional sensors, more sophisticated sensors, and/or other additional or more sophisticated equipment being included in the remote emissions sensing system.
Systems and methods for intravenous drug management using immittance spectroscopy
Described herein are devices, systems, and methods for determining the composition of liquids, including the identity of one or more drugs in the liquid, the concentration of the drug, and the type of diluent using immittance spectroscopy. These devices, systems and methods are particularly useful for describing the identity and, in some variations, concentration of one or more components of a medical liquid such as intravenous fluid. In particular, described herein are devices, systems and methods that may operate in low ionic strength diluents. Also described are methods of recognizing complex immittance spectrograph patterns to determine the composition of a liquid by pattern recognition.
System for gas detection, well data collection, and real time streaming of well logging data
A system for creating a log during gas detection and monitoring is disclosed herein. The system can include a gas detection and well logging device for sensing and transmitting data, which can include a processor in communication with a monitoring device. The monitoring device can monitor, acquire, and transmit data associated with a drilling operation. The processor can receive the data, calibrate the data, and log the data into files. The processor can capture sensed data based on a time event and a depth event. The processor can scale the data and form a geological-hydrocarbon log for transmission. A client device can be in communication with the gas detection and well logging device, and can have computer instructions for querying the geological hydrocarbon log, the data, and the files to obtain real time streaming data for instant display.
Polar display for use with drilling tools
Various techniques for generating a polar display include a method, which involves receiving information identifying a formation property of an anomaly within a geologic formation from a measurement-while-drilling (MWD) tool that includes several sensors. The formation property is identified by at least one magnitude and at least one distance. The formation property is also identified relative to a corresponding property of the geologic formation. The method also involves receiving information identifying an azimuthal angle from the MWD tool, where the azimuthal angle relates a position of the anomalous formation to a position of a first sensor. The method then generates a graphic, based upon the at least one magnitude and the at least one distance and the azimuthal angle, and displays the graphic on a polar display, in which a center of the polar display corresponds to a location of the borehole in which the MWD tool is located.
Haptic feedback enabled navigation system using short range radio technologies
The invention relates to a haptic navigation system, configured for providing a haptic instruction to a user, and to a method for providing a haptic instruction to a user. The haptic navigation system comprises a navigation module comprising a route calculation unit, configured for calculating at least one route for the user to go to a predetermined destination, and a user interaction unit, configured for capturing at least one input parameter from the user, and a feedback unit configured for receiving an instruction sent from the navigation module and for converting the instruction received into a haptic instruction such that the user find the correct route. In this way, a haptic navigation system is provided which is reliable, cost-effective to realize and can easily be integrated into existing navigation systems while at the same time making it possible to get rid of displays or voice recognition in navigation applications.
Navigation device and method
A navigation device comprising a receiver for receiving signals from position sensors, memory having stored therein a seed position and map data which comprises a map of navigable routes in an area, and an output device, such as a display or speaker, for outputting a current location. The navigation device further comprises a processor for determining distance travelled and changes in orientation from the signals and estimating the current location on one of the navigable routes of the map data. The step of estimating comprises using the distance travelled and the changes in orientation to extrapolate from the seed position possible paths along the navigable routes that the navigation device may have travelled and assigning to each path a probability that the navigation device travelled that path. For changes in orientation, the processor expands each path and recalculates the probability that the navigation device travelled that path. The processor assigns the current location to be a current predicted position on the path with the highest probability.
Electronic device with object guiding function and an object guiding method thereof
The present invention discloses an electronic device with object guiding function and the method thereof. In one embodiment, the electronic device includes a view window area, via which a user may watch a view. The electronic device may determine whether an object is located in the view window area when the user inputs the position of the object, and may further show an object indicating message or an object guiding message according to the determination result. Therefore, the electronic device is able to provide the user with short distance guiding function. In another embodiment, the electronic device may also show information related to the object located in the view window area, such as information about every mountain range, constellation, user's friends, or specific landmark that is located in the view window area.
Automatic correction of past position errors for location and inventory tracking
A method is provided for calibrating past position estimates from a positioning system that provides real-time position estimates of a mobile object. The method first stores the real-time position estimates, which as time goes by become past position estimates and naturally form a first past trajectory depicting the past movement of the mobile object. Subsequently, a calibrated past trajectory is determined, which includes calibrated past position estimates that correspond to the same time instances as the past positions in the first past trajectory. When real-time positions have low qualities, this method calibrates them at a later time by using (higher-quality) real-time positions both before and after them. Errors in the past positions are then corrected based on the calibrated past trajectory. When used with event detectors that indicate inventory transactions, this method can correct position errors associated with inventory events so as to improve the performance of inventory tracking.
Collision probability calculation apparatus for vehicle
A collision probability calculation apparatus capable of accurately calculating a collision probability that one's own vehicle will collide with an object around the own vehicle (referred to as a nearby object). In the apparatus, a position of the nearby object and a traveling speed and a traveling direction of the own vehicle are acquired. A collision probability map is generated on the basis of the traveling speed and traveling direction of the own vehicle. A width of a traveling lane of the own vehicle is acquired and the map is corrected in response to the width of the traveling lane. Thereafter, a collision probability associated with the position of the nearby object is corrected in response to the position of the nearby object. The corrected collision probability is outputted as a more accurate collision probability that the own vehicle will collide with the nearby object.
Traffic flow model to provide traffic flow information
Examples of maintaining or querying a traffic database to generate a traffic flow model to provide traffic flow information and determine a per-lane route for a vehicle to travel are disclosed.
Idling stop control unit and idling stop control method
An idling stop control unit (ISCU) provided in a vehicle including an air conditioner (S) which controls an air conditioning state of a passenger compartment of the vehicle. The idling stop control unit includes: idling stop prohibiting means for canceling idling stop to restart an engine (10) and prohibiting execution of idling stop when a switch for changing the air conditioning state is operated during idling stop in which the engine (10) is stopped when the vehicle is at a stop; and idling stop enabling means for automatically lifting the prohibition and enabling execution of idling stop when a predetermined condition is met.
Device and method for controlling timing at which ignition is stopped when internal combustion engine becomes stopped
A control device for stopping an engine, configured in such a manner that, when, after the ignition of the engine is turned off, the throttle valve is opened to introduce air in order to avoid that a piston stops near the top dead center, the control device stops the engine without causing a misalignment of the stop position of the piston and without degrading emission quality. A device for controlling the timing at which ignition is stopped when an internal combustion engine becomes stopped is provided with: a means for sending, depending on the rotational speed (NE) of the internal combustion engine detected by a rotational speed sensor decreasing to a level lower than or equal to a predetermined value (Np) after the ignition (55) is turned off and the throttle valve (14) is closed, a signal to an actuator (18) so that the throttle valve (14) is opened in order to control the stop position of a piston; and also provided with a means for stopping the ignition of the ignition plug when the throttle valve (14) becomes opened in order to control the stop position of the piston.
Hybrid drive apparatus
A hybrid drive apparatus includes an input member that is drivingly connected to a rotary electric machine and drivingly connected via an input clutch to an internal combustion engine, an output member that is drivingly connected to the input member and transmits rotation of the input member to wheels, and a control device that controls the rotary electric machine. The control device is capable of performing valve opening/closing phase control that advances or retards opening/closing phases of valve elements provided in the internal combustion engine via a valve opening/closing phase adjusting mechanism and, with the internal combustion engine in a stopped state before starting a vehicle, advances the opening/closing phases of the valve elements to bring the opening/closing phases of the valve elements into an advanced phase state relative to predetermined reference phases, thus starting the vehicle with torque of the rotary electric machine in the advanced phase state.
Low-drain, self-contained monitoring device
In one aspect, a vehicle monitoring apparatus includes an interface configured to connect to a diagnostic port of a vehicle, a processor coupled to the interface and configured to communicate with the diagnostic port and a sensor coupled to the processor and configured to detect a factor indicating the presence of a driver in the vehicle. The sensor causes the apparatus to transition from a first power mode to a second power mode upon detection of the factor. The apparatus draws more power from the vehicle in the second power mode than in the first power mode. The apparatus also includes a housing that includes the processor and the sensor.
Control apparatus for general-purpose engine
In an apparatus for controlling a general-purpose engine used as a prime mover of an operating machine, the apparatus regulating a throttle opening such that an engine speed is converged to a desired engine speed, calculating a basic fuel injection amount based on the engine speed and throttle opening, and controlling engine warm-up operation by correcting the basic fuel injection amount with a correction coefficient to calculate a warm-up time fuel injection amount after engine start is completed and injecting fuel by the calculated amount, a fuel injection amount with which the engine output becomes maximum is searched based on the throttle opening regulated in response to increase/decrease operation of the warm-up time fuel injection amount conducted when the engine speed is constant; and the correction coefficient is corrected using the searched fuel injection amount. With this, a warm-up correction coefficient appropriate for the engine warm-up condition can be calculated.
Computer network for calculating aircraft cornering friction based on data received from an aircraft's on board flight data management system
This invention relates to a computer network for calculating the true aircraft cornering friction coefficient of an aircraft runway or taxiway using the data collected by and available in the aircraft Flight Data Recorder (FDR) or other flight data management system, for example, the Quick Access Recorder (QAR). The invention may optionally distribute to personnel in the ground operations of an airport and airline operations, including but not limited to aircraft pilots, airline operation officers and airline managers as well as airport operators, managers and maintenance crews, the most accurate and most recent information concerning the true aircraft cornering friction coefficient to aid in making better and more accurate safety and economical decisions.
Braking force distribution control device for a vehicle
Disclosed is a braking force distribution control device for a vehicle which has a braking apparatus capable of individually controlling braking forces of the wheels as required. Front or rear wheels having higher braking force sharing rate being referred to control reference wheels and the front or rear wheels having lower braking force sharing rate are referred to control object wheels. A difference value between braking slip index values of the left and right wheels of said control object wheels is referred to a reference difference value. A braking force distribution control is executed on the control object wheels so that the magnitude relationship in wheel speeds of the left and right wheels of the control object wheels is converse to that of the left and right wheels of the control reference wheels.
