Mobile device peripherals management system and multi-data stream technology (MdS)
A device and system for management of and access to externally connected peripheral devices by mobile devices. User and/or application data on a mobile device is sent to externally connected peripheral devices. External peripheral devices includes, but are not limited to, printers, scanners, displays, audio interfaces, speakers, network adapters, storage drives, hard drives, and the like. An end user mobile device application interface is installed as an application on a mobile device. Data may be sent directly to a peripheral device, or to a peripherals aggregation device, which may be active or passive.
Conditional integration of a satellite device into an authentication process involving a primary device
A processing device comprising a processor coupled to a memory is configured to determine a risk of simultaneous theft of a primary device and at least one satellite device associated with the primary device, and to identify said at least one satellite device as an appropriate authentication factor for use in an authentication process involving the primary device, based at least in part on the determined risk. The identified satellite device may serve as an additional or alternative authentication factor relative to one or more other authentication factors. The processing device may comprise the primary device itself, or another separate device, such as an authentication server that also participates in the authentication process. Information associated with the identified satellite device is utilized in the authentication process to authenticate a user of the primary device.
Embedded ring oscillator network for integrated circuit security and threat detection
Aspects of the disclosure relate to combining on-chip structure with external current measurements for threat detection in an integrated circuit. This method considers Trojans' impact on neighboring cells and on the entire IC's power consumption, and effectively localizes the measurement of dynamic power. An on-chip structure can permit threat detections. In one aspect, the on-chip structure can comprise a plurality of sensors distributed across the entirety of the IC, with each sensor of the plurality of sensors being placed in different rows of a standard-cell design. In another aspect, data analysis can permit separating effect of process variations on transient power usage of the IC from effects of a hardware threat such power usage. The on-chip structure also can be employed for implementation of a PE-PUF.
System and method for enhancing device passcode security
A method for entering a passcode within a mobile device begins with receiving an indication of a user attempt to access the mobile device. A passcode entry display including a plurality of touch points is generated responsive to the indication. Each of the plurality of touch points includes at least two visual identifiers associated therewith. The passcode entry display is displayed on an interface of the mobile device and the passcode is received responsive to user selection of a sequences of the plurality of touch points associated with a predetermined sequence of at least one of the visual identifiers. The arrangement of the at least two visual identifier associated with the plurality of touch points of each passcode entry display differs from an arrangement of the at least two visual identifiers in a previous and a subsequent passcode entry display.
Data storage device and data storage system including the same
A data storage device protecting security code stored therein and a data storage system including same are disclosed. The data storage device efficiently prevents unauthorized access to the security code by allowing command descriptor block (CDB) information to be read using only a read-only memory (ROM).
Method for document processing
A method and system process a document having attached thereto a set of digital rights specifications, the digital rights specifications specifying constraints on the processing of the document. A workflow controller selects candidate devices, for processing the document, from a plurality of devices and determines, for each candidate device, that the device meets the digital rights specifications requirements. A set of devices are assigned to process the document from the set of devices that meet the digital rights specifications constraints. The workflow controller detects a failed device included in the assigned set of devices to process the document and determines potential candidate devices to replace the failed device. For each potential candidate device, it is determined if the potential candidate device meets the digital rights specifications requirements. A device that meets the digital rights specifications constraints is assigned to replace the failed device.
Private anonymous electronic messaging
Private anonymous electronic messaging between a message originator and a message recipient within an organization encourages open communication which can provide information to the organization that might otherwise be secreted from the organization, and can allow the message originator to obtain desired help (e.g., counseling). By profiling of the message originator based on current and previous electronic messaging within the system as well as external organizational information (e.g., behavioral or financial information), the system can assess concerns yet act as a gateway to protect the message originator's true identity through escalating levels of concern unless a genuine concern about the health, well-being, and/or safety of the message originator, others, or the organization is indicated, in which case the system can reveal the true identity of the message originator as appropriate.
Data management using a virtual machine-data image
In one implementation, encrypted data and a virtual machine are stored together as a virtual machine-data image, wherein the virtual machine is configured to EXERT management control over the data based on policies set by an owner of the data. In another implementation, metadata defining or tagging policies for usage of data is associated with the data. Control capabilities of service providers are mapped to the policies, wherein those service provider environments that best satisfy the controls mapped to the policies are identified.
Unauthorized operation detection system and unauthorized operation detection method
The content of operations is identified and an alert is generated to an operation having a high risk of information leakage.An agent monitors, for example, operations performed with respect to a dialogue displayed on a client PC. If a file is selected by an operation performed with respect to the displayed dialogue, the agent assigns an identifier indicating a source for the file to the file. If the file is sent as an attached file, the agent identifies an output destination for the attached file as well as the source for the attached file; and if the output destination for the attached file is an external Web server and the source for the attached file is a mail server, the agent generates an alert by determining that an unauthorized operation has been executed; and then sends the generated alert to a management server.
Systems and methods for automated malware artifact retrieval and analysis
An automated malware analysis method is disclosed which can perform receiving a first universal resource locator identifying a first intermediate network node, accessing the first intermediate network node to retrieve a first malware artifact file, storing the malware artifact file in a data storage device, analyzing the malware artifact file to identify a second universal resource locator within the malware artifact file, and accessing a second intermediate network node to retrieve a second malware artifact file.
Geolocation error tracking in transaction processing
An improved technique tracks errors in collecting geolocation data associated with a transaction. Along these lines, an adaptive authentication engine stores information indicative of a failure to collect geolocation data associated with the transaction. In particular, this information takes the form of a geolocation collection state; the adaptive authentication engine stores such a state in a field of a database that contains historical transaction information. If a service provider failed to collect geolocation information for a transaction, the adaptive authentication engine stores a “Fail” value in the geolocation collection state field of the database entry associated with the transaction. Adaptive authentication techniques may then correlate such “Fail” values with other field values such as time of submission and device type. The result of such a correlation is to build a risk model based on geolocation collection error which the risk engine may then use to compute risk score.
Safe self-modifying code
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for runtime language-independent sandboxing of software. In one aspect, a system implements an extended Software Fault Isolation (SFI) software sandboxing system configured to provide a user-mode program interface for receiving runtime requests for modifying verifiably safe executable machine code. Requests can include dynamic code creation, dynamic code deletion, and atomic modification of machine code instructions. A runtime modification of a verifiably safe executable memory region is made in response to each received runtime request, and code within the modified memory region has a guarantee of safe execution.
Computing device with untrusted user execution mode
Methods and apparatus for executing untrusted application code are disclosed. An example apparatus includes an execution mode state indicator with a plurality of states. In the example apparatus, the execution mode state indicator is configured such that placing the execution mode state indicator in a first state causes the processor to operate in a first execution mode and placing the execution mode state indicator in a second state causes the processor to operate in a second execution mode. The example apparatus also includes an instruction processing module that is configured to implement a set of instructions in the first execution mode and designate one or more instructions of the set of instructions as illegal instructions in the second execution mode. The example apparatus further includes a memory system that, in the second execution mode, is configured to restrict access to a set of memory addresses accessible by the processor in the first execution mode to a subset of the set of memory addresses.
Methods for handling a file associated with a program in a restricted program environment
Techniques for handling a file associated with a program are described herein. According to an aspect of the invention, in response to a request for accessing a file received through a first program, the file is stored in a first sandboxed storage area, where the file is to be accessed by a second program. An atomic move operation is then performed on the file that atomically moves the file from the first sandboxed storage area to a second sandboxed storage area, where the first sandboxed storage area is not accessible to the first program and second program. The second program is launched to access the file stored in the second sandboxed storage area, where the second sandboxed storage area is a part of a sandbox associated with the second program.
Filter-based identification of malicious websites
A candidate suspicious website is identified. A plurality of lightweight features associated with the candidate suspicious website is identified. A filter score is determined based on the plurality of lightweight features, wherein the filter score indicates a likelihood that the candidate suspicious website is a malicious website. Whether the filter score exceeds a threshold is determined. Responsive at least in part to the filter score exceeding the threshold it is determined that the candidate suspicious website is a suspicious website. Whether the suspicious website is a malicious website is determined by identifying software downloaded to the computing system responsive to accessing the suspicious website and determining whether the software downloaded to the computing system is malware based on characteristics associated with the downloaded software.
Instant messaging malware protection
A computing device capable of instant messaging (IM) contains IM anti-malware software for preventing the transmission of malware-created IMs and opening potentially harmful IMs that it receives. When transmitting an IM, the software checks to ensure that the message being sent was created by the user (a human being) and not by IM malware, such as an IM BOT. This is done by copying details of a message as it is being typed by a user into a database and searching for that data before an IM is transmitted from the device. The software also ensures that when it receives an IM from an outside source, that the message contains a special encrypted signal that was inserted into the message by the source when the source has determined that the message was created by a human being. If the special signal is not found, it is presumed that the message was created by malware and may be discarded. Ensuring that an IM message is created by a human being is by leveraging a feature in IM client software that provides the name of the person typing the message as the message is being created.
Method and apparatus for detecting unauthorized access to a computing device and securely communicating information about such unauthorized access
A method and apparatus for detecting attacks against a computing device are described. Such attacks may be detected by the device and reported to a requesting entity in a manner that makes it difficult for an attacker to know that the attack has been detected. Several exemplary embodiments comprising different client/server and client/network type systems are presented.
Unauthorized URL requests detection
Unauthorized URL requests are detected based on individual user's access map(s). An access map describes legitimate paths that a user may be led from one URL to another URL. Additional information on individual URLs forming the paths, such as whether a particular URL is a start URL or a critical URL, is also included in the access map. The access map may be updated based on the most currently available information. When a URL request is made from a client device associated with a user, and it if is determined that the requested URL may potentially suffer from CSRF attacks, then the requested URL and its referral URL are compared against the URL paths in the user's access map to determine whether the URL request is unauthorized. If so, then an alert may be raised.
System and method for coordinating network incident response activities
The present invention provides a system and method to process information regarding a network attack through an automated workflow that actively reconfigures a plurality of heterogeneous network-attached devices and applications to dynamically counter the attack using the network's own self-defense mechanisms. The present invention leverages the security capabilities present within existing and new network-attached devices and applications to effect a distributed defense that immediately quarantines and/or mitigates attacks from hostile sources at multiple points simultaneously throughout the network. In a preferred embodiment, deployed countermeasures are automatically lifted following remediation activities.
Printing system and image forming apparatus
A printing system includes an image forming apparatus and a host terminal apparatus. The image forming apparatus is operated by a first user who picks up a printed output of the image forming apparatus. A second user sends print data from the host terminal apparatus. The image forming apparatus includes an input section, a receiving buffer, and a watermark embedding section. The first user inputs a first item of information indicative of the first user through the input section. The receiving buffer stores the print data therein. The watermark embedding section produces a watermark pattern in which information representative of the first item of information is embedded, and combines the print data with the watermark pattern. The image forming apparatus prints out the received print data with the watermark pattern embedded therein. The watermark pattern includes the first item of information therein.
Interactive video captcha
Provided is a Captcha Access Control System (CACS) for generating an improved captcha that are based, in one described embodiment, upon a command in one format and a response in a different format, one or both of which are rendered in a format that is difficult for an automated system to interpret. A computer system or program to which a user is requesting access generates a textual or audible command. A video device captures the user's response and transmits the response to a response evaluation device. Based upon an analysis of the transmitted video and a comparison between the analyzed video and the command, the computer or program either enables access or denies access.
Embodiments for performing service binding between a client and a target server are disclosed. In accordance with one embodiment, a clear text client service binding value is received from a client at the target server, the client service binding value is compared to a server service binding value, and a communication channel is formed between the client and the target server when the client service binding value matches the server service binding value.
Using cached security tokens in an online service
A security token service generates a security token for a user that is associated with a client and stores the full security token within a memory. The security token includes an identity claim that represents the identity of the generated security token. Instead of passing the entire security token back to the client, the identity claim is returned to the client. For each request the client makes to the service, the client passes the identity claim in the request instead of the full security token having all of the claims. The identity claim is much smaller then the full security token. When a computing device receives the identity claim within the request from the user, the identity claim is used to access the full security token that is stored in memory.
Privacy-preserving user attribute release and session management
An information processing system comprises one or more processing devices of at least one processing platform. In one embodiment, the system comprises cloud infrastructure that is configured to validate an externally-generated security token issued to a user, to extract one or more claims from the validated externally-generated security token, and to create a session object to hold the extracted claim or claims. The cloud infrastructure issues an internally-generated security token based on the session object that allows the user to be identified to a protected resource. The internally-generated security token is validated in conjunction with a request from the user for access to the protected resource, and information associated with at least one extracted claim is selectively released responsive to validation of the internally-generated security token. Access of the user to the protected resource is granted or denied based on the selectively-released information.
Systems and methods for securing network communications
Secure communications may be established amongst network entities for performing authentication and/or verification of the network entities. For example, a user equipment (UE) may establish a secure channel with an identity provider, capable of issuing user identities for authentication of the user/UE. The UE may also establish a secure channel with a service provider, capable of providing services to the UE via a network. The identity provider may even establish a secure channel with the service provider for performing secure communications. The establishment of each of these secure channels may enable each network entity to authenticate to the other network entities. The secure channels may also enable the UE to verify that the service provider with which it has established the secure channel is an intended service provider for accessing services.
Hardware-based device authentication
An opportunity for a computing device to participate in a secure session with a particular domain is identified. A domain identifier of the particular domain is received and a secured microcontroller of the computing device is used to identify a secured, persistent hardware identifier of the computing device stored in secured memory of the computing device. A secure identifier is derived for a pairing of the computing device and the particular domain based on the hardware identifier and domain identifier of the particular domain and the secure identifier is transmitted over a secured channel to the particular domain. The particular domain can verify identity of the computing device from the secure identifier and apply security policies to transactions involving the computing device and the particular domain based at least in part on the secure identifier.
Code-based authorization of mobile device
A system and method for authenticating mobile communications devices. The method comprises: generating a code corresponding to a user configured to be rendered on a rendering device to produce a rendered code, the rendered code being readable by a mobile communications device having a code reading device, the rendered code comprising a secret token; storing the secret token along with information identifying the user on a first storage device; providing the code to the user; receiving, at the authentication server, a setup message from the mobile device, the message includes a device identifier and the secret token; comparing the received secret token and the secret token stored on the first storage device; if the received secret token matches the secret token stored on the first storage device, storing, on a second storage device, information identifying the user and a trusted device value corresponding to the device identifier.
Visual authentication and authorization for mobile devices
A system and method is provided for visual authentication and authorization of a user for mobile touch devices, the system having: a login display on a mobile touch device displaying a visual pattern; a data collection engine whereby touch attributes are obtained from a plurality of user touch events to the mobile touch device with reference to the visual pattern, the touch attributes comprise measured touch attributes and derived touch attributes calculated from the measured touch attributes; an authentication engine whereby the touch attributes are compared to projected user touch attributes derived from user touch attribute values obtained during prior successful logins.
Method and device for verifying dynamic password
The examples of the present invention provide a method and device for verifying a dynamic password. In the method and device, some algorithm parameters can be exchanged in public by using a DH algorithm, and thus a same key is shared safely between two entities, so as to implement the verification of the dynamic password and further improve the security of identity verification. Moreover, the method and device can be easy to use. Further, by the above technical solution, no message exchange is needed between a mobile device and a verification server, and a user does not need to pay for additional flux, so as to decrease the burden of the user and verification costs.
Methods and systems for enhancing the accuracy performance of authentication systems
A method for enhancing the accuracy performance of authentication systems includes determining an authentication data requirement for a desired transaction and at least one new verification phrase. The method also includes capturing authentication data from a user with a communications device in accordance with the authentication data requirement, and capturing biometric data of the at least one new verification phrase from the user with the communications device. Moreover, the method includes adding the determined at least one new verification phrase to an enrollment phrase registry and storing the biometric data captured for the at least one new verification phrase in an enrollment data record of the user after successfully authenticating the user.
Multi-level authentication for medical data access
Techniques for multi-level authentication for medical data access are supported. A system may include a central medical information management system that provides restricted access to medical data. An accessing device supports multiple different authentication levels. For example, the accessing device may use a combination of device identifiers, passwords, and quick access codes to ensure access only by authorized users.
Organizing permission associated with a cloud customer in a virtual computing infrastructure
Organizing permissions to authorize a subject to perform an action on an object in a cloud computing environment is described. A plurality of permissions associated with a cloud customer is created. A first set of permissions from the plurality of permissions is associated with one or more objects. Each of the first set of permissions describes an action performed on an object. A second set of permissions from the plurality of permissions is associated with one or more users. Each of the second set of permissions describes an action to be performed by one or more users.
Providing differentiated network services and priorities to VPN routers/clients
In one embodiment, a first network device receives a priority message from a second network device, wherein the priority message conforms to a connection establishment protocol and indicates a priority associated with the second network device. The first network device obtains the priority from the priority message and stores the priority. The first network device allocates resources for at least one of control or data plane processing to the second network device in accordance with the priority.
Dual cookie security system with interlocking validation requirements and remedial actions to protect personal data
A first server associated with a first URL receives a request from a client, including a first object having a respective user identifier and validation value. The server evaluates the validation value of the received first object with respect to a first validation requirement. When the validation value of the first object fails the first validation requirement, the server sends a response to the client that causes the client to send a second request to a second URL that is distinct from the first URL. A second server associated with the second URL receives a request from the client that includes a second object, distinct from the first object. The second server evaluates the received second object with respect to a second validation requirement, and when the second object fails the second validation requirement, the second server invalidates the respective user identifier.
Method and device for user authentication
A method is provided for user authentication, comprising: provision of a client device provided with an encryption function of variables K, t, x, in which: K is a secret shared by the server and the client device; t is a time-dependent variable; and x is a variable having at least two values, a step of calculation (S30) by the client device of a first value of the function obtained for a first value of x, for authentication of the user by the server; and a step of calculation (S80, S110) by the client device of a second value of the function, obtained for a second value of x, for verification of the user authentication by the server. Also provided is a user authentication device with means of calculation of values of said function.
Runtime risk detection based on user, application, and system action sequence correlation
A method for assessing runtime risk for an application or device includes: storing, in a rules database, a plurality of rules, wherein each rule identifies an action sequence; storing, in a policy database, a plurality of assessment policies, wherein each assessment policy includes at least one rule of the plurality of rules; identifying, using at least one assessment policy, a runtime risk for an application or device, wherein the identified runtime risk identifies and predicts a specific type of threat; and identifying, by a processing device, a behavior score for the application or device based on the identified runtime risk, wherein the action sequence is a sequence of at least two performed actions, and each performed action is at least one of: a user action, an application action, and a system action.
Program replacing method
A program replacing method includes registering a first program so that message transmission is enabled between the first program and a detachable point of deployment (POD). The first program has an identifier that identifies a program type of the first program. When a second program having the same identifier as the first program exists in the broadcast receiving terminal apparatus, the second program is notified that message transmission between the second program and the point of deployment is to be terminated. Approval for terminating the message transmission between the second program and the point of deployment is received from the second program. The message transmission between the second program and the point of deployment is then terminated.
Digital broadcast receiver and upgrading method thereof
A digital broadcast receiver and an upgrading method thereof that can achieve an upgrade stabilization. The digital broadcast receiver includes a tuner to receive broadcast data of a selected channel, a demultiplexer to separate new middleware data and information data corresponding to the new middleware data from the broadcast data, a memory to pre-store previous middleware data and to store the new middleware data and the information data, and a controller to determine whether to store the new middleware data in the memory based on the information data. If storage of the new middleware data is completed, the controller checks whether an upgrade is successful by executing the new middleware data, and if the upgrade fails, the controller executes the previous middleware data pre-stored in the memory. Thus, the receiver upgrades the received middleware program in a stable manner.
Dual mode proximity sensor
A computer-implemented method for controlling an electronic device including receiving a signal through a light sensor of the device, identifying with a processor of the device whether the received signal originated from a light emitter of the device, and controlling a function of the device, the function selected based on whether the signal is identified as originating from the light emitter of the device or the light emitter separate from the device.
IP media streaming service delivery
A method of ordering the delivery of a media stream to a client terminal coupled to an IP network is described. The method comprises identifying, at a user terminal (e.g. a mobile device), destination address information for the client terminal. The user terminal is authenticated to an application server of an IP Multimedia Subsystem network, and the destination address information is sent from the user terminal to the application server. The media stream is then sent to the client terminal. This enables the media to be delivered to the client terminal on the basis of the authentication of the user terminal.
Systems and methods for caching data in media-on-demand systems
Systems and methods may be provided for retrieving non-on-demand media data and on-demand media data that is provided by separate data sources. On-demand media data may be cached to reduce system latencies and the burden on the distribution network.
Efficiently distributing video content using a combination of a peer-to-peer network and a content distribution network
A method, system and computer program product for efficiently distributing video content. A peer-to-peer network and a content distribution network are used in combination to distribute video content. A content distribution network relies on servers distributed across the Internet to achieve high quality content delivery at a high cost. A peer-to-peer network distributes content among peers without incurring server side cost but may experience poor performance. The peer-to-peer network and the content distribution network are leveraged in a manner that achieves high content delivery and low cost by allowing the peer-to-peer network to serve as much content as possible while using the content distribution network to bootstrap the content in the peer-to-peer network and using it as a fallback whenever the peer-to-peer network has insufficient bandwidth, insufficient quality or when the missing piece of video content in the video buffer of the client device has an immediate deadline.
Forming die assembly for microcomponents
A forming die assembly for microcomponents includes a forming die, a plunger, and a punch. The forming die is formed with an outer die, an inner die, a storage portion formed at the inner die, and a punch hole formed at the inner die. The inner die slidably inserted into the outer die forms a part of a cavity between the inner die and the outer die. The storage portion stores a raw material with a metal powder and a binder having plasticity. The punch hole connects the cavity and the storage portion and forms a gate therebetween. The plunger slidably inserted into the storage portion fills the raw material stored in the storage portion into the cavity through the punch hole. The punch is slidably inserted into the plunger, and it closes the gate and compresses the raw material in the cavity.
Consuming paid media in an internet-based content platform
An internet-based content platform that includes subscribable paid channels is provided. The internet-based content platform receives, via a user interface, a request of an end user to subscribe to a paid channel. The paid channel is one of a plurality of channels of the internet-based content platform and has dynamically changed content. The internet-based content platform requests, via the user interface, end user information that includes payment information of the end user. The internet-based content platform receives the end user information and creates a subscription to the paid channel for the end user based on the end user information. The internet-based content platform provides, via the user interface, access to the content of the paid channel to the end user at substantially the same time as creating the subscription for the end user.
Cost reduction through bidding and advertising
Media can be provided by requesting a data channel, wherein the request includes a bid for bandwidth. The bid can be indicative of a price that a user is willing to pay for the bandwidth. It can subsequently be determined, based on the price, to service the request for the data channel, establish the data channel, and charge an account an amount, based on the price.
Method and apparatus for providing a user interface
When the user views the information available on a program (in a Personal Video Recorder), the keywords that determine whether a program will be recorded are accentuated. This can be done by using the size of the text or by using colors or any other kind of varying accentuation i.e. encircled or blinking text. This makes it easy for the user to identify the keywords used in their personalized profile. Additionally the user can navigate between keywords and change the accentuation of the keywords, to indicate a rating (in multiple levels) of the keyword.
Method and apparatus for purchasing upgraded media features for programming transmissions
The present invention provides an improved method and apparatus for purchasing media features for programming transmissions. A selection is sent to a server system to buy an upgraded media feature for a programming transmission. The server system automatically coordinates purchasing the media feature from a programming transmission source and providing the media feature from the programming transmission source. In one embodiment, an entertainment system includes a user interface from which a viewer selects an upgraded media feature for a programming transmission, wherein the programming transmission with the upgraded media feature is provided to the entertainment system.
Interactive user interface for television applications
An iTV user interface includes a navigable menu area through which a user can select from among a variety of services and a content display area in which formatted data associated with a selected menu service are displayed to the user. The formatted data is displayed in a rotating or ticker fashion having both a passive mode, in which the formatted data is displayed in a sequence independent of any selection operations by a television viewer, and active mode, in which the formatted data is displayed in a sequence that depends on selection operations by the television viewer. Advertisements and/or promotions may be interspersed among the content items. The navigable menu area and the content display area may be displayed to the viewer at the same time as television programming is displayed on the television.
Method and apparatus for customizing user experience
A method for customizing a user communication experience is provided. The method includes the steps of receiving a user communication input and determining one or more communication input characteristics. Thereafter, one or more advertisements are provided to the user in accordance with the user communication input and the one or more determined communication characteristics.
Method and apparatus for providing user control of advertising breaks associated with a media program
A method, apparatus, article of manufacture, and a memory structure for presenting an advertisement for playback in conjunction with a streamed media program are described. The method permits the user to control advertising breaks and in particular, the timing of advertising breaks associated with the media program.
System and method for monitoring video performance
A computer-implemented method, computer program product, and computing system for receiving one or more transmitted frame identifiers that are mathematical representations of one or more transmitted video frames included within a multi-frame video. One or more video frames included within the multi-frame video are received, thus defining one or more received video frames. A mathematical representation of each of the one or more received video frames is generated, thus defining one or more received frame identifiers. The one or more received frame identifiers are compared to the one or more transmitted frame identifiers to determine a level of similarity between the one or more received video frames and the one or more transmitted video frames.
Method and system for the determination of a present viewer in a smart TV
The invention relates to a system for determining a list of currently watching one or more viewers of a smart TV, which comprises at the smart TV: (a) a mobile phone connection unit for detecting pre-registered telephones of potential viewers that are within a short range from the TV; (b) a normal schedule unit for pre-recording for each potential viewer his normal schedule; (c) a recent activity monitoring unit for recording recent viewers activity within the smart TV; and (d) a viewer determination unit for receiving data from said mobile phone connection unit, from said normal schedule unit, and from said recent activity unit, and for determining from said data a list of one or more currently watching viewers of the TV.
Disk drive apparatus with a centering mechanism
A disk drive apparatus able to prevent jamming of a disk and abutting parts having a rotary table fit on a shaft of a brushless motor and carrying a disk and a centering part elastically biased in an axial direction away from a center hole of this rotary table and fit in a center through hole of the disk to center and hold the disk, the centering part having inelastic abutting parts sticking out from a center taper part in radial directions and abutting against an inner circumferential edge of the center through hole and having outer circumferential groove parts forming clearances from the inner circumferential edge between the inelastic abutting parts adjoining each other in the circumferential direction.
System and method for using a mobile agent object to collect data
Method and system for collecting and filtering messages received at an event source platform and delivering the filtered messages to a collection host platform. According to one embodiment, the system uses a mobile agent object to filter messages received at an event source platform. The mobile agent object determines a filtered set of messages that match predetermined parameters and then delivers the filtered messages to a collection host platform for storage or redirection.
Extended dynamic optimization of connection establishment and message progress processing in a multi-fabric message passing interface implementation
In one embodiment, the present invention includes a system that can optimize message passing by, at least in part, automatically determining a minimum number of fabrics and virtual channels to be activated to handle pending connection requests and data transfer requests, and preventing processing of new connection requests and data transfer requests outside of a predetermined communication pattern. Other embodiments are described and claimed.
Method and system for parent backup application monitoring of children backup applications
Parent backup application monitoring of children backup applications is described. Child backup information, including an execution of a child backup task by a child backup application, is communicated from the child backup application to a parent backup application. Second child backup information, including an execution of a second child backup task by a second child backup application, may be communicated from the second child backup application to the parent backup application. A parent backup task is executed by the parent backup application. At least one child backup application inherently lacks a functionality to execute the parent backup task as the parent backup application executes the parent backup task. A report is generated based on the child backup information.
Method and computer program product for integrating a first application providing a B2B gateway and one or more second applications
The invention provides for a method and computer program product for integrating an e-business service application being provided by a B2B server and one or more other remote applications by means of an Entity-Relationship model.
Techniques for event filtering
Described are techniques for event notification. A first notification about a first event is received. A timer is set to an amount of time. Processing waits until an occurrence of either receiving a second notification of a second event or expiration of said timer indicating that the amount of time has lapsed. It is determined whether the amount of time has lapsed or whether the second notification has been received. If the expiration time has lapsed, notification of the first event is provided, and otherwise, if the second notification has been received prior to the amount of time lapsing, the timer is reset and processing waits for an occurrence of either receiving a next notification of an event or expiration of the timer indicating that the amount of time has lapsed.
Correlating parts of composite transactions involving asynchronous calling mechanisms
At least one presently preferred embodiment of the invention broadly contemplates correlating asynchronous transaction parts based on a unique transaction value (e.g. a unique business ID) that all the transaction parts will have access to. This avoids the need for enriching/changing the message body or message header with ARM “correlator” information.
Dynamic reconfigurable heterogeneous processor architecture with load balancing and dynamic allocation method thereof
A dynamic reconfigurable heterogeneous processor architecture with load balancing and dynamic allocation method thereof is disclosed. The present invention uses a work control logic unit to detect load imbalance between different types of processors, and employs a number of dynamic reconfigurable heterogeneous processors to offload the heavier loaded processors. Hardware utilization of such design can be enhanced, and variation in computation needs among different computation phases can be better handled. To design the dynamic reconfigurable heterogeneous processors, a method of how to choose the basic building blocks and place the routing components is included. With the present invention, performance can be maximized at a minimal hardware cost. Hence the dynamic reconfigurable heterogeneous processor(s) so constructed and the load balancing and dynamic allocation method together will have the best performance at least cost.