Method for controlling a vehicle having only a braked rear axle and brake slip control
A method is described for controlling a vehicle having a pressure-medium-activated brake device which includes wheel brakes and brake circuits on each side, on only at least one rear axle, and having a drive engine which drives the rear wheels of the at least one rear axle, in which the rear wheels can be optionally or automatically coupled to or decoupled from front wheels of a front axle in order to transmit driving and/or braking power. Also described is a vehicle having a brake device which includes wheel brakes and brake circuits on each side on only at least one rear axle, and having a drive engine which drives the rear wheels of the at least one rear axle, in which the rear wheels can be optionally or automatically coupled to or decoupled from the front wheels of a front axle in order to transmit driving and/or braking power.
A seeder for attaching to a tractor or another towing vehicle includes a carriage mounted on a plurality of wheels that allow the device to easily traverse roads and other terrain. Atop the carriage are a pair of bins, each for storing a discrete type of seed for dispersing into furrows. Beneath the bins are a plurality of juxtaposed seeding units for simultaneously sowing multiple, closely-spaced rows of seeds. Each seeding unit includes a furrowing assembly formed of a shaft having a plurality of cogged cutting wheels mounted thereon. Immediately trailing each cutting wheel is a spring-biased compaction wheel that compresses and covers each furrow as it is sown. Each shaft also includes a designated height-adjustment mechanism that compensates for undulating or varying terrain. Accordingly, as the carriage traverses a field, the cutting wheels create multiple, minimally-spaced furrows into which seeds are automatically dispensed; the height-adjustment mechanism automatically raises or lowers the cutting blades as underlying terrain varies to assure that all seeds are planted at a consistent depth.
Automatic transmission system for bulldozer
An automatic transmission system for a bulldozer includes an automatic speed stage shifting section that switches among speed stages depending on a vehicle speed, a speed stage maintaining section that maintains a currently selected speed stage until a predetermined speed stage shifting disobedient time elapses after completion of a speed stage shifting while disobeying a switching instruction from the automatic speed stage shifting section, a load detecting section that detects a vehicle load, and a control restricting section that restricts a control processing of the maintaining section for causing it to obey the shifting section's instruction when the vehicle load is a predetermined load or greater even before the disobedient time elapses.
Vehicle lamp controller, vehicle lamp system, and vehicle lamp control method
A vehicle lamp controller, a vehicle lamp system, and a vehicle lamp control method are provided. The vehicle lamp system includes an acceleration sensor, a vehicle lamp, and the vehicle controller. The controller includes a receiver configured to receive an acceleration information detected by the acceleration sensor, a control unit configured to derive a vehicle longitudinal direction acceleration and a vehicle vertical direction acceleration from the acceleration information, and to generate a control signal for instructing an adjustment of an optical axis of the vehicle lamp, based on a variation in a ratio between a temporal change amount of the vehicle longitudinal direction acceleration and a temporal change amount of the vehicle vertical direction acceleration during at least one of an acceleration and a deceleration of a vehicle, and a transmitter configured to transmit the control signal to an optical axis adjusting portion of the vehicle lamp.
Electric power steering system
An electric power steering system determines a steering state of a steering wheel on the basis of a current (Im) of a motor applying assist force to a steering system and a steering speed (ωs) of the steering wheel. A state where the steering wheel is retained at a position other than a neutral position is a retained state, and a state where the steering wheel is placed at the neutral position is a neutral state. When the steering speed (ωs) is lower than a determination value (ωa) and the motor current (Im) is larger than a reference value (Ix), it is determined whether the steering state is the neutral state. When the steering speed (ωs) is lower than the determination value (ωa), the motor current (Im) is larger than the reference value (Ix), and the steering state is determined to be the neutral state at immediately preceding determination, the steering state is determined to be the neutral state.
Method for determining a torque on a steering train
Disclosed is a method for determining the torque introduced into a drive train, the method including the process steps of determining angular signals with the help of two sensors between which a region of the steering train is located which is subjected to a torque evaluating the differences of the angular signals taking into account known torsional rigidity of the steering train.
Vehicle automatic steering control apparatus
A vehicle control apparatus that for automatic steering control that reduces occupant discomfort and stress is provided. A lane width of a subject lane and a current in-lane ratio are detected. If an off-lane obstacle which may place stress on the occupant is present within a prescribed area, a relative position between each off-lane obstacle and the vehicle is determined. A target in-lane ratio is determined based on the relative position. Specifically, when the off-lane obstacles are present on both the left and right sides of the subject lane, the target in-lane ratio is such that lateral distances to both off-lane obstacles are equal. When the off-lane obstacle is present on only one of either the left or right of the subject lane, the target in-lane ratio is set such that a lateral position away from the off-lane obstacle by a lateral distance set in advance is the target lateral position.
Device for detecting and tracking motor vehicles
A device for detecting and tracking vehicles includes a position-determining device for determining a current vehicle position, a transmitting device for transmitting the current vehicle position to a receiver via a communication channel, and a device for detecting an activated interfering transmitter and for triggering an action depending on the detection of an activated interfering transmitter.
Centralized management of motor vehicle software applications and services
In one example, a network device stores a mapping of application operation modes to vehicle conditions such as a first condition of the vehicle powered but not moving and a second condition of the vehicle moving. The network device receives a wirelessly transmitted request for a particular application to utilize an interface powered by the vehicle. The network device compares an application identifier specified by the received request to the mapping. The network device then identifies a portion of the vehicle interface according to the comparison and signals control software on the vehicle to grant the particular application access to only the identified portion of the vehicle interface itself. The application can reside on the mobile device and utilize the vehicle interface as an extended interface, or the application can reside on the vehicle.
Method for analyzing faults present on a platform and associated system
A method for analyzing faults present on a platform includes the following steps: (a) providing a table of correspondence between a plurality of observable symptoms on the platform (10) and the fault modes capable of creating each observable symptom; (b) measuring the observable symptoms present on the platform (10); (c) establishing at least one family of faults, including determining a list of fault modes capable of creating, alone or in combination, all of the selected present symptoms, placing each given fault mode of the group in a fault family, and grouping all of the fault modes capable of creating at least one selected present symptom shared with the given fault mode together in the same fault family as the given fault mode. The method is applicable to fault analyses on aircrafts.
Monitoring and diagnosing device for working machine
Monitoring and diagnosing device including: a classification information storage section; frequency information storage section: a first data classifier section reading out reference classification information from the classification information storage section, comparing operational data, detected by a plurality of sensors and inputted in time sequence, with the reference classification information to classify the operational data, and then generating operational data classification information; a frequency comparator section compiling the operational data classification information, generating operational data frequency information by adding, to the operational data classification information, appearance frequency information for each classification of operational data, reading out reference frequency information from the frequency information storage section, and then generating operational data frequency comparison information by comparing operational data frequency information with the reference frequency information; and an abnormality diagnosing section performing an abnormality diagnosis upon the working machine by use of the operational data classification information and operational data frequency comparison information.
System to automatically measure perception sensor latency in an autonomous vehicle
A vehicle may operate in an autonomous mode in an environment during a test period. The vehicle may include at least one sensor coupled to the vehicle, configured to acquire sensor data during the test period. The sensor data may include data representative of a target object in the environment. The vehicle may operate the sensor to obtain the sensor data. The vehicle may define a movement of the vehicle, determine a predicted movement of the target object in the sensor data based on the defined movement, initiate the defined movement of the vehicle at an initiation time during the test period, complete the defined movement of the vehicle at a completion time during the test period, analyze the sensor data obtained during the test period, and determine a latency of the at least one sensor based on the analyzed data.
Modifying a vehicle state based on the presence of a special-purpose vehicle
A method is provided that includes receiving user input identifying a travel destination for a first vehicle, determining, by a processor, a first route for the first vehicle to follow, and configuring the first vehicle to follow the first route. The method further includes obtaining a model for a second vehicle that shares a road with the first vehicle and comparing model to a pre-determined template for a vehicle that is known to be a special purpose vehicle in order to determine whether the first template and the second template match. The method further includes determining, by the processor, a second route that leads to the travel destination, when a match is found to exist, and switching the first vehicle from following the first route to following the second route.
Hybrid-vehicle control device
Provided is a hybrid-vehicle control device that can continue high-speed driving, without transitioning to the HEV mode, by raising the motor torque limit during driving in the EV mode. The hybrid-vehicle control device includes: an engine; a motor that starts the engine and that drives driving wheels; a first clutch that switches between the HEV mode and the EV mode; an automatic transmission; and an electric-vehicle mode control means. The smaller the transmission ratio of the transmission is during driving in the EV mode, the smaller the value of the engine start torque, which is reserved for transitioning to the HEV mode, is made by the electric-vehicle mode control means.
System and method for indicating delay in implementation of an energy-expending action in a powered vehicle system
A method for operation of a vehicle by a control system is provided. The method comprises indicating to a vehicle operator a delay in implementation of an energy-expending action in a powered vehicle system in response to receiving an implementation request from an input device based on vehicle energy usage via a delay indicator.
Control system for equipment on a vehicle with a hybrid-electric powertrain and an electronically controlled combination valve
A control system for a hydraulic system comprises an electronic control module, an electronic system controller, a remote power module, and a solenoid valve. The electronic control module monitors torque output of an internal combustion engine, an electric motor and generator. The electronic system controller monitors torque demand of a first and a second hydraulic circuit. The remote power module is in electrical communication with the electronic system controller. The solenoid valve is in electrical communication with the remote power module. The solenoid valve connects to a combination valve and has a first open position and a closed position. The combination valve is in fluid communication with a first hydraulic circuit and a second hydraulic circuit. The solenoid valve moves to the open position in response to an output signal from the electronic system controller.
Vehicle having independently driven and controlled right and left drive wheels
A self-propelled vehicle includes a maneuvering unit, a drive unit including first and second drive sections, which are driven and controlled by drive wheel control commands, a drive wheel unit including left and right drive wheels driven by the first and second drive sections, respectively, at least one caster wheel which is controlled by a caster wheel control command, a bank detector for detecting a degree of bank of the vehicle and a control unit including a drive wheel control section for generating the drive wheel control commands. The control unit further includes a caster wheel control section which generates the caster wheel control command for controlling the steering angle of the caster wheel during a bank traversing travel, based on the bank degree so as to resolve a difference between a target travel and the actual travel which occurs during the bank traversing travel.
Control device for hybrid vehicle and control method for hybrid vehicle
A control device for a hybrid vehicle causes the hybrid vehicle to travel in limp-home mode with motive power from an engine when either a motor or a battery for travel cannot be used. The engine incorporated in the hybrid vehicle includes an EGR device for recirculating part of exhaust gas to an intake system of the engine again. Even if an operation state of the engine satisfies a prescribed EGR permission condition for operating the EGR device, during the travel in limp-home mode with an abnormality detection flag being set to 1, the control device prohibits operation of the EGR device.
Boat including steering load control
A boat that allows effective steering even when the motor output power is decreased due to the low battery charge includes a first predictive determination unit arranged to compare an actual charge amount of a battery supplying an electric power to a steering motor or a predicted charge amount of the battery calculated from a predicted working current with a threshold predetermined in relation to running states; a steering load detector arranged to calculate a required output value of a steering motor necessary to steer an outboard motor while the boat is under way; and a steering load controller arranged to control the required output value to be decreased from the present output value when the first predictive determination unit determines that the threshold is larger than the battery charge amount.
Method for determining run-curves for vehicles based on travel time
A method reduces the computation time for determining optimal run-curves for a specific travel time of a vehicle along a route between two locations. The computation is partitioned between pre-processing and real-time steps. A set of weights μ are generated, and run-curves for the weights are obtained and stored during the pre-processing. State transition matrices can also be determined and stored during the pre-processing. During real-time, a specific travel time is obtained. The travel time is used to interpolate the weight μ for the specific travel time from the stored weights. The memory can be updated for each solution for a specific travel time to dramatically reduce the time to optimize the run-curves.
System and method for asynchronously controlling a vehicle system
A method includes identifying power outputs to be provided by propulsion-generating vehicles of a vehicle system for different locations along a route and calculating handling parameters of the vehicle system at the locations along the route. The handling parameters are representative of at least one of coupler forces, coupler energies, relative vehicle velocities, or natural forces exerted on the vehicle system. The method also includes determining asynchronous operational settings for the propulsion-generating vehicles at the locations. The asynchronous operational settings represent different operational settings that cause the propulsion-generating vehicles to provide at least the power outputs at the locations while changing the handling parameters of the vehicle system to designated values at the locations. The method further includes communicating the asynchronous operational settings to the propulsion-generating vehicles in order to cause the propulsion-generating vehicles to implement the asynchronous operational settings at the different locations.
Train traffic advisor system and method thereof
Embodiments of the present invention disclose a method and system for providing train traffic advice. According to one embodiment, train status information associated with at least one train is received at a data center hosting a train traffic advisor application. Train crossing location data is stored in a database and retrieved by the train traffic advisor application. Based on the received train status information and the train crossing location data, train traffic information associated with the at least one train is calculated. Subscribing devices are identified by the train traffic advisor application, and the train traffic information is communicated to at least one of the identified subscribing devices.
Apparatus and method for forecasting geostationary satellite error
An apparatus and method for forecasting a geostationary satellite anomaly is provided. The method may include storing at least one piece of space environmental information, satellite information, and satellite anomaly event information, and estimating a satellite anomaly susceptibility to a space environmental phenomenon based on the at least one piece of space environmental information, the satellite information, and the anomaly event information.
Energy protection device for an aircraft
An energy protection device includes a plurality of sensors that detect a triggering situation requiring an energy protection and a control unit that actuates an energy protection function when the triggering situation is detected and also activates an autothrottle. When the control unit begins the energy protection function, an original engagement state of the autothrottle before the triggering is stored. Thus, when the aircraft returns to an operational flight domain not requiring the energy protection function, the control unit stops the energy protection function and sets an engagement state of the autothrottle based on the stored original engagement state.
Functional monitor for flight management system
The invention relates to a flight management system for aircraft which makes it possible to carry out tests of the results of the calculations of the main functions for formulating the flight plans and trajectories of the aircraft making it possible to anticipate errors in this formulation, to present them to the crew as a function of criticality criteria, to store them so as to be communicated and processed by the maintenance teams.
System and method for safely flying unmanned aerial vehicles in civilian airspace
A system and method for safely flying an unmanned aerial vehicle (UAV), unmanned combat aerial vehicle (UCAV), or remotely piloted vehicle (RPV) in civilian airspace uses a remotely located pilot to control the aircraft using a synthetic vision system during at least selected phases of the flight such as during take-offs and landings.
Vehicular traveling regulation device and method for controlling vehicle
A position determination unit determines whether a present position of a vehicle deviates from a predetermined range. A direction determination unit determines whether a traveling direction of the vehicle is along a return direction, which is toward the predetermined range, on determination of the position determination unit that the present position deviates from the predetermined range. A traveling regulation unit regulates traveling of the vehicle when the direction determination unit determines that the traveling direction is not along the return direction.
Automated demand response energy management system
The power flexibility of energy loads are maximized using a value function for each load and outputting optimal control parameters per load. These loads are aggregated into a virtual load by maximizing a global value function that includes the value function for each individual load. The solution yields a dispatch function providing: a percentage of energy to be assigned to each individual load, a possible time-varying power level within a time interval for each load, and control parameters and values. An economic term of the global value function represents the value of the power flexibility to different energy players. A user interface includes for each time interval upper and lower bounds representing respectively the maximum power that may be reduced to the virtual load and the maximum power that may be consumed by the virtual load. An energy trader modifies an energy level in a time interval relative to the reference curve for the virtual load. Automatically, energy compensation for the other intervals and recalculation of upper and lower boundaries occurs and is displayed. The energy schedule for the virtual load is distributed to the actual loads using the dispatch function.
Internet based spa networking system having wireless spa nodes
A spa node comprising a spa controller, a power sense adapter configured to compute power being drawn by selected spa components; a spa network adapter, and a home network adapter, each of the three adapters including a wireless transceiver wherein the spa network adapter is configured to receive power data transmitted over a wireless link by the power sense adapter and to further receive status/performance data from the spa controller. The home network adapter is configured to receive power and status data transmitted by the spa network adapter over a wireless link and to convert that data to a form suitable for transmission to an Internet access point. The home network adapter is further linkable over the Internet to a central server, a dealer computer and a spa owner or user computer.
Machine tool, machining method, program and NC data generation device
A work having a non-circular cross-section is machined by relative movement between the work and a tool, as the relative position and angle between the work and tool are changed at least within a plane including the cross-section of the work. In machining along a preset tool path, the difference between the relative angle at a point on the preset tool path which machining is started and that point on the preset tool path at which machining is finished is calculated. Time needed in machining along the preset tool path is equally divided by a preset number at equal time divisions, and positions on the tool path corresponding to equal time divisions are set as tool path points. When the tool moves through each point, the relative angle is continuously changed an angle corresponding to division of the difference of the relative angles by the preset number of equal time divisions.
Patient specific ankle-foot orthotic device
The unique advantages of computer-controlled fabrication of a patient-specific orthotic device using an automated fabrication machine capable of following computer instructions to create 3D surface contours and new developments in non-invasive three-dimensional (3D) scanning have made it possible to acquire digital models of freeform surfaces such as the surface anatomy of the human body and to then fabricate such a patient-specific device with high precision. Such a patient-specific device brings significant improvement in patient-specific fit, comfort, and function of medical devices (and, in particular, to orthoses that require a close fit to the wearer's body to act effectively). The combination of these two technologies is ideally suited for the development of patient-specific orthotic devices.A patient specific ankle-foot orthotic device using this technology is disclosed. This exemplary device is used to help stabilize the ankle-foot region, for example, in patients with impaired gait.
Audio configuration based on selectable audio modes
An operating system of a device receives, from an application executing on that device, data that identifies a category of hardware resources that the application needs to use in order to function. That category is mapped to a specified set of hardware resources of the device. The operating system also receives, from the application, data that identifies a mode. The mode corresponds to an intended use of a set of hardware resources and is mapped to a group of hardware resource settings that are consistent with the intended use. The operating system allocates, to the application, a particular set of hardware resources that are mapped to the category. The operating system configures one or more hardware resources in the particular set of hardware resources in conformity with a particular group of settings that are mapped to the mode.
Frequency-specific determination of audio dose
The present disclosure relates to media players, such as portable electronic devices, vehicle audio systems, home stereo systems, etc. In particular, it relates to the management of the sound pressure level generated by portable electronic devices. A method and system for controlling the consumed audio dose of a user of a media player is described. The method comprises the steps of selecting a first frequency range from the total frequency range relevant for the human ear; of determining the audio dose already consumed by the user within the first frequency range; of evaluating the audio dose of a media track within the first frequency range and the already consumed audio dose of the user within the first frequency range; and of controlling the audio dose generated by the media player based on the evaluating step.
Controller and design support apparatus
Methods, systems, and computer program products for compensating unstable linear time-invariant due to input nonlinearities are described. In one implementation, compensating a controlled device may include controlling the controlled device using feedforward control. In another implementation, compensating the controlled device may include controlling the controlled device using feedback control.
Variable implantable medical device power characteristics based upon data or device type
An implantable medical device (“IMD”) as described herein includes adjustable power characteristics such as variable transmitter output power and variable receiver front end gain. These power characteristics can be adjusted in a dynamic manner based upon various operating aspects of the intended or actual IMD telemetry environment. These operating aspects may include the external telemetry device type, the IMD device type, and/or the type, context, or meaning of the telemetry data transmitted by the IMD. The IMD may process information related to these operating aspects to generate power scaling instructions or control signals that are interpreted by the IMD transmitter and/or the IMD receiver. Such adjustability enables the IMD to satisfy minimum telemetry requirements in a manner that does not waste power, thus extending the IMD battery life.
Implantable tissue growth stimulator
An implantable tissue growth stimulator is disclosed. The implantable tissue growth stimulator includes electronic circuitry to alter the voltage output by the stimulator. The implantable tissue growth stimulator may he controlled from an external device via wireless communication. The implantable tissue growth stimulator may be configured for use with an implants in particular, the implantable tissue growth stimulator may be incorporated into an orthopedic device such as a hip prosthesis. The implantable tissue growth stimulator may be used to stimulate bone growth.
Devices for controlling high frequency spinal cord modulation for inhibiting pain, and associated systems and methods, including simplified program selection
Selective high-frequency spinal chord modulation for inhibiting pain with reduced side affects and associated systems and methods are disclosed. In particular embodiments, high-frequency modulation in the range of from about 1.5 KHz to about 50 KHz may be applied to the patient's spinal chord region to address low back pain without creating unwanted sensory and/or motor side affects. In other embodiments, modulation in accordance with similar parameters can be applied to other spinal or peripheral locations to address other indications. In particular embodiments, aspects of the foregoing modulation therapies may be implemented by systems and devices that have simplified functionalities.