Managing resources in a multiprocessing computer system
Embodiments of the invention relate to multiprocessing systems. An aspect of the invention concerns a multiprocessing system that comprises a hardware control component for selecting a hardware management action responsive to a hardware policy and a virtualization component for presenting virtual hardware resources to a software task execution environment. The system may further comprise a software workload management component for controlling at least one running software task and routing at least one new software task using the virtual hardware resources; and a communication component for signaling the software workload management component to perform a software management action in compliance with the hardware management action. The hardware policy may be a hardware power management policy, and the software management action may comprise quiescing the at least one running software task or routing the new software tasks to a different software task execution environment.
System and method for using a task starvation indication to prevent starvations of tasks in a multiple processing entity system
A system, computer program and a method for preventing starvations of tasks in a multiple-processing entity system, the method includes: examining, during each scheduling iteration, an eligibility of each task data structure out of a group of data structures to be moved from a sorted tasks queue to a ready for execution task; updating a value, during each scheduling iteration, of a queue starvation watermark value of each task data structure that is not eligible to move to a running tasks queue, until a queue starvation watermark value of a certain task data structure out of the group reaches a queue starvation watermark threshold; and generating a task starvation indication if during an additional number of scheduling iterations, the certain task data structure is still prevented from being moved to a running tasks queue, and the additional number is responsive to a task starvation watermark.
Scheduling flows in a multi-platform cluster environment
Techniques for scheduling multiple flows in a multi-platform cluster environment are provided. The techniques include partitioning a cluster into one or more platform containers associated with one or more platforms in the cluster, scheduling one or more flows in each of the one or more platform containers, wherein the one or more flows are created as one or more flow containers, scheduling one or more individual jobs into the one or more flow containers to create a moldable schedule of one or more jobs, flows and platforms, and automatically converting the moldable schedule into a malleable schedule.
System for setting each transfer module in a network device into one of a plurality of standby states based upon the level of traffic
This invention provides a data transfer control device for carrying out data transfer using a plurality of transfer resources. The data transfer control device comprises a transfer resource management portion that set the plurality of transfer resources to either one of a transfer-enabled state whereby data transfer is enabled and a plurality of standby states on the basis of a load on the data transfer control device and that manages the plurality of transfer resources so as to assume the set operating status; and a load distribution portion that distributes the data to transfer resources that have been set to the transfer-enabled state. The plurality of standby states are states which data transfer is disabled and which mutually differ at a minimum in terms of at least one of power consumption level and transition time to the transfer-enabled state.
Asynchronous input/output (I/O) using alternate stack switching in kernel space
A mechanism for asynchronous input/output (I/O) using second stack switching in kernel space is disclosed. A method of the invention includes receiving, by a kernel executing in a computing device, an input/output (I/O) request from an application thread executing using a first stack, allocating a second stack in kernel space of the computing device, switching execution of the thread to the second stack, and processing the I/O request synchronously using the second stack.
Two-pass linear complexity task scheduler
A method for two-pass scheduling of a plurality of tasks generally including steps (A) to (C). Step (A) may assign each of the tasks to a corresponding one or more of a plurality of processors in a first pass through the tasks. The first pass may be non-iterative. Step (B) may reassign the tasks among the processors to shorten a respective load on one or more of the processors in a second pass through the tasks. The second pass may be non-iterative and may begin after the first pass has completed. Step (C) may generate a schedule in response to the assigning and the reassigning. The schedule generally maps the tasks to the processors.
Detecting bottleneck condition based on frequency distribution of sampled counts of processing requests
An operation management apparatus obtains a value Xi indicating the number of process requests being processed by an information processing apparatus during each sampling operation, from N samplings acquired during a specific time period from the information processing apparatus, wherein N is an integer satisfying a condition of 1≦N, and i is an integer satisfying a condition of 1≦i≦N. The apparatus determines, for a plurality of information processing apparatuses, a ratio of the sum of values Xi, each value Xi having a difference, from a maximum value of the values Xi, falling within a specific range, to the total sum of the values Xi. The apparatus detects an information processing apparatus having the ratio equal to or higher than a specific value.
System and method of constraining auto live migration of virtual machines using group tags
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for constraining auto live migration of virtual machines using group tags, access control lists, and time constraints. A system assigns a hypervisor a group tag denoting membership in a group and assigns a virtual machine an affinity group tag that denotes a placement requirement on hypervisors. The affinity group tag can be positive, requiring a match, or negative, requiring a non-match. The system migrates the virtual machine to the hypervisor according to compatibility between the group tag and the affinity group tag. Limitations of virtual machine placement and live migration due to group tags can be overridden in the system by a forced migration triggered by a human or qualifying event. Additionally, an access control list can be added to group membership of hypervisors and a time dimension can be added to a group tag or an access control list.
Bulk data management in a virtual environment
A system and method for service aware virtualization is disclosed. The system comprises a plurality of virtual instances operating on virtualization software and a plurality of service manager modules operating on the virtualization software. Each service manager module is coupled to a separate virtual instance and configured to interface with an operation of guest software operating within the virtual instance on the virtualization software. A management interface coupled to the service manager modules interfaces with the plurality of virtual instances.
Managing remote deployment of a virtual machine and service request to be processed by the virtual machines based on network bandwith and storage connectivity
A method for managing remote deployment of a virtual machine (VM) in a network environment is provided. A VM image stored in a second storage medium is copied to a first storage medium. The first storage medium is located in close proximity to a first computing system, and the second storage medium is located remotely from the first computing system and in close proximity to a second computing system. As the VM image is being copied, a first VM is deployed on the first computing system from a partial copy of the VM image stored in the first storage medium, and a second VM is deployed on the second computing system from the VM image stored in the second storage medium. Service requests submitted to the first computing system are managed either locally by the first VM or remotely by the second VM based on type of service requested.
Method and system for displaying configuration test results by leveraged data protection software
Displaying configuration test results by leveraged data protection software is described. A memory location is read where a display file is stored for a software installer. A configuration checker is executed for the computer. Results are read from executing the configuration checker. The results are written to the memory location. A leveraged software creation tool is prompted to display the display file via an output device. The leveraged software creation tool lacks the capability to dynamically load the display file.
Assisting server migration
The present invention describes a method and system for preparing a migration and consolidation of at least one source application to be migrated to or consolidated in at least one heterogeneous server device. A computing system selects at least one prospective target platform component based on an evaluation of at least one source platform component, a requirement of the at least one source application, and a compatibility and an affinity of the at least one prospective target platform component. The computing system collects first metadata of the at least one source platform component and the at least one prospective target platform component. The computing system collects second metadata associated with the migration and consolidation. The computing system groups the first metadata and the second metadata into a RFM (Request For Migration). The computing system prepares and configures a final target platform in accordance with the RFM.
Method for managing an application and application platform
According to an example of the present invention, an application platform installs a first application upon receiving a request for installing the first application, and sends a summary of the first application to a server; in which an application list is maintained for each user in the server and the application list is to store summaries of all of applications installed by each user. The application platform uninstalls a second application upon receiving a request for uninstalling the second application, and notifies the server to delete a summary of the second application from an application list corresponding to a user sending the request for uninstalling the second application; in which the first application and the second application are a same application or different applications.
Dynamically updating on-demand runtime platforms executing business applications
In one aspect, a business application is provided by a customer for execution in a cloud environment. A runtime platform for the business application is identified based on the functionality of the business application. In another aspect, an installable package for a product composing the business application and a first version of the runtime platform is generated. In yet another aspect, the business application and a second version of the runtime platform are synchronously installed in a cloud environment based on the installable package of the product, where the metadata of the business application and the metadata of the business application are dynamically validated prior the installation to guarantee compatibility.
Generating a transition system for use with model checking
The invention concerns model program analysis of software code using model checking. Initially, a transition system (22) and an extensible markup language (XML) (24) representation of the data is generated. Next, labels (26) for the transition system are generated by querying the XML representation of the data using (markup) query language. The labels and the structure of the transition system are then used as input to model checking techniques to analyse the software code (28). It is an advantage of the invention that the problem of labelling a transition system can be transformed into the XML domain so that detailed information about the software code can be extracted using queries in a format that can be run in the XML domain which are well known. At the same time the transformation to the XML domain does not prevent the use of efficient model checking technologies.
System and method for using aspects to generate event data records
Methods and systems are described for generating event data records by using aspects. Cross cutting concerns are applied in order to generate the EDRs. In various embodiments, the EDRs are generated within a gateway or another type of software application that processes various communications. In processing data, the gateway can generate data records, which capture information regarding traffic flow within the gateway. The event data records are generated at various points in the gateway by using an aspect to weave code at compile time. Once generated, the EDRs can be picked up by an external listener and filtered based on various criteria, such as Java type-based filtering and classification. The listener can use predefined filtering coming from the gateway or customize the filtering according to specific needs. The EDRs can also be classified by using a configuration file, which can be modified without altering any programming code within the gateway.
Determining performance of a software entity
Methods, systems, and products for determining performance of a software entity running on a data processing system. The method comprises allowing extended execution of the software entity without monitoring code. The method also comprises intermittently sampling behavior data for the software entity. Intermittently sampling behavior data may be carried out by injecting monitoring code into the software entity to instrument the software entity, collecting behavior data by utilizing the monitoring code, and removing the monitoring code. The method also comprises repeatedly performing iterations of the allowing and sampling steps until collected behavior data is sufficient for diagnosing performance of the software entity. The method may further comprise analyzing the collected behavior data to diagnose performance of the software entity.
Software development using code retraction and background warm up
Aspects of the subject matter described herein relate to software development. In aspects, code is deployed to a target and debugged. After the debugging has ended, instead of waiting for another version to be deployed to the target, the code is retracted from the target and warm up of the target is performed as needed potentially in parallel with other software development activities with respect to the code.
Collaborative software debugging in a distributed system with client-specific display of local variables
In a distributed system that includes a debug server and debug clients coupled for data communications through a network, collaborative software debugging includes presenting a client-specific GUI that includes a client-specific local variables pane; detecting user input including detecting, by at least one particular debug client, user input setting the client-specific local variables pane to display local variables of a stack frame associated with an active routine owned by the particular debug client; generating and sending to the debug server application-level messages; receiving client-specific debug results; and displaying the client-specific debug results, including: displaying, in the particular debug client's client-specific local variables pane, the local variables of the stack frame associated with the active routine owned by the particular debug client; and displaying, in another debug client's client-specific local variables pane, local variables of another stack frame.
Method and apparatus for testing software
Techniques are provided for testing new software slated to be deployed on a target machine population with a number of target machines having a number of existing software programs. Method steps can include obtaining a list of depending software programs on selected ones of the target machines. The list can include those of the existing software programs which depend on the new software and/or those of the existing software programs on which the new software depends. The steps can further include identifying relevant test cases based on the list of depending software programs, instantiating a plurality of test client platforms characteristic of the target machine population, and testing the relevant test cases on the plurality of test client platforms to identify failures.
Method and computer system for document authoring
Integrated development environment IDE (999), method and computer system for developing user interface documents. An editor (104) is used for editing a user interface document. An adaptation engine (105) generates device class specific representations of the user interface document. Each device class specific representation refers to a respective device class. Device class dependent tools (120) of the IDE (999) are used for generating device class specific information and providing it to the author. Device class specific information can be information about the complexity of the user interface by device class provided by a complexity indicator (121), information about how many pages are generated for which device class provided by a device class dependent view (122) or information about the layout for various device classes provided by a frames layouting view (124).
Apparatus and method for generating applications automatically
Disclosed are an apparatus and method for generating applications. A plurality of source codes corresponding to functional modules of the applications are stored in the module storage unit 120. The request analysis unit analyzes a request received from a client who has requested application generation and generates a module list needed to implement functions of the applications. The application generation unit combines the source codes corresponding to the generated module list to generate a first application to be executed in a service provision system of the client and a second application to be executed in a service use system corresponding to the service provision system of the client. According to the present invention, any franchise affiliate owner or general user without application development capability can produce two mutually linked applications easily by one-time input.
Method for estimating resource consumption in the generation of a control device program code
A method for estimating a resource consumption of storage space and/or of required runtime of a control device program code to be generated for a control program, whereby the functionality of the control program is given in an executable model. The model has a function with first functional magnitudes and first information associated with the first functional magnitudes and optimization parameters for optimizing a code generator. A program code representation is generated for part of the model comprising the function by the code generator taking into account first values of the optimization parameters. An estimation unit comprises a resource model with hardware parameters. An estimated value for the storage space requirement is determined for the control device program code and/or a runtime estimated value is determined for the control device program code by the estimation unit taking into account the hardware parameters and based on the program code representation.
System for supporting collaborative activity
A system includes a processor which has access to a representation of model of activity, which includes workspaces. Each workspace includes domain hierarchies for representing an organizational structure of the collaborating users using the system, and initiatives hierarchies representing process structures for accomplishing goals. An interface permits users to view and modify the workspaces for which the user has access. Each user can have different access permissions in different workspaces. The domain and initiative hierarchies provide two views of the workspace objects without duplicating resources. A resource is a collection of shared elements defined by the users that give users associated with the workspace access to information sources. Users can define knowledge boards for creating reports based on information fields of the resources. The knowledge board is associated with a resource template from which the resource is created.
Navigation-independent access to elements of an integrated development environment (IDE) using uniform resource locators (URLs)
The present invention discloses a navigation-independent system for accessing the elements of an integrated development environment (IDE) using uniform resource locators (URLs). Such a system can include a set of URL-accessible IDE elements, a set of URLs, and a URL operation tool. The set of URL-accessible IDE elements can represent a multitude of functional objects accessible by the IDE. Each URL-retrievable IDE element can include a set of meta data that contains key words describing the URL-accessible IDE element. Each URL in the set of URLs can be configured to provide a navigation-independent mechanism for accessing a corresponding URL-accessible IDE element. The URL operation tool can be configured to associate URLs with URL-accessible IDE elements and execute URL operations on the URL-accessible IDE elements.
Analysis apparatus and method to analyze a printed circuit board
An analysis apparatus for a printed circuit board. The analysis apparatus includes a processor that executes a process of rewriting physical property data of a wiring layer of a printed circuit board to a value. The value is based on physical property data of an electronic part having a heat-generating attribute. The electronic part is mounted on the portion of the wiring layer. The analysis apparatus converts the physical property data of the portion of the wiring layer that has the electronic part to physical property data of an insulating layer of the printed circuit board.
Selective voltage binning within a three-dimensional integrated chip stack
Systems and methods for selective voltage binning within a three-dimensional integrated chip stack. A method is provided that includes defining a correlation between at least two parameters. At least one parameter of the at least two parameters is from a first chip of a three-dimensional integrated chip stack and at least one parameter of the at least two parameters is from a second chip of the three-dimensional integrated chip stack. The method further includes generating a covariance matrix based on the at least two parameters. The method further includes calculating a new parameter or new parameter set using the covariance matrix. The method further includes performing statistical static timing analysis (SSTA) such that the new parameter or the new parameter set is propagated into the SSTA. The method further includes determining whether timing targets for the three-dimensional integrated chip stack are achieved.
Method of and system for generating optimized semiconductor component layout
A method of generating an optimized layout of semiconductor components in conformance with a set of design rules includes generating, for a unit cell including one or more semiconductor components, a plurality of configurations each of which satisfies some, but not all, of the design rules. For each configuration, it is checked whether a layout, which is a repeating pattern of the unit cell, satisfies the remaining design rules. Among the configurations which satisfy all of the design rules, the configuration providing an optimal value of a property is selected for generating the optimized layout of the semiconductor components.
Method of reducing parasitic mismatch
A method of reducing parasitic mismatches comprises generating a first net list file from a first layout through a resistance-inductance-capacitance (RLC) extraction mechanism using a first simulation tool, performing a V/I test on a network through a second simulation tool, determining whether a mismatch exists based upon a result of the V/I test and modifying a connection trace of the network to generate a second layout.
Method of decomposable checking approach for mask alignment in multiple patterning
The present disclosure provides one embodiment of an integrated circuit (IC) design method. The method includes receiving an IC design layout having a first plurality of features defined in a first layer and a second plurality of features defined in a second layer; converting the IC design layout to a topological diagram having nodes, chains and arrows; and identifying alignment conflict based on the topological diagram using rules associated with loop and path count.
Method and device for sending file data
Embodiments of the present invention relate to a method and a device for sending file data. The method comprises: obtaining a shift that is relative to an initial position of a to-be-sent file and is generated when a representative to-be-sent file shifts in a display area; determining whether a position of the to-be-sent file after the shift exceeds a preset position; and if the position of the to-be-sent file after shifting reaches or exceeds the preset position, sending the to-be-sent file to a corresponding receiving terminal.
Multi-layered hierarchical browsing
A method and system are disclosed for browsing an electronic hierarchical product catalog. The catalog is organized as a tree data structure with each node corresponding to an item category, an item sub-category, or an attribute that describes characteristics of items in a category. Such attributes may be used as filters for searching for an item or item category. The catalog tree is a collection of linked independent sub-trees including category and attribute sub-trees. The sub-trees allow navigation of the catalog tree via links between various nodes. The sub-trees may be linked to multiple other sub-trees, providing easy navigation for users and simplifying the addition of new sub-categories and attributes to the catalog tree, for service providers. The use of linked sub-trees also allows attributes set by the user in a previous search to be used in a subsequent search for a similar item.
Enhancing touch and feel on the internet
A system for enabling touch and feel over the internet provides a three-dimensional representation of a good being sold, that three-dimensional representation being viewable from a number of different directions. In one embodiment, the good being sold is in a package and the package is displayed from the number of different directions. Another embodiment has the good being a book, and the inside and outside covers of the book are displayed and specified pages of the book can be displayed. The user can read from either the label or the covers just like as if the were actually handling the good.
Smart user-customized graphical keyboard
A computing device automatically customizes attributes of a graphical keyboard based on user inputs to the graphical keyboard. For example, the computing device can display a first graphical keyboard arrangement that includes a first representation of a key associated with a target region of an input-sensitive display. The computing device receives a plurality of user inputs, each associated with a respective touch region of the input-sensitive display. Subsequent to determining that one or more of the touch regions is not substantially aligned with the target region, the computing device displays a second graphical keyboard arrangement that includes a second representation of the key, wherein at least one attribute of the second representation of the key is graphically modified relative to the first representation of the key so as to substantially align one or more of the touch regions with a target region associated with the second representation of the key.
Drag drop multiple list modification user interaction
Various systems and methods can perform a drag operation. The drag operation involves selecting an item displayed in a graphical user interface, and moving the selected item from a first location to a second location on the graphical user interface. One method involves detecting a user input and modifying the drag operation in response to the user input while the drag operation is ongoing.
User interface methods and apparatus for controlling the visual display of maps having selectable map elements in mobile communication devices
A viewable map region of a map is visually displayed in a display, and a plurality of point of interest (POI) indicators are presented in the viewable region. One or more off-map indicators are also presented in the viewable region, where each off-map indicator indicates a POI indicator outside of the viewable region but within a predetermined range. In response to detecting a forward signal when a cursor is on a current POI or off-map indicator, the viewable region is panned in the display in the upwards direction when the cursor is on a topmost POI or off-map indicator. Otherwise, the cursor is repositioned in an upwards direction onto a next POI or off-map indicator in the viewable region. The reverse occurs with respect to detecting of a reverse positioning signal.
Mobile terminal and method of providing user interface using the same
A mobile terminal including a display configured to display a graphical user interface, a user identification unit configured to connect at least first and second user identification modules to the mobile terminal, in which the first and second user identification modules include first and second telephone numbers, respectively, a memory configured to store at least first and second user interface information corresponding to the first and second user identification modules, respectively, and a controller configured to control the display to display the graphical user interface using the first user interface information when the first user identification module is used and to display the graphical user interface using the second user interface information when the second user identification module is used.
Strategy editor supporting automatic designation of displayed line style based upon a connection data type
Enhancements to a strategy object editor for creating and modifying control strategies for process control systems (both distributed and discrete) is described. The improvements include: supporting a set of graphical depictions for individual control object (modified by an appearance object editor), drag and drop connections for declarations that connect control strategies to other control strategies, GUI-based designation of object execution order, automatically applied line styles based upon connection data type, and automatic modification of elements within an appearance object to accommodate a moved attribute.
Mobile terminal and display controlling method thereof
A mobile terminal and display controlling method thereof are disclosed. The present invention includes storing user registration information registered at each of one or more websites, receiving an input of a command signal for providing the user registration information, and displaying a registration information indicator corresponding to each of the one or more websites. Displaying the registration information indicator includes displaying the stored user registration information registered at the corresponding website within the registration information indicator.
System and method for using web browser to display advertising materials to user
A computer-implemented system including a memory, a storage device and a processing unit, the memory storing a set of instructions, which, when executed by the processing unit cause the processing unit to perform a method for displaying promotional materials to a user using a browser executing on a client computer. The method involves determining websites in a browsing history of the browser; sending a request to one or more internet resources, the requests being related to the determined websites; receiving the promotional materials from the one or more internet resources in response to the request; associating the received promotional materials with the websites in the browsing history of the browser; and displaying websites in the browsing history of the browser together with the associated promotional materials.
Method and system to process video effects
A system and method of processing a video Instant Message (IM) is provided. The method may comprise receiving a captured video stream from an image capture device and selecting at least one video effect from a plurality of video effects. A modified video stream is then generated (e.g., using a digital filter) that includes the video effect and is then communicated to a viewing location as the video Instant Message. The IM application can be a legacy IM application and generate a graphic user interface via the IM application to allow a user to select the video effect. The captured video stream may be received from a web camera and the modified video stream may be communicated via the Internet to the viewing location. The method may be performed in a device driver that interfaces the image capture device to an Instant Messaging application associated with the device driver.
Web browser audio controls
One or more audio controls are presented in a browser application to allow a user to adjust one or more audio signals (e.g., mute, adjust volume) provided by one or more audio sources (e.g., websites). In some aspects, the browser application remembers the user's audio control settings for audio sources and automatically applies those settings to the audio controls when audio signals from the audio sources are detected.
Image forming apparatus and method of displaying preview image
An image forming apparatus includes an image forming unit, a whole preview image generating unit that generates a whole preview image, the whole preview image being a print preview image of the entirety of each page, a display unit, a whole preview image display control unit that controls displaying the whole preview image, a divided preview image generating unit that generates divided preview images, the divided preview images being made by dividing the print preview image of each page by a dividing number, a divided preview image enlarging unit that enlarges each of the divided preview images at higher magnification than a display magnification of the whole preview image and generates enlarged divided preview images, and a divided preview image display control unit that controls displaying the enlarged divided preview images.
Optimized methods and devices for the analysis, processing and evaluation of expressions of the XPath type on data of the binary XML type
An object of the invention is in particular methods and devices for analyzing, processing and evaluating expressions of the XPath type on data of the XML type with which coding or decoding tables are associated. After generating a list comprising a set of targets from the XPath-type expression, one target is linked to the coding/decoding table (115). When one part of the set of data is accessed, a reference to an item is identified in the table using the part of data. It makes it possible to access a target linked to the table in order to reconstruct the item (145) and evaluate the expression (150). According to a particular embodiment, a parameter representing the discriminating character of the targets is determined and linked to the table to enable the discriminating character of the targets to be taken into account during the evaluation of the XPath expression on the XML-type data.
Automated determination of website structure
Techniques are described for automatically determining the structure of multiple related Web pages based at least in part on human-supplied information, such as in at least some situations by automated operations of a website structure determination system to determine a common structure of at least some Web pages of a target Website of interest. In at least some such situations, the techniques include identifying structural elements or other structural locations within the common structure of multiple related Web pages that correspond to one or more types of information of interest. Once such structural locations are identified for one or more types of information of interest, information of those types may then be automatically retrieved from various Web pages of the target Website using those identified structural locations, even if those Web pages have not been previously manually reviewed.
Method and apparatus for receiving display limited web page content
One embodiment comprises a non-transitory, tangible computer readable storage medium, encoded with processor readable instructions to perform a method of displaying content in a web page. One method optimizes the order of HTTP requests made during the downloading of a web page or web application comprising a plurality of objects, and receiving a first portion of the plurality of objects in a first order. Additionally, (i) a viewable section of the web page, (ii) centers of the viewable section of the web page and each of the plurality of objects, and (iii) a distance from the center of the viewable section of the web page to the center of each of the plurality of objects may be determined. Furthermore, the objects may then be prioritized based on their distance from the center of the viewable section. A request to receive at least one additional portion of the objects in a second order based on the prioritization of the objects may then be sent.
Techniques to create structured document templates using enhanced content controls
Techniques to create structured documents and document templates using enhanced content controls are described. An apparatus may comprise an application to generate a document from a document template. The application may comprise a document template component operative to retrieve a document template comprising multiple document parts. The application may further comprise a content control component operative to manage a content control embedded in a document part of the document template. The content control may be associated with a data source arranged to store richly formatted content presented by the content control without necessarily requiring the data storage to be written in any particular way. The content control component may synchronize any changes to the formatted content between the content control and the data store. Other embodiments are described and claimed.
Packet communication testing apparatus and associated methods
A system includes a packet generator and a packet checker. The packet generator is operable to operable to generate a packet for transmission to a destination device. The packet includes a plurality of fields, including a code field that is operable to store a code generated based on an expected modification to the packet during transmission. The packet checker is associated with the destination device and is operable to receive the packet.
Combined Koetter-Vardy and Chase decoding of cyclic codes
An apparatus having a first circuit and a second circuit is disclosed. The first circuit may be configured to generate (i) a plurality of symbols and (ii) a plurality of decision values both in response to detecting an encoded codeword. The second circuit may be configured to (i) generate a plurality of probabilities to flip one or more of the symbols based on the decision values, (ii) generate a modified probability by merging two or more of the probabilities of an unreliable position in the symbols and (iii) generate a decoded codeword by decoding the symbols using an algebraic soft-decision technique in response to the modified probability.
System and method for multi-dimensional encoding and decoding
A system and method for using a cyclic redundancy check (CRC) to evaluate error corrections. A set of data and initial CRC values associated therewith may be received. The set of data by changing a sub-set of the data may be corrected. Intermediate CRC values may be computed for the entire uncorrected set of data in parallel with said correcting. Supplemental CRC values may be computed for only the sub-set of changed data after said correcting. The intermediate and supplemental CRC values may be combined to generate CRC values for the entire corrected set of data. The validity of the corrected set of data may be evaluated by comparing the combined CRC values with the initial CRC values.
Throughput-sensitive redundancy encoding schemes for data storage
Techniques for optimizing data storage are disclosed herein. In particular, methods and systems for implementing redundancy encoding schemes with data storage systems are described. The redundancy encoding schemes may be scheduled according to system and data characteristics. The schemes may span multiple tiers or layers of a storage system. The schemes may be generated, for example, in accordance with a transaction rate requirement, a data durability requirement or in the context of the age of the stored data. The schemes may be designed to rectify entropy-related effects upon data storage. The schemes may include one or more erasure codes or erasure coding schemes. Additionally, methods and systems for improving and/or accounting for failure correlation of various components of the storage system, including that of storage devices such as hard disk drives, are described.
Flash memory controller and data reading method
A data reading method is provided. The data reading method includes: utilizing a first sense voltage to read a data unit from a flash memory block; performing an error detection operation on the data unit and calculating an error polynomial according to a detection result; and determining whether the error polynomial conforms to a predetermined condition and deciding whether to perform read retry on the data unit according to a determining result.
HARQ procedure with processing of stored soft-bits
It is described a method for determining a received data block by employing a Hybrid Automatic Repeat Request procedure. The described method comprises calculating (104) first soft-information values being associated with a first reception of the data block, storing the calculated first soft-information values in a first buffer (121), and calculating (104) second soft-information values being associated with a second reception of the data block, wherein the second reception results from a retransmission of the data block following the first reception. The described method further comprises rate matching (128) a first soft data block comprising the calculated and stored first soft-information values, rate matching (118) a second soft data block comprising the calculated second soft-information values, and decoding (152) a combination of the rate matched first soft data block and the rate matched second soft data block. It is further described a radio receiver arrangement, a computer-readable medium and a program element, which are all adapted for carrying out and/or for controlling the described received data block determination method.
Systems and methods for efficient data shuffling in a data processing system
Various embodiments of the present invention provide systems and methods for data processing. Such data processing includes data shuffling.
Method of embedding configuration data in a non-configuration document
Embodiments are directed to a method of embedding configuration files in a document generated by a system, with the configuration file including settings associated with the generation of the document. A particular embodiment is directed to the embedding of configuration files of a testing system in a report document generated by the testing system. The configuration file includes system settings and external settings in association with the test results documented in the report document. For example, a testing system can generate a PDF report document associated with a test performed, and embed configuration files into the PDF report document. The embedding of configurations files in the PDF document can be done by using standard embedding mechanisms already available in the PDF file format and supported by most PDF viewing tools. The embedding of the configuration file can be performed automatically when the report document is generated.
Streaming and sampling in real-time log analysis
Technologies are described herein for incorporating streaming and/or sampling in real-time log analysis. Representative samples of log data are extracted from the log files on a number of monitored hosts and streamed in real-time to log processors for processing. The log processors accumulate and process the representative samples of log data, and track a data completeness value representing an indication of a proportion of total log data represented by the representative samples received. The representative samples of log data are merged and collated. Estimated metrics are calculated from the merged and collated representative samples and the data completeness, and the estimated metrics are published to consumers in near real-time.
Programmable error handling
A data storage device having different operating modes is disclosed. The data storage device comprises a processor, a command execution module, and an error response module. The command execution module is configured to receive commands from the processor, execute the commands, and report status information to the processor. The error response module comprises a programmable register configured to store one of a plurality of different error response types for each of a plurality of errors, wherein the error response module is configured to receive a report of one of the errors, and to output an error response signal to the command execution module based on the error response type in the register corresponding to the reported error. The processor is configured to reprogram at least one of the error response types in the register for at least one of the errors when the data storage device switches operating modes.