Summation anodal pacing to complement multisite stimulation
A device and method for cardiac pacing is disclosed in which anodal pacing of the left ventricle is provided. Anodal pacing occurs when an anodal surface area is sufficiently small to create an area of hyper-polarization of the myocardial cell membrane. This creates a virtual cathode at a location remote from the anode. The virtual cathode results in depolarization of the heart in a manner similar to the virtual cathode at the true fixed cathode. In addition a device and method for summation anodal pacing is provided in which one anode is common between two or more cathodes. This results in hyperpolarization of a larger segment of the myocardium as compared to non-summation anodal pacing and thereby forms a larger virtual electrode to enable capture of localized, discrete cardiac structures such as the bundle of His or the very proximal portions of the right and left bundles.
Portable automatic brain state assessment apparatus
A method and apparatus for performing rapid brain assessment may provide emergency triage to head trauma patients by analyzing a combination of spontaneous and evoked brain potentials. The spontaneous and evoked potentials are analyzed, and the results classified, to present a real-time assessment of a patient's brain, diagnosing any potential abnormalities therein.
Method for treating complex rhythm disorders
A method of treating a complex rhythm disorder of a human heart includes identifying a region of a wall of the heart having an activation trail that is rotational or radially emanating, where the activation trail is indicative of the complex rhythm disorder and is based on activation times associated with one or more activations of the heart. A portion of the region is selected based on the activation trail and modified to affect the activation trail.
Multi-wavelength diagnostic imager
The present invention is a multi-wavelength diagnostic imager. In one embodiment, the present invention includes an apparatus and method for noninvasive evaluation of a target versus a non-target, comprising: one or more light sources having at least one emission spectra directed at the target wherein the position, orientation and intensity of light sources is varied to control near-surface reflectance and are directed at less than the entire target; and one or more detectors positioned to capture light reflected from the target into two or more spatial images of the target at two or more times, wherein the spatial images are used to distinguish between the target and the non-target.
Scanned laser vein contrast enhancer using a single laser
The present invention is a Miniature Vein Enhancer that includes a Miniature Projection Head. The Miniature Projection Head may be operated in one of three modes, AFM, DBM, and RTM. The Miniature Projection Head of the present invention projects an image of the veins of a patient, which aids the practitioner in pinpointing a vein for an intravenous drip, blood test, and the like. The Miniature projection head may have a cavity for a power source or it may have a power source located in a body portion of the Miniature Vein Enhancer. The Miniature Vein Enhancer may be attached to one of several improved needle protectors, or the Miniature Vein Enhancer may be attached to a body similar to a flashlight for hand held use. The Miniature Vein Enhancer of the present invention may also be attached to a magnifying glass, a flat panel display, and the like.
Radiographic image capturing apparatus
In a radiographic image capturing apparatus, an object to be examined is compressed and secured between a compression plate and an image capturing base, at a position off-center from a central position of the image capturing base near a subject in a direction along the subject. An opening is defined in the compression plate so as to confront the object to be examined in the off-center position. The radiation source irradiates the object to be examined as well as the opening with radiation from a central angle of the radiation source, which is aligned with a vertical axis of the image capturing base, and which passes through the central position from a predetermined angle that is angularly spaced from the central angle about the central position.
Veress needle with illuminated tip and cavity penetration indicator
A Veress needle assembly comprises an outer steel tube with a sharpened tip at the distal end surrounding an inner rod having a blunt distal end. The proximal end of the inner rod is spring biased towards a position in which its distal end extends beyond the distal end of the outer stainless steel tube so that while piercing the wall of a body cavity the inner rod is forced upwardly against the spring bias to allow the sharpened end of the outer tube to extend into a cutting position. An indicator light supported on the proximal end of the assembly is controlled by a switch which is in a first position when the outer tube is passing through the wall of the body cavity and a second position when the outer tube enters the body cavity behind the wall, allowing the rod to move beyond the distal end of the outer tube, thereby changing the illumination of the light source so that the operator is signaled that the Veress needle has passed into the body cavity.
Particle radiation therapy equipment
Particle radiation therapy equipment arranged to apply a charged particle beam to a region of application in a predetermined direction, comprising a charged particle beam source arranged to direct a charged particle beam in the predetermined direction, further comprising magnetic field generation means for generating a magnetic field in an imaging volume which includes the region of application at the same time that the charged particle beam is applied, wherein the magnetic field generation means is arranged to provide access to the region of application for the charged particle beam, and to provide a homogeneous magnetic field in the region of application of the charged particle beam, said magnetic field being directed substantially in the predetermined direction.
Atlas-based analysis for image-based anatomic and functional data of organism
A non-invasive imaging system, including an imaging scanner suitable to generate an imaging signal from a tissue region of a subject under observation, the tissue region having at least one anatomical substructure and more than one constituent tissue type; a signal processing system in communication with the imaging scanner to receive the imaging signal from the imaging scanner; and a data storage unit in communication with the signal processing system, wherein the data storage unit is configured to store a parcellation atlas comprising spatial information of the at least one substructure in the tissue region, wherein the signal processing system is adapted to: reconstruct an image of the tissue region based on the imaging signal; parcellate, based on the parcellation atlas, the at least one anatomical substructure in the image; segment the more than one constituent tissue types in the image; and automatically identify, in the image, a portion of the at least one anatomical substructure that correspond to one of the more than one constituent tissue type.
Nuisance alarm reductions in a physiological monitor
A method and apparatus for controlling alarms in a medical diagnostic apparatus where an alarm is generated when a measured value for a physiological parameter is outside a specified range. The method continuously calculates a baseline value, and establishes dynamic thresholds that are related to and continuously track the baseline value. The method determines the amount of time the measured value is past the dynamic threshold, and the amount by which the threshold is passed. Alarms are triggered based upon a combination of the amount of time and the amount by which the threshold is passed. Preferably, the combination is an integral or some function of an integral.
Optical systems and methods for ratiometric measurement of blood glucose concentration
Novel optical devices, methods and systems relating to the detection of glucose, and more particularly to real-time glucose monitoring, are disclosed herein. More particularly, various hardware and methodological means are disclosed for ratiometric correction of optical glucose measurements for artifacts of optical systems.
Joints with very low resistance between superconducting wires and methods for making such joints
In a method or joint for joining first and second semiconductor wires, each comprising a number of filaments which each comprise a superconductive core within a respective sheath, the filaments being embedded within a matrix and wherein the superconductive cores comprise magnesium diboride and the sheaths comprise niobium, over a certain length a matrix is removed to expose the filaments. The exposed filaments are immersed in molten tin such that the nobium of the sheaths is converted to niobium-tin throughout a thickness of the sheaths. A superconductive path is provided between the superconductive cores of filaments of the first wire through the niobium-tin sheaths of the filaments to the superconductive cores of the second wire.
A magnetic field source is provided comprising a support structure upon which is positioned a conducting surface path of superconductor material. The support structure has an at least partially radially overlapping layer of material arranged in a spiral. A corresponding conducting surface path of superconductor material is arranged on the surface of the support structure such that the conducting path has a first point for the introduction of current and a second point for the extraction of current.
Customized audio/antenna module and method for making the same
The present invention relates to a method for assembling a self-contained audio/antenna module for a portable communication device, the method comprising the steps of incorporating, into the audio/antenna module, one or more transducers, said incorporation comprising, for at least one transducer, the steps of custom designing and implementing a membrane structure for the at least one transducer in accordance with design constrains provided by an audio/antenna module casing, and incorporating a standard, prefabricated magnetic circuit into the audio/antenna module, said magnetic circuit being adapted to displace the membrane structure of the at least one transducer in accordance with incoming audio drive signals. The invention further relates to an audio/antenna module manufactured according to the above-mentioned method.
Method and apparatus for reducing power consumption in a portable electronic device
A method and apparatus for reducing power consumption of a portable electronic device, such as a smartphone, or other portable devices when in sleep mode. A low power mode core stay alive while the electronic device is in sleep mode. When implemented in a smartphone, for example, the low power mode core may react to an incoming call so that at least part of the external memory of the smartphone may be powered down. The low power mode core may acknowledge the incoming call and provide a user interface for answering the call before the operating system is resumed, so as to keep the same or similar phone usage experience as the operating system is processing the incoming call. At the same time, the low power mode core may wake up the operating system. The same approach is applicable in monitoring devices, where the entire device need not be running.
Detecting circuit for electric quantity, processing device and method for state detection of mobile telephone in standby
The present disclosure provides a processing method for detecting a state of a mobile telephone in standby, the method includes: determining whether a battery electric quantity of the mobile telephone in standby is high or low according to an electric quantity detecting circuit; determining a work state of a Modem module when the battery electric quantity of the mobile telephone is high; and determining a wakeup subsequent flow according to the determined battery electric quantity of the mobile telephone and the determined work state of the Modem module. The present disclosure further provides an electric quantity detecting circuit and a processing device for state detection of a mobile telephone in standby.
Method and system for increasing power savings in a DOCSIS device
Processing circuitry in a user device detects information concerning periodic station maintenance opportunities provided by a CMTS. The processor determines a quiet interval between the end of one station maintenance opportunity and the beginning of the subsequent opportunity. If offsite power to the user device is lost, the processor counts down a predetermined amount of time with a first timer and then periodically turns off RF circuitry of the device after the ending of a maintenance opportunity that follows the counting down of the first timer. The processor then begins a second timer to count the quiet interval. After counting down the quiet interval, the processor restores battery power to the RF circuitry for the duration of the maintenance opportunity.If an off-hook condition occurs while the second counter counts down the quiet interval, the processor restores battery power to the RF circuitry.
Controlling use of a communications device in accordance with motion of the device
A wireless communications device is controlled in accordance with motion thereof. If the device is determined to be in motion, such as in a vehicle, use of the device is restricted. Discrimination between vehicular motion and ambulatory motion is provided. While in motion, use of the device can be allowed under specific exception conditions. Exception conditions include the device being used by a passenger of a vehicle, a 911 call, or a call to a designated number. The ability to control the device in accordance with motion thereof can be remotely activated and deactivated, thus allowing, for example, parental control of a device belong to a child.
Mobile digital communication/computing device having a context sensitive audio system
A mobile client device, such as a wireless mobile or a palm sized personal digital assistant, is provided with at least a first and second audio resources and companion programming instructions/circuitry to generate various audio signals in a more context sensitive manner, while multi-media resources are being utilized. The instructions/circuitry cause the mobile client device to determine a first audio volume level at which the mobile client device is being utilized by a user for a first audio signal. Once the first audio volume level is determined, instructions/circuitry cause a second audio signal to be provided at a second audio volume level to the user. The second audio volume level being based at least in part on the first audio volume level initially.
Relational rendering with a mobile terminal
Data storing multiple contact entries is access and at least two of the contact entries are selected from the accessed data. A phone number and an image are associated with at least two selected contact entries. A relational characteristic is determined for the selected contact entries. A rendering size is determined for each of the selected contact entries of the image associated with the contact entry based on the determined relational characteristic for the contact entry. A composite display that enables concurrent rendering of the images associated with the selected contact entries is generated. The composite display renders each of the images according to its determined rendering size. Rendering of the generated composite display is enabled.
Signal transmission channel
A signal transmission channel using a SIW between a transmitter and distant receiver. The SIW may include a MSL/SIW interface, be flexible, may use plug connections and/or may operate in a MMW band.
Connector for connecting at least one output device to a rendering device and method for managing connections
A connector for connecting at least one output device to a rendering device, wherein the connector includes at least one detection unit for detecting at least one external signal, characterized in that the connector comprises at least one communication unit for communicating with at least one wireless communication device wirelessly, wherein the detection unit is connected to the communication unit for managing the communication unit, and a method for managing connections to an output device from a rendering and/or a communication device, wherein the output device is connected to a connector for connecting the output device to the rendering and/or communication device, characterized in that the connector upon detection of a specific external signal which was detected wirelessly activates a communication unit of the connector for communication with the communication device.
Provisioning interfaces for accessing virtual private branch exchange services through a mobile device
Systems, methods and computer program products for facilitating the provisioning of a single and multi-line virtual private branch exchange (PBX) including automated call distribution via a mobile device are described. In some implementations, the provisioning of the single and multi-line virtual PBX can be achieved using one or more unique provisioning interfaces. The unique provisioning interfaces can enable the setup and configuration of a virtual PBX service account instantaneously from any geographical location at anytime. Changes made to the virtual PBX service account can be immediately reflected back (e.g., in real-time) to the system providing the core operating environment.
Method for transmitting feedback information in CoMP, terminal for performing same, method for generating channel state information and base station apparatus for performing same
Disclosed are a method for estimating a channel state in a CoMP operation of a terminal and a method for generating channel state information of a base station. A terminal can measure strength or an interference level of a signal of each cell using a reference signal received from each cell for performing the CoMP operation. In addition, the terminal can measure the sum of the interference levels of the cells which do not perform the CoMP operation using a region from which a reference signal of a serving cell of each cell is transmitted. In addition, the terminal can transmit to the serving base station the strength of the interference level of the signal of each cell for performing the measured CoMP operation and the sum of the interference levels of the cells which do not perform the CoMP operation.
Method and apparatus for controlling power in wireless communication system
A base station in a wireless communication system and a method for controlling power by the same are provided. The method includes receiving channel state information from a mobile terminal, calculating information regarding a Modulation order Product code Rate (MPR) of the mobile terminal using the channel state information, and controlling transmission power for the mobile terminal according to the information regarding the MPR.
Gating control loop technique for optimizing performance in a wireless communication network
A gating scheme in a wireless communication network is tuned according to the performance of the application used. This can mean that in some situations gating is not used at all while in other occasions gating is used where the cycle length, burst length, number of preambles and offset are adjusted. The performance is monitored and the gating is increased or decreased depending on the results of the monitoring and demands of the application. Furthermore, the gating scheme adapts to the current performance and is chosen to optimize performance in terms of system capacity. The monitoring also takes into account which of the gating cycles that needs to be changed. The algorithm is self tuning/configuring meaning that it will control the gating scheme to find and keep an optimal level for the used application.
Multi-bearer rate control for transporting user plane data
An intermediary function receives a reservation request for a desired throughput from the sourcing device, and determines a set of bearers whose aggregate throughput approximates the desired throughput. The intermediary function requests from at least one access network the set of bearers whose aggregate throughput approximates the desired throughput, and receives from the at least one access network an allocated set of bearers, wherein the allocated set of bearers comprises one or more bearers. The intermediary function informs the sourcing device of an aggregate throughput of the allocated set of bearers, receives user plane data from the sourcing device, and associates the user plane data with the allocated set of bearers in order to transport the user plane data to the receiving device. Subsequent modifications to the allocated set of bearers causes the intermediary function to inform the sourcing device of the modified aggregate throughput of the allocated set of bearers.
Method for updating location in a wireless communication system
A method for updating a location in a wireless communication system is disclosed. The method includes transmitting a request message to enter idle mode, receiving a response message including an Identifier (ID) of a first paging group and an ID of a second paging group in response to the request message, activating a paging group location update timer, when the MS leaves an area of the first paging group, and updating a location according to the paging group location update timer.
Modifying mobile device operation using proximity relationships
Described is a technology by which a mobile computing device such as a mobile telephone operates differently based on detected proximity to another mobile device with which the first mobile device has a defined relationship. For example, the first mobile device may transfer content to the second mobile computing device when proximity corresponds to a non-cellular communications coupling, such as Bluetooth® or Wi-Fi coupling. In this manner, content transfer is deferred until a non-cellular coupling exists. The mobile device (or both devices) may output a notification to indicate that the other mobile computing device has been detected within a threshold proximity, such as via GPS data or by being within the same cellular tower. The type and/or settings of an output notification may vary based on different thresholds.
Location based wireless tower caching
Embodiments of the present invention provide a method, system and computer program product for wireless tower caching. In an embodiment of the invention, a method for wireless tower caching in a radio access network (RAN) can include receiving a response to a request from an end user device wirelessly coupled to a base station of the RAN, determining geographic positioning data for the response and identifying a most geographically wireless tower coupled to the RAN relative to the determined geographic positioning data (such as the closest wireless tower to the determined geographic positioning data). Thereafter, the response can be cached at a cache in a base station of the identified wireless tower.
Method and apparatus for determining environmental context utilizing features obtained by multiple radio receivers
A method, apparatus and computer program product are provided to facilitate the determination of the environmental context of a mobile terminal. In this regard, the method, apparatus and computer program product may utilize the features obtained by a plurality of different types of radio receivers in order to more precisely determine the environmental context of the mobile terminal. The performance of the mobile terminal including applications executed by the mobile terminal may correspondingly be more accurately tailored to the current environmental context of the mobile terminal.
Mobile terminal and schedule notifying method thereof
A mobile terminal and a schedule notifying method of the mobile terminal are disclosed. The mobile terminal includes: a wireless communication unit configured to perform radio communication with a location-based service (LBS) providing server; a controller configured to select a participant in a schedule creation mode, discriminately display whether or not the selected participant uses the LBS, registers schedule to a scheduler when creating of the schedule is completed, and acquire location information of the participant using the LBS when an alarm time of the registered schedule arrives; and an output unit configured to output a schedule notification signal and location information of the participant.
Adjusting user settings on a handheld mobile communication device based upon location
A handheld electronic device that receives geo-location based signal data into a microprocessor on board the handheld electronic device. The microprocessor processes the signal data into location data representative of the present geographic location of the electronic handheld device. The microprocessor adjusts at least one user defined setting of the handheld electronic device based on whether the location data indicates that the handheld electronic device is within stored geographical boundaries.
Context aware geofencing
In one embodiment an electronic device comprises a display, a motion sensor, one or more wireless communication devices, and logic configured to receive, in the controller, data indicating that the controller is in motion, determine a velocity of the controller, and activate a first location service to determine a coarse location of the controller when the velocity of the controller falls above a predetermined threshold for a predetermined period of time. Other embodiments may be described.
Estimating the location of a wireless terminal in wireless telecommunications systems that comprise distributed and/or repeater antennas
A technique for estimating the location of a wireless terminal at an unknown location in a geographic region is disclosed. The technique is based on the recognition that there are location-dependent traits of electromagnetic signals. In environments where multiple antennas are radiating the same signal, as in the case of distributed antennas or host-repeater configurations, one or more possible locations of the wireless terminal can be designated as improbable based on i) a measure of the propagation delay of a signal traveling between a) a base station and b) the wireless terminal or an infrastructure antenna, or ii) the maximum distance at which a signal is detectable by the wireless terminal. Additionally, the applicable set of values for the location-dependent traits is selected based on similar criteria.
Enhanced positioning assistance data for reduced signaling
Apparatus and methods for determining a location estimate of a mobile device based on an extended set of assistance data are presented. The extended assistance data includes assistance data for base stations, such as cellular base stations and access points, not expected to be viewable by the mobile device in a (current) first geographical area but expected to be viewable by the mobile device in a (future) second geographical area. By seeding the mobile device with assistance data expected to be useful in the future, the network reduces messaging between the network and mobile device and battery consumption by the mobile device.
Combined base transceiver station and base station controller call origination and termination
A system, method, and computer readable medium for a mobile origination comprises receiving an origination request message by a main call control (MCC) from a radio call control (RCC), receiving an assignment request message by the RCC from the MCC, receiving a traffic channel assign message by a channel element control (CEC) and by the MCC from the RCC, receiving a call setup message by a selector distribution unit (SDU) from the MCC, and receiving a link active message by the CEC from the SDU.
Interference mitigation method in cellular wireless network, and apparatus with the same
Interference mitigation methods in a small cell wireless network are provided. In the methods, negotiations between different stations are provided for interference mitigation. By such negotiations, UL-DL configurations are chosen in considering interference between neighboring stations and the interferences therefrom are effectively mitigated.
On-demand vacate mechanism for cloud spectrum services
A platform to facilitate transferring spectrum rights is provided that includes a database to ascertain information regarding available spectrum for use in wireless communications. The proposed apparatus and non-transitory machine-accessible medium defines the transactions required for release of the “rented” spectrum by clients which are using the spectrum when demanded by a primary spectrum holder to provide functionality for flexible and optimal use of spectrum on client devices. The apparatus and non-transitory machine-accessible medium coordinates scanning for available broadcast, multicast, and/or conditional access platforms, networks, and/or services, as well as maintaining connection with CSS network elements to enable flexible and optimal use of the spectrum and manages the resources among multiple radios and applications on the platform.