Systems and methods for precise generation of phase variation in digital signals
Systems and methods are disclosed for precise generation of phase variation in digital signals. The disclosed signal generation embodiments generate a pattern of information bits that represents a digital signal with desired phase variations and transmit this digital pattern at high speed utilizing a serializer to generate a high speed bit stream. The high speed bit stream can be used to generate one or more digital signals, such as clock signals, having desired rates and desired phase variations. In certain embodiments, the desired phase variation can be introduced into the resulting digital signal by removing and/or inserting bits in a digital pattern thereby moving logic transitions (e.g., rising edge transitions, falling edge transitions) as desired within the resulting digital signal. In addition to clock signals, the resulting digital signals generated can be control signals, data signals and/or any other desired digital signal.
Communication circuit and communication method
Provided is a communication circuit (10) connected with a plurality of function blocks (A, B) that perform processing based on a first clock signal, and mediates communication between the function blocks (A, B). The communication circuit (10) includes N number of communication means, where N is a positive integer, having the same data width as communication data output from the function blocks, and each of the N number of communication means performs communication processing based on N number of second clock signals specified by 1/N of a frequency of the first clock signal, respectively corresponding to the N number of communication means and having a phase difference of 360/N degrees from each other. This makes it possible to provide a communication circuit between function blocks in which the amount of necessary hardware and power consumption is small, the timing design is easy, and the communication latency is low.
Dynamic control of reduced voltage state of graphics controller component of memory controller
A method includes detecting a trigger condition, and in response to detecting the trigger condition, reducing a voltage applied to a graphics controller component of a memory controller. The reduction in voltage may cause the voltage to be reduced below a voltage level required to maintain context information in the graphics controller component.
USB host wake from sleep state for mobile devices
A USB host for wakeup from a sleep state includes a hold memory, a USB host controller, and a USB driver. When going to sleep, the USB driver sends a suspend command to the USB host controller in response to receiving a sleep command. The USB driver also reads a controller context from the USB host controller and saves the controller context in the hold memory. Thereafter, the USB driver turns off one or more supply potentials and one or more clocks in the host controller, and returns a sleep acknowledgement. While in sleep, the interface pins are placed in a hold state and notification to the operating system are disabled.
Methods, devices, and mediums associated with controlling a power mode
An application may receive a request to control a power mode. The power mode may be controlled based on the request and the operational status of the application. In one example, the power mode may be disabled until termination of the application. In another example, the power mode may be disabled for a specified amount of time or according to operational status of multiple applications and/or electronic pages. In yet another example, the power mode may be controlled according to an operating system power management configuration.
Enabling idle states for a component associated with an interconnect
In one embodiment, the present invention includes a method for receiving an information packet in a first port from an interconnect while an agent associated with the first port is in an idle low power state, transmitting a first signal from the first port along the interconnect to request re-transmission of the information packet, and sending a second signal from the first port to the agent to cause the agent to enter a fully active power state. Other embodiments are described and claimed.
Wake-on-LAN between optical link partners
Embodiments described herein achieve Wake-on-LAN to allow optical modules the ability to wake up link partners instantaneously when there is data to be transmitted or received. As such, Wake-on-LAN features are provided for a side-band handshaking protocol and channel that is independent from the normal data traffic path.
Power gating of cores by an SoC
A method for power gating a core by a SoC is provided. Instruction Pointer information, state of the core, core access information and wake up latency information of the core are used in power gating or un-gating of the core. A change in state of the core is detected by a device driver and is provided to a power management unit. As the state of the core changes from active to passive, the wake up latency information and the core access information of the core are retrieved by the SoC from a database to perform either the power gating or the un-gating of the core. The database is prepared by analyzing code blocks statically.
Cryptographic operations using a key hierarchy
Aspects of the subject technology relate to systems, methods, and machine-readable media for performing a cryptographic operation. A system can be configured to submit a request, to a security device, for a decrypted user encryption key, wherein the security device is configured to decrypt the user encryption key by unbinding the user encryption key using a user authorization key. The system can receive, in response to the submitted request, the decrypted user encryption key and decrypt authorization data for a cryptographic key using the decrypted user encryption key. The system can submit a request for the security device to load the cryptographic key, wherein authorization data is used to authorize the request, and submit a request for the security device to perform a cryptographic operation using the loaded cryptographic key.
Method for testing electrical components in main supply, in particular in building
A test comment is transmitted by a test unit in the form of a data transmission via a mains supply to one or more electric components of a network. Each electric component that receives a transmitted test command transmits a test response that characterizes each electric component, in the form of a data transmission via the mains supply back to the test unit, the transmitted response being then evaluated in the test unit.
Method and system for hard disk emulation and cryptographic acceleration on a blade server
An inventive apparatus that integrates the operation of a hard disk emulator and a cryptographic accelerator on a single blade server card. An application with cryptographic operations can off load computationally intensive calculations to the cryptographic accelerator so that the speed at which the application performs actions can be increased significantly. Typically, the hard disk emulator is a flash memory component and the accelerator can perform at least modular exponentiation calculations. One bus is employed for communication between the hard disk emulator and the accelerator. Another bus is employed to communicate with other resources off the card. Often, the card is configured to operate as one of a several blade servers in a chassis.
Systems and methods are described for communicating between a client machine and a server. A security token message may be transmitted from the server to the client machine. The security token message may include a first security token. The first security token may include a communication interaction identifier that identifies a communication interaction between the client machine and the server and an action request identifier that identifies an action request message capable of being sent from the client machine to the server to request that an action be performed on the server. An action request message including a second security token and transmitted in association with the communication interaction may be received at the server. When it is determined that the first security token matches the second security token, the requested action may be performed.
OTP generation using a camouflaged key
A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP.
Method of access control and corresponding device
A computing device which includes an access control mechanism which is used to control access to keys which are used in cryptographic processes. Any application wishing to gain access to a key must first obtain authorization from the access control mechanism. Authorized applications may access keys directly, without having to pass data through the access control mechanism.
Methods and systems for encoding and protecting data using digital signature and watermarking techniques
Systems and methods are provided for determining a presence of a watermark in electronic data. In certain embodiments, a plurality of keys is generated, and a plurality of payloads are retrieved from electronic data using the keys. A statistical indicia of randomness is generated based on the payloads, and the presence of a watermark is determined when the indicia is below a threshold.
Extending an integrity measurement
A method of extending an integrity measurement in a trusted device operating in an embedded trusted platform by using a set of policy commands to extend a list of Platform Configuration Registers (PCRs) for the device and the current values of the listed PCRs and an integrity value identifying the integrity measurement into a policy register, verify a signature over the integrity value extended into the policy register, and, if verification succeeds, extend a verification key of the trusted platform, plus an indication that it is a verification key, into the policy register, compare the integrity value extended into the policy register with a value stored in the trusted platform, and, if they are the same: extend the stored value, plus an indication that it is a stored value, into the policy register, and extend the integrity measurement in the trusted device if the value in the policy register matches a value stored with the integrity measurement.
Data recording device, and method of processing data recording device
A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller unique key unique to a respective controller based on the controller key and the first controller identification information, and a second controller identification information based on the first controller identification information. A decryptor decrypts the encrypted medium device key using the controller unique key to obtain a medium device key. An authentication/key exchange process unit performs authentication/key exchange process with the host device through an interface unit using the medium device key, the medium device key certificate and the second controller identification information to establish a secure channel.
Client-server system with security for untrusted server
In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user computers (clients), a method is provided for enhancing security in the context of digital rights management (DRM) where the server is an untrusted server that may not be secure, but the client is secure. This method operates to authenticate the server to the client and vice versa to defeat hacking attacks intended to obtain confidential information. Values passed between the server and the client include encrypted random numbers, authentication values and other verification data generated using cryptographic techniques including double encryption.
Method and system for authenticating peer devices using EAP
A system and method for authenticating a peer device onto a network using Extensible Authentication Protocol (EAP). The key lifetime associated with the keying material generated in the peer device and the authentication server is communicated from the authenticator to the peer device within the EAP Success message. The peer device, having been provided with the key lifetime, can anticipate the termination of its authenticated session and initiate re-authentication prior to expiry of the key lifetime.
System, apparatus, and method for digital distribution
An apparatus for encrypting content to be played on another device is provided. The apparatus includes a processor and memory that includes a set of instructions. The set of instructions is configured to cause the processor to receive a selection of content from a user accessing the apparatus, and determine whether the user is authorized to receive the content. The set of instructions is further configured to cause the processor to transfer content along with an encrypted key associated with the user when the user is authorized to receive the selected content.
Method for validating a road traffic control transaction
A method for validating a road traffic control transaction. The method includes: storing a cryptographic key assigned to a transaction receiver, in the transaction receiver; recording an image of a vehicle; reading an identification of the vehicle in the recorded image by OCR and generating a control transaction thereof in the control station; generating a random key and encrypting the recorded image into authentication data with the random key and the cryptographic key in the control station; transmitting the recorded image, the control transaction, the random key and the authentication data to the transaction receiver; in the transaction receiver, encrypting the received recorded image into nominal authentication data with the received random key and the stored cryptographic key; and comparing the received authentication data with the nominal authentication data. The received control transaction is then validated when the received authentication data and the nominal authentication data are identical.
System and methods for providing multi-hop access in a communications network
A system and methods for providing a supplicant access to a communications network are disclosed. An authenticator receives an authentication request at an authenticator (210) from the supplicant. A state is created based on the authentication request at the authenticator (210). The authentication request is relayed towards a prime authenticator (215) where the prime authenticator is connected to an authentication server. Finally, the authenticator (215) receives authentication information from the prime authenticator and fulfills the authentication request using the authentication information.
Secure system for allowing the execution of authorized computer program code
Systems and methods for selective authorization of code modules are provided. According to one embodiment, file system or operating system activity relating to a code module is intercepted by a kernel mode driver of a computer system. The code module is selectively authorized by authenticating a cryptographic hash value of the code module with reference to a multi-level whitelist. The multi-level whitelist includes (i) a global whitelist database remote from the computer system that is maintained by a trusted service provider and that contains cryptographic hash values of approved code modules, which are known not to contain viruses or malicious code and (ii) a local whitelist database containing cryptographic hash values of at least a subset of the approved code modules. The activity relating to the code module is allowed when the cryptographic hash value matches one of the cryptographic hash values of approved code modules within the multi-level whitelist.
Apparatus and method for using contents information in digital rights management
An apparatus and method for determining contents information corresponding to a Rights Object (RO) by transmitting information on contents together when the RO is moved from a mobile device to a memory card or a smart card or when the RO is moved from the memory card or the smart card to the mobile device are provided. The apparatus includes a meta information manager for determining information on contents corresponding to the RO when the RO is moved, and for generating meta information containing the determined contents information, and a controller for providing control to transmit the RO and the meta information generated by the meta information manager to a portable storage device. Accordingly, the conventional problem can be solved in which information on contents cannot be determined by using a Contents IDentifier (CID) if the RO does not exist together with the contents.
Updating certificate status in a system and method for processing certificates located in a certificate search
A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a computing device (e.g. a mobile device) to determine status data that can be used to indicate the status of those certificates to a user of the computing device. Selected certificates may be downloaded to the computing device for storage, and the downloaded certificates are tracked by the data server. This facilitates the automatic updating of the status of one or more certificates stored on the computing device by the data server, in which updated status data is pushed from the data server to the computing device.
Subscriber certificate provisioning
Provisioning a device with a certificate is contemplated. The certificate may be used to verify whether the device or a user of the device is authorized to access electronic content, services, and signaling. The certificate may be provisioned in relation to the device having successfully completed a two-factor authentication process so that an entity providing the certificate need not have to repeat the two-factor authentication process.
Change in identification information causing request for new certificate issuance
An information processing apparatus that communicates using an electronic certificate is provided. When identification information is configured that identifies the information processing apparatus on a network, the configured identification information is stored in a storage unit. A request for issue of an electronic certificate containing the identification information stored in the storage unit is issued to a certificate authority. Once the request for issue is issued, a determination is made as to whether or not the identification information contained in the request for issue matches the identification information stored in the storage unit prior to obtaining the electronic certificate that is issued by the certificate authority in response to the request for issue. If it is determined that a mismatch exists, the user is notified to that effect.
Interconnect device to enable compliance with rights management restrictions
The present invention provides an interconnect device that connects a source device to a destination device, and allows the source device's non-compliant rights management (RM) interface to deliver media content with little or no restriction to the destination device's compliant RM interface.
Accessing a secure terminal
A method of accessing content on a secure terminal is described. The method comprises: capturing an image of a visual code presented on a display of a secure terminal. The method then involves decoding the visual code to ascertain (i) a set of connection parameters and (ii) a unique identifier. The set of connection parameters are used to establish a connection with the secure terminal. The method also comprises receiving the content from the secure terminal via the established connection in response to transmission of the unique identifier.
Secure data communication system
The description relates to a system designed to protect data exchange involved with the use of cloud computing infrastructures by services and individuals. The system is designed so that a cloud resource and its middleware access points are protected in transferring data among themselves and end users using a system designed to spread the data and then reassemble the data.
System and method for validating components during a booting process
A method and system for validating components during a booting process of a computing device are described herein. The method can include the steps of detecting a power up signal and in response to detecting the power up signal, progressively determining whether software components of the computing device are valid. If the software components are determined to be valid, the computing device may be permitted to move to an operational state. If, however, at least some of the software components are determined to be not valid, the computing device may be prevented from moving to the operational state. In one arrangement, if the computing device is prevented from moving to the operational state, corrective action can be taken in an effort to permit the computing device to move to the operational state.
Apparatus and method for dynamically determining execution mode of reconfigurable array
An apparatus and method for dynamically determining the execution mode of a reconfigurable array are provided. Performance information of a loop may be obtained before and/or during the execution of the loop. The performance information may be used to determine whether to operate the apparatus in a very long instruction word (VLIW) mode or in a coarse grained array (CGA) mode.
Disabling threads in multithread environment
A system, apparatus and method for multithread handling on a multithread processing device are described herein. Embodiments of the present invention provide a multithread processing device for multithread handling including a plurality of registers operatively coupled to an instruction dispatch block, including thread-control registers for selectively disabling threads. In various embodiments, the multithread processing device may include a thread-operation register for selectively providing a lock to a first thread to prevent a second thread from disabling the first thread while the first thread has the lock. In still further embodiments, the multithread processing device may be configured to atomically disable and release a lock held by a thread. Other embodiments may be described and claimed.
Loading/discarding acquired data for vector load instruction upon determination of prediction success of multiple preceding branch instructions
Provided is a processor including an instruction issue unit that issues a vector load instruction read from a main memory based on branch target prediction of a branch target in a branch instruction, a data acquisition unit that starts issue of a plurality of acquisition requests for acquiring a plurality of vector data based on the issued vector load instruction from the main memory, a determination unit that determines a success or a failure of the branch target prediction after the branch target is determined, and a vector load management unit that, when the branch target prediction is determined to be a success, acquires all vector data based on the plurality of acquisition requests and then transfers all the vector data to a vector register, and, when the branch target prediction is determined to be a failure, discards the vector data acquired by the issued acquisition requests.
Adaptive write behavior for a system having non-volatile memory
Systems and methods are disclosed for adaptive writing behavior for a system having non-volatile memory (“NVM”). A memory interface of a system can be configured to determine whether a write preference of the system is skip-sequential. In response to determining that the write preference is skip-sequential, the memory interface can sequentially program data to a first set of pages of a block of the NVM. In addition, the memory interface can sequentially pre-merge gaps between the first set of pages with one or more pages of a data block. Moreover, the memory interface can be configured to switch to an alternative programming state in response to determining that at least one condition has been satisfied. For example, the memory interface can stop programming data sequentially, and instead program data in the order that the data is received from a file system.
Apparatus for processing remote page fault and method thereof
Disclosed is an apparatus for processing a remote page fault included in an optional local node within a cluster system configuring a large integration memory (CVM) by integrating individual memories of a plurality of nodes. The apparatus includes a memory including a CVM-map, a node memory information table, a virtual memory area, and a CVM page table, and a main controller mapping the large integration memory to an address space of a process when a user process requests memory allocation.
Processing system having memory partitioning
Memory resource partitioning code allocates a memory partition in response to a process requesting access to memory storage. Memory partition rules may define attributes of the memory partition. The attributes may include a minimum memory allocation and a maximum memory allocation for the memory partition.
Data copy management for faster reads
Multiple copy sets of data are maintained on one or more storage devices. Each copy set includes at least some of the same data units as other sets. Different sets optionally have data units stored in different orders on the storage device(s). A particular one of the sets of data is selected as the set to be accessed in response to detecting a particular scenario.
Active replication switch
A method, system, and program product for transparently shifting between using a virtual service layer (VSL) performing active-active replication which presents the volume of the first site and the volume of the second site as a single volume and a second replication technique for replicating the volume of the first site and the volume of the second site without use of the VSL.
Point in time access in a replication environment with LUN resizing
A method, system, and computer product for accessing a point in time in a replication based environment with a journal, the replication environment having a production site and a replication site, the replication site having a journal, comprising, receiving a request for a point in time, rolling the replication site to the point in time, determining if applications running in the replication environment are dependant on the LUN size, and presenting, based on a positive determination, a faked LUN size to the applications.
System and method for mirroring data
Disclosed is a data processing and/or storage system. The data processing and/or storage system may include at least two interfaces, wherein each of the at least two interfaces includes a non-dedicated communication port for communicating data to and form external data systems or clients based on a rule base.
Changing ownership of cartridges
Exemplary system, and computer program product embodiments for changing ownership of cartridges, such as virtual cartridges between remotely located virtual tape libraries, are provided. In one embodiment, by way of example only, processes and protocols for the changing ownership of the cartridges are controlled from a primary location to a secondary location. The production site is moved for the cartridges. The ownership of the cartridges is waived. Access is allowed to the cartridges. Additional data is written and replicated using resources of the cartridges.
System and method for managing page variations in a page delivery cache
Embodiments disclosed herein provide a high performance content delivery system in which versions of content are cached for servicing web site requests containing the same uniform resource locator (URL). When a page is cached, certain metadata is also stored along with the page. That metadata includes a description of what extra attributes, if any, must be consulted to determine what version of content to serve in response to a request. When a request is fielded, a cache reader consults this metadata at a primary cache address, then extracts the values of attributes, if any are specified, and uses them in conjunction with the URL to search for an appropriate response at a secondary cache address. These attributes may include HTTP request headers, cookies, query string, and session variables. If no entry exists at the secondary address, the request is forwarded to a page generator at the back-end.
Method and apparatus for coordinating transmission of data between a storage medium and a host
The transmission of buffered data is coordinated between a storage medium and a host in response to a request from the host. One or more blocks of data are transferred from the storage medium to a buffer memory. One or more frames of data are transmitted from the buffer memory to the host, wherein the number of blocks ending in the frame is recorded in a blocks/frame register, and possibly also in a block count accumulator register. Buffer release pulses for releasing buffer space in memory are sent to the buffer memory, based on the number of blocks in the blocks/frame register, or the number of blocks accumulated in the block count accumulator register when a signal is received from the host. A pointer which points to the last block of data successfully transferred is updated in accordance with the buffer release pulses.
Method and system for aligning transaction split boundaries to memory burst boundaries
A system and method in accordance with the present invention provides for a solution benefiting from providing for non-duplicative access to data located in a system memory via the alignment of transaction sub-command breaking points with memory burst boundaries associated with the system memory, by creating a plurality of sub-commands for a transaction each having breaking points, identifying a plurality of memory burst boundaries for the system memory each having burst boundary points, and aligning a plurality of breaking points with a plurality of burst boundary points to provide single access to data located in the system memory.
Implementing data storage and dual port, dual-element storage device
A method for implementing data storage and a dual port, dual element storage device are provided. A storage device includes a predefined form factor including a first port and a second port, and a first storage element and a second storage element. A controller coupled between the first port and second port, and the first storage element and second storage element controls access and provides two separate data paths to the first storage element and second storage element.
System and method to provide non-coherent access to a coherent memory system
In one embodiment, a system comprises a memory and a memory controller that provides a cache access path to the memory and a bypass-cache access path to the memory, receives requests to read graph data from the memory on the bypass-cache access path and receives requests to read non-graph data from the memory on the cache access path. A method comprises receiving a request at a memory controller to read graph data from a memory on a bypass-cache access path, receiving a request at the memory controller to read non-graph data from the memory through a cache access path, and arbitrating, in the memory controller, among the requests using arbitration.
Outstanding load miss buffer with shared entries
A load/store unit with an outstanding load miss buffer and a load miss result buffer is configured to read data from a memory system having a level one cache. Missed load instructions are stored in the outstanding load miss buffer. The load/store unit retrieves data for multiple dependent missed load instructions using a single cache access and stores the data in the load miss result buffer. The outstanding load miss buffer stores a first missed load instruction in a first primary entry. Additional missed load instructions that are dependent on the first missed load instructions are stored in dependent entries of the first primary entry or in shared entries. If a shared entry is used for a missed load instruction the shared entry is associated with the primary entry.
Store queue with store-merging and forward-progress guarantees
Some embodiments of the present invention provide a system that performs stores in a memory system. During operation, the system performs a store for a first thread, which involves creating an entry for the store in a store queue for the first thread. It also involves attempting to store-mark a corresponding cache line for the first thread by sending a store-mark request for the first thread to the memory system, wherein a store-mark on the cache line indicates that one or more store queue entries are waiting to be committed to the cache line. If the attempt to store-mark the cache line fails because a second thread holds a store-mark on the cache line, and if obtaining the store-mark will ensure forward progress for the first thread, the system forces the second thread to release the store-mark, so the first thread can acquire a store-mark for the cache line.
Data prefetch for SCSI referrals
A method for communication between an initiator system and a storage cluster. The method comprises receiving an initial I/O request from the initiator system to a first storage system; providing a referral response from the first storage system to the initiator system, the referral response providing information for directing the initiator system to a second storage system; notifying the second storage system regarding the referral response via a prefetch notice, the prefetch notice including an operation type and address information for accessing requested data; when the initial I/O request is a read request, prefetching at least a portion of the requested data stored in the second storage system in to a cache; receiving a second I/O request from the initiator system to the second storage system; and providing to the initiator system the portion of the prefetched data from the cache of the second storage system.
Memory package utilizing at least two types of memories
A memory package and methods for writing data to and reading data from the memory package are presented. The memory package includes a volatile memory and a high-density memory. Data is written to the memory package at a bandwidth and latency associated with the volatile memory. A directory map associates a volatile memory address with data in the high-density memory. A copy of the directory map is stored in the high-density memory. The methods allow writing to and reading from the memory package using a first memory read/write interface (e.g. DRAM interface, etc.), though data is stored in a device of a different memory type (e.g. FLASH, etc.).
Non-volatile hard disk drive cache system and method
A non-volatile hard disk drive cache system is coupled between a processor and a hard disk drive. The cache system includes a control circuit, a non-volatile memory and a volatile memory. The control circuit causes a subset of the data stored in the hard disk drive to be written to the non-volatile memory. In response to a request to read data from the hard disk drive, the control circuit first determines if the requested read data are stored in the non-volatile memory. If so, the requested read data are provided from the non-volatile memory. Otherwise, the requested read data are provided from the hard disk drive. The volatile memory is used as a write buffer and to store disk access statistics, such as the disk drive locations that are most frequently read, which are used by the control circuit to determine which data to store in the non-volatile memory.
A plurality of storage nodes in a single chassis is provided. The plurality of storage nodes in the single chassis is configured to communicate together as a storage cluster. Each of the plurality of storage nodes includes nonvolatile solid-state memory for user data storage. The plurality of storage nodes is configured to distribute the user data and metadata associated with the user data throughout the plurality of storage nodes such that the plurality of storage nodes maintain the ability to read the user data, using erasure coding, despite a loss of two of the plurality of storage nodes. The chassis includes power distribution, a high speed communication bus and the ability to install one or more storage nodes which may use the power distribution and communication bus. A method for accessing user data in a plurality of storage nodes having nonvolatile solid-state memory is also provided.
Independent management of data and parity logical block addresses
A data storage method includes identifying, in a set of data items associated with respective logical addresses for storage in a memory, a first subset of the logical addresses associated with the data items containing application data, and a second subset of the logical addresses associated with the data items containing parity information that has been calculated over the application data. The data items associated with the first identified subset are stored in one or more first physical memory areas of the memory, and the data items associated with the second identified subset are stored in one or more second physical memory areas of the memory, different from the first physical memory areas. A memory management task is performed independently in the first physical memory areas and in the second physical memory areas.
Interruptible NAND flash memory
A NAND flash memory logical unit. The NAND flash memory logical unit includes a control circuit that responds to commands and permits program and/or erase commands to be interruptible by read commands. The control circuit includes a set of internal registers for performing the current command, and a set of external registers for receiving commands. The control circuit also includes a set of supplemental registers that allow the NAND flash memory logical unit to have redundancy to properly hold state of an interrupted program or erase command. When the interrupted program or erase command is to resume, the NAND flash memory logical unit thus can quickly resume the paused program or erase operation. This provides significant improvement to read response times in the context of a NAND flash memory logical unit.
Flash memory with small data programming capability
A method comprises receiving a request to access a memory array having one or more memory erase units with a data area of flash array and with a specific amount of memory which offers small data programming capability, the specific amount of memory configured to be erased simultaneously or sequentially with a main memory block of the memory array; and if the memory access request includes programming small data, then providing access to the specific amount of memory, or if the memory access request does not include programming small data, then providing access to the data area of flash array. The size of the specific amount of memory may be pre-defined, and the specific amount of memory may be a different memory technology.
Interleaving codeword portions between multiple planes and/or dies of a flash memory device
A system, a method and a non-transitory computer readable medium are disclosed. The non-transitory computer readable medium may store instructions for: (I) interleaving at least two portions of a first codeword of a group of codewords between at least two flash memory planes while violating at least one ordering rule out of (a) an even odd ordering rule, (b) a programming type ordering rule, and (c) a codeword portions ordering rule; and (II) interleaving different portions of other codewords of the group of codewords between multiple flash memory planes while maintaining the even odd ordering rule, the programming type ordering rule and the codeword portions ordering rule. The at least two portions may be programmed to rows in different flash memory blocks, and the flash memory planes may belong to the same or multiple flash memory dies. The programming type ordering may define different decoupling sequence steps with sizes set for different programming types according to sensitivity to noise.
Redundant data bus system including multiple transmission paths
There are configured a first transmission path, along which data is transmitted/received between a controller and a first microcomputer through a first driver, and a second transmission path, along which data is transmitted/received between the controller and the first microcomputer through a second driver. The controller transmits an operation check signal to the first microcomputer through the first or second transmission path, and receives a response signal from the first microcomputer through the first or second transmission path.
Direct memory access (DMA) address translation between peer input/output (I/O) devices
A method and apparatus is described herein for supporting direct memory accesses between peer I/O devices. It is determined whether a guest physical address (GPA) referenced by an access generated from an I/O device, is within a range of GPAs associated with local I/O devices based at least in part on a GPA base and a GPA window size. If the GPA is within the window, then the GPA is translated to an HPA based at least in part on a base HPA associated with a local device and then forwarded to that local device. However, if the GPA is not within the window, then the access is forwarded upstream.
Method for using wireless data card individually to access network and wireless access terminal
A method is provided for using a wireless data card individually to access a network, and a wireless access terminal is provided. The wireless access terminal includes a data line switching module and a power line switching module. The method includes, when the wireless access terminal detects that the wireless data card is connected with a terminal through a universal serial bus (USB) cable, the power line and the data line of the wireless data card are respectively switched to connect the data line and the power line of the external USB interface thereon. A user can still freely connect the 3G network at anytime and anywhere by connecting a common USB cable between the laptop and the wireless data card in the wireless access terminal in the case without the mains supply.
Livelock prevention mechanism in a ring shaped interconnect utilizing round robin sampling
A novel and useful cost effective mechanism for detecting the livelock/starvation of transactions in a ring shaped interconnect that utilizes minimal logic resources. Rather than monitor all transactions concurrently in the ring, the mechanism monitors only a single transaction in the ring. A sampling point is located at a point in the ring which contains a set of N latches. If the monitored transaction is not being starved, it is released and the detection logic moves on the next candidate transaction in round robin fashion. If the monitored transaction passes the sampling point a threshold number of times, it is deemed to be starved and a starvation prevention handling procedure is activated. By traversing the entire ring a single transaction at a time, all starving transactions will eventually be detected with an upper limit on the detection time of O(N2).
Method for sharing input and output ports
Disclosed is a method for sharing input/output ports among inverters. A sharing method by a master inverter according to the present disclosure is such that data to be outputted to an output port of a slave inverter is transmitted to the slave inverter where data inputted to input port of the slave inverter is received. Furthermore, a sharing method by the slave inverter is such that data transmitted along with a request frame is outputted to an output port in case of receiving the request frame requesting use of the output port from the master inverter, where data used by the master inverter among data received from input port is transmitted to the master inverter.
Input module for an industrial controller
An input module for an industrial controller is configurable to simplify setup and commissioning. The input module includes input terminals configurable, for example, as a counter input. Still other input terminals may be configured to trigger events as a function of the input signals present at the terminals. Time signals corresponding to transitions in state of the input terminals, triggering of events, or operation of the counters may be recorded. The input module is further configurable to transmit data back to the processor or to transmit data directly to another module in the industrial control network.