System and method for network management
Various systems and methods for network management are disclosed. In one embodiment, a network management system comprises a receiver for receiving data from a plurality of entities, including base stations and/or subscriber handsets, a processor for generating a network map or a recommendation based on the received data, a display device for displaying the network map or recommendation, and a transmitter for transmitting instructions based on the recommendation.
Method and system for dynamic cell configuration
An apparatus for adapting hyper cells in response to changing conditions of a cellular network is disclosed. During operation, the apparatus collects data regarding network conditions of the cellular network. In accordance with the collected network condition data, the apparatus changes an association of a transmit point from a second cell ID of a second hyper cell to a first cell ID of a first hyper cell. Virtual data channels, broadcast common control channel and virtual dedicated control channel, transmit point optimization, UE-centric channel sounding and measurement, and single frequency network synchronization are also disclosed.
Methods and arrangements in a wireless communication system
Method and arrangement (600) in a first network node (120-1), serving a first cell (130-1), for forming a coordination group for coordinating multipoint wireless communication. The method comprising determining (502) interference within the first cell (130-1). Also, the method comprises identifying (503) a second network node (120-2), which is either transmitting radio signals causing the interference, serving a user equipment (110-1), which transmits radio signals causing the interference, or being the intended recipient of radio signals causing the interference. Additionally, the method comprises transmitting (504) a token to the identified second network node (120-2), inviting it to coordinate the wireless communication. Furthermore, in addition, if acceptance is received, the method comprises forming (505) a coordination group together with the second network node (120-2), and coordinate the wireless communication.Further, a method and arrangement (800) in a second network node (120-2) is presented.
Method and apparatus for expanded data rate control indices in a wireless communication system
In one embodiment, the patent application comprises an apparatus, method and means for expanding DRC indices comprising assigning multiple DRC covers to at least one sector. In another embodiment, the apparatus, method and means for expanding DRC indices further comprises creating an expanded DRC indices list, sending a mapping of DRC covers to the expanded DRC indices list to an access terminal, and using the mapping to determine a sector and DRC index from the DRC indices list on requests for transmission from the access terminal.
Method and apparatus for efficient serving cell change using multiple parallel timers
Methods and apparatus are described herein to manage a serving cell change. Timers are used to monitor one or more cells which become stronger relative to a cell which is currently the best cell. These one or more cells may be referred to as pending best cells. Further, in some aspects, additional timers can be started for any cell relative to any pending best cell when the respective cell becomes stronger than the respective pending best cell.
System and method for user equipment mobility support in a heterogeneous network
A method for supporting mobility in a user equipment by a macro cell as the user equipment moves into a coverage area of a low power node includes receiving a measurement report from the user equipment, and selecting a technique for supporting mobility according to the measurement report, and a support factor of the user equipment and of a communications system where the user equipment is operating. The method also includes operating the macro cell and the low power node according to the selected technique.
Anti-interference apparatus and method in wireless communication system
The present invention relates to an apparatus and method for reducing the interference caused by a femtocell in a wireless communication system. The method comprises the steps of: measuring the intensity of a signal received from a terminal when the transmission mode is deactivated; and controlling the transmission mode to be activated according to the signal intensity, and thus has the advantage of decreasing the influence effects caused by the femtocell and reducing the power consumption in a femto base station.
Acquiring information from volatile memory of a mobile device
According to various embodiments, there is provided a method of acquiring information from volatile memory of a mobile device, the method including: accessing the volatile memory of the mobile device used by an application operating on the mobile device to store communicated information with a communication device; acquiring a copy of data present in the volatile memory; and analyzing the copy of data to extract the communicated information.
Method and device for monitoring wireless terminal behavior according to terminal type
One or more embodiments of a method and device taught herein provide for monitoring wireless terminal behavior in a wireless communication network, where each wireless terminal has a defined terminal type. Data describing the behavior of a plurality of wireless terminals in the wireless communication network is obtained. Based on the obtained data, an aggregated severity score for a given terminal type is determined that is indicative of the extent to which one or more of a plurality of performance criteria have not been met by wireless terminals of the given terminal type. If the aggregated severity score for the given terminal type exceeds a corresponding severity score threshold, one or more of a plurality of predefined actions are performed based on the extent to which the threshold is exceeded.
Use of proximity sensors for interacting with mobile devices
Various arrangements for handling a call by a mobile device and/or selecting a function for execution by the mobile device are presented. A phone call may be commenced by a mobile device. During the phone call, the mobile device may collect proximity data that indicates the mobile device is not proximate to an ear of a user. The microphone of the mobile device may be muted in response to the proximity data that indicates the mobile device is not proximate to the ear of the user.
Mobile device applications for computer-telephony systems
On a mobile telecommunications device, computer-executable code executes to facilitate interactions between the user of the mobile telecommunications device and a call center or other computer-telephony integration equipment. The computer-executable code includes instructions that request at least one operation to be performed at a call center, where the call center includes a call center controller, an interactive voice response system component, and at least one agent. At least in part, a wireless network transmits the request from the mobile telecommunications device to the call center controller.
Intelligent telephone number processing
A method and apparatus of a device that converts a telephone number based on the location of a telephone is described. The device receives the telephone number, where telephone number is to be used to place a telephone call on the device. The device further determines if the telephone number is suitable to place the telephone call based on a content of the telephone number and a location of the device. If the telephone number is not suitable to place the telephone call, the device converts the telephone number to a telephone number suitable to be used to place the telephone call.
Mobile services access management methods and systems
An exemplary method includes a mobile services access management system maintaining a mobile services access schedule associated with a mobile access device, the mobile services access schedule specifying one or more restricted access time periods during which access by the mobile access device to one or more mobile services requires entry of a predetermined access code, receiving a request to access at least one mobile service within the one or more mobile services during one of the one or more restricted access time periods, receiving entry of a predetermined access code in conjunction with the request, granting the mobile access device access to the at least one mobile service, and providing a notification of the access to a predetermined recipient. Corresponding methods and systems are also disclosed.
Secure communications smartphone system
Methods, systems, and non-transitory data storage media are provided for secured communications where biometrics are used to secure communications sent over a data communication path. A sender of a secured communication may identify one or more biometrics required from a recipient before the recipient is allowed to interpret, read, view, or listen to the communication. Communications secured by the present invention may include email, text messages, iMessages, files, links, Universal Resource Locators (URLs), videos, photos, attachments, or other forms of electronic data or media communications.
Vehicular information receiver and vehicular information reception system
A vehicular information receiver is coupled to a portable device that receives information by paying a communication fee based on a unit packet fee. The receiver sets reception factors that affect the amount of data received by the portable device. An expected fee calculation unit calculates an expected communication fee based on the unit packet fee and an expected amount of data, which is based on the reception factors. A display unit displays the reception factors and the expected communication fee, which can be viewed by a user. Accordingly, the user is able to view the reception factors that determine the amount of data to be received and the expected communication fee associated with the data to be received, before such data is received from the portable device, thereby avoiding unexpected increases in communication fees.
High-frequency circuit module
Provided is a high-frequency module that can prevent a transmission signal from reaching a reception circuit and that can achieve high mounting density. A first duplexer for a first frequency band is mounted on a circuit substrate, and a second transmission filter and a second reception filter that constitute a second duplexer for a second frequency band are embedded in the circuit substrate. The second transmission filter and the second reception filter are embedded in the circuit substrate in locations that overlap at least a part of a projection region that is formed by projecting the first duplexer in a thickness direction of the circuit substrate. The first frequency band and the second frequency band are separated from each other by at least a prescribed frequency range.
A receiver circuit includes an analog front-end circuit, a first adaptation circuit, and a second adaptation circuit. A method operates the receiver circuit. The analog front-end circuit is configured to resolve an output signal from an input signal as a function of adjustable parameters. The first adaptation circuit is coupled to the analog front-end circuit and is configured to determine values of the adjustable parameters responsive to the output signal. The second adaptation circuit is coupled to the analog front-end circuit and to the first adaptation circuit. The second adaptation circuit is configured to adjust the values of the adjustable parameters responsive to one or more operating conditions of the receiver circuit. These operating conditions include a temperature and/or a power supply voltage of the receiver circuit.
Dynamic sub-sampling radio frequency mixer systems and methods
A mixer, a receiver, and a method provide dynamic sub-sampling mixer which adjust a sub-sampling rate based on power drain and performance. A mixer includes mixer circuitry receiving an input of a Radio Frequency (RF) input signal and providing an output of a baseband signal of the RF input sampled at a sub-sampling rate, baseband parametric control circuitry receiving the baseband signal and measuring at least one parametric value of the baseband signal, and sampling period control circuitry receiving the at least one parametric value and adjusting the sub-sampling rate based thereon, the sub-sampling rate or ratio is adjusted minimize power drain while ensuring performance of the at least one parametric value is satisfying a predetermined level.
Frequency multiplication using self-mixing
Frequency multipliers having corresponding methods and multifunction radios comprise: N multipliers, wherein N is an integer greater than one; wherein the multipliers are connected in series such that each of the multipliers, except for a first one of the multipliers, is configured to mix a periodic input signal with an output of another respective one of the multipliers; wherein the first one of the multipliers is configured to mix the periodic input signal with the periodic input signal.
Radio communication apparatus, radio communication method, and non-transitory computer readable medium storing radio communication control program
A combination of antennas to be used is selected based on a distance between a plurality of antennas or the polarization direction of a radio signal to be transmitted/received.
System and method of hybrid FDM/TDM coexistence interference avoidance
A hybrid FDM/TDM solution for in-device coexistence interference avoidance is proposed. A user equipment (UE) comprises a first radio transceiver and a second co-located radio transceiver. The UE detects coexistence interference between the two radios based on radio signal measurement. The UE sends an IDC interference indicator to its serving base station (eNB). The UE also reports IDC information including recommendation for FDM and TDM configurations to the eNB. The eNB receives the IDC interference indicator and evaluates whether to trigger FDM-based solution to mitigate the coexistence interference. The eNB also evaluates whether to trigger TDM-based solution to mitigate coexistence interference. The evaluation is based on the recommended FDM and TDM configurations. The eNB may trigger FDM-based solution, TDM-based solution, or FDM and TDM solution based on the evaluation results of the feasibility and effectiveness of each solution.
Attenuating antenna switch and communication device
An attenuating antenna switch may be used to suppress increase in the scale and power consumption of an RFIC. The antenna switch has a first terminal, a second terminal, and an antenna terminal coupled to the first and second terminals and configured to be connected to an antenna. The first switch switches between a first state in which a high frequency signal is propagated between the first terminal and the antenna terminal, and a second state in which the high frequency signal is interrupted. A second switch switches between the first and second states between the second terminal and the antenna terminal. The first and second switches are controlled in a mutually exclusive manner such that only one of the two switches can be in the first state at any given time. When in the first state, each switch adjusts an attenuation amount of the high frequency signal.
Intercell interference reduction
A distributed antenna system based wireless cellular communication system with transmit side linear interference cancellation is described. In this system the effective channel elements (I) and (II) are estimated and reported by mobile station MS1 and MS2, respectively, to a transmit weight matrix processing apparatus. Processing apparatus uses the effective complex channel matrix (one row reported by each mobile station) to differentially update the transmit weight matrix used for the transmit side linear interference cancellation.
Communication terminal and communication control method
A communication terminal (10) including a first communication unit (11) and a second communication unit (12) includes a presence status detection unit (13) that detects a presence status indicating whether a distance from a personal computer (50) is inside a communication range where communication is possible or outside the communication range where communication is not possible for each of the first communication unit (11) and the second communication unit (12), and a communication status management unit (14) that, in accordance with the presence status of either communication unit (11, 12) detected by the presence status detection unit (13), causes the other communication unit (11, 12) to transition to an activation state, a standby state or a disconnection state.
Alternative path configuration for peer-to-peer networking
A method, an apparatus, and a computer program product are provided in which information is exchanged through peer-to-peer communication with a second wireless device using a first radio technology. The information regards at least one additional radio technology. In addition, whether to utilize a second radio technology of the at least one additional radio technology for peer-to-peer communication with the second wireless device rather than the first radio technology is determined. Furthermore, the first radio technology is utilized to exchange control information for the second radio technology.
Apparatus for and method of selecting between antennas for wireless communication
A communication device comprising at least first and second antennas wherein a quality of communication between the communication device 2 and a further device 20 is assessed when using the at least first and second antennas 8, 10, 12 so as to select one of the at least first and second antennas for further communications between the communication device and the further device.
Method and device for active load modulation by inductive coupling
A data emission/reception device by inductive coupling includes an inductive antenna circuit in which an antenna signal appears, a mechanism configured to for extracting a first periodic signal from the antenna signal, a synchronous oscillator receiving the first periodic signal and supplying a second periodic signal, and an active load modulation circuit configured to apply bursts of the second periodic signal to the antenna circuit. The device is configured to place the oscillator in the synchronous oscillation mode before each application of a burst of the second periodic signal to the antenna circuit, then place the oscillator in the free oscillation mode.
System and method for securely pairing a wireless device using wireless communication
Various embodiments of an invention for pairing a plurality of wireless devices using wireless communications are disclosed. A method for pairing a wireless device comprises placing the wireless device in a pairing enclosure. The pairing enclosure includes a shielding layer to substantially attenuate a pairing signal emitted within the pairing enclosure. A pairing signal transmitted through the pairing enclosure is received at a pairing signal receiver configured to detect a power level of the pairing signal. An indication is made regarding whether the pairing procedure can begin, proceed, or be terminated based on the power level of the pairing signal detected by the paring signal receiver.
Systems and methods for producing, delivering and managing educational material
A method includes receiving data associated with a characteristic of a set of students from a educational delivery system. The characteristic can include, for example, a demographic characteristic, a geographical location, a score of an assessment associated with a learning objective from the plurality of learning objectives, a time to complete the assessment, a number of attempts to complete the assessment and/or an indicator of knowledge of the learning objective based on prior educational experience. A first group of students and a second group of students are automatically selected from the set of students based on the data such that first group of students is substantially identical to the second group of students. A first educational material is delivered to the first group of students. A second educational material is delivered to the second group of students.
Image forming apparatus with belt member pushing
An image forming apparatus includes an image bearing member; a stretched rotatable belt member; a transfer device for forming a transfer portion where a toner image is transferred from the image bearing member onto a recording material carried and conveyed on the belt member; a separation roller capable of separating the recording material from the belt member; a push-up device capable of pushing up a belt surface locally with respect to a widthwise direction of the belt member to separate the recording material from the belt member; and an execution portion for executing, when an abnormality occurs during an image forming operation, an operation in a stop mode in which the belt member is, after the image forming operation is stopped, rotated in a push-up state of the push-up device and then the rotation of the belt member is stopped.
Image forming apparatus
An image forming apparatus includes an openable cover capable of opening and closing an opening, an image forming portion for forming a toner image on a sheet, and a cam member provided in the image forming portion for moving a contact member toward and away from an opposing member. A controller controls the image forming portion and rotation of the cam member. The controller stops an operation of the image forming portion when a detecting unit detects opening of the openable cover, and then controls rotation of the cam member at least one full turn when the detecting unit detects closing of the openable cover.
Image heating device
In an image heating device (F) employing an induction heating system, which includes a heating rotary member (15, 15A) and a magnetic flux generating unit including a coil and a magnetic core (12), when an area of a surface of a leading end portion of the core (12) on a side opposed to the heating rotary member (15) is large, the time change of the magnetic flux to act on the heating rotary member does not increase. As a result, the heat generation efficiency of the heating rotary member may be suppressed. To resolve this problem, the core (12) includes a second core portion (12a) protruding toward the heating rotary member and including, on a leading end side of a convex-shaped part, a leading end protruding portion (12d) which has a width smaller than a width of a root portion (12b) of the convex-shaped part in a circumferential direction.
Method for controlling image forming apparatus, and image forming apparatus
If any of a plurality of conditions is satisfied, an image forming apparatus having a plurality of image forming units that form images on an intermediate transfer member in a superimposed manner detects, using a pattern detection sensor, the amount of color misregistration of the images formed by the plurality of image forming units on the intermediate transfer member and corrects the color misregistration of the images formed by the plurality of image forming units in accordance with the amount of color misregistration that is smaller than a color misregistration correction tolerance, which varies depending on the plurality of conditions, and that has been detected by the pattern detection sensor.
A developing device includes spiral wings, a forward double spiral wing, clearance portion, backward double spiral wing, and short lead backward spiral wing installed on the rotational shaft of a stirring and carrying unit. The forward and backward double spiral wings have spiral directions opposite to each other, and together are formed to have an equal lead to the spiral wings. The supplying and carrying unit is disposed above the stirring and carrying unit, and the supplying and carrying unit and the stirring and carrying unit are divided by a partition having a communication portion installed at a position corresponding to the forward and backward double spiral wings.
Image reading apparatus
An image reading apparatus includes a substructure, a first opening and closing body that opens and closes the upper portion of the substructure, and a second opening and closing body that opens and closes the upper portion of the first opening and closing body, and includes a locking mechanism in which the first opening and closing body and the second opening and closing body do not enter the opened state at the same time.
Developing device of image forming apparatus
An image forming apparatus having an improved configuration to prevent foreign substances from accumulating on a space maintaining member used to maintain a constant distance between a photoconductor and a developer delivery member. The image forming apparatus includes a photoconductor, a developer delivery member to deliver and feed developer to the photoconductor, a cleaning member to remove the developer and foreign substances remaining on a surface of the photoconductor while coming into contact with the photoconductor, and a space maintaining member arranged to come into contact with the photoconductor so as to maintain a constant developing gap or developing nip between the photoconductor and the developer delivery member. The space maintaining member is located between both ends of the cleaning member.
Electrophotographic member and electrophotographic apparatus
Provided is an electrophotographic member, which hardly changes in performance even when being left to stand for a long time period. The electrophotographic member comprises a support, an elastic layer formed on the support, and a surface layer covering a surface of the elastic layer and containing a urethane resin, and in which the urethane resin comprises a reaction product of: a hydroxyl group-terminated prepolymer obtained by reacting a polyester polyol with a polyisocyanate; and an isocyanate-terminated prepolymer obtained by reacting a polyester polyol with a polyisocyanate.
Image forming system
An image forming system includes a first developer container, a second developer container having a capacity larger than the first developer container, and an image forming main unit having a structure configured to allow one developer container selected from a group including the first and second developer containers to be removably installed therein. Each of the first and second developer containers includes a housing configured to form a developer storage chamber in which developer is storable, and a developer agitating member. The agitating member of the first developer container has a construction equivalent to that of the second developer container. Lower portions of the housings are equally positioned relative to the corresponding agitating member and have equally shaped inner surfaces, while portions other than the lower portions of the housings are shaped differently from each other.
Image forming apparatus and image forming unit
Image forming apparatuses include: a casing; an image forming unit removable from the casing in a first direction; and plural developer cartridges. The cartridges may be attached and detached with respect to the image forming unit in a second direction that is inclined toward the first direction. Other image forming apparatuses include: a casing; an exposure device; a plurality of cartridges configured to be attached and detached with respect to the casing in a first direction; and a recording medium transport system for transporting recording media adjacent the photosensitive members in a second direction. The first direction may be inclined with respect to the second direction, and at least a portion of optical paths of the light emitted from the exposure device may extend parallel with the first direction. Aspects also relate to image forming units, e.g., for use in image forming apparatuses as described above.
Image-forming device capable of positioning developing unit and developer cartridge precisely
An image-forming device may include a casing and a developing unit that is detachably mounted in the casing and formed with a first opening. The developer unit may have a developer carrying member carrying a developer, wherein the developing unit includes one end. The image-forming device may also include a first shutter configured to open and close the first opening and a developer cartridge that is configured to be detachably mounted in the casing, accommodate the developer, and is formed with a second opening. The second opening may be in alignment with the first opening when the developing unit and the developer cartridge are mounted in the casing. The image-forming device may also include a second shutter configured to open and close the second opening. The image-forming device may also include an alignment member between the developing unit and the developer cartridge.
Charging device and image forming apparatus
A charging device includes a discharge electrode that charges a surface of a rotatable image carrier and extends along the image carrier, a case that extends along and encloses the discharge electrode with a side thereof nearest to the image carrier being open, a grid electrode provided between the image carrier and the discharge electrode, a cleaning member that cleans at least one of the discharge electrode, the case, and the grid electrode by moving along the case, a regulating portion that is provided between the cleaning member and the case and regulates a distance between the cleaning member and the case in a direction orthogonal to the direction of movement of the cleaning member by coming into contact with the cleaning member or the case, and a supporting portion that supports the regulating portion and allows the regulating portion to move away from the cleaning member or the case.