Methods for early write termination with non-volatile memory
In one embodiment of the invention, a memory apparatus for improved write performance is disclosed. The memory apparatus includes a base printed circuit board (PCB) having an edge connector for plugging into a host server system; a card level power source to provide card level power during a power failure; a memory controller coupled to the card level power source and having one or more memory channels; and one or more non-volatile memory devices (NVMDs) coupled to the card level power source and organized to respectively couple to the memory channels controlled by the memory controller. Each memory controller provides queuing and scheduling of memory operations on a channel for each NVMD in the memory channels. Responsive to power failure, the memory controller receives card level power and changes the scheduling of memory operations to the NVMDs in each memory channel.
USB redirection for read transactions
Methods and systems for conducting a transaction between a virtual USB device driver and a USB device are provided. A virtual USB manager of a hypervisor receives a one or more data packets from a client. The virtual USB manager stores of the one or more data packets in a buffer. The virtual USB manager dequeues a data packet from the buffer. The virtual USB manager transmits the data packet to the virtual USB device driver for processing.
Data management method and system
A data management system includes a data gathering device and a host device. The data gathering device is configured to gather data regarding a target object and to transmit the data to the host device. The host device operates on the data to produce an output and transmits the output back to the data gathering device. Subsequent action, including the gathering of further data, may be taken on the target object in response to and upon receipt of the output. The data gathering device and host device may communicate via wire or wirelessly. The host device may also exchange information with a network.
Virtual USB compound device enumeration
A system for implementing a virtual Universal Serial Bus (USB) compound device with a simulated hub enables a single physical USB device, such as a USB peripheral device, to expose multiple stand-alone functions on the USB bus. Logical functions on the single physical USB device can be added and removed dynamically without re-enumerating the entire device and without affecting the state of other functions. Logical functions can also be independently implemented on any of a number of processors in a system that has access to the USB hardware. Each processor can enumerate as one or more USB devices via the virtual hub. Initialization of logical functions can be performed via the virtual USB hub to maintain a charging current level from a USB host in a device having a discharged battery.
Method and system for a thin client and blade architecture
In a computing system, a method and system for a thin client and blade architecture are provided. A blade may generate video, audio, and peripheral control information that may be transmitted to a thin client (TC) by utilizing a video encoder, an audio bridge, and a peripheral bridge. Communication between the blade and the TC may occur based on a communication protocol that may operate independently of an operating system and/or applications running on the blade. The video encoder may dynamically compress the video information according to network capacity and/or video content and may dynamically select from various compression algorithms. The blade may configure and manage operations that interface with the TC. The TC may comprise a video decoder, a transceiver, a processor, a video display bridge, an audio bridge, and a peripheral bridge and may be adapted to communicate with peripheral devices.
Secure communication network
The present invention is directed to a secure communication network that enables multi-point to multi-point proxy communication over the network. The network employs a smart server that establishes a secure communication link with each of a plurality of smart client devices installed on local client networks. Each smart client device is in communication with a plurality of agent devices. A plurality of remote devices can access the smart server directly and communicate with agent devices via the secure communication link between the smart server and one of the smart client devices. This communication is enabled without complex configuration of firewall or network parameters by the user.
Map intuition system and method
A map intuition system and method that involves machine learning techniques to analyze data sets and identify mappings and transformation rules as well as machine-human interactions to leverage human intuition and intelligence to rapidly complete a map.
Systems and methods for content injection
The present solution is directed towards a policy-based intermediary that dynamically and flexibly injects content in responses between a client and a server based on one or more policies. The present solution addresses the challenges of injecting content in a client-server transaction. The intermediary determines when and what content to inject into a response of a client-server transaction based on a request and/or response policy. The injected content may include timestamp and/or variable tracking of different events in a client-server transaction. For example, when an intermediary appliance is deployed in a system to accelerate system performance and improve user experience, the appliance may inject content based on policy to monitor the acceleration performance of the deployed appliance.
United router farm setup
One embodiment of the present invention provides a computing system. The computing system includes a processor, a memory, a discovery mechanism, a switch management mechanism, and a configuration management mechanism. The discovery mechanism discovers a remote switch. The switch management mechanism registers the remote switch and transmits a switch image to the remote switch, thereby allowing the remote switch to install the image. The configuration management mechanism configures the remote switch, thereby allowing the remote switch to be controlled by the computing system.
Dynamically assigning unique addresses to endpoints
The present disclosure generally provides techniques for establishing a unique, ephemeral home address (hoa)/home agent address (ha′) address pair that may be limited to use in a session having a defined lifetime. Limiting the use of this dynamic address pair to a session lifetime and by preventing a mobile node from knowing the static address of a home agent may help protect the home agent from attacks.
Diameter route learning
Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a message at the network device; constructing a route key based on the message, wherein the route key comprises at least one value carried by the message; determining whether the network device stores a previous route record associated with the route key; and if the network device does not store a previous route record associated with the route key, generating a new route record based on the route key, and provisioning a new route based on the new route record into a routing table of the network device.
Rule engine evaluation of context objects
Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a Diameter message at the DRA from an origin device; establishing a context object in response to receiving the Diameter message; evaluating a rule that includes a context object reference, wherein the evaluation includes accessing the context object based on the context object reference; and transmitting a message based on the evaluation of the rule.
MMS message transfer method and system
The present invention relates to a method for transferring messages which includes the steps of transmitting a message from a first message service provider to a second message service provider, and evaluating the message (MMS) on the second message service provider's end, whereby the message contains at least one first header which includes a reference to at least one network element of the first message service provider, which was involved in the processing of the message.
Healthcare semantic interoperability platform
A system and method for efficiently linking local databases having different data formats or standards into a network, wherein a content based router is provided between each of the databases and a network “party line” bus and translates data from the respective database into a common canonical form or format so that all information within the network between the content based routers complies with the common canonical form and are validated according to single standard or mechanism, for example when information first enters the network. Also provided is a tracking or audit mechanism whereby each item of information provided with a unique network identifier when it first enters the network, and is also provided with or associated with a local identifier from each local database that originates or accesses the information item and router identifiers of the content based routers corresponding to those local databases.
Providing mobile device management functionalities for a managed browser
Methods, systems, computer-readable media, and apparatuses for providing mobile device management functionalities are presented. In various embodiments, a mobile device management agent may monitor state information associated with a mobile computing device. The monitored state information may be analyzed on the mobile computing device and/or by one or more policy management servers. In some instances, the one or more policy management servers may provide management information to the mobile computing device, and the management information may include one or more commands (which may, e.g., cause the mobile computing device to enforce one or more policies) and/or one or more policy updates. Subsequently, one or more policies may be enforced on the mobile computing device based on the monitored state information and/or based on the management information.
Contact details service
A method for a user to advise related entities with respect to a consumer service of their contact details wherein the user submits data to a Contact Details Registration Service to register their use of the consumer service; the Contact Details Registration Service allocating the user with a unique identification indicia and transmitting same to the user for subsequent use in communications with the Contact Details Registration Service and/or any related entities of the consumer service registered with the Contact Details Registration Service; the data submitted by the user including their contact details and having at least an address to which correspondence is to be sent, the contact details being associated with the unique identification indicia of the user by the Contact Detail Registration Service and stored in a database; and the user's contact details being accessible to the consumer service, or related entities thereof, upon provision of the user's associated unique identification identifier to the Contact Details Registration Service database, wherein the Contact Details Registration Service database maintains a record of related entity requests for the contact details of the user.
System and method for SIP user agent identification and efficient binding
The present disclosure provides a system and method for Session Initiation Protocol (SIP) user agent identification and efficient binding. In accordance with one example embodiment, there is provided a method for use on a Session Initiation Protocol (SIP) registration server for registering user agents, comprising: receiving a REGISTER message which includes a binding key; determining whether a prior binding associated with the binding key exists in a registration repository; and creating a new binding associated with the binding key and adding the new binding to the registration repository when no prior binding associated with the binding key exists in the registration repository.
Pairing system, pairing management device, pairing method, and program
To provide a pairing system which requires no special hardware and is capable of easily pairing terminals intended by a user. A pairing management device includes a pairing control module which receives pairing requests from communication terminals and data terminals, and generates tentative pairs from the communication terminals and the data terminals which transmitted the pairing request, and a confirmation data control module which allots and transmits pair confirmation data which corresponds on one-on-one basis to the communication terminals and the data terminals forming the tentative pairs, and allows the pairing control module to update the tentative pairs to final pairs when the pairing control module receives pair alteration data corresponding to the pair confirmation data from the communication terminals or the data terminals.
Method and apparatus for monitoring the transmission of medical data in a communication network
A method and an apparatus are for monitoring the transmission of medical data in a communication network, in particular in an image communication network, with technical modalities for the recording of the medical data and data processing units being connected to one other via the communication network as network subscribers. The method includes checking at least one of data and parameters to be transmitted between the network subscribers, for compatibility.
Device discovery in a ubiquitous computing environment
Technologies are generally described for methods, instructions, and client applications for device discovery in a ubiquitous computing environment. In some examples, the methods, instructions, and client applications may facilitate the organization of features of devices in a ubiquitous computing environment into a series of hierarchical hash numbers, the ordering of the hierarchical hash numbers corresponding to the respective devices, and the searching for a particular one of the devices by attempting to match hashed search criteria to the ordered hierarchical hash numbers at one of the devices in the ubiquitous computing environment.
Resource aware parallel process distribution on multi-node network devices
Techniques are provided for monitoring a plurality of independently operating processing nodes in a core data packet routing system, wherein each processing node is running its own operating system instance. A placement decision is made for respective processes on selected ones of the independently operating processing nodes based on a predetermined policy, and then the respective processes are placed, based on the placement decision, on the selected ones of the independently operating processing nodes such that the respective processes become placed processes. A list of placed process/processing node pairs specifying a pairing of the placed processes and the processing nodes on which the placed processes have been placed is maintained so that a user can review the then-current set of process placements.
Distributed data storage
The present invention relates to a distributed data storage system comprising a plurality of storage nodes. Using unicast and multicast transmission, a server application may write data in the storage system. When writing data, at least two storage nodes are selected based in part on a randomized function, which ensures that data is sufficiently spread to provide efficient and reliable replication of data in case a storage node malfunctions.
Consistent cluster operational data in a server cluster using a quorum of replicas
A method and system for increasing server cluster availability by requiring at a minimum only one node and a quorum replica set of replica members to form and operate a cluster. Replica members maintain cluster operational data. A cluster operates when one node possesses a majority of replica members, which ensures that any new or surviving cluster includes consistent cluster operational data via at least one replica member from the immediately prior cluster. Arbitration provides exclusive ownership by one node of the replica members, including at cluster formation, and when the owning node fails. Arbitration uses a fast mutual exclusion algorithm and a reservation mechanism to challenge for and defend the exclusive reservation of each member. A quorum replica set algorithm brings members online and offline with data consistency, including updating unreconciled replica members, and ensures consistent read and update operations.
Server load balancing using geodata
The present technology relates to serving geodata based on location of a requesting device. More specifically, the technology efficiently services requests for geodata, e.g., map data, by directing requests to a server that stores a shard of an entire database of geodata. A request for geodata includes an unencrypted header having a location of a device making the request for geodata. The present technology relates the location to a shard storing data relevant to the location.
Method and system for hierarchical tracking of content and cache for networking and distribution to wired and mobile devices
Embodiments of the present invention are directed to a system and apparatus for tracking media content (storage) and its cache (that is synched with the original content) in a large-scale wide-area distributed network. The system includes at least one mini tracker which is configured to keep information on the location of the content and to distribute this information to micro trackers in a first jurisdiction. The system also includes at least one zone tracker which is configured to keep information on the location of the content in a region and to distribute this information to mini trackers in a second jurisdiction. The system further includes a master tracker which is configured to keep information on the location of the content in all regions in a third jurisdiction to distribute this information to zone trackers in the third jurisdiction. The micro tracker (in wired or mobile end device/point) is configured to obtain location information from at least one of the mini tracker or zone tracker if a primary source malfunctions.
One-to many stateless load balancing
A stateless load balancer may route a request to a computing device without tracking state information of the communication connection that delivered the request. The stateless load balancer may receive a request that is initiated by a client device. The request may be transported to the stateless load balancer via a communication connection that includes a public destination internet protocol (IP) address. One of the routing devices in the stateless load balancer may obtain connection tuples of the communication connection that transported the request, in which the connection tuples include the public destination IP address. Once obtained, the routing device may generate a hash value from one or more connection tuples. Subsequently, the routing device may map the hash value to a target network address of a particular computing device in a cluster of multiple computing devices by accessing stored mapping data, and then route the request to the particular computing device for processing.
System and method for hypertext transfer protocol layered reconstruction
HTTP layered reconstruction is disclosed. A database is queried to identify a location of a previously reconstructed HTML artifact file or packet data of a HTML file in a repository that stores packet data captured from a network. The reconstructed HTML file is analyzed. Links to external files are identified and the database is queried to identify a location of previously reconstructed artifact files or packet data of associated external files. The external files are reconstructed, as needed. A web page is then reconstructed based on the reconstructed HTML file and reconstructed external files, presenting a view of the web page as it originally appeared to a user. A user may specify which external file types to include and/or not include. New versions of external files may be obtained and indicated in the reconstructed web page when associated artifact files or packet data are not stored within the repository.
Optimized video streaming to client devices
There is provided a system and method for determining an optimal bandwidth for a communication between a networked client device and a server. There is provided a method comprising identifying the networked client device, identifying a location of the networked client device, obtaining a client device profile for the networked client device corresponding to the location, and determining the optimal bandwidth using the client device profile. In this manner, client devices may almost instantly stream the highest quality video available.
Mechanism for tracking host participation in multicast groups
A method performed in a network element coupled between a subscriber end station and a multicast source for tracking a history of IGMP report messages. The network element receives and IGMP report message from the subscriber end station and determines a multicast group address and multicast source IP address corresponding to a multicast group to which the network element is a member. The network element builds an IGMP report history record indicating the subscriber end station's identity and comprises the multicast group address, the multicast source IP address, and a time stamp corresponding to the date and time at which the network element received the IGMP report message. This record is then stored in an IGMP report history database along with a plurality of other IGMP report history records so that the network element can maintain a history of IGMP report messages received from the subscriber end station.
Bandwidth requesting system, bandwidth requesting device, client device, bandwidth requesting method, content playback method, and program
A bandwidth requesting device is to be connected via a network to a plurality of client devices that play contents. The bandwidth requesting device is to appropriate bandwidths to the plurality of client devices and includes a bandwidth securement requesting unit that determines a request bandwidth, based on bandwidth management information and appropriation request bandwidths sent from the plurality of client devices. The bandwidth securement requesting unit requests a relay server, provided externally from the network, that determines bandwidths usable by the network, to secure the request bandwidth. The bandwidth requesting device also includes a processing unit that resolves, upon a competition among the appropriation request bandwidths sent from the plurality of client devices, the competition. Further, the bandwidth requesting device includes a communication unit that communicates with the relay server and the plurality of client devices to receive the bandwidth management information.
Method and system for updating and retrieving state information for mobile nodes in a communication network
A method for updating and retrieving information for one or more nodes includes sending an update of at least a first indicator from at least a first node of a group of nodes to a home agent. Each of the group of nodes is associated with the home agent and corresponds to at least one of a plurality of indicators. The plurality of indicators is related to an internet protocol and includes the first indicator. The method further includes sending a request to the home agent for group node information that is associated with at least information related to the plurality of indicators corresponding to the group of nodes. Additionally, the method includes receiving the group node information from the home agent and transferring the group node information to one or more applications capable of accessing all the group of nodes. Moreover, the method includes sending one or more communication messages to at least a second node of the group of nodes via the one or more applications without using the home agent for routing.
Communicating information relating to a network resource
In an information retrieval system, a system and method for presentation of information and/or resources that are pertinent to an individual's interests or task. Guiding individuals to places of interest on a network where information is stored. Displaying or otherwise presenting useful information to the user.
Dynamic route requests for multiple clouds
Aspects of the present invention include a method of dynamically routing requests within multiple cloud computing networks. The method includes receiving a request for an application from a user device, forwarding the request to an edge server within a content delivery network (CDN), and analyzing the request to gather metrics about responsiveness provided by the multiple cloud computing networks running the application. The method further includes analyzing historical data for the multiple cloud computing networks regarding performance of the application, based on the performance metrics and the historical data, determining an optimal cloud computing network within the multiple cloud computing networks to route the request, routing the request to the optimal cloud computing network, and returning the response from the optimal cloud computing network to the user device.
Method and system for dispatching received sessions between a plurality of instances of an application using the same IP port
A logical module, referred as Load Balancer Module (LBM), is disclosed which listens to one of certain common predefined port number. These well-known ports for receiving communication video conference signaling and control protocols is thereafter load balanced and multi-plexed to a number of instances of protocol stack applications. By balancing the multi-media data stream across a multitude of application instances multiple multi-media data streams may be serviced and processed by a single internet protocol host processor. A mutipoint control unit (MCU) may therefore process multiple input data streams containing multi-media video conferencing information.
Probing network nodes for optimization
A method is disclosed for optimizing a network that is formed from a plurality of nodes. The NC node of the network compiles an order that the plurality of nodes perform a probing operation. The order is typically round robin. The NC node receives a request from a client that identifies a next node to perform the probing operation. Based on the request, the NC node changes the order so that the next node performs the probing operation after the current node that is performing the probing operation has completed the operation.
Server image capacity optimization
Embodiments of the invention provide a solution to optimize/minimize the total capacity of Gold Image within the entire datacenter which utilizes a scale-out type of storage systems. A method of server image provisioning comprises checking whether a gold image exists in a first storage system, the gold image being one of a real gold image or a virtual gold image; if no gold image exists in the first storage system, searching a remainder of the storage systems until a real gold image is found in a second storage system; after finding the real gold image in the second storage system, creating a virtual gold image in the first storage system, the virtual gold image in the first storage system being associated with the real gold image in the second storage system; and creating a snapshot volume in the first storage system based on the virtual gold image.
Wireless network performance monitoring
A system and method include determining an amount of network traffic to add to traffic in the network to emulate a desired condition, beginning a test of the network such that network nodes generate test traffic in accordance with the determined amount of network traffic to emulate the desired condition, receiving the test traffic, and calculating network performance measures as a function of the received test traffic.
Systems and method for using closed captions to initiate display of related content on a second display device
In some implementations, a method for using closed captions in a double display scenario includes, obtaining a video stream configured to be displayed on a first display device. The video stream includes closed captions. The method also includes, identifying one or more symbols or words included in the closed captions; and obtaining a set of instructions. The set of instructions includes instructions to display content information relating to at least one symbol or word in the one or more symbols or words. The method further includes, in response to obtaining, and in accordance with, the set of instructions, executing one or more applications based on a type of the content information; and formatting for display, on a second display device, output from the one or more applications. The applications include one of: a web browser, a music application, a feed reader application, a coupon application, and a content viewer.
Apparatus and method for managing multimedia playback
An apparatus and method of managing reproduction of multimedia contents. A multimedia reproduction method includes: receiving identification information on predetermined multimedia contents; receiving first reproduction information on the predetermined multimedia contents, from a multimedia reproduction management apparatus receiving the transmitted identification information; and if first identification information contained in the received first reproduction information corresponds with the transmitted identification information, reproducing the predetermined multimedia contents based on the first reproduction information. According to the apparatus and method, even when a DVD title being played back is replaced by another DVD title, or when the power of a DVD playback apparatus is suddenly interrupted, the reproduction position information is safely maintained.
Generating custom address links
A system is configured to receive location information associated with a geographic location, determine a web address associated with the location information, and determine a custom address associated with the location information and the web address, where the custom address is descriptive of the location information and is different than the web address. The system is further configured to store information associating the web address, the custom address, and the location information, and send the custom address to a user device, where the user device is able to use the custom address to obtain or share at least a portion of the location information at the web address.
Network streaming of video data using byte range requests
In one example, a device for receiving information for multimedia data includes one or more processors configured to determine a byte range of a file of a representation of multimedia content to request from a source device, form a uniform resource locator (URL) that specifies, in a file path portion of the URL, according to a template, the file and the byte range in accordance with requirements of the source device, and issue a GET request that specifies the formed URL to the source device.
Providing proxy service during access switch control plane software upgrade
Systems and methods utilize the data plane of an access switch to aid in providing control plane proxy services when the access switch is undergoing a software upgrade on its control plane. In one aspect, a method includes providing a peer switch with current state information of the host computer, encapsulating a control plane query packet sent from the host computer using a first hardware circuit of the access switch, forwarding the encapsulated control plane query packet to the peer switch using the first hardware circuit. The method further includes receiving a response to the control plane query packet from the peer switch using the first hardware circuit and directing the response to the host computer.
IT discovery of virtualized environments by scanning VM files and images
Information-technology discovery techniques are performed directly on virtual machine files. A discovery system sends directives to a remote host and receives data extracted from the virtual machine files as a result of the remote host responding to the directive. The discovery system extracts discovery information from the received data and sends the discovery information to a discovery repository. The discovery information may include static and dynamic virtualized hardware as well as executing software applications and services within a virtual machine and across multiple virtual machines.
Multi-use application proxy
Some embodiments of a multi-use application proxy have been presented. In one embodiment, an application proxy is executed as an intermediary a set of applications. The application proxy performs multiple functions between the set of applications. For example, the application proxy aggregates interactions between the applications and a client in one embodiment.
Application programming interface for prefetching map data
An API for prefetching map data receives a prefetch request for an indicated geographic area from a software application. In response, the API retrieves map data corresponding to the indicated geographic area from a map data provider and stores the map data in a map data cache without causing a digital map based on the map data to be displayed on the display device. The map data cache is accessible to the software application only via the API. Subsequently to storing the map data in the map data cache, the API receives a request to render the digital map from the software application and, in response to the request to render the map image, renders the map image for display on a display device using the map data stored in the map data cache.
Virtual desktop configuration and operation techniques
Techniques for configuring and operating a virtual desktop session are disclosed herein. In an exemplary embodiment, an inter-partition communication channel can be established between a virtualization platform and a virtual machine. The inter-partition communication channel can be used to configure a guest operating system to conduct virtual desktop sessions and manage running virtual desktop sessions. In addition to the foregoing, other techniques are described in the claims, the detailed description, and the figures.
Wide area network file system with low latency write command processing
Methods, apparatuses, and systems directed to write command processing in distributed file caching systems. Implementations of the invention allow for write operations to identified files to proceed, while information regarding the identified file is fetched from a remote host and a locally cached version of the file is constructed. Implementations of the present invention can be configured to improve the performance of wide area network file systems, while preserving file consistency.
E-mail protocol optimized for a mobile environment and gateway using same
A message delivery server system for delivery of electronic content to a receiving client, comprises: a data storage for storing electronic content, a connection unit for maintaining a connection with the receiving client, and a connection establishment unit for allowing a receiving client to establish a connection with the server. The connection establishment unit comprises a definition unit for placing one or more connection definitions relating to the connection in an entity that is independent of any actual connection socket used for the session. The definition unit can be use to establish additional sockets to maintain the session and the definitions within can be used to find the best way to download media to the receiving client.
Data transmission/reception system and data transmission/reception program
Provided is a data transmission/reception system which can display a title created based on an attribute information of a data on a monitor with high visibility. When a command is inputted via an input unit, a CPU creates a title information file used for creating the title, and when the data is created, the CPU creates a title attribute information table. A communication terminal transmits and receives the data and the title attribute information table. The CPU creates the title in accordance with the title information file and the title attribute information table. The monitor displays plural titles on a title list screen. Accordingly, a user can display the plural titles on the monitor with the high visibility. Moreover, the user can easily manage the data in accordance with the title.
User-based semantic metadata for text messages
Methods, devices, and computer-readable medium described herein may provide for the adding of user-based semantic metadata to a text message. The semantic metadata may be added at a sending user device based on a user's selection. A receiving user device may interpret the text message based on the semantic metadata.
Applying actions to item sets within a constraint
Items of an item set may be stored by an item server (e.g., mail messages comprising a mailbox stored by a mail server) that supports the application of actions, but only within a constraint (e.g., a maximum duration or computational resources consumed by the action). The application of complex actions to large item sets may exceed the constraint if performed in one request. Moreover, the request may be made by a user interface of a user device, but the user interface may stall while interoperating with the item server to perform the action. Instead, a background process may issue a sequence of requests applying the action to respective batches of items within the constraint. This architecture may enable the user interface to remain responsive to the user while the action is performed, and even to be terminated without jeopardizing the completion of the action upon the item set.
System and method for self-calibrating, self-organizing and localizing sensors in wireless sensor networks
A method of self-organizing sensor nodes in a wireless sensor network (WSN); a method of localizing mobile nodes in a WSN; and a method of self-calibrating a WSN are disclosed. The method of self-organizing sensor nodes in a WSN includes configuring sensor nodes to in turn broadcast consecutive messages at a plurality of pre-defined and incrementally increasing power levels; detecting receipt of the broadcasted messages at each of the sensor nodes and notifying a master node as to the identity of each sensor node receiving the broadcasted message and the power level at which it was received to define a detected neighborhood for each sensor node; determining relative locations of sensor nodes with the detected neighborhoods; and mapping relative locations of the sensor nodes by the master node based on results of the neighborhood detection and known locations of two anchor nodes.
Network infrastructure management
Network infrastructure management may be provided. First, administrative tools associated with a plurality of network topologies may be provided in a management console. Providing the administrative tools may comprise providing a first set of tools associated with a first network topology in the console. The first network topology may be an on-premises topology. Providing the administrative tools may also comprise providing a second set of tools associated with a second network topology in the console. The second network topology may be a cloud topology. Next, communications for the plurality of network topologies may be established to manage the plurality of network topologies through the management console. Establishing the communications for the plurality of network topologies may comprise establishing a first communications channel between the first network topology and the console. In addition, establishing the communications may comprise establishing a second communications channel between the second network topology.
Management of broadcast-distributed data entities
A method, computer program product, and data processing system for reducing the storage needed for broadcast-distributed data entities, such as electronic mail messages from a mailing list, are disclosed. Locally stored data entities that are determined to have corresponding copies elsewhere are replaced with identifying information to allow the corresponding copies to be retrieved. In a preferred embodiment, locally-stored electronic mail messages in an electronic mail server that are determined to come from archived mailing lists are replaced periodically with one or more URLs (Uniform Resource Locator) of archived copies of the message. When a request from a mail client to download the electronic mail message is received, the message is reconstructed from the archived copy and returned to the client, rather than being retrieved from local storage.
Space-efficient mail storing and archiving based on communication structure
The present invention relates to electronic mail. In particular, it relates to a method and system for processing electronic mail, wherein mails are stored in a space efficient way by removing redundancy from the content. Prior art is known for doing a limited version of this on a mail client.In order to provide a method and system which is adequate for server operation it is proposed to perform the steps of: splitting the content of an incoming e-mail into elementary mail segments by parsing and optionally normalizing the e-mail body based on a regular grammar with transduction rules; computing a unique ID for each elementary mail segment; storing the normalized or original form of an elementary mail segment together with a link to its respective parent elementary mail segment in a table in a way retrievable by said unique ID; and reconstructing an original e-mail from a concatenation of a respective sequence of said elementary mail segments wherein the unique ID for each elementary mail segment is used as a key for accessing said table and retrieving the respective elementary mail segment.
Use of information channels to provide communications in a virtual environment
The invention generally relates to virtual environments, and more particularly to systems and methods for communicating in virtual environments. A method of providing communication in a virtual universe (VU) includes instantiating and assigning an information channel to a first client of the VU, associating at least one additional client of the VU to the information channel, and conveying data placed on the information channel to the first client and the at least one additional client.
Infrastructure management operational workflows
Provided are techniques for the orchestration of workflows such as, but not limited to, computer system server, storage, virtualization and cloud infrastructure management operations and tasks. The disclosed orchestration techniques support non-scripted native representations of the workflows and the addition of new object types or operation sets or services. The disclosed orchestration techniques support atomicity and transactional semantics of workflows and include the ability to configure parameters for execution of workflow, which influences, for example, error, temporal and automation semantics.
Method and system for triggering activation of IMS applications on a mobile radio terminal
A method of remotely activating a non-native IP multimedia subsystem (IMS) application of an electronic device. The method may include receiving at least one of a general IMS availability registration from the electronic device or a native IMS application registration from the electronic device; identifying the non-native IMS application using a database that associates IMS applications with corresponding electronic devices; transmitting an activation trigger for the non-native IMS application to the electronic device; and receiving an IMS application registration for the non-native IMS application and registering the non-native IMS application.
Remote management of virtual machines hosted in a private network
Management of virtual machines within a private network may be provided from a server application, such as a web application, on a machine remote from a private network. The server application receives management commands and communications the management commands in a vendor independent format to a client application within the private network. The client application receives the management commands, instantiates the management commands into a vendor specific definition and redirects the management commands to the virtual machine host for appropriate execution.
System for providing policy based content service in a mobile network
Serving user selected content in accordance with a service policy is disclosed. The user may select content from a content source to be accessed at a mobile device. The desired content is modified as necessary such that transmission of the content complies with a policy. Alternatively, only content that complies with the policy may be made available for selection. The manner in which a policy is defined and the content provided may be determined by various factors including mobile device capabilities, user preferences, and network conditions.
Accelerated delivery of media content via peer caching
An example method includes monitoring client devices to identify a subset of client devices actively connected to an internet gateway server, and maintaining a record of media data chunks cached at each client device of the subset of client devices. The method includes receiving a request from a first client device for a media data item stored at a media server device, and determining that a first target portion of the media data item is cached at a second client device actively connected to the internet gateway server. The method includes instructing the first client device to establish a peer-to-peer connection with the second client device, to request, and to receive the first target portion of the media data item from the second client device. The method includes retrieving and sending the remainder of the media data item to the first client device.
Clustered computer system
A clustered computational system comprises a clustered computational engine, a program host, and a queue manager. The clustered computational engine comprises a plurality of clustered computers and is configured to perform computations. The program host stores a plurality of programs that define computations that can be performed by the clustered computational engine and a plurality of inputs to the programs. The queue manager is configured to determine when the program host has stored sufficient inputs to allow the clustered computational engine to perform a computation defined by the program and to schedule the performance of the computation by the clustered computational engine.
A hardware integer saturation detector that detects both whether packing a 32-bit integer value causes saturation and whether packing each of first and second 16-bit integer values causes saturation, where the first 16-bit integer value is the upper 16 bits of the 32-bit integer value and the second 16-bit integer value is the lower 16 bits of the 32-bit integer value. The detector includes hardware signal logic, configured to generate four signals with information about the integer values. The hardware integer detector also includes saturation logic, configured to gate the four signals to generate a saturation signal. Each bit of the saturation signal indicates whether packing the 32-bit integer value or whether packing one of the first and second 16-bit integer values will cause saturation respectively.
Generation of an analog Gaussian noise signal having predetermined characteristics
The present invention relates to a method and system for providing an analog Gaussian noise signal having the predetermined probability distribution function, bandwidth and center frequency. A band-limited digital noise signal indicative of a Gaussian noise signal having a predetermined Gaussian probability distribution function is ΣΔ modulated generating a pulse-density modulated 1-bit sequence representing a Gaussian noise signal having a predetermined probability distribution function, bandwidth and center frequency. Using an analog low-pass filter the pulse-density modulated 1-bit sequence is then converted into a respective analog Gaussian noise signal having the predetermined probability distribution function, bandwidth and center frequency. The method and system are successfully employed in numerous applications such as in histogram testing and probabilistic digitization.
System and method for aggregating and presenting tags
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for aggregating and presenting tags. A system configured to practice the method identifies a type for each tag describing a media event received from a tagging system, generates aggregate tags representing at least a portion of the set of tags based on the identified types, associates each aggregate tag with the media event based on the at least the portion of the plurality of tags represented by each respective aggregate tag, and optionally outputs the aggregate tags with the media event. A system configured to combine media segments based on aggregated tags first retrieves aggregate tags associated with a media event, receives input from a user, identifies a subset of aggregate tags related to the input, and outputs portions of the media event associated with the subset of aggregate tags.
Methods and apparatuses to optimize updates in a file system based on birth time
Methods and apparatuses that maintain birth time for a file system to optimize file update operations are described. The file system can include a plurality of snapshots or clones of data stored in one or more extents of blocks allocated in a storage device. Each extent may be associated with a time stamp according to the birth time. A request may be received from an executable using the file system to update data in a particular extent associated with a particular time stamp. In response, the current birth time in the file system and the particular time stamp may be compared to determine if the particular extent is not shared by more than one of the snapshots. If the particular time stamp is equal to the current birth time, the particular extent may be updated directly without performing an expensive operation to check whether a reference count of the particular extent is equal to one.
Remembered set overhead reduction by deferred garbage collection of stable regions
At least one region of a heap that includes memory allocations is analyzed, using age and occupancy criteria, across a number of local garbage collection cycles using a processor executing a region-based garbage collector. Based upon the analyzed age and occupancy criteria of the at least one region, at least one stable region in age and occupancy is identified among the at least one region of the heap across the number of local garbage collection cycles. Maintenance of a remembered set (RS) of external references into the at least one stable region is temporarily stopped for each identified stable region during at least one additional local garbage collection cycle.
Efficient pushdown of joins in a heterogeneous database system involving a large-scale low-power cluster
A system and method for allocating join processing between and RDBMS and an assisting cluster. In one embodiment, the method estimates a cost of performing the join completely in the RDBMS and the cost of performing the join with the assistance of a cluster coupled to the RDBMS. The cost of performing the join with the assistance of the cluster includes estimating a cost of a broadcast join or a partition join depending on the sizes of the tables. Additional costs are incurred when there is a blocking operation, which prevents the cluster from being able to process portions of the join. The RDBMS also maintains transactional consistency when the cluster performs some or all of the join processing.
System and method for editing an item list in electronic content
In various embodiments, a computerized method includes creating a first item of a list having at least two items that form a portion of electronic content. The computerized method can include creating a second item of the list within the electronic content, as well as converting the second item to a separate paragraph below the first item, wherein the separate paragraph is part of the first item. The computerized method may include creating another item of the list below the separate paragraph, wherein a continuity is maintained between the first item and the another item of the list. The computerized method includes storing the electronic content in a machine-readable medium.
Method and computer program product for creating ordered data structure
The present invention provides a method and computer program product for creating an ordered data structure for storing a plurality of data elements. The data elements to be stored are first arranged in an order. A plurality of keys is then generated for the ordered data elements such that the keys may be arranged in a sequence. Thereafter, one or more keys from the plurality of keys are associated with the ordered data elements such that the values of the keys maintain the requisite order among the ordered data elements. Finally, an ordered data structure is created for storing the ordered data elements along with the associated keys.
Digital archive systems, methods and computer program products for linking linked files
A digital archive system includes a plurality of digital files and a user interface that allows a user to designate any one of the files as an anchor file and to link other ones of the files to a designated anchor file. The user interface allows a user to annotate each file linked to an anchor file with information describing the respective file and any relationship between the anchor file and the respective linked file. The content of an anchor file and all files linked thereto can be displayed via the user interface.
Computer-implemented processing of heterogeneous data
A computer-implemented method for a computing environment employing a matrix-based mathematical programming language includes: generating a heterogeneous dataset in the computing environment, where the heterogeneous dataset embodies a plurality of variables for a plurality of subjects, where each element of a respective variable has a same data type, where the variables comprise at least two data types; accessing contents of the heterogeneous dataset with a single command in the computing environment, where the single command is a brace command, a dot command, or a parentheses command; and providing in the computing environment a portion of the heterogeneous dataset based on the single command.
Systems and methods for applying statistical inference techniques to knowledge representations
Techniques for analyzing and synthesizing complex knowledge representations (KRs) may utilize an atomic knowledge representation model including both an elemental data structure and knowledge processing rules stored as machine-readable data and/or programming instructions. One or more of the knowledge processing rules may be applied to analyze an input complex KR to deconstruct its complex concepts and/or concept relationships to elemental concepts and/or concept relationships to be included in the elemental data structure. One or more of the knowledge processing rules may be applied to synthesize an output complex KR from the stored elemental data structure in accordance with context information. Methods of populating an elemental data structure and methods of synthesizing a complex KR from the elemental data structure may rely on statistical inference techniques.
Techniques for performing data loss prevention
A technique for performing data loss prevention includes creating for a user, using a data processing system, respective permissive policies with a most permissive enforcement action for each content category of a resource. In this case, the content category includes at least two categories. The technique also includes forming, using the data processing system, a policy set based on the respective permissive policies. The technique further includes creating, using the data processing system, an effective policy from the policy set using a least permissive enforcement action. Finally, the technique includes applying, using the data processing system, the effective policy to determine whether a user action is permitted on the resource.
Methods and systems for improving text segmentation are disclosed. In one embodiment, at least a first segmented result and a second segmented result are determined from a string of characters, a first frequency of occurrence for the first segmented result and a second frequency of occurrence for the second segmented result are determined, and an operable segmented result is identified from the first segmented result and the second segmented result based at least in part on the first frequency of occurrence and the second frequency of occurrence.
Systems and methods for automatically providing whois service to top level domains
Methods and systems are disclosed for quickly providing Whois services to a new top level domain after it is provisioned in a registry. In one embodiment, domain data is received at a first system regarding a top level domain (TLD). The domain data is assigned an authoritative port of a Whois server and is provisioned in a registry database. In certain embodiments, the Whois server provides information relating to domain name registrations of the TLD in the database, according to the authoritative port. The Whois server determines that a Whois query is received at the authoritative port for the queried TLD and responds with the queried information. To the requester, the responses appear as if they are sent from a unique Whois server for each TLD, but the Whois server is actually shared among the TLDs.
Associating security trimmers with documents in an enterprise search system
Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.
Rules-based targeted content message serving systems and methods
A method of serving targeted content messages for display in a website accessed in a browser program of a networked computer communicatively connected to a network at a network address for communications, delivers uniquely targeted content messages displayed in websites viewed in web browsers. The method includes placing a script device in a website file, processing the website file, together with the script device by a particular web browser on download of the website file, including by determining the network address of the networked computer, determining an identifier of the website file, and sending an artifact representing the network address and the identifier over the network to a server computer. The method also includes detecting the network address and the identifier by the server computer, querying a database for a database article related to the network address and the identifier, constructing a script program stored in memory of the server computer for the particular browser and website file, and constructing an ad device stored in memory of the web browser device from the script program. The method further includes calling the server computer by the ad device by communication of an identifier representing an action of the web browser device, receiving the identifier by the server computer, querying the database for a select message artifact related to the script program, the identifier, the website file, and the web browser, and responding by the server computer to the web browser with the select message artifact. A message represented by the select message artifact is displayed in the website then viewed in a browser window of the web browser. Messages can be prioritized and are uniquely targeted in content, based on real-time activities of the web browser.
Modifying search criteria using gestures
A method for searching using a touchscreen including: receiving, from a user, multiple search criteria; receiving, using the touchscreen, a gesture input from the user; selecting a search preference corresponding to the gesture input; obtaining multiple modified search criteria by modifying the plurality of search criteria based on the search preference; and generating multiple search results based on the multiple modified search criteria and a data repository.
Observation bandwidth is allocated to an image provider such that an image may be reacquired while optimizing the utility of the image provider's observations. The observation bandwidth is allocated with reference to the rate of change associated with a location where images are acquired by the image provider and to an importance value associated with the location. The rate of change identifies how frequently the location is subject to modifications. The importance value indicates a likelihood that users are concerned with receiving current image data at the location. Different locations having substantially the same rate of change and importance value are grouped together. The same observation bandwidth is allocated for the image providers at locations that are grouped together such that each image provider may reacquire images at the allocated observation bandwidth.
Apparatus and associated methodology for automatically selecting content using stored criteria
In an information processor which records many contents or has many contents already recorded therein, and can generate an arbitrary combination of the contents, a weight is computed for each of the contents based on either data stored in a history data file (184) or data stored in a display data file (182) and data stored in a filtering data file (181), and a content is selected from the contents stored in a content file (161) based on the weight. The selected content is related with a package corresponding to the data stored in the filtering data file (181).
Techniques for organizing single or multi-column temporal data in R-tree spatial indexes
Techniques for organizing single or multi-column temporal data into R-tree spatial indexes are provided. Temporal data for single or multiple column data, within a database system, is converted into one or more line segments. The resulting line segments are transformed into a minimum bounding rectangle (MBR). Finally, the MBR is inserted into an R-tree spatial index.
Trending search magazines
Embodiments include methods and systems for generating trending search magazines. Trending topics may be identified from news servers. A search magazine edition may be generated for a trending topic. The edition has a search magazine format, including a news section, a user-generated media section and an about section. News and article servers are searched for articles on the trending topic. Media is searched for on the trending topic. Descriptive information is searched for on the trending topic. The search results of these automatic searches are transformed into the search magazine format of the edition and provided for display in a current display view of a mobile device.
Sentiment analysis from social media content
The sentiment engine includes a sentiment module configured to gather opinions or determine sentiment expressed in documents, a crawling module configured to crawl servers to obtain at least a subset of the documents or opinions from social media websites, a keyword module configured to extract keywords from documents, a filtering module configured to filter keywords and documents, and a classification module configured to classify documents, sentences, and/or keywords, a polarity prediction module configured to predict the polarity of a sentiment sentence, and a social media net promoter score (SNPS) configured to calculate a loyalty metric of users from social media websites. The functionality of these modules may be combined with one another or in addition to other modules.
Method for generating search result and system for information search
The present disclosure discloses a method for generating a search result and an information search system. The method for generating a search result includes: receiving, by an information search system, a search request; obtaining, by searching, a plurality of pieces of matching information that match the search request; obtaining a respective amount of user response associated with each of the plurality of pieces of matching information and further obtaining a total amount of user response associated with a respective categories to which each of the plurality of pieces of matching information belongs; and ranking the plurality of pieces of information to generate a search result based on the total amount of user response associated with the respective category to which each of the plurality of pieces of matching information belongs. By using the above technical scheme, a result of more rational ranking of matching information can be displayed to a user when the user performs a search, thus improving experience of the user.
Scalable visual search system simplifying access to network and device functionality
A method, apparatus and computer-readable storage medium are provided for providing a list of candidates that may provide information requested by a user. In this regard, an indication of information desired by a user may be received. The indication of the desired information may include media content associated with one or more objects in a real world and/or meta-information providing one or more characteristics associated with the media content, a mobile device and/or the user. A list of candidates for the desired information may then be presented to the user, such as upon a mobile device of the user. In response to an indication of a selection of the user from among the list of candidates or otherwise, an association may be created between the selection of the user and the indication of information desired by the user.
Systems and devices for personalized rendering of digital media content
Systems and methods are disclosed for providing devices capable of the reception and playback of one or more crafted media channels transmitted over an intermittent connection. An exemplary method of personalized rendering of media content includes receiving media files and file metadata defining attributes of the media files over a data link at a receiver. The method further includes executing, using a processor of the receiver, instructions stored in a memory of the receiver. The instructions cause the processor to store certain ones of the media files characterized by file metadata consistent with one or more channel profiles in the memory, remove certain of the ones of the media files stored within the memory, and sequence the ones of the media files stored within the memory for rendering based upon one or more of the channel profiles.
Personalized media charts
Personalized media charts are described. In embodiments, a request can be received for a personalized media chart that lists media assets as recommendations in a relevant order for a user. The media assets are initially ordered in the personalized media chart according to a chart rank for each media asset. A relevance factor is then determined for each of the media assets, where the relevance factor for a media asset indicates a relevance of the media asset to the user. A chart rank adjustment is calculated for each of the media assets based on the relevance factors for each of the media assets, and the media assets are then reordered in the personalized media chart according to the chart rank adjustments for each of the media assets.
Method, system and apparatus for efficiently determining priority of data in a database
A method and apparatus for determining priority of data in a database managed by a computing device are provided. The data comprises a list of events, the computing device comprising a processing unit interconnected with a memory device and a display device. Context data is processing at the processing unit to determine a priority ranking for each of the items, wherein processing the context data to determine a priority ranking comprises at least one of processing attendance data, location, event data, and telephone record data. Respective areas of the display device are controlled to provide visual representations of each of the events, each respective area controlled according to the priority ranking.
Distributing interest categories within a hierarchical classification
Methods and systems for distributing interest categories within a hierarchical classification, wherein a parent interest category is identified and the hierarchical classification is filtered. A sub-interest category is extracted, based on the filtering, and a weighting associated with the sub-interest category is transferred into the parent interest category. The weighting is distributed in the hierarchical classification.
Data collection for usage based insurance
Large amounts of data resulting from periodic sampling and capture of data corresponding to variable operational parameters of one or more systems, such as a plurality of vehicles, and stored in a large number of rows of data corresponding to the number of captured samples are summarized in an analytically meaningful way by simply counting the instances of particular values of the operational parameters of interest in the form of a histogram and stored as a single row of data. The reduction in number of rows of data allows acceleration of processing of later queries by a factor of one thousand (assuming an average trip length of ten minutes) or more.
Search system and method using search library
Provided is a search system and method for performing a search during execution of an application in a mobile terminal. The search method may include executing an application, without terminating the application, by including a search window on a part of an execution screen of the application. The system and method also include incorporating a library into an application.
System and method of forwarding end user correlated user and control plane or network states to OSS system
A system is described for collecting data records which have been correlated to subscriber, or end user, access network, core network, transport network, and application service information, referred to as end user correlated data records and utilizing those records in a wireless or wireline network to identify and address correctable conditions in a network, such as a wireless or wireline network. The system includes at least one probe in the network which is able to monitor network activity and provide detailed data records on that activity. These data records are sent to a mediation device that correlates those data records with subscriber and/or location data, to create the end user correlated data records. An intelligent application services device takes the end user correlated data records and examines the records to determine if there are any correctable conditions in the network or the end user devices.
Compile time opcodes for efficient runtime interpretation of variables for database queries and DML statements
A method system and program for performing a query in which context and information including opcodes accompanies an execution plan for the query. The opcodes determine operations to retrieve a set of bind variables. The execution plan and context information shared by a plurality of application programs.
Devices for providing distributable middleware data proxy between application servers and database servers
The present invention discloses devices including a transparent client-connection manager for exchanging client data between application servers and the device: a request analyzer for analyzing query requests from at least one application server; a data-retrieval/command-execution module for executing query requests; a database connection manager for exchanging database data between at least one database server and the device; a cache-memory pool for storing data items from at least one database server; a cache-policy module for determining cache criteria for storing the data items In the cache-memory pool; and a data-consistency invalidation module for determining invalidated data items based on invalidation criteria for removing from the cache-memory pool. The cache-memory pool is configured to utilize memory modules residing in data proxy devices and distributed cache management utility, enabling the memory capacity to be used as a cluster to balance workloads.
Information management method and information management apparatus
An information management method to be executed by a computer, the information management method includes; accepting a registration request that includes identification information of a mobile device, and position information of the mobile device that includes latitude and longitude; generating a value that includes the identification information followed by information that indicates a date and time when the registration request is accepted; storing the position information in a first storage unit in a manner correlated with the value; generating another value that includes the information that indicates the date and time followed by the identification information; storing the position information in a second storage unit in a manner correlated with the other value; storing the position information in a third storage unit in a manner correlated with the identification information; and storing the identification information in a fourth storage unit in a manner correlated with the position information.
Rapid iterative development of classifiers
A classifier development process seamlessly and intelligently integrates different forms of human feedback on instances and features into the data preparation, learning and evaluation stages. A query utility based active learning approach is applicable to different types of editorial feedback. A bi-clustering based technique may be used to further speed up the active learning process.
System and method for searching for documents
A computer system is disclosed. The computer system includes one or more processors, and a memory storage storing one or more instructions for implementing a search tool. The instructions, when executed, instruct the computer system to perform a set of steps. The steps include receiving a search query from a user computer, the search query including one or more search terms to use to perform a first search. The steps further include, based on the one or more search terms, performing the first search, and providing for display at the user computer a list of one or more law-related documents responsive to the search query, a list of one or more recommended sources in which to perform a second search for documents, and a list of legal topics associated with the responsive documents.
Method for determining optimal connectable route to target person based on mutual intimacy index
Disclosed is a method for determining an optical connectable route to a target person based on a mutual intimacy index in that, when a specific member searches a route capable of connecting with a desiring target person though his acquaintance stored in his address book, it can determine an optical connectable route having a high mutual intimacy index between brokers as few broker as possible, by using the intimacy information of acquaintance lists stored in the address books of each member.
Two stage search
A two stage model identifies individuals having knowledge in a subject matter area relevant to a query. A relevance model receives a query and identifies documents, or other information, relevant to the query. A co-occurrence model identifies individuals, in the retrieved documents, related to the subject matter of the query. Individuals identified can be scored by combining scores from the relevance model and the co-occurrence model and output in a rank ordered list.
Storage tape analytics user interface
A method of accessing tape storage analytics data gathered from tape libraries. The method includes generating a user interface on a client device via a web browser. The user interface includes a first screen displaying graphics or an analysis table generated based on the tape storage analytics data. The method includes receiving user input selecting a portion of the displayed graphics or an item within a cell of the analysis table and, then, modifying the user interface to display a second screen, which presents a subset of the tape storage analytics data corresponding to the selected portion and to operation of at least one of one or more tape libraries, one or more tape drives, and one or more tape media within the tape libraries. The receiving and modifying steps may be repeated to navigate between data corresponding to a tape library, a tape drive, and media.
Adaptive software component techniques
Techniques are presented for dynamically adapting software components. An enhancement for a component is dynamically detected and installed. The enhancement is dynamically processed for requests directed to the component or for responses generated by the component.
Apparatus and method for storing and reading a file having a media data container and a metadata container
A concept is disclosed for outputting a file having a media data container and a metadata container, the concept including providing an error information related to a data sample and storing the error information together with a sample number related to the data sample in the metadata container.
Method and system for resolving data inconsistency
Method, system, and programs for resolving data inconsistency in a distributed system having a plurality of replica instances. In response to a read request of at least one data element, a key-specific probability value for the at least one data element of the read request is retrieved. Based on the retrieved key-specific probability value and a system load of the distributed system, a self-healing probability of the at least one data element of the read request is computed. A self-healing transaction that includes the at least one data element of the read request is then generated based on the self-healing probability of the at least one data element. The generated self-healing transaction is further applied to at least some of the plurality of replica instances in the distributed system to resolve data inconsistency.
Heat indices for file systems and block storage
Techniques and mechanisms are provided to allow for selective optimization, including deduplication and/or compression, of portions of files and data blocks. Data access is monitored to generate a heat index for identifying sections of files and volumes that are frequently and infrequently accessed. These frequently used portions may be left non-optimized to reduce or eliminate optimization I/O overhead. Infrequently accessed portions can be more aggressively optimized.
Virtual machine file level recovery
A method, article of manufacture, and apparatus for protecting data. In some embodiments, this includes determining a file to recover, looking up an index to find a file record number associated with the file, determining constituent blocks based on the file record number, reconstructing data from the constituent blocks, and storing the data in a storage device.
Systems and methods for classifying files as candidates for deduplication
A computer-implemented method may include identifying at least one file and detecting an event that is suggestive of at least a portion of the file being duplicated in at least one additional file. The computer-implemented method may also include classifying the file as a candidate for deduplication in response to detecting the event. The computer-implemented method may further include maintaining the file's candidate-for-deduplication classification for use in prompting a determination on whether the portion of the file is already stored within a storage device.
Method and apparatus for identifying and eliminating duplicate data blocks and sharing data blocks in a storage system
A method for sharing data blocks in a hierarchical file system in a storage server includes allocating a plurality of data blocks in the file system, and sharing data blocks in the file system, without using a persistent point-in-time image, to avoid duplication of data blocks. A method for identifying data blocks that can be shared includes computing a fingerprint for each of multiple data blocks to be written to a storage facility and storing the fingerprint with information identifying the data block in an entry in a set of metadata. The set of metadata is used to identify data blocks which are duplicates.
Information processor, information processing system, data archiving method, and data deletion method
An information processor may include a command receiving unit that receives an immediate processing command in which a deletion target to be deleted from the database is conditioned, and a registration processing unit that registers information defining the deletion target into a management data unit. In addition, the information processor may include a deletion processing unit that deletes the deletion target from a database, and deregisters the deleted deletion target from the management data unit. The information processor can also include a data manipulation command processing unit, which, in the case where a data manipulation command having a manipulation target that coincides with a table of the deletion target registered in the management data unit is received, processes the data manipulation command in a state where a condition to exclude the deletion target from the manipulation target is added to the data manipulation command.
Using multiple clients for data backup
Various systems and methods for using multiple clients for data backup are described. For example, one method involves accessing a namespace, where the namespace indicates locations of files. At least a portion of the namespace is divided into sets, where the sets correspond to a subset of the files. The files of the subset are accessed by plurality of nodes, and the accessing is based on the sets. Each of the nodes accesses the files of the subset. The nodes are used to store, at data storage, the files of the subset.
Determining whether predefined data controlled by a server is replicated to a client machine
A request is received for predefined data from a client machine. It is determined if the client machine is at an acceptable location to receive the predefined data. The requested predefined data is replicated to the client machine if the client machine is at an acceptable location and replication of the predefined data is prevented if the client machine is at an unacceptable location.
Unified local storage supporting file and cloud object access
A method and system for providing unified local storage support for file and cloud access is disclosed. The method comprises writing a chunk on a storage server, and replicating the chunk to other selected storage servers when necessary. The method and system further comprise writing a version manifest on the storage server; replicating the version manifest to other selected storage servers when necessary. Object puts or appends are implemented by first chunking the object, determining if the chunks are new, transferring the chunks if required, followed by creation of a new version manifest referencing the chunks. Finally, the method and system include providing concurrent file-oriented read and write access consistent with the stored version manifests and chunks.
Determining user key-value storage needs from example queries
Technologies are generally provided for conveying tree and index needs of a database by collecting and forwarding a statistically representative set of data requests so that a new datacenter can use its existing auto-learning and adjustment techniques to create local indices before receiving its first real or live requests. In some examples, requests at an origin datacenter may be collected to provide a small population of queries that are representative of a larger population of queries. Filters and/or anonymizers may be employed to adhere to data sharing rules and restrictions while still allowing a new datacenter to build indices and test performance. Thus, the new datacenter may be trained asynchronously from another site and without actual data changing hands. Training and testing of destination database services may be completed before committing to customer migration.
Configuration information management apparatus and dictionary generation method of configuration information management apparatus
A data management unit stores therein configuration items including attribute items described according to different schemas. A dictionary candidate retrieval unit specifies a combination of a pair of attribute items, which defines a correspondence relation between the attribute items of the different schemas, as a dictionary definition item, and retrieves, as a dictionary candidate, a combination of the attribute names corresponding to the same attribute value in the attribute items, which are described according to the schemas, of the dictionary definition item from the data management unit. A dictionary generation unit generates dictionary information defining synonymity between the attribute names of the different attribute items described according to the different schemas based on the dictionary candidate retrieved by the dictionary candidate retrieval unit. A dictionary management unit stores therein the dictionary information generated by the dictionary generation unit.
Automating asynchronous programming in single threaded systems
Various technologies and techniques are disclosed for automating asynchronous programming in single threaded systems. A wrapper is automatically generated around an original function. When metadata indicates the wrapper should be utilized for asynchronous data retrieval, the wrapper calls a data retrieving function asynchronously. Asynchronous retrieval of data is initiated from the data retrieving function using a direct callback. A specially marked exception is thrown to cause control to leave and get caught by a special exception in the wrapper. When the direct callback function is called because the data has been retrieved, the data is saved. The wrapper is called again in a synchronous fashion, which causes the wrapper, original function, and data retrieving function to be called again. When the data retrieving function is called again, data that was saved by the direct callback function is retrieved, and then returned to the calling function through the callback function.
Overloaded communication session
A method of providing information responsive to a request from a wireless communication device involves receiving an information request from a mobile device and generating responsive information for the information request, transmitting a first portion of the responsive information to the mobile device in a first communication session, and transmitting a second portion of the responsive information to the mobile device in a second, overloaded communication session.
Synchronization for initialization of a remote mirror storage facility
In a local storage system having a local volume with a plurality of local regions, respective local signatures are computed over the local regions. In a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote signatures are computed over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature. The data in the given remote region is then replaced with data from the corresponding local region.
Inconsistency robustness in scalable OLAP cubes
A method (and system) includes providing a memory including a plurality of named locations each holding a value and introducing at least one freshener. The at least one freshener chooses one of the plurality of named locations and re-computes its value.
Predicting a user behavior number of a word
The present disclosure introduces a method, an apparatus and memory of predicting a user behavior number of a word for reducing the amount and the complexity of operation, saving the consumption of the equipment, and improving the accuracy and reliability of predictions. In an embodiment, a historical data sequence of the user behavior number of a word is converted from a time domain to a frequency domain. Based on the converted frequency domain, each estimated cycle and its effect rate value of the historical data sequence are ascertained. If the historical data sequence is stable, an average value of user behavior numbers of some historical data points before a prediction point is calculated as a user behavior number of the prediction point. Otherwise, the user behavior number is calculated based on a selected main cycle and a selected singularity.
Prediction method of predicting a future state of a system
A method of predicting at least one future state of a system is provided. The method comprises embedding, using a phase space embedding module, time series data relating to the system within a reconstructed phase space. The phase space embedding module comprises instructions stored on a non-transitory computer-readable medium that are executable by a processor. The method further comprises predicting, using a prediction module, the at least one future state of the system based on a rate of separation of trajectories of the embedded data within the reconstructed phase space. The prediction module comprises instructions stored on the non-transitory computer-readable medium that are executable by the processor.
System, method, and computer program product for updating an algorithm
A system, method, and computer program product are provided for updating an algorithm. In use, feedback data associated with an identification of an object is received. Additionally, one or more algorithms are updated, based on the feedback data. Further, the updated algorithms are distributed.
Benchmarking progressive systems for solving combinatorial problems
A system is provided for benchmarking a progressive combinatorial solver. The system may initialize a parametric model collector, and perform a plurality of parametric trials associated with respective numbers of sub-part iterations of the progressive combinatorial solver. For each of the plurality of parametric trials, the system may initialize a statistical data collector. The system may perform a plurality of randomized executions of the progressive combinatorial solver, and add data including metric values for respective solutions of the executions to the statistical data collector. The system may then determine statistical parameter(s) of data in the statistical data collector, and add data including an indication of the respective number of sub-part iterations, a cost of finding the metric values for the respective solutions, and the statistical parameters of the trial to the parametric data collector. And the system may determine a best-fit model from data in the parametric data collector.
Methods and systems for constructing Bayesian belief networks
Methods and systems are described for simplifying a causal influence model that describes influence of parent nodes Xi (i=1, . . . , n) on possible states of the child node Y. The child node Y and each one of the parent nodes Xi (i=1, . . . , n) are assumed to be either a discrete Boolean node having states true and false, a discrete Ordinal node having a plurality of ordered states; and a Categorical node having a plurality of unordered states. The influence of each parent node Xi on the child node Y is assumed to be a promoting influence and an inhibiting influence. User interfaces are described that incorporate these specific node types.
Automatic classification of segmented portions of web pages
Exemplary methods and apparatuses are provided which may be used for classifying and indexing segmented portions of web pages and providing related information for use in information extraction and/or information retrieval systems.
Identification and association of refrigerated containers with dispatch orders
A database sends identification and dispatch orders to a ship or rail transport that powers a shipping container during the ship or rail segment of the container's journey. The database also sends identification and dispatch orders to gensets that power shipping containers on a motor vehicle transport during a vehicular segment of the container's journey. The database associates the identification and dispatch orders along with the container as the container moves from connection with a genset on a vehicular transport to a ship or rail transport, and associates the identification and dispatch orders along with the container as the container moves to connection with a genset on a vehicular transport from a ship or rail transport.
Structured objects and actions on a social networking system
A social networking system includes a mechanism for integrating user actions on objects outside of the social networking system in the social graph. External system operators include widgets that, when executed by user devices, record user interactions that correspond to a defined structure of actions and objects. Third party operators utilize a tool provided by the social networking system to define the structure of actions and objects. External actions are recorded by the social networking system for publishing to the social graph.
Medical data encryption for communication over a vulnerable system
A system for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a demographics layer and a data layer, separately encrypting the demographic layer and data layer using different encryption keys, and providing servers in a communication and processing system with a decryption key for the layer processed by such server. Medical file data may be separated into more than two layers. Users accessing the system are authenticated using standard techniques. By separately encrypting different parts of a patient medical record, processing and communication of patient medical files by intermediary servers is enabled without risking disclosure of sensitive patient information if such servers are compromised.
Methods and systems for upgrade and synchronization of securely installed applications on a computing device
Embodiments of the present disclosure provide for upgrades and synchronization of applications installed on a device, such as a mobile device. In one embodiment, a device may include applications purchased and downloaded via a content management system. The device maintains a list or database of applications that are authorized for each device. This list is also replicated in a remote cache that is maintained by an archive host. The device may then synchronize and upgrade these applications across multiple platforms, such as one or more computers that can be coupled to the device or the archive host. The archive host allows for files of the application be provided back to the device. Upon installation, the device can then confirm the authorization and identity of the newly installed application.
System and method for preventing identity theft or misuse by restricting access
A system and method for network file filtering to prevent identity theft or misuse by restricting access to files likely to contain sensitive data is disclosed. The file filtering process includes scanning at least one data file for density of a selected pattern. Files identified as containing the selected pattern may be further analyzed to determine the likelihood of the presence of sensitive information. The process may also include restricting access to files that are identified as likely to contain sensitive information.
Value exchange system for use within an internet-based social network
Certain embodiments contemplate a computer-implemented method of enabling a value exchange between users of a SNS which functions within the confines of the SNS. Certain embodiments comprise an application which creates at least an interface to the value exchange system, a means for registration to enable users to register with the value exchange system, a means for receiving at the value exchange system, a value exchange transaction between a first user and a second user, wherein the users are members of a same internet-based social network and the value exchange system makes use of the internet-based social network account identifiers of the respective users to enable the communication of value exchange transactions between the users. The application may also create a value exchange means for debiting from or crediting to the value exchange system account of first and second users.
Projection shopping with a mobile device
A method for making purchases with a mobile device at a physical location is described. A service provider receives information about an item available for purchase, and this information is projected on a surface. A user in the vicinity of the surface views the projected information and provides input through the user's mobile device. The projected information changes based on the input. The user selects an item for purchase and pays for the selected item through the mobile device.
Electronic commerce integration
An information system environment is described that, among other things, facilitates integration of electronic commerce and physical store front retailer selling channels. In some realizations, the system includes a shopper accessible kiosk co-located with a physical store front retailer and an electronic commerce information service accessible from locations external to the physical store front retailer. Both access inventory information supplied from a suitable information service. The shopper accessible kiosk allows a user thereof to access inventory information particular to the physical store front retailer, while the electronic commerce information service allows a user thereof to order items from out of stock of the physical store front retailer.
Device customization during order fulfillment utilizing an embedded electronic tag
A method for customizing a device during order fulfillment is described. A radio frequency identification (RFID) tag of an electronic device is wirelessly loaded with customization information at an order fulfillment center without disturbing packaging surrounding the electronic device or without powering up the electronic device.
A system and architecture for enhancing search results generated by an Internet search engine, so that those search results include enhanced buyer-oriented information, is disclosed. According to one aspect, a list of search results generated by an Internet search engine comprises one or more search results that are associated with one or more URLs in a set of URLs. For each such URL, seller-specific information, which may be based on and/or comprise ratings that are associated with registered selling entities that are associated with that URL, is presented in association with that URL's corresponding search result in the list of search results. A user who submitted query terms, based upon which the list of search results was generated, can use the presented rating information to determine which of the search results to investigate further.
Tracking transactions by using addresses in a communications network
Communications between participants over a communications link are proxied by an intermediary, such as an Integrated Order Mechanism (IOM). Participants interact with each other through the IOM. The IOM may be transparent to the participants such that they are not aware that the IOM is involved in processing communications. For example, in the context of a transaction by a customer making a purchase from a merchant over the Internet, the IOM facilitates the processing of transactions by processing requests from both the customer and the merchant. Neither the customer nor the merchant may be aware that the transactions are being handled by the IOM. Transactions may be tracked using addresses in a communications network. Address identifiers may be used to reduce the size of the addresses.
Online video game advertising system and method supporting multiplayer ads
In a video game session supporting a set of gamers participating in the game from a variety of different locations, an opportunity to provide an advertisement is presented. The content of the advertisement is chosen based upon specific criteria such as data relating to one of the gamers, for example, the location of the gamer. The chosen content of the advertisement is provided within an advertising spot of the video game.
Exchanging identifiers between wireless communication to determine further information to be exchanged or further services to be provided
A server exchanges information between one or more wireless devices to complete a transaction. The server receives second device identifier information from a first wireless device using a wide area network. The second device identifier information was previously provided to the first wireless device using short range wireless communication. The server then uses the second device identifier information to determine additional information concerning an entity or object located in proximity to the second device, and then the server delivers information to the first wireless device based at least in part upon both (a) the second device identifier and (b) a current step in a multiple step process for an ongoing electronic commerce transaction.
Monetizing service calls through advertising
A platform service that is used by an application may be linked to an advertising service. A cost of using the platform service may be reduced based on the linking.
Techniques for advertising in electronic commerce
Disclosed is a system for performing online data queries and purchasing advertisements associated with business listings. The system for performing online data queries is a distributed computer system with a plurality of server nodes each fully redundant and capable of processing a user query request. Each server node includes a data query cache and other caches that may be used in performing data queries. The data query, as well as request allocation, is performed in accordance with an adaptive partitioning technique with a bias towards an initial partitioning scheme. Generic objects are created and used to represent business listings upon which the user may perform queries. Various data processing and integration techniques are included which enhance data queries. An update technique is used for synchronizing data updates as needed in updating the plurality of server nodes. A multi-media data transfer technique is used to transfer non-text or multi-media data between various components of the online query tool. Optimizations for searching, such as the common term optimization, are included for those commonly performed data queries. Also disclosed is a system for targeting advertisements that are displayed to a user of the system. Advertisements may also be purchased using this system. Advertisements are linked to the business listings that may result from a user query for particular types of businesses or listings.
Optimized bill of work for aircraft maintenance based on task prioritization and time slot proximity analysis
A system and method for aircraft maintenance planning according to which an optimized bill of work is generated for a line maintenance station at which one or more airplanes are parked or are expected to be parked.
Insurance coverage management system
A coverage management system is described herein that enables an insurance agent and an insured party to engage in a streamlined insurance procurement process. The coverage management system facilitates generation of interactive insurance-related documents, provides mechanisms to interact with the documents, and optimizes agent-insured interaction via the insurance-related documents.
Remote controlled robot system that provides medical images
A remote controlled robot system that includes a mobile robot and a remote control station. The mobile robot is controlled by the remote control station and includes a robot monitor, and a robot camera that captures a robot image. The system also includes a medical image device that can be coupled to the robot. The remote control station includes a camera that captures a remote station image, and a monitor that displays the robot image captured by the robot camera in a robot view field, displays the remote station image in a station view field. The robot transmits the robot and medical images to the remote control station such that a larger portion of a network bandwidth is allocated for the medical image than the robot image.
A content processing service may analyze an item of original content and identify several objects, attributes of those objects, and relationships between those objects present in the item of original content. The content processing service may also analyze a source graph, such as a social graph or supplemental graph, and identify several objects, attributes of those objects, and relationships between objects present in the source graph. The content processing service may customize the item of original content by selecting an original object and selecting a source graph object. One or more of the attributes or relationships of the selected original object in the item of original content may be replaced by one or more of the attributes or relationships of the selected source graph object. To customize items of audio content, audio content associated with the source graph object may replace audio content associated with the target graph object.
Voice interface to NFC applications
Technologies for transferring Near Field Communications information on a computing device include storing information corresponding to services in a database on the computing device, receiving a voice input corresponding to a name of a requested service, and retrieving the information corresponding to the requested service from the database. Such technologies may also include loading the retrieved information corresponding to the requested service into a Near Field Communications tag emulated by the computing device and transferring the retrieved information to a portable computing device in response to the Near Field Communications tag being touched by a Near Field Communications reader of the portable computing device. The information corresponding to the requested service stored in the database, retrieved from the database, loaded into the Near Field Communications tag, and/or transferred to the portable computing device may include a Universal Resource Identifier and content-specific keywords corresponding to the requested service.
System for tuning synthesized speech
An embodiment of the invention is a software tool used to convert text, speech synthesis markup language (SSML), and/or extended SSML to synthesized audio. Provisions are provided to create, view, play, and edit the synthesized speech, including editing pitch and duration targets, speaking type, paralinguistic events, and prosody. Prosody can be provided by way of a sample recording. Users can interact with the software tool by way of a graphical user interface (GUI). The software tool can produce synthesized audio file output in many file formats.
Speech recognition apparatus and method
A speech recognition apparatus is provided. The speech recognition apparatus includes a primary speech recognition unit configured to perform speech recognition on input speech and thus to generate word lattice information, a word string generation unit configured to generate one or more word strings based on the word lattice information, a language model score calculation unit configured to calculate bidirectional language model scores of the generated word strings selectively using forward and backward language models for each of words in each of the generated word strings, and a sentence output unit configured to output one or more of the generated word strings with high scores as results of the speech recognition of the input speech based on the calculated bidirectional language model scores.
Method and apparatus for speech recognition
A computer-implemented method, apparatus and computer program product. The computer-implemented method performed by a computerized device, comprising: transforming a hidden Markov model to qubits; transforming data into groups of qubits, the data being determined upon the hidden Markov model and features extracted from an audio signal, the data representing a likelihood observation matrix representing likelihood of phoneme and state combinations in an audio signal; applying a quantum search algorithm for finding a maximal value of the qubits; and transforming the maximal value of the qubits into a number, the number representing an entry in a delta array used in speech recognition.
System and method of providing machine translation from a source language to a target language
A machine translation method, system for using the method, and computer readable media are disclosed. The method includes the steps of receiving a source language sentence, selecting a set of target language n-grams using a lexical classifier and based on the source language sentence. When selecting the set of target language n-grams, in at least one n-gram, n is greater than 1. The method continues by combining the selected set of target language n-grams as a finite state acceptor (FSA), weighting the FSA with data from the lexical classifier, and generating an n-best list of target sentences from the FSA. As an alternate to using the FSA, N strings may be generated from the n-grams and ranked using a language model. The N strings may be represented by an FSA for efficiency but it is not necessary.
Method and system for segmenting phonemes from voice signals
A method and a system for segmenting phonemes from voice signals. A method for accurately segmenting phonemes, in which a histogram showing a peak distribution corresponding to an order is formed by using a high order concept, and a boundary indicating a starting point and an ending point of each phoneme is determined by calculating a peak statistic based on the histogram. The phoneme segmentation method can remarkably reduce an amount of calculation, and has an advantage of being applied to sound signal systems which perform sound coding, sound recognition, sound synthesizing, sound reinforcement, etc.
Method and system for assisting input of text information from voice data
A method may include converting voice data into text data and tagging at least one portion of the text data with at least one tag, the at least one tag indicating that the at least one portion of the text data includes a particular type of data. The method may also include displaying the text data on a display such that the at least one portion of text data is displayed with at least one associated graphical element indicating that the at least one portion of text data is associated with the at least one tag. The at least one portion of text data may be a selectable item on the display allowing a user interfacing with the display to select the at least one portion of text data in order to apply the at least one portion of text data to an application.
Apparatus and method for isolating multi-channel sound source
In an apparatus and method for isolating a multi-channel sound source, the probability of speaker presence calculated when noise of a sound source signal separated by GSS is estimated is used to calculate a gain. Thus, it is not necessary to additionally calculate the probability of speaker presence when calculating the gain, the speaker's voice signal can be easily and quickly separated from peripheral noise and reverb and distortion are minimized. As such, if several interference sound sources, each of which has directivity, and speakers are simultaneously present in a room with high reverb, a plurality of sound sources generated from several microphones can be separated from one another with low sound quality distortion, and the reverb can also be removed.
System enhancement of speech signals
A system enhances speech by detecting a speaker's utterance through a first microphone positioned a first distance from a source of interference. A second microphone may detect the speaker's utterance at a different position. A monitoring device may estimate the power level of a first microphone signal. A synthesizer may synthesize part of the first microphone signal by processing the second microphone signal. The synthesis may occur when power level is below a predetermined level.
Encoder, decoder and methods thereof
An encoder whereby the bit efficiency of encoding can be improved, thereby improving the qualities of signals as decoded. In the encoder: a time-frequency converting unit (101) converts signals, which are to be encoded, to frequency domain signals; an adaptive spectrum formation encoding unit (102) determines an effective range in the frequency band of the frequency domain signals; and a pulse vector encoding unit (103) pulse vector encodes only the signal components within the effective range.
Parallel simulation using an ordered priority of event regions
In one embodiment, a plurality of kernels are provided. Each kernel may simulate a partition of a design under test. A plurality of event regions are provided. The regions may be in an ordered priority. Events for the device under test may be determined for event regions in each of the kernels. An event region to execute events in is then determined and all kernels may execute events in the same event region. Kernels then execute events for the determined event region. When finished executing events in an event queue, data synchronization may occur. In this case, information may be synced among kernels, such as status and state values for shared objected are synchronized.
Table-lookup-based models for yield analysis acceleration
In one embodiment, the invention is a method and apparatus for table-lookup-based models for yield analysis acceleration. One embodiment of a method for statistically evaluating a design of an integrated circuit includes simulating the integrated circuit and generating a lookup table for use in the simulating, the lookup table comprising one or more blocks that specify a device element for an associated bias voltage, wherein the generating comprises generating only those of the one or more blocks that specify the device element for a bias voltage that is required during the simulating.
Method for identifying the maximal packing density of shifting-tiles automated warehouses
A warehouse management system including a layout module which determines a layout of the automated warehouse, the layout including at least one occupied cell and at least one blank cell and an analysis module which analyzes the layout of the automated warehouse to determine a minimum number of blank cells required to retrieve an object from all of the occupied cells in the warehouse.
Method and apparatus for selecting a tracking method to use in image guided treatment
A treatment delivery system or a simulation system simulates treatment of a patient, including testing the ability of one or more tracking methods to track a target position during the simulation. The system then presents simulation results to a user, the simulation results indicating whether any of the one or more tracking methods will successfully track the target position during treatment delivery.
Clinician programmer system and method for generating interface models and displays of volumes of activation
A system and method for displaying a volume of activation (VOA) may include a processor that displays via a display device a model of a portion of a patient anatomy that includes anatomical structures, displays via the display device and overlying the display of the model a VOA associated by the processor with a set of anatomical stimulation parameter settings, the display of the VOA, and graphically identifies interactions between the displayed VOA and a first subset of the anatomical structures associated with one or more stimulation benefits and a second subset of the anatomical structures associated with one or more stimulation side effects, where the graphical identifications differ depending on whether the interaction is with the first subset or the second subset.
Software application for ranking language translations and methods of use thereof
The software application is used to rank language translations and a method to implement those ranked language translations. The language translations are for textual or vocal phrases that a user wants to convert from its original language to a preferred language. The software application will refer to a variety of translation sources in order to create a set of applicable translations for a textual or vocal phrase. The software application will then rank each applicable translation with an accuracy score, which is weighed by three factors: the commonalities between the set of translation sources, a user input process, and a linguistic mapping process. Some methods to implement the ranked language translations include using accelerometer data from a electronic communication device to operate the software application, integrating a moderator into a conversation process, using subtitles in speech bubbles for a video chat, and using location data to communicate with different contacts.
Computer simulation of electromagnetic fields
A method and system is provided for solving for electromagnetic fields by approximating an electromagnetic function as a sum of basis functions multiplied by coefficients to be determined. The set of equations used to determine the coefficients results from taking derivatives of the action integral with respect to the coefficients (and/or other parameters) and setting the derivative equal to zero, thereby extremizing the action integral.
Patient selectable joint arthroplasty devices and surgical tools
Disclosed herein are methods, compositions and tools for repairing articular surfaces repair materials and for repairing an articular surface. The articular surface repairs are customizable or highly selectable by patient and geared toward providing optimal fit and function. The surgical tools are designed to be customizable or highly selectable by patient to increase the speed, accuracy and simplicity of performing total or partial arthroplasty.
System and method for generating three dimensional functional space reservation systems of a vehicle using delta storage
A system and method for generating three dimensional functional space reservation systems of a vehicle from a conceptual space reservation is disclosed. In one embodiment, in a method for generating three dimensional functional space reservation systems, functional, connectivity and geometrical information associated with two conceptual space reservation versions of the vehicle is collected from design databases. The two conceptual space reservation versions include current and previous conceptual space reservation versions. Then, mathematical models are created in organized binary form. Delta information detected from the two conceptual space reservation versions of the vehicle is outputted. Further, a set of rules and checks is applied in the mathematical model of the current conceptual space reservation version and standardized entities information is outputted. A set of functional attributes is also applied to standardized entities and the three dimensional functional space reservation systems including new part numbers for the design entities are generated.
Geometric singularity detection
A system and method for geometric singularity is presented. In one aspect, the system and method are employed for detecting and quantifying envelope singularities of one or more solid shapes in relative movement. In an implementation, a solid shape having a motion is defined. A set of points in a space in which the motion of the solid shape occurs are sampled. For each point in the set of points, the following values are determined: an inverted motion of the motion; one or more inverted trajectories that correspond to points of the space associated with the inverted motion; one or more intersections between the inverted trajectories and a boundary defined by the motion of the solid shape; and one or more tangencies between the inverted trajectories and the boundary. Each point in the set of points is then classified as a function of values of the intersections and tangencies, each classification being one of a set of classifications including an interior fold point, a fold boundary point, a regular point, a sweep boundary point, or a point exterior to the set swept by the solid shape during the motion.
Method and system for noise simulation analysis useable with systems including time-of-flight depth systems
An analytical tool useable with complex systems receives as input various system parameters to predict whether sufficiently accurate quality depth data will be provided by the TOF system. Depth data quality estimates involve dividing system operation into smaller operations whose individual depth data quality contributions can be more readily computed. The effect of the individual operations is combined and the tool outputs a depth data quality estimate accounting for the net result of the various unique operations performed by the system. When used with a TOF system, input parameters may include magnitude and angular distribution of TOF emitted optical energy, desired signal/noise, sensor characteristics, TOF imaging optics, target object distances and locations, and magnitude of ambient light. Analytical tool output data can ensure adequate calculation accuracy to optimize the TOF system pre-mass production, even for TOF systems whose sequence of operations and sensor operations are flexibly programmable.
Method and system for semiconductor process control and monitoring by using a data quality metric
During fault detection of a production process, the influence of the data communication process for communicating measurement readings to the fault detection system may be taken into consideration. In one illustrative embodiment, a data rate related parameter may be used as an input variable for a data reduction procedure, thereby enabling an efficient assessment of the quality of the remaining “real” process and tool parameters.
System and method for monitoring and managing three-phase power flows in electrical transmission and distribution networks
A system and method for monitoring and managing three-phase power flows in electrical transmission and distribution networks through the use of a deterministic, non-iterative method using an holomorphic embedding and algebraic approximants for determining the power flows in the three phases of a power generating system having an electrical grid. Such method is capable of determining whether or not a physical solution to the load flow problem exists, or if the system is in a state of voltage collapse. It may be employed in either real-time or off-line analytic applications for balanced or unbalanced electric power systems, in particular for monitoring and analyzing unbalanced conditions in three-phase electrical networks and for the accurate calculation of short-circuit conditions.
Intermodulation scanning force spectroscopy
We have invented a method of sensing a surface by driving a resonator with two or more frequencies and exploiting the nonlinear phenomenon of intermodulation. When a resonator (for example an oscillating cantilever) with a sharp tip is brought close to a surface, the non-linear tip-surface interaction generates intermodulation response of the resonator. The measured frequency spectrum of intermodulation response contains much information about the material composition of the surface. When the resonator is scanned over the surface, the intermodulation spectrum can be used to make an image of the surface with enhanced contrast for different materials on the surface, or it can be used to extract the tip-surface interaction at every point on the surface.
Tracking user physical activity with multiple devices
Methods, devices, and computer programs are presented for creating a unified data stream from multiple data streams acquired from multiple devices. One method includes an operation for receiving activity data streams from the devices, each activity data stream being associated with physical activity data of a user. Further, the method includes an operation for assembling the unified activity data stream for a period of time. The unified activity data stream includes data segments from the data streams of at least two devices, and the data segments are organized time-wise over the period of time.
Method and apparatus for sensor based pedestrian motion detection in hand-held devices
A method and apparatus are described for sensor based detection of pedestrian motion. Based on a 3-axis accelerometer, the apparatus may differentiate between walking, running, standing still, or any random movement that the user may perform. The method may comprise the steps of performing a time domain analysis and a frequency domain analysis. The time domain analysis may be based on a Teager-Kaiser Energy Operator. The frequency domain analysis may be based on a fast Fourier transform. A apparatus for detecting pedestrian motion may comprises an accelerometer, an operator, a Teager-Kaiser Energy Operator, a first peak detection, a second peak detection, a buffer, a fast Fourier transform, a memory and a look-up table. The apparatus may be a hand held device.
Calibrating reconstructed signal using multi-tone calibration signal
A method of calibrating a reconstructed signal from a plurality of sub-signals is provided. The method includes injecting a calibration signal having multiple tones into a received input signal; dividing the input signal into a first and second sub-signal, including an overlapping frequency band; performing a first frequency translation by converting frequency components of the second sub-signal; digitizing the first sub-signal and the frequency converted second sub-signal; performing a second frequency translation to reverse the first frequency translation to obtain a reconstructed second sub-signal; and quantifying impairments to the digital first sub-signal and reconstructed second sub-signal caused by differences in magnitude and phase of frequency components within the overlapping frequency band.
Method for self-calibrating an accelerometer mounted on a wheel of a vehicle while said vehicle is moving
A method for self-calibrating, while a vehicle is moving, an accelerometer mounted on a wheel of the vehicle so that its plane of maximum sensitivity is secant with the axis of rotation of the wheel. The average value and on the other hand the amplitude of the signal representative of the acceleration Acc-read delivered by the accelerometer are calculated first, for an established speed of the vehicle, based on measurements performed by the accelerometer during a time window corresponding to the time needed for the wheel to complete n rotations, with n>1, then the values of the gain C1 and of the offset C2 of the accelerometer are determined by resolving the system of two equations with two unknown values: ω2R=C1×(average value of Acc-read)+C2 2 g=C1×(amplitude of Acc-read) with: ω the speed of rotation of the wheel, R the radius of the wheel.
Method for measuring net charge density of membrane and apparatus thereof
The present invention provides a method for measuring net charge density of membrane and apparatus thereof. The method measures the net charge density of a membrane by utilizing the relation between the mechanical pressure difference applied across the membrane and the generated streaming potential or the relation between the applied electric field and the generated electroosmotic flow. The present invention also provides a method and an apparatus for measuring the resistance of a membrane.
Method for parameters extraction of solar cells
The present invention discloses a method for extracting of solar cell parameters. After illuminating the solar cell by different simulated solar luminosity with different illumination intensity, measured current and measured voltages of the solar cell are acquired and the series resistance of the solar cell is extracted based on the measured current and measured voltages. The root mean square error (RMSE) is used to determine the series resistance of the solar cell. Therefore, the parameters of the solar cell are extracted without presuming current-voltage functional form.
In-situ battery diagnosis method using electrochemical impedance spectroscopy
A method of estimating the internal state of a first electrochemical system for power storage is disclosed. The SoC and the electrochemical impedance are determined for different internal states of a second electrochemical system of a same type as the first electrochemical system being studied. An electrochemical impedance model is then defined as a function of the SoC and of parameters. The electrochemical impedance Z of the system studied is determined and its SoC is estimated using the model applied to electrochemical impedance Z.
System and method for providing certifiable electromagnetic pulse and RFI protection through mass-produced shielded containers and rooms
Disclosed are a system and method for providing certifiable shielded cabinets and rooms, or pods, to protect devices, equipment and people from electromagnetic interference such as electromagnetic pulse, and directed energy attack. The method simulates the separate electric and magnetic shield requirements and capabilities of each type of materials, simulating them separately and together to form a combined set of materials layered for an enhanced electromagnetic shield that is lighter weight and less expensive. Further disclosed is a system and method for SCADA, RFID, and OID monitoring and controls to enable initial and ongoing testing and control.
Methods for measuring leakage rate and inferring production rate of an oilfield downhole pump
Methods for measuring the leakage rate of a downhole pump using either measured axial load information from the drive rod string or using measured production data. The invention is for methods of applying the leakage rate to a downhole dynamometer card, for a reciprocating rod pump, for determining well production.
Gas appliance and method of controling the gas appliance
The present invention provides a water heater, including a combustor, a gas pipe, a combustion controller, a pressure gauge, and a controller. The gas pipe supplies the combustor gas. The combustion controller controls combustion of the combustor. The pressure gauge detects a gas pressure in the gas pipe and generates an electrical signal in association with the gas pressure. The controller is electrically connected to the gas gauge and the combustion controller to receive the electrical signal from the gas gauge and controls the combustion controller according to the electrical signal to adjust the combustion of the combustor. In addition, the present invention further provides a method of controlling the water heater.
Fuel-injection condition detector
A fuel-injection condition detector includes a first approximate portion which approximates a plurality of fuel pressure values representing the descent pressure waveform or the ascent pressure waveform into a least-squares approximate line by least-squares method; and a weighting portion which applies a weight to the fuel pressure value. The weight is set greater as a difference between the fuel pressure and the least-squares approximate line is larger. Then, the weighted values are approximated into a weighted approximate line by the least-squares method.
Method for processing a signal from a flow meter for measuring a gas flow in an internal combustion engine
A method for processing a signal from a flow meter for measuring a gas flow in an internal combustion engine includes processing the signal according to a first logic when the engine operates in a first intake mode and processing the signal according to a second logic when the engine operates in a second intake mode. The first intake mode includes the activation of a high-pressure EGR valve. The second intake mode includes the activation of a low-pressure EGR valve.
Path classification and estimation method and system for prognosticating asset life
Path classification and estimation method and system used in combination with a computer and memory for prognosticating the remaining useful life of an asset by classifying a current degradation path of a current asset as belonging to one or more of previously collected degradation paths of exemplary assets and using the resulting classifications to estimate the remaining useful life of the current asset.
Methods for automatically characterizing a plasma
A method for automatically characterizing plasma during substrate processing is provided. The method includes collecting a set of process data, which includes at least data about current and voltage. The method also includes identifying a relevancy range for the set of process data, wherein the relevancy range includes a subset of the set of process data. The method further includes determining a set of seed values. The method yet also includes employing the relevancy range and the set of seed values to perform curve-fitting, wherein the curve-fitting enables the plasma to be automatically characterized.
Polymer side chain analysis method and polymer side chain analysis device
The present disclosure relates to an apparatus and a method for analyzing side chains of a polymer. More specifically, the present disclosure relates to an apparatus and a method for analyzing the number of side chains of a polymer.
Offline analyzer system and method for multivariate characterization of properties in crude and heavy hydrocarbon oils
A method and apparatus is provided for off-line concentration determination of components liquid hydrocarbon mixtures such as crude or heavy oil. A sampling unit continuously delivers a sample volume to a fluid flow path while a temperature control module maintains the sample at a predetermined setpoint temperature. A homogenization module helps prevent sample stratification while a flow control module maintain a constant sample flow rate. A spectrometer is communicably coupled to an optical transmission cell to transmit and receive radiation. The transmission cell includes collection optics to capture and aggregate non-collimated radiation emerging from the cell, for transmission to the spectrometer. The spectrometer measures sample spectra at a predetermined rate of flow of the sample volume through the transmission cell. A processor is configured to capture and use the spectra in combination with a model of spectra for the hydrocarbon mixture.
Molecular flux rates through critical pathways measured by stable isotope labeling in vivo, as biomarkers of drug action and disease activity
The methods described herein enable the evaluation of compounds on subjects to assess their therapeutic efficacy or toxic effects. The target of analysis is the underlying biochemical process or processes (i.e., metabolic process) thought to be involved in disease pathogenesis. Molecular flux rates within the one or more biochemical processes serve as biomarkers and are quantitated and compared with the molecular flux rates (i.e., biomarker)from control subjects (i.e., subjects not exposed to the compounds). Any change in the biomarker in the subject relative to the biomarker in the control subject provides information to evaluate therapeutic efficacy of an administered drug or a toxic effect and to develop the compound further if desired. In one aspect of the invention, stable isotope-labeled substrate molecules are administered to a subject and the label is incorporated into targeted molecules in a manner that reveals molecular flux rates through metabolic pathways of interest.
Methods of detecting and monitoring cancer using 3D analysis of centromeres
The present application relates to a method of detecting and monitoring cancer or precancer in a cell using three-dimensional analysis to assess centromere organization. In addition, the application relates to a method and system for characterizing the 3D organization of centromeres.
Computational method and apparatus for predicting polypeptide aggregation or solubility
A prediction method for predicting the effect of an amino acid modification on the rate of aggregation (solubility) of a reference polypeptide comprising: calculating the difference in hydrophobicity (ΔHydr) between the reference polypeptide and a modified polypeptide, calculating the difference in β-sheet propensity (ΔΔGcoil-α+ΔΔGβ-coil) between the reference polypeptide and modified polypeptide, calculating the difference in charge (Δ Charge) between the reference polypeptide and modified polypeptide, and calculating: [x* ΔHydr]+[y*(ΔΔGcoil-α+ΔΔGβ-coil)]−[z*Δ Charge], wherein x, y and z are scaling factors.
Methods of identifying biochemical pathways
Methods for metabolomically determining the biological affects of compounds are described.
Apparatus for determining the concentration of a conductive fluid present in a fluid filled borehole
An apparatus for determining the concentration of a conductive fluid present in a fluid filled bore hole is described. Such apparatus are known as water hold-up meters and are frequently used in oil, gas and water filled bore holes. In bore hole applications, data bandwidth between a down hole device and the surface can be limited, while determining water hold-up based on down hole measurements can be data intensive. A technique is proposed for calculating the water hold up that requires less data to be transmitted between the down hole device and the surface.
Navigation information may be provided. First, a destination location may be received at a portable device. Next, a current location of the portable device maybe detected. Then, at least one way-point may be calculated based on the current location and the destination location. An orientation and a level of the portable device may be determined and the at least one way-point may then be projected from the portable device.
Method and apparatus for transforming overbounds
A method for determining overbounds comprises the steps of determining conservative overbounds (qi) of at least one error (εi) in a first phase space, multiplying the conservative overbounds (qi) of errors (εi) in the first phase space by a first parameter (θ(−x)·2) and a second parameter (θ(x)·2), and determining an upper bound for the integrity risk at the alert limit (pw,int(AL)) in a second phase space using overbounds (qi) of errors (εi) in the first phase space by the first parameter (θ(−x)·2) and the second parameter (θ(x)·2).
Portable terminal and method for providing network contents using a portable terminal
A portable terminal and a method for providing network contents using the portable terminal are provided. The portable terminal receives contents from a network, uses information related to a destination and a pre-stored map data to search for a travel route from a start point to the destination, determines an estimated time for a user to reach the destination from the start point, and outputs travel guide information to guide the user along the travel route while outputting contents having a reproduction time corresponding to the estimated time.
Collision position predicting device
The present invention is intended to provide a technique which is capable of detecting a collision position of a moving object crossing a road and a subject vehicle with a higher degree of accuracy. In the present invention, in cases where the moving object crossing the road into which the subject vehicle has entered is detected at the time when the subject vehicle has turned to the right or to the left, the direction of a moving vector of the moving object is fixed to a direction which is set based on a shape of the road into which the subject vehicle has turned to the right or to the left. Then, the collision position of the moving object and the subject vehicle is predicted based on this moving vector of which the direction is fixed.
Automatic leveling control
Representative implementations of devices and techniques provide leveling for a vehicle, such as an overland vehicle. Sensors associated with the vehicle may provide signals representing one or more operating conditions of the vehicle, including forces acting on the vehicle and a path of travel of the vehicle. The vehicle can be leveled based on one or more of the signals from the sensors.
Road-installed driving supporting device, vehicle-mounted driving supporting device, and driving supporting system
A vehicle-mounted driving supporting device 2 supports driving on the basis of the presence of a nonpriority vehicle A entering a priority road 50 from a nonpriority road 40. The vehicle-mounted driving supporting device 2 includes an information provision determination device 34 which, when a host vehicle is traveling on the priority road 50, determines whether or not driving support is required on the basis of the specification regarding driving support of the nonpriority vehicle A received from the outside. Therefore, it is possible to avoid a driver from feeling bothered.
Method of controlling combustion of diesel engine
A method of controlling combustion of a diesel engine may include a vibration measuring step of measuring engine vibrations, a measurement region setting step of setting a range where an LPP (location of peak pressure) is predicted from measured vibration data, a frequency transforming step of transforming a vibration signal to a frequency response function, a frequency integrating step of integrating the transformed frequency response function, an LPP detecting step of selecting a location of peak pressure from integrated frequency response function, an estimated value determining step of selecting LPP offset and SOC (start of combustion) offset by using the detected LPP, an error determining step of determining LPP value error and SOC value error by comparing the estimated LPP value and the estimated SOC value with a target LPP value and a target SOC value, and a combustion correcting step of correcting and controlling combustion by the determined errors.
Method of predicting NOx generation amount
A method of predicting NOx generation amount may include calculating NO generation rate by using a combustion pressure of an engine and driving variables of the engine, obtaining NO generation period by using the combustion pressure of the engine, calculating NO generation amount based on the NO generation rate and the NO generation period, and predicting the NOx generation amount by obtaining NO2 generation amount based on a ratio between NO and NO2 according to the NO generation amount and a driving condition of the engine.
Real time linearization of a component-level gas turbine engine model for model-based control
A method for model-based control of a gas turbine engine is disclosed. An operating point of the gas turbine engine is generated from measured parameters using a component-level model. The component-level model is analytically linearized by taking the first partial derivative of output parameters of each component with respect to input parameters of each component, and evaluating the result at the operating point. Components of the linearized component-level model are combined to form a combined perturbational model of the gas turbine engine, which is inverted to solve for control commands as a function of target parameters and measured parameters.
Fuel delivery system
A method includes i) identifying a period of operation corresponding to a fuel supply requirement; ii) determining at least one ambient air condition in which the machine will operate during the period; iii) determining a duration of time in which, whilst in the ambient air condition, it is required to achieve a predetermined vapor trail characteristic; iv) determining a resultant fuel composition for use by the machine in the ambient air condition to achieve the characteristic, where the resultant fuel composition includes at least one of the first and second fuel compositions; v) determining the ratio of at least the first and second fuel compositions required for sufficient resultant fuel composition for the duration of time determined in step iii); and vi) producing a first signal indicative of the ratio of at least the first and second fuel compositions required for the duration of time determined in step iii).
Method and device for controlling an electrohydraulic brake system
A system and device and a method for controlling an electrohydraulic brake system of a motor vehicle especially adapted for brake by wire applications. The embodiments carryout position control of an actuator of an electronically activatable pressure supply unit based on the actuator position actual value and on and actuator position reference value which is determined on the basis of a pressure reference value.
Adaptable thermal management of a vehicle dual-clutch transmission
A method of managing clutch thermal loads in a multi-speed dual-clutch transmission (DCT) that is paired with an engine in a vehicle. The method includes assessing whether the vehicle is being accelerated and identifying a DCT clutch slipping during the acceleration. The method also includes determining vehicle parameters, determining an amount of time remaining for the clutch to stop slipping using the determined vehicle parameters, and determining an amount of time remaining until the clutch reaches a threshold temperature. The method additionally includes comparing the determined amount of time remaining for the clutch to stop slipping with the determined amount of time remaining until the clutch reaches the threshold temperature. Furthermore, the method includes activating an indicator if the determined amount of time remaining until the clutch reaches the threshold temperature is less than the determined amount of time remaining for the clutch to stop slipping.
Method and system for determining the contact point for a clutch in a vehicle
A method for determining the contact point for a clutch in a vehicle comprising an engine, a clutch, powered wheels and a gearbox. The gearbox has a first gearbox component which is connected to the clutch and disconnectable from the powered wheels. The method steps include estimating (405) a friction torque for the first gearbox component, whereby the torque transmitted by the clutch is a function of estimated friction torque, closing (407) the clutch, whereby a representation of a torque transmitted by the clutch is determined for a plurality of positions for the clutch, determining (409) the contact point by means of the determined representation of torque transmitted, and the further step (402), before the closure of the clutch, of accelerating the first gearbox component if its rotation speed is below a certain value. Also a system and a vehicle for performing the method are disclosed.
System and method for controlling a transmission
A system for selecting shift schedules of a transmission of a vehicle includes a controller configured to receive a signal indicative of acceleration of the vehicle prior to a change of a gear of the transmission. The controller is further configured to estimate tractive effort of the vehicle following the change of the gear of the transmission, the tractive effort estimation being based on at least an estimation of a road load on the vehicle. The controller is further configured to select between a first shift schedule and a second shift schedule based on the tractive effort estimation, wherein, if the tractive effort estimation is less than a threshold value, the controller selects the first shift schedule, and if the tractive effort estimation is at least equal to the threshold value, the controller selects the second shift schedule.
Adaptive speed-based control of a binary clutch assembly
A vehicle includes an engine and a transmission, the latter of which includes a controller which executes an adaptive speed-based control method. The transmission includes gear sets each having multiple nodes, an input member continuously connected to the engine and to one of the gear sets, and a binary clutch assembly connected to the same gear set as the input member. The controller is programmed to detect a requested transmission shift into an engine braking state while the vehicle is coasting. The controller also commands an increase in engine speed to a target engine speed in response to the requested shift, and applied the binary clutch assembly when the engine output speed reaches the target engine speed. The controller calculates slip across the binary clutch assembly and adjusts the target engine speed as needed over time until the target slip is achieved at the target engine speed.
Vehicular shift control apparatus
A vehicular shift control apparatus configured to control a speed ratio of a belt-type transmission having first and second variable-diameter pulleys, and a transmission belt wound between the first and second variable-diameter pulleys, by controlling hydraulic pressures to be applied to respective hydraulic cylinders of said first and second variable-diameter pulleys, according to respective commanded hydraulic pressure values of the first and second variable-diameter pulleys, such that the speed ratio coincides with a target value, the vehicular shift control apparatus includes a shift control portion configured to be operable, when a first-variable-diameter-pulley hold pressure which permits the speed ratio of said belt-type transmission to be held at the target value in a shift-down action is determined as said commanded hydraulic pressure value of the first variable-diameter pulley, to temporarily reduce said commanded hydraulic pressure value with respect to said first-variable-diameter-pulley hold pressure in an initial period of said shift-down action.
Systems and methods for detecting soil characteristics
A soil detection and planting apparatus. The apparatus includes a vehicle and a controller coupled to the vehicle. The apparatus further includes a planting device coupled to the vehicle, the planting device configured to plant seeds or plants into a soil material. The apparatus includes a ground penetrating radar sensor coupled to the vehicle. The ground penetrating radar soil sensor is configured to scan the soil material up to a designated depth beneath a surface of the soil material, wherein the ground penetrating radar soil sensor is further configured to provide a sensor feedback signal to the controller with respect to an intrinsic characteristic of the soil material. The controller is configured to instruct placement of a seed or a plant into the soil material based on the feedback signal.
Signal based safety system for construction zone
A system incorporating one or more interrogators or readers on heavy construction equipment (e.g., loaders) detect signals emanating from signal transmitters on clothing or equipment of construction workers. Responsive to the detection of a signal emanating from behind the heavy equipment, or in another position relative to the heavy equipment, the driver is notified audibly of the danger such that the driver may stop the movement of the heavy equipment or causes the brakes to be applied and transmission to be disengaged automatically without operator involvement.
Provided is a tractor which allows continuation of a plowing work by appropriately elevating a plow when slip occurs in wheels. The tractor includes draft controlling means (34) for elevating the plow to a target machine body level value obtained by making reference to control information with a draft load value detected by a draft load sensor (S). The control information is set based on a target plowing depth set when the plow was set to a target plowing depth and a draft load value. When a slip ratio detected by a slip ratio acquiring means (37) exceeds a threshold value, in place of previously set control information, there is newly set control information which renders higher the target machine body level relative to a same draft load value, thereby to elevate the plow.
Method and system for automatic wheel positioning
A system and method for automatically angularly positioning wheels of an automotive vehicle after parking. The system disclosed here includes a power-assisted steering system coupled to the wheels. Further, the system includes a controller, coupled to the steering system, which is configured to automatically position the wheels in a desired direction, based on a determination that the vehicle is parked.
Driving support device
A conventional brake control can generate only a small yaw moment compared with a steering control, so that reliable avoidance of obstacles cannot be obtained. With a steering control, the driver gets behind the wheel every time when crossing a lane and has an uncomfortable feeling. To solve these problems, a traveling aid device comprises: a detection unit for detecting the traveling state of a vehicle, the position of a lane marker, and the positions and types of obstacles around the vehicle; a calculation unit for calculating, based on the traveling state of the vehicle, the position of the lane marker, and the positions and types of the surrounding obstacles, a target yaw moment so as to prevent a departure from the lane marker and a collision with the surrounding obstacles; and a distribution unit for distributing, based on at least one of the traveling state of the vehicle, the position of the lane marker, and the positions and types of the surrounding obstacles, the target moment to a first actuator for controlling the driving/braking force and a second actuator for controlling the steering.
Driver assistance system and method
A driver assistance system includes a stereo vision system that includes at least one camera and at least one sensor disposed on or in a vehicle; a roadside marker detection unit configured to receive stereo image data from the stereo vision system, and to detect roadside markers from the stereo image data; and a road path estimation unit configured to estimate a road path in a direction of travel of the vehicle, based on the roadside markers detected by the roadside marker detection unit.
Driver assistance system for driver assistance for consumption controlled driving
A driver assistance system for driver assistance for consumption controlled driving combines tactile and visual feedback functions, especially in the form of a drive configuration, a display concept and/or a deceleration assistant, wherein the emphasis is, on the one hand, on a modified accelerator pedal characteristic and, on the other hand, on providing ECO tips for an interactive output of efficient driving instructions.
Method and system for detecting fail of steering angle sensor in electric power steering apparatus
A method and system may detect a fail of a steering angle sensor in an electric power steering apparatus. The system may include: a steering angle sensor for generating and transmitting a steering angle signal measuring a rotation angle of a steering wheel; a motor for generating an assistant power for smooth steering and transmitting a current and a voltage based on rotation of the motor; and an Electronic Control Unit (ECU) for receiving the current and the voltage from the motor, sensing the rotation direction of the motor, receiving the steering angle signal from the steering angle sensor, sensing a first rotation direction of the steering wheel, and then, when the rotation direction of the motor is not equal to the first rotation direction of the steering wheel, determining that the steering angle signal has a fail and starting operation of a fail-safe logic.
Vehicle health prognosis
A method includes collecting state of health (SOH) data and usage data from a plurality of vehicles. A peer group is identified among the vehicles. A vehicle health prognosis is generated for each vehicle of the peer based on the collected SOH and usage data. The vehicles of the peer group are ranked based on the generated vehicle health prognosis and the rank is reported to an output device that is associated with each vehicle or with a user of each vehicle. If evaluation of the ranking indicates that the health prognosis of a vehicle of the peer group is improvable by modifying vehicle usage, an alert is issued to a user of that vehicle.
Data selection by an autonomous vehicle for trajectory modification
An autonomous vehicle may determine to seek assistance navigating using a first trajectory. The autonomous vehicle may be configured to receive and store data about a plurality of obstacles. A particular obstacle in the plurality of obstacles may partially or wholly obstruct the first trajectory. The autonomous vehicle may select a portion of the stored data that includes data representing the particular obstacle. The selected portion of the stored data may be provided to an assistance center. A second trajectory may be received from the assistance center, where the second trajectory is not obstructed by the particular obstacle.
Driving assistance apparatus
A driving assistance apparatus is provided with: a storing device for storing each of a plurality of past driving situations of a self-vehicle as a group of a plurality of driving situation factors, for storing, correspondingly to each of the plurality of past driving situations, an action characteristic value and a driving situation occurrence frequency, and for storing, correspondingly to each of the plurality of driving situation factors, a factor influence value and a factor change frequency; an estimating device for estimating a future driving action of the driver on the basis of the plurality of past driving situations, the action characteristic value, the driving situation occurrence frequency, the factor influence value, and the factor change frequency; and a performing device for performing driving assistance in accordance with the estimated driving action.
Shift execution control system for an electrically variable transmission
A system and method of controlling first and second electric motors of a vehicle having an electrically variable transmission during an engine start/stop operation. The system and method determine a type of shift being performed, determine if a first clutch is being applied or released during the shift, determine if a second clutch is being applied or released during the shift, determine an acceleration limit based on the shift being performed and which clutch is being applied and/or released, determine acceleration and speed profiles based on the shift being performed, which clutch is being applied and/or released and the acceleration limit, determine a first electric motor torque and a second electric motor torque based on the acceleration and speed profiles, and set the torques of the first and second electric motors to the determined first and second electric motor torques.
Utilization of vehicle portal states to assess interior comfort and adjust vehicle operation to provide additional fuel economy
A method of operating a heating, ventilation and air-conditioning system of a plug-in hybrid electric vehicle, comprising during a first engine-running condition, where a vehicle window or vent is in a more closed position, operating a climate control system to provide a user requested level of thermal comfort, and during a second engine-running condition, wherein the vehicle window or vent is in a less closed position, limiting the performance of the climate control system and biasing shared vehicle resources to provide additional fuel economy. In this manner, thermal comfort of the vehicle passengers can be maintained while providing additional fuel economy.
Method and apparatus for controlling water-jet driven marine vessel
A system for controlling a marine vessel having first and second waterjets, corresponding first and second steering nozzles and corresponding first and second reversing buckets. The system comprises a speed control device for providing a first vessel control signal that corresponds to a speed to be provided to the marine vessel, a processor configured to receive the first vessel control signal and that is configured to provide at least one first actuator control signal coupled to the first and second waterjets, and at least one second actuator control signal coupled to the first and second steering nozzles and the first and to second reversing buckets. The system any of improves upon turns provided by conventional waterjet propulsion systems, improves upon slowing down or stopping marine vessels as is done by conventional waterjet propulsion systems, and improves upon the controllability of the waterjet propulsed marine vessel at low vessel speeds.
Target trailing with safe navigation with colregs for maritime autonomous surface vehicles
Systems and methods for operating autonomous waterborne vessels in a safe manner. The systems include hardware for identifying the locations and motions of other vessels, as well as the locations of stationary objects that represent navigation hazards. By applying a computational method that uses a maritime navigation algorithm for avoiding hazards and obeying COLREGS using Velocity Obstacles to the data obtained, the autonomous vessel computes a safe and effective path to be followed in order to accomplish a desired navigational end result, while operating in a manner so as to avoid hazards and to maintain compliance with standard navigational procedures defined by international agreement. The systems and methods have been successfully demonstrated on water with radar and stereo cameras as the perception sensors, and integrated with a higher level planner for trailing a maneuvering target.
Passenger transportation system and relative control method
A passenger transportation system having at least one rail extending along a path; at least one trolley movable along the rail; an actuating device having a linear electric motor, in turn having at least one slide fitted to the trolley, and a linear stator extending at least partly along the path, and having an elongated body, and a quantity of power windings embedded in the elongated body; and a quantity of sensors configured to control the position of the trolley, the sensors being fitted to the elongated body and so positioned as to minimize noise generated by the power windings on the sensors.
GPS carrier-phase based relative navigation
Systems and methods for navigation of a vehicle may carry out one or more operations including, but not limited to: obtaining coordinates of a vector connecting two points in space using carrier phase measurements from global navigation system satellites (GNSS); setting the vector as an intended path of a vehicle; storing carrier phase signals from a GNSS receiver received at a first position of the vehicle; receiving carrier phase signals from a GNSS receiver at a second position of the vehicle; and determining a position of the vehicle relative to the intended path from one or more carrier phase signals received at the second position and one or more stored carrier phase signals received at the first position.
Systems and method for managing sensors in a vehicle
A system and method for sensor management is provided. The system includes a plurality of sensors, and a sensor controller node communicatively coupled to the plurality of sensors, said sensor controller node configured to dynamically task data collections and communications with at least one of the plurality of sensors.
Effectuating energization and deactivation of particular circuits through rules-based smart nodes
Systems for reducing power usage and/or wastage use sensors to gather information about a circuit and its usage. Triggers are identified based on the information from the sensors, and subsequently used to control power delivery by reversibly effectuating energization and deactivation of particular circuits through smart nodes.
Method for performing service/maintenance on a switchgear panel, and related switchgear panel
A switchgear panel and a method for servicing/maintaining a switchgear panel are disclosed which provide a Human Machine Interface that includes a first memory unit, and a first circuit breaker on board of which an Intelligent Electronic Device is placed. The Intelligent Electronic Device having an associated memory unit. The first memory unit and/or on the associated memory unit storing sets of data related to one or more of the switchgear panel, the first Intelligent Electronic Device, and the first circuit breaker. The Human Machine Interface is in operative communication with the first Intelligent Electronic Device, to transfer and save one or more of the sets of data stored on the associated memory unit onto the first memory unit or vice versa.
Control system for stopping or reversing movement of an irrigation system
A control system for stopping or reversing movement of an irrigation system comprises an electronic proximity sensor and a control device. The electronic proximity sensor is configured for mounting to the irrigation system and operable to detect a target. The control device is responsive to the electronic proximity sensor for stopping or reversing movement of the irrigation system when the electronic proximity sensor detects the target.
Method of and apparatus for multiple channel flow ratio controller system
A four channel gas delivery system comprising: an inlet channel; four outlet channels; four flow sensors; four control valves, each valve being arranged so as to control the flow from the inlet channel through a corresponding one of the outlet channels; a flow ratio control system configured so as to control the flow from the inlet channel through the corresponding outlet channels so that the following flow ratios are controlled: (a) a first ratio of flows between the outlet channels of a first pair; (b) a second ratio of flows between the outlet channels of a second pair; and (c) a third ratio of flows between the first pair of outlet channels relative to the second pair of outlet channels; wherein the third ratio is controlled by generating at least one bias signal respectively applied to at least one pair of valves, the bias signal being a function of a predetermined set point of the third ratio and measured values of the third ratio.
Methods and systems for irrigation control
A wireless system is provided for monitoring environmental, soil, or climate conditions and/or controlling irrigation or climate control systems at an agricultural or landscape site. In some embodiments, the wireless system includes at least one wireless nodes for monitoring environmental, soil, or climate conditions and/or for controlling one or more irrigation or climate control systems at the site. The wireless system also includes a server computer system located remotely from the site. The server computer system is coupled to the node/s over a communications network for receiving data from and controlling operation of the node/s. The server computer system is also coupled to a device operated by an end-user over a communications network for transmitting the data to and receiving remote control commands or queries from the end-user.
Method and apparatus for determining engine pulse cancellation torque
A method for controlling operation of an electro-mechanical transmission configured to transfer torque among an input member, a plurality of torque machines and an output member includes determining an engine pulse torque, calculating a first motor torque pulse command based upon a first transfer function between the engine pulse torque and a torque command for a first torque machine and the engine pulse torque, calculating a second motor torque pulse command based upon a second transfer function between the engine pulse torque and a torque command for a second torque machine and the engine pulse torque, and controlling the first torque machine in response to the first motor torque pulse command and controlling the second torque machine in response to the second motor torque pulse command.
Power management system for a handheld medical device
A system for managing power consumption of a handheld diabetes management device and limiting effects of temperature on operations performed by the handheld diabetes management device comprises a blood glucose measuring module, a temperature sensing module, and a power management module. The blood glucose measuring module selectively measures blood glucose in a blood sample and generates a status signal indicating a status of operation of the blood glucose measuring module. The temperature sensing module senses an internal temperature of the handheld diabetes management device and estimates an ambient temperature external to the handheld diabetes management device. The power management module deactivates one or more components of the handheld diabetes management device based on the status of operation of the blood glucose measuring module when the internal temperature of the handheld diabetes management device exceeds a threshold temperature. The power management module deactivates the blood glucose measuring module when the ambient temperature is greater than a first predetermined threshold or less than a second predetermined threshold.
Contact displacement actuator system
A robot displacement device for use with a robotic frame shaped to approximate and be coupleable to at least a portion of the human body and configured to mimic movement of the human body. The device employs a plurality of force sensors which are attached to the robotic frame which detect a baseline controlling interface force status relationship between the sensors and the extremities of the human operator. Based on the output force signal from the sensors and the force and direction of gravity relative to the robotic frame, the computation system calculates at least a rotational force required to maintain the controlling force status relationship. That system then generates and transmits an actuation signal to a drive system attached to the robotic frame which displaces a portion of the robotic frame in order to maintain the controlling force status relationship.
Robot and control system
A control system or the like capable of causing a controlled object to act in an appropriate form in view of an action purpose of the controlled object to a disturbance in an arbitrary form.Each of a plurality of modules modi, which are hierarchically organized according to the level of a frequency band, searches for action candidates which are candidates for an action form of a robot R matching with a main purpose and a sub-purpose while giving priority to a main purpose mainly under the charge of the module over a sub-purpose mainly under the charge of any other module. The actions of the robot R is controlled in a form in which the action candidates of the robot R searched for by a j-th module of a high frequency are reflected in preference to the action candidates of the robot R searched for by a (j+1)th module of a low frequency.
A robot includes a chassis, a motive subsystem configured to maneuver the chassis, a hopping actuator attached to the chassis and configured to launch the robot, and at least one leg pivotable with respect to the chassis to pitch the chassis upward at a selected launch trajectory angle. A control subsystem automatically actuates and controls the motive subsystem when the robot is airborne and uses the rotational momentum of the motive subsystem to control the attitude of the robot chassis in flight.
Method, system and apparatus for dispensing drugs
A method, system and apparatus is provided for dispensing drugs quickly, conveniently, securely, and accurately and at relatively less cost than traditional pharmacy-based dispensing systems. A script for a drug prescribed to a user is generated comprising a human readable description of the drug and the user or a machine readable description of the drug and the user. The script is provided to a robotic prescription dispensary operable to recognize either the human readable description or the machine readable description, and validate and dispense the drug accordingly. The robotic prescription dispensary includes a user interface, a tele conferencing or video conferencing means enabling communication between the user and a human validation agent, and a scanning means for capturing an image of the script. A method for managing inventory and distribution of drugs is also provided.
Vacuum processing apparatus and program
The present invention provides an efficient transferring control method in a vacuum processing apparatus of a linear tool in which plural vacuum robots are arranged in transferring mechanical units to which process chambers are connected and processing-target members are passed and received among the plural vacuum robots. In addition, the present invention provides a vacuum processing apparatus in which there are provided plural controlling methods, and a unit which determines whether rates of the transferring robots are to be controlled or rates of the process chambers are to be controlled on the basis of processing time of each processing-target member and switches the controlling method in accordance with a site whose rate is controlled.
Manufacturing control based on a final design structure incorporating both layout and client-specific manufacturing information
Disclosed are embodiments of an improved design method, the results of which are a final design structure for an integrated circuit that incorporates, not only layout information, but also client-specific manufacturing information (e.g., import/export information, service requests, processing directives, purchase order requirements, design rule information, etc.) in the same data format in hierarchical form. Also disclosed are embodiments of a manufacturing control method and system. In these embodiments, a final design structure, such as that described above, is received at tape-in. The information contained therein (particularly, the client-specific manufacturing information) is sorted by type and then forwarded to the appropriate tools within the manufacturing facility for processing. By providing the client-specific manufacturing information directly to each manufacturing facility in the final design structure in conjunction with the layout information, the embodiments eliminate the need for independent information gathering by each manufacturing facility.
Factory level process and final product performance control system
A factory control server stores module configuration data for modules. The modules include processes for producing a final product and have corresponding module requirements. The factory control server analyzes in real-time actual product output data that is generated by a final product tester after a factory produces at least one final product to determine whether the actual product output data meets an expected product output. The factory control server analyzes actual module data in real-time to determine a new module requirement to cause new actual product output data for a subsequent final product to meet the expected product output in response to a determination that the actual product output data does not meet the expected product output. The factory control server notifies a module controller in real-time of the new module requirement. The module controller changes parameters in real-time to manufacture the subsequent final product.
Methods and apparatus to control audio leveling in media presentation devices
Methods and apparatus to control audio leveling in media presentation systems are described. An example method for controlling audio leveling in a media presentation system includes receiving data including media content and metadata and selecting an audio leveling technique to be used in an audio leveling process based on the metadata.
Microcircuit cochlear electrode array and method of manufacture
A microcircuit cochlear electrode array and process for the manufacture thereof, the electrode array comprising first and second flat microcircuits comprising a plurality of laterally spaced longitudinally extending electrical conductors and longitudinally spaced electrode receiving pads extending laterally from the conductors, the first flat microcircuit being helically wrapped in a first direction along an axis with its longitudinally spaced electrode receiving pads exposed on an end of an outer surface hereof and the second flat microcircuit helically being wrapped in an opposite direction on and along an outer surface of the first helically wrapped microcircuit with its longitudinally spaced electrode receiving pads exposed on an outer surface thereof adjacent the exposed longitudinally spaced electrode receiving pads of the first microcircuit, and ring electrodes around and electrically secured to the electrode receiving pads of the first and second microcircuits.
Implantable apparatus for detection of external noise using motion sensor signal
Detects external noise using a motion sensor signal for example to increase the specificity of arrhythmia detections based on active muscle noise detection. Whenever a motion signal is present that is below or above a certain frequency, for example 5 Hz, or within a certain frequency range, for example 1 to 10 Hz, and/or above a certain amplitude, for example greater than 1 mg, or close to a known motion pattern, then the detection of fast ventricular arrhythmia is suspended. For the detection of slow arrhythmia, for example asystole or syncope, an episode is confirmed when a short lasting motion sensor signal occurs. Uses a motion sensor based signal, for example as obtained from an accelerometer on an implantable electrode lead and/or implantable device.
Integrated conductive sensor package having conductor bypass, distal electrode, distal adapter and custom molded overlay
This disclosure relates to implantable medical devices (IMDs); in particular, to medical electrical leads having an integrated sensor disposed in a hermetic package and said sensor package accommodates a torque coil and an elongated cable conductor extending therethrough. The integrated sensor can include a pressure sensor, an accelerometer, and the like. The coil and the cable can couple to pacing and sensing electrode coupled to the lead distal to the sensor package. The sensor package is compact, substantially circular in cross section and robust, in that the overall design promote mechanical stability.
Percutaneous implantation of an electrical stimulation lead for stimulating dorsal root ganglion
A method of implanting an electrical stimulation lead to stimulate a dorsal root ganglion includes providing an electrical stimulation lead having a distal end, a proximal end, a longitudinal length, electrodes disposed along the distal end of the lead, terminals disposed on the proximal end of the body, a plurality of conductors electrically coupling the electrodes to the terminals. The method further includes sequentially inserting a series of hollow introducers into the back of a patient to open a passage to the dorsal root ganglion. Each introducer in the series has an inner diameter larger than an inner diameter of a preceding introducer in the series. The method also includes implanting the electrical stimulation lead through the passage formed using the series of hollow introducers. Upon implantation of the electrical stimulation lead, at least one of the plurality of electrodes is adjacent the dorsal root ganglion.
Medical leads having forced strain relief loops
Strain relief loops are forced by being formed into medical leads such that a body of the lead imposes a force to regain the loop if the loop has been disturbed. Because the strain relief loop is forced, the surgeon implanting the medical lead is not required to create the strain relief loop as a step in the implantation procedure. Forcing the strain relief loop ensures that the strain relief is achieved. The forced strain relief loop also ensures that the loop is present to reduce heating at the electrodes of the medical caused by exposure to excessive radiofrequency energy. The forced strain relief loop may be created by heating the lead body while held in the loop configuration by a mold to cause the loop configuration to persist once the medical lead is removed from the mold.
Anchor sleeve for implantable lead
An anchor sleeve for securing a therapy delivery element, such as a stimulation lead or catheter, within a living body, that includes an inner sleeve with pre-formed locations of weakness that facilitate localized deformation. The anchor includes a deformable outer sleeve with a primary lumen extending along an axis. The outer surface of the outer sleeve includes a plurality of suture grooves oriented generally concentric to the axis. The inner sleeve includes a plurality of beams connected at deflection regions arranged around a secondary lumen. The inner sleeve is located in the primary lumen adjacent to the suture grooves so that the secondary lumen is generally concentric with the primary lumen. A plurality of locations of weakness are preformed in each of the beams to facilitate localized deformation in response to a radially inward force applied around the suture grooves by a suture material.
Systems and methods for producing asynchronous neural responses to treat pain and/or other patient conditions
Systems and methods for producing asynchronous neural responses to treat pain and/or other patient conditions are disclosed. A method in accordance with a particular embodiment includes selecting a target stimulation frequency that is above a threshold frequency, with the threshold frequency corresponding to a refractory period for neurons of a target sensory neural population. The method can further include producing a patient sensation of paresthesia by directing an electrical signal to multiple sensory neurons of the target sensory neural population at the stimulation frequency, with individual neurons of the sensory neural population completing corresponding individual refractory periods at different times, resulting in an asynchronous sensory neuron response to the electrical signal.
Dynamic cranial nerve stimulation based on brain state determination from cardiac data
A method of treating a medical condition in a patient using an implantable medical device, comprising providing an electrical signal generator; providing at least a first electrode operatively coupled to the electrical signal generator and to a vagus nerve of the patient; sensing cardiac data of the patient; determining at least a first cardiac parameter based upon said cardiac data; setting at least a first value; declaring an unstable brain state of a patient from said at least a first cardiac parameter and said at least a first value; and adjusting the at least a first value. Also, a computer readable program storage device encoded with instructions that, when executed by a computer, performs the method. In addition, the implantable medical device used in the method.
Methods for electronic directionality of deep-brain stimulation
Methods, systems and devices to provide correction parameters for implanted electrodes by applying a cathode pulse to a bilateral implanted electrode while providing a synchronized anode on the opposite electrode. The electrical field can be “shaped” over space and time to reach more of the targeted area by selecting various combinations of active contacts. The cathode lead directs the electrical field to the target and the placement and number of anode contacts activated determines the electric field path and rate of dissipation based on vertical and horizontal distance and timing. The correction parameter can be applied to anode and cathode contacts on a single implanted lead. Each lead can have plural anode and cathode contacts each independently controllable. Active anodes and cathodes are statically or dynamically selected to generate a shaped electric field to reach the target.
System and method for contactless power transfer in implantable devices
A system and method for contactless power transfer in implantable devices for charging rechargeable batteries disposed within the implantable devices are provided. The system includes a first coil electrically couplable to a power source, wherein the first coil is configured to produce a magnetic field. The system further includes a second coil electrically coupled to the rechargeable battery disposed within the implantable device and configured to receive power from the first coil via the magnetic field and to transfer the power to the rechargeable battery. The system also includes a field focusing element disposed between the first coil and the second coil and configured as a self resonant coil having a standing wave current distribution to focus the magnetic field onto the second coil and enhance the coupling between the first coil and the second coil.
An implantable device (10) is used to emit electrical stimulation signals to surrounding tissue by means of at least one stimulation electrode (17). The device (10) has an input stage which is connected to a supply unit (12) by a cable, by means of which the input stage is supplied with at least one substantially square electrical AC voltage which is, averaged over time, at least virtually free of a DC voltage with respect to an external ground (29), which can be connected to the tissue (64) (FIG. 1).
Expandable blood pump for cardiac support
A pump for inducing flow within a vascular system comprises two inlets. The pump has a first configuration for deployment within the vascular system and a second, operable configuration for directing the fluid flow within the vascular system, where the second configuration has a greater diameter than the first configuration. A centrifugal impeller is configured to induce the fluid flow by rotation about an axis of rotation, where the flow is in a direction generally transverse to the impeller's axis of rotation.
Device for the medical care of a patient in an emergency
A device (1) for the medical care of a patient in an emergency which comprises an item of clothing (2) which may be worn by the patient on the body and monitoring devices (8, 9) arranged on the item of clothing (2), which may monitor at least one physiological function of the patient, in order to detect an emergency. The device further comprises a cardiac compression device (3, 4) arranged on the item of clothing (2), which is operatively connected to the monitoring device (8, 9), in order to treat the patient with a cardiac resuscitation when the monitoring device (3, 4) determines an emergency, and a defibrillator (5, 6, 7) as well as the intraosseous delivery of drugs into the bone marrow cavity of the breast bone. Moreover, a device (1) for the medical care of a patient in an emergency, which comprises as a therapeutic device a respiratory therapeutic device (10, 11, 12, 13) which is able to supply oxygen and/or a drug for pulmonary resuscitation into the respiratory system of the patient.
Systems and methods for making and using improved connector contacts for electrical stimulation systems
A port for receiving a lead is defined at a first end of a connector housing of a connector assembly for an implantable electrical medical device. A lumen extends from the port along a longitudinal axis of the connector housing. At least one of a plurality of connector contacts disposed in the connector housing couples to a terminal of the lead when the lead is received by the connector housing. The connector contacts include spring contact probes spaced apart from one another along the longitudinal axis of the connector housing with at least a portion of each of the spring contact probes extending along a first transverse axis into the lumen of the connector housing. The plurality of spring contact probes physically contact the terminals of the lead solely along the first transverse axis when the lead is received by the connector housing.
Processing for multi-channel signals
Method and apparatus for improved processing for multi-channel signals. In an exemplary embodiment, an anomaly metric is computed for a multi-channel signal over a time window. The magnitude of the anomaly metric may be used to determine whether an anomaly is present in the multi-channel signal over the time window. In an exemplary embodiment, the anomaly metric may be a condition number associated with the singular values of the multi-channel signal over the time window, as further adjusted by the number of channels to produce a data condition number. Applications of the anomaly metric computation include the scrubbing of signal archives for epileptic seizure detection/prediction/counter-prediction algorithm training, pre-processing of multi-channel signals for real-time monitoring of bio-systems, and boot-up and/or adaptive self-checking of such systems during normal operation.
R-wave detection method
A method for detecting an R-wave from an ECG signal (x(t)) derived from a living body, the method comprising the steps of (a) acquiring the ECG signal from the living body, (b) digitizing the ECG signal into a digital ECG signal (x(ti)), (c) filtering the digital ECG signal with a bandpass filter (53) and applying an absolute value filter (55) thereto to create a filtered ECG signal (g(ti)), (d) for each sequential value of the filtered ECG signal, comparing (57) the filtered ECG signal to an ECG tracking threshold (TT), (e) if the filtered ECG signal is no greater than TT, incrementing a counter (59), but if greater than TT, setting the counter to zero; and (f) comparing (63) the counter to a predetermined refractory count RC and, if the count is equal to RC, outputting an R-wave trigger indicating that an R-wave has been detected.
RMS electrocardiography system and method
A system for assessing a cardiac condition of a subject includes a sensor configured to record a plurality N of electrocardiographic signals from the subject to generate an ECG (electrocardiogram). The system further includes a processor configured to compute an RMS (root-mean-square) magnitude function from the recorded signals, and to measure from the RMS magnitude function an RMS variable that contains information about the cardiac condition of the subject. The ECG may be a standard 12-lead clinical ECG. The measured RMS variables may include RMS T-wave width, RMS RT recovery time, and RMS QT interval.
Apparatus and method for measuring biologic parameters
Support structures for positioning sensors on a physiologic tunnel for measuring physical, chemical and biological parameters of the body and to produce an action according to the measured value of the parameters. The support structure includes a sensor fitted on the support structures using a special geometry for acquiring continuous and undisturbed data on the physiology of the body. Signals are transmitted to a remote station by wireless transmission such as by electromagnetic waves, radio waves, infrared, sound and the like or by being reported locally by audio or visual transmission. The physical and chemical parameters include brain function, metabolic function, hydrodynamic function, hydration status, levels of chemical compounds in the blood, and the like. The support structure includes patches, clips, eyeglasses, head mounted gear and the like, containing passive or active sensors positioned at the end of the tunnel with sensing systems positioned on and accessing a physiologic tunnel.
Surgery assistance system and optical axis position measurement device
A surgery assistance system including a rigid endoscope having a position-orientation detection marker, 3-dimensional (3D) shape measurement device for obtaining data corresponding to a 3D surface of a patient and data corresponding to a 3D surface of the position-orientation detection marker, and computation unit for aligning pre-stored tomographical data of the patient and the data corresponding to the 3D surface of the patient, computing an optical axis of the rigid endoscope on the basis of the data corresponding to the 3D surface of the position-orientation detection marker and a pre-obtained 3D relative position relationship between an actual optical axis of the rigid endoscope and the position-orientation detection marker, for computing a tissue wall in the patient from the 3D tomographical data, and for computing an intersection of the tissue wall and the computed optical axis of the rigid endoscope.
System for analyzing and treating abnormality of human and animal tissues
A patient treatment unit for analyzing and treating abnormality of human or animal tissues, includes a display; a pulse generator circuit that outputs a sequence of electrical pulses at a pulse frequency, the electrical pulses having a pulse width, the pulse generator controlling the pulse frequency and the pulse width of the electrical pulses; a pair of probes for contacting a body of a patient and electrically coupled to the pulse generator; and a voltage and current sensing circuit that senses a voltage or a current via the probes when contacting the body of the patient.
Wireless recording and stimulation of brain activity
Subdural arrays transmit electrocorticogram recordings wirelessly, across the patient's skull, allowing the craniotomy used for surgical placement of the arrays to be completely closed. In various embodiments, the arrays also respond to commands, applying signal patterns to the patient's brain for diagnostic and treatment purposes.
Implantable electronic devices for detecting hypoglycaemia using EEG signals
Apparatus for capturing EEG signals comprising an implantable signal capture unit (34) connected to a proximal end of at least one implantable electrode (32) is implanted by passing a tubular guide sheath (24,26) along a subcutaneous path from an implantation site, passing the distal end of a said electrode through said guide sheath to bring said signal capture unit to said implantation site, and withdrawing said guide sheath from the electrode while progressively axially splitting the guide sheath to enable its removal. The signal capture unit may have a housing having at least two electrode contacts on its for capturing EEG signals in operative connection with circuitry within said housing for receiving said EEG signals and for wireless transmission thereof for reception at a location exterior to the body of the patient.
Multiple wavelength sensor emitters
A physiological sensor has light emitting sources, each activated by addressing at least one row and at least one column of an electrical grid. The light emitting sources are capable of transmitting light of multiple wavelengths and a detector is responsive to the transmitted light after attenuation by body tissue.
Open-structure magnetic assembly for magnetic resonance imaging
An open-structure magnetic assembly is adapted to generate a homogeneous magnetic field in an accessible space region, including a first and second independent source of magnetic field (10, 12), each generating a contribution to the resulting magnetic field. The first source includes a conducting or superconducting plate (20), carrying an unidirectional current flow (I) from an input side (22) to an output side (24) and at least one external current recirculating path (30) between the output side (24) and the input side (22) of the plate. The second source includes a volume of magnetized material or an arrangement of coils, arranged for generating a magnetic field component oriented according to the magnetic field generated by the first source (10), and whose intensity exhibits a gradient in a direction perpendicular to the conducting plate (20) adapted to compensate, in a region of interest, an opposite gradient in the magnetic field intensity generated by the first source (10).
Systems and methods for communicating with wireless-enabled devices that are capable of responding to changes in operational state
A system for communicating with a wireless-enabled device. The system comprises an input for receiving from the device a signal indicative of the device being in a de-powered operational state; a functional entity configured to determine, on a basis of (i) knowledge that the device is in the de-powered operational state and (ii) context information regarding the device, a certain action to be taken by the device while in the de-powered operational state; and an output for causing transmission of a message to the device, wherein the message is for causing the device to take the certain action while in the de-powered operational state.
Mobile device displaying instant message and control method of mobile device
The present invention relates to a mobile terminal displaying an instant message and a control method of the same. A mobile terminal according to an aspect of the invention may include: a wireless communication unit sending or receiving an instant message; a display unit including a first region and a second region and displaying the instant message sent or received by the wireless communication unit on the first region; and a controller displaying information corresponding to at least one object included in the instant message on the second region.
Transceiver set assignment scheme for a distributed antenna system
According to one embodiment, a method includes establishing a plurality of wired connections between a base station and a plurality of geographically distributed remote transceivers. Each remote transceiver of the plurality of remote transceivers has one or more physical antenna ports. The plurality of remote transceivers are assigned to a plurality of sets where each set has one or more of the plurality of remote transceivers. One or more logical ports is assigned to each set of the plurality of sets. Each logical port of a set corresponds to at least one physical antenna port of the one or more remote transceivers of the respective set. Data traffic is sent from the base station to the endpoint using at least one wireless connection between the endpoint and at least one physical antenna port of the one or more remote transceivers of a first set of the plurality of sets.
Method of grouping users to reduce interference in MIMO-based wireless network
In a system of MIMO communications in a wireless network, a number of wireless units are logically divided into a plurality of user groups, through operation of a semi-orthogonal user selection sub-system. For example, the user selection sub-system may implement a heuristic user selection algorithm based on near-orthogonality. Each user group is assigned a discrete transmission channel, which may be orthogonally defined in terms of frequency, time, or code. Data is transmitted over the channels (e.g., from network base stations) in a coherently coordinated manner, according to a zero-forcing beamforming operation. The system may be configured for operation in a time/frequency selective manner, e.g., over time/frequency selective fading channels. The wireless units may be allocated to the time/frequency slots based on prioritization of channel strength and considerations of fairness, in conjunction with the application of a semi-orthogonal user selection algorithm.
Methods and apparatus for supporting multiple connections
Systems and methodologies are described that facilitate supporting multiple connections associated with a wireless terminal. Notifications may be provided to a primary base station upon establishment and/or removal of connections between the wireless terminal and secondary base station(s). Additionally, the multiple connections may be evaluated and a preferred connection from the set of multiple connections may be utilized to transfer data to the wireless terminal over a downlink connection.
Method and apparatus for selecting identity module of mobile terminal supporting plural identity modules
A method and apparatus for selecting one of multiple identity modules attached to a mobile terminal is provided. The method includes selecting a network, detecting identity modules corresponding to the network, selecting one of the detected identity modules, and connecting to the network using the selected identity module. The identity module selection method enables automatic selection of one of multiple identity modules attached to a mobile terminal without cumbersome user manipulation.
Mobile device session switching
A method includes identifying, by a mobile device, a time, a day, a date or a location, and accessing a database storing first information correlating the time, day, date and location to a personal mode or a business mode for the mobile device. The method also includes identifying, exception information associated with the time, day, date, or location, and identifying user preference information associated with the personal mode and the business mode. The user preference information identifies a background associated with a home screen, icons provided on the home screen, or links to information accessible via the home screen. The method further includes configuring the mobile device in the personal or business mode based on the first information and the exception information, wherein the configuring includes providing, on the home screen, information corresponding to the user preference information associated with either the personal or business mode.
Method and telecommunications network for deactivating or activating a cell in such a network
The invention relates to a method for deactivation of at least one first cell of a plurality of cells in a telecommunications network. User devices in the at least one first cell are triggered to report measurement information regarding one or more second cells of the plurality of cells to the telecommunications network. The measurement information is received in the telecommunications network and analyzed, in order to determine whether one or more user devices in the at least one first cell are eligible for being served by a second cell of the one or more second cells when the at least one first cell would be deactivated. When the one or more user devices are determined to be eligible for being served by the second cell of the one or more second cells, the one or more user devices are transferred and the at least one first cell is deactivated.
Wireless communication terminal and control method
A wireless communication terminal, which performs wireless communication with base stations using each of a first communication method and a second communication method and enables to be in an idle state with both methods, having a setting section that sets a suspend time for detecting an incoming call from the base station using the first communication method subsequent to completion of communication with the base station using the first communication method; and a determination section that determines a cause of the completion of communication with the base station, wherein the setting section sets the suspend time based on the cause of completion of communication determined by the determination section.
Methods and devices for reducing interference in an uplink
A method of operating a communication system such that the communication system comprises at least a macrocell base station and a femtocell base station that is within the coverage area of the macrocell base station. The communication system is configured to provide an indication of the noise rise or interference at the macrocell base station to the femtocell base station and the femtocell base station, in response thereto, adjusts a maximum permitted transmission power based on the indication.
Method for adjusting channels in cognitive wireless communication, and cognitive wireless communication system capable of implementing the method
There is disclosed a channel adjusting method capable of suppressing the occurrence of interference between a cognitive pilot channel (CPC) and an auxiliary control channel (ACS) in cognitive wireless communications. According to the channel adjusting method for use in cognitive wireless communications, initially, a connection using a cognitive pilot channel (CPC) is set up. Thereafter, it is determined whether or not a spectrum sensing channel (ACS) is to be utilized. If yes, it is then determined whether or not any interference occurs between the spectrum sensing channel (ACS) and the set-up cognitive pilot channel (CPC). This allows an adjustment to be performed such that no interference occurs between the cognitive pilot channel (CPC) and the spectrum sensing channel (ACS).
Power control in a wireless system having multiple interfering communication resources
A power control procedure is based on assigning a common control parameter to considered interfering communication resources, and using the control parameter together with a unique power control condition for determining the individual transmit power parameters of the communication resources. In particular, for each one of at least a subset of said communication resources, an individual transmit power parameter is determined based on a power control condition implying that the total received power divided with a path gain of the communication resource should correspond to the common control parameter. The determined transmit power parameters are then used for controlling the transmit powers of the corresponding communication resources. This process helps to maximize aggregate data rate for any given amount of total invested power.
Method and communication system for providing a content delivery service through push-to-talk
A method of providing a content delivery service to an actual user of a communication system supporting push-to-talk. The content delivery service includes delivering a content to the actual user, wherein the method includes associating a virtual user to said content; establishing a push-to-talk session involving the actual user and the virtual user; and delivering the content from the virtual user to the actual user through the established push-to-talk session.
Network-centric link adaptation for coordinated multipoint downlink transmission
A Coordinated MultiPoint (CoMP) cell controller performs network-centric link adaptation for User Equipment (UE) in the CoMP cell. The CoMP cell controller receives at least infrequent channel estimates from a UE in the CoMP cell, from which it estimates downlink channel and thermal noise at the UE. The CoMP cell controller is aware of the desired signal to be received at the UE, and the intra-CoMP cell interference to the UE caused by transmissions to other UEs in the CoMP cell. The CoMP cell receives from the UE reports of inter-CoMP cell interference caused by transmissions by other CoMP cells. Based on the downlink channel quality, the desired signal, the intra-CoMP cell interference, the inter-CoMP cell interference, and the thermal noise, the CoMP cell controller performs link adaptation by selecting modulation and coding schemes, and other transmission parameters, for an upcoming transmission duration (such as a TTI).
SMS inquiry and invitation distribution method and system
The invention is an SMS distribution method for inquiries, invitations and proposals in which inquiries are sent to mobile telephone numbers included in a distribution list and their replies are collected as text messages via the SMS service (7) provided by the telecommunications network by means of a software program (1) installed on a server (2). The problem in distributing inquiries with existing SMS services has been the limited possibility of replying to the sending telecommunications operator and separating replies to several inquiries from one another. In the method embodied by this invention, universally reachable mobile network numbers (11) are used as reply addresses for the inquiries, invitations and proposals, and replies are separated from one another by means of reply addresses consisting of public mobile communication network numbers and SMS service numbers and automatically generated reply symbols.
Method and apparatus for constructing database in mobile communication terminal
A method of constructing a database in a mobile communication terminal includes analyzing one of a file attribute and a database field type of the received file when the file is received, determining whether the analyzed one of the file attribute and the database field type is identical to a field type of the database in the mobile communication terminal, and updating a database table in the mobile communication terminal according to the determination.
Method for processing conflict of communication service procedures and associated devices
A method for processing a conflict of communication service procedures and associated devices are provided, which are used to solve the problem that the user equipment (UE) receiving the circuit switching (CS) domain paging message conflicts with initiating the Non-Access Stratum (NAS) procedure by itself. Said method includes that: the UE receives a first paging message from the network side equipment; when the UE judges the first paging message is a CS domain paging message and that the UE itself is about to initiate an original Non-Access Stratum (NAS) procedure, the UE ignores the first paging message and initiates the original NAS procedure.
Paging and access via different nodes
Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node.
User description based on contexts of location and time
A description of a user is estimated based on the context of a user's past and present locations. A disclosed data-processing system continually receives data points for each user that represent spatial and/or temporal events. These events represent, for example, presence of a person at a specific geographic location such as a geographic area or point of interest (POI). The data-processing system evaluates the received data points in relation to one or more of the geographic locations, yielding results that are also based on the demographic characteristics of each visited location and the commercial characteristics of each visited location. The data-processing system evaluates the data points also to determine patterns exhibited in each user's activity or inactivity, and patterns exhibited in the distance traveled and the type of travel. The data-processing system bases the user descriptions on the results of these evaluations.
System and method for improving location estimates of co-located sectored cell sites for location services
Improved location estimates for transceivers is described. The location estimate of transceivers can be improved for sector transceivers that are co-located at a sectored cell site. The location estimate for each individual co-located sector transceiver can be updated as a centroid of all of the co-located sector transceivers. The location information of the transceivers can be used to provide network location estimation to mobile devices which do not have accurate positioning estimates.
Apparatus and method for determining a wireless device's location after shutdown
A wireless data processing device is described which periodically exits an unpowered state and transmits location data. For example, one embodiment of a wireless data processing device comprises: power circuitry for maintaining the wireless data processing device in a powered or unpowered state, the power circuitry causing the wireless data processing device to enter into an unpowered state responsive to user input; a timer to periodically power up the wireless device or portion thereof in response to reaching a predetermined time; a location services module determining a current location of the wireless data processing device using one or more specified location determination techniques; a transmit thread transmitting the current location of the wireless device over one or more specified communication channels; and the power circuitry powering down the wireless data processing device a second time after the current location has been transmitted.
Location-based home services and energy management
In one example, wireless mobile device data is provided to a building control system by sending location data from a wireless mobile device to an Internet-based service, receiving the location data from the wireless mobile device in the Internet-based service, determining an associated building control system from the wireless mobile device identity, sending data derived from the location data to the building control system, and implementing a change in the building control system based on the sent data derived from the location data.
Cross-technology coverage mapping system and method for modulating scanning behaviour of a wireless user equipment (UE) device
A method for modulating scanning behavior of a wireless user equipment (UE) device includes determining a geographic area location where the wireless UE device is located and responsive to determining that a radio access technology (RAT) previously available in the geographic area location is not currently available, modifying the frequency of searches for the radio access technology. A corresponding wireless user device is also shown.
Transmit power setting method and mobile telecommunication system using the same
A method for setting transmit power of a small base station by using a signal to interference and noise ratio (SINR) received by the small base station while the small base station is providing service and a mobile telecommunication system using the same. In one embodiment, a mobile telecommunication system includes a network base station configured to variably set a transmit power so that a signal to interference and noise ratio received from a user equipment may fall between an upper limit and a lower limit of a predetermined target signal to interference and noise ratio.
Handling in-device coexistence interference
A user equipment is able to transmit, to a wireless access node, an indication of in-device coexistence (IDC) interference between the wireless interfaces. The user equipment can include a counter to track a number of transmissions having the indication of IDC interference.
Method for reducing the handover frequency by a communication device in femtocell networks
A method for reducing the handover frequency by a communication device in femtocell networks includes the steps: measuring the radio signal strength by a communication device and storing the information of the serving base station into a cache memory; checking whether the stored information in the cache memory is classified as “femtocell” or not; if so, deleting the macrocell's information from the measurement report by the communication device and transmitting this to the serving base station; when the radio link failure occurred, checking whether the stored information in the cache memory is classified as “femtocell” or not; if so, initiating a timer; detecting an available femtocell before the timer expires; transmitting a call reestablishment request message to the available femtocell for rebuilding the link.
Mobile communication method, radio access apparatus, and gateway apparatus
A mobile communication method according to the present invention includes the steps of: when a gateway apparatus (S-GW) is switched from a first state where downlink data is transmitted to a first radio access apparatus to a second state where the downlink data is transmitted to a second radio access apparatus, transferring, from the first radio access apparatus to the second radio access apparatus, the downlink data which is received from the gateway apparatus and to which specific information is added; and transmitting, from the second radio access apparatus to a mobile station (UE), transfer downlink data which is transferred from the first radio access apparatus and to which the specific information is added, before new downlink data transmitted from the gateway apparatus (S-GW).
Mobile terminal device, its communication method, and radio network system
Provided is a mobile terminal apparatus which can realize a long-time wait as follows. The mobile terminal apparatus surely performs a reselection process to increase chances to wait for a host communication system, improve the traffic efficiency, and reduce arrival failures while reducing power consumption. A communication method and a radio network system for the mobile terminal apparatus are also disclosed. The mobile terminal apparatus (mobile telephone 10) includes a communication unit (1) and a control unit (8). The control unit (8) uses the communication unit (1) to periodically monitor presence/absence of a predetermined bit of a paging channel in a base station with which communication is in progress. If the presence of the bit is confirmed, the control unit (8) changes the communication time slot so as to acquire broadcast information reported by the paging channel and extracts a parameter containing information which identifies a communication system existing in the periphery from the broadcast information. The control unit (8) executes a reselection process for releasing the session of the communication system which is currently waiting and executes a reselection process for a capture trial on the identified communication system.
Optimized handover configuration
A method for power measurements in a cellular communication system comprises receiving measurement configuration orders. Operation of a power meter is controlled in dependence on the measurement configuration orders. Reference signal received powers are measured. A measurement report is compiled and transmitted. The measurement configuration orders comprise cell status information associated with neighboring cells and measurement instructions that are dependent of the cell status of respective cell. The cell status information comprises information about whether the neighboring cell is of a different type than the serving cell. Controlling of the operation of the power meter and/or compiling of the measurement report is performed in dependence on the cell status of the neighboring cell. A method for handover based on such measurement reports is also disclosed as well as Node Bs and user equipments configured to perform such methods.
Mobile terminal and controlling method thereof
A mobile terminal and controlling method thereof are disclosed, by which data can be shared with a counterpart terminal in the course of a phone call. The present invention includes a touchscreen, a sensing unit configured to sense an action of a user, a communication unit configured to communicate with a counterpart terminal via at least one of a first communication network and a second communication network, and a controller, in response to a first user command inputted via at least one of the touchscreen and the sensing unit in the course of performing a voice call to the counterpart terminal via the first communication network, controlling a first data sharing screen with the counterpart terminal to be displayed on the touchscreen, the controller controlling a data sharing via the first data sharing screen to be performed together with the voice call.
Location-based call control
An architecture is presented that automatically detects a location of a user and forwards messages to a pre-configured number associated with the detected location. A location system is provided that comprises a location component and a routing component. The location component publishes presence information of a mobile device. The presence information is associated with a physical location of the mobile device. Once the mobile device's presence information is published, the routing component automatically sets the call forwarding to the physical location for communication to a user of the mobile device. The message is routed to a pre-configured number associated with the physical location of the mobile device. A user of the mobile device pre-configures numbers associated with various frequently visited physical locations (e.g., home, club, etc.).
Provision of additional content to mobile communication devices
A system and method for the insertion