Sub power source-type electronic device and image forming apparatus
An electronic device includes a first voltage output part configured to output a first voltage, a second voltage output part configured to output a second voltage, a first controller configured to receive the first voltage supplied from the first voltage output part, a second controller configured to receive the first voltage supplied from the first voltage output part, and a third controller configured to receive the second voltage supplied from the second voltage output part. The first controller stops the supply of the first voltage to the second controller by the first voltage output part after the supply of the second voltage to the third controller by the second voltage output part has been stopped.
Power supply circuit, image forming apparatus incorporating same, and power supply method to supply voltage to image forming apparatus
A power supply circuit includes a voltage regulator to which a first high voltage is supplied, to operate at constant voltage and regulate the supplied first high voltage, and a first rectifier circuit to which the first high voltage is supplied, connected in parallel to the voltage regulator, to rectify the supplied first high voltage for output as a first DC voltage. When the first high voltage is a pseudo-alternating-current (AC) voltage consisting of two types of high voltages that alternate, the voltage regulator regulates each of the two different types of the voltages to output a desired pseudo-AC voltage.
Apparatus, methods, and systems for engaging and disengaging a fixing nip for cut sheet processing
A fixing device includes a first fixing member a second fixing member that are movable to engage and disengage a fixing nip defined by the first and second fixing member. The fixing nip is disengaged to accommodate entry and exit of a cut sheet, and engaged to accommodate warm-pressure fixing a marking material image to the cut sheet.
Image formation apparatus, driving control method, and computer program product
An image formation apparatus includes an image carrier; a driving source generating a driving force for the image carrier; a drive transmission unit; a driving control unit controlling the driving source; an image formation unit forming an image on a surface of the image carrier; a transfer nip between a transfer member and the surface of the image carrier; a driving-force exerting unit exerting a driving force on any one of the image carrier and a first drive transmission member on a drive transmission path, and a specific drive transmission member imparting weakest spring characteristics among drive transmission members to a drive transmission system; a detecting unit detecting an estimation parameter used in estimating a driving-load-torque variation amount of the image carrier; a torque-variation-amount estimation unit; and a driving-force control unit controlling the driving force to cancel the driving-load-torque variation.
Device for determining and adjusting transfer voltage in an imaging apparatus and a method thereof
A device and method for determining and applying a transfer voltage in an imaging apparatus is provided. A servo voltage is determined based in part upon a change in an environmental condition. A determination is made whether or not to perform a new transfer servo operation based upon at least one of an amount of time passing since the last transfer servo operation was performed and a comparison of the determined servo voltage and a servo voltage used in a prior transfer servo operation. A transfer servo operation includes charging a photoconductive drum to a charge corresponding to a printing voltage.
Control apparatus and method, image forming apparatus and system, and computer readable medium
A control apparatus includes the following elements. A toner density specifying unit specifies a toner density in a developer stored in a developing device. A toner density controller performs control such that the toner density approximates a predetermined toner density target value. A first calculator calculates a first value corresponding to an image density of an image to be output after a first timing. A correction amount specifying unit specifies a correction amount for the toner density target value at the first timing. When the condition that an absolute value of a difference between the first value and a second value is greater than a predetermined threshold is satisfied, the correction amount specifying unit specifies a smaller correction amount for the toner density target value, compared with when the condition is not satisfied. A correcting unit corrects the toner density target value on the basis of the correction amount.
Image forming device and method of adjusting density of formed image
An image forming device includes a toner supplying unit to supply the toner to a storage unit. A mixer supplies developer in the storage unit to a developing roller, and a developer sensor detects the amount of developer on the surface of the developing roller. A toner concentration sensor detects toner concentration in the developer stored in the storage unit, and a control unit adjusts at least one of a developing bias and a rotation speed of the mixer based on a value detected by the developer sensor and a value detected by the toner concentration sensor, such that a printed image has uniform density.
Asset tracking system for rack-based enclosures
A system includes a beacon device including a communication strip having a plurality of directed light emitters distributed along the communication strip. The beacon device can transmit a directed light signal via the directed light emitters. The system further includes a tag including a processor, a radio frequency transmitter coupled to the processor, a directed light receiver coupled to the processor, and a lens having first and second major surfaces and a side surface, the tag to receive the directed light signal via the side surface and to transmit a radio frequency tag message via the radio frequency transmitter. The system also includes a radio frequency reader to receive the radio frequency tag message.
40, 50 and 100 Gb/s optical transceivers/transponders in 300pin and CFP MSA modules
Disclosed by way of exemplary embodiments, a 40/50/100 Gb/s Optical Transceivers/transponders which use opto-electronic components at data rates collectively that are lower than or equal to half the data rate, using two optical duobinary carriers. More specifically, the exemplary embodiments of the disclosed optical transceivers/transponders relate to a 43 Gb/s 300pin MSA and a 43˜56 Gb/s CFP MSA module, both include a two-carrier optical transceiver and the appropriate hardware architecture and MSA standard interfaces. The two-carrier optical transceiver is composed of a pair of 10 Gb/s optical transmitters, each using band-limited duobinary modulation at 20˜28 Gb/s. The wavelength channel spacing can be as little as 19˜25 GHz. The same principle is applied to a 100 Gb/s CFP module, which is composed of four tunable 10 Gb/s optical transmitters, with the channel spacing between optical carriers up to a few nanometers.
Accessing transceiver link information from host interface
Embodiments of the present invention include systems and methods for accessing the digital diagnostic data and controller data of a remote transceiver module via the diagnostic port of a local transceiver. The invention involves modulating high-speed data and out-of-band data as a double modulated signal, wherein the out-of-band data includes the remote transceiver controller and digital diagnostic data, which is subsequently accessible by an external user device from the diagnostic port of the local transceiver.
Connection management server, OLT, ONU/ONT and the system and method for providing ethernet-based PTL-PON
Provided is a passive optical network (PON) providing system of an Ethernet-based packet transport layer (PTL) scheme, including: a connection management server to manage a unified PTL connection overall over the network by establishing a PTL connection between an optical network unit (ONU)/optical network terminal (ONT) of a customer termination of one party and an ONU/ONT of a customer termination of another party, and by applying a PTL-PON scheme to a PON section between the ONU/ONT and an optical line termination (OLT); an OLT to manage a connection of a received packet, and to convert a format of the packet according to a transmission direction of the packet and thereby transmit the packet; and an ONU/ONT becoming an end point of the PTL connection to convert the format of the packet according to the transmission direction of the received packet and to thereby transmit the packet to a customer terminal or the OLT.
Optical packet switching system and optical packet switching device
An optical packet switching device is provided with: a first input unit and a second input unit for receiving an optical packet signal having destination information and priority information; a first demultiplexer and a second demultiplexer for branching the optical packet signal; an optical switch unit for routing one of branched optical packet signals; a first analyzer unit and a second analyzer unit for analyzing the header of the other branched optical packet signal so as to detect the destination information and the priority information; and an output competition determination unit for checking for temporal competition of a plurality of optical packet signals based on destination information and for determining whether the optical packet signals should be transmitted or discarded based on priority information when there is competition.
Methods and systems for distributing fiber optic telecommunication services to local areas and for supporting distributed antenna systems
A fiber optic network includes a fiber distribution hub including at least one splitter and a termination field; a plurality of drop terminals optically connected to the fiber distribution hub by a plurality of distribution cables; and a distributed antenna system (DAS). The DAS includes a base station and a plurality of antenna nodes. The base station is optically connected to the fiber distribution hub and the antenna nodes are optically connected to the drop terminals. Example splitters include a passive optical power splitter and a passive optical wavelength splitter. Signals from a central office can be routed through the passive optical power splitter before being routed to subscriber locations optically connected to the drop terminals. Signals from the base station can be routed through the wavelength splitter before being routed to the antenna nodes.
Wavelength division multiplexing transmission system, optical channel monitor and optical channel monitoring method
A light channel monitor includes an optical separating section configured to separate a wavelength multiplexed optical signal into optical signals for channels and monitors configured to measure intensities of the optical signals for the channels. A processing section is configured to correct the measured intensities of the optical signals based on a wavelength transmission characteristic of the optical separating section to calculate the wavelength multiplexed optical signal before the separation.
Camera and auto-focusing method of the camera
A camera includes a depth-sensing lens, an auto-focusing apparatus, and a display screen. In an auto-focusing method of the camera, a focusing position of the depth-sensing lens is determined when an image of the scene is shown on the display screen. The depth-sensing lens senses a depth between the object and the camera, and determines a distance between the object and the focusing position of the depth-sensing lens. An optimal focus of the camera is calculated according to the depth and the distance. The auto-focusing apparatus controls the depth-sensing lens to move from the focusing position to the optimal focus of the camera. The camera controls the depth-sensing lens to capture an image of the scene based on the optimal focus when a user presses a button of the camera.
Imaging apparatus, flash device, and control method thereof
An imaging apparatus for performing wireless communication with an external device. An instruction transmitting unit transmits an operation instruction to the external device. A response signal receiving unit receives a response signal from the external device. A first controlling unit starts a first operation relating to an imaging process in a case that a first time passes from a point of receiving the response signal by the response signal receiving unit. The external device executes a second operation relating to the imaging process in a case that a second time passes from a point of transmitting the response signal from the external device to the imaging apparatus.
Triaxial camera suspension unit
The invention relates to a suspension system designed for use with optical devices, such as video cameras. The camera suspension unit includes a platform, outer and middle frames, with the orthogonal intersecting axes of rotation at the midpoint of the unit, rotating drives to rotate the unit about the X, Y and Z axes all controlled by a control unit. The middle frame of the suspension unit is designed as a mechanical parallelogram, having a movable jointed foot, a piston-rod and two cranks, as well as two mechanical links, all of which have an axis of rotation parallel to the middle frame axis of rotation, which is parallel to the Y axis. The outer end of each mechanical link is fastened to a crank while the inner end is fastened to the frame. The inner ends are fastened in a rotatable manner, allowing for the rotation about an axis parallel to the axes of rotation of the cranks. The outer frame of the suspension unit, the foot of the parallelogram, two mobile mechanical links and the cranks, are all joined together, to form two parallelograms. The platform is rotatably fastened to the middle frame or parallelogram on at least one end with a piston-rod, and the axis of rotation of the platform is perpendicular to the axes of rotation of the piston-rod in relation to the cranks. The axis of rotation of the platform and cranks intersect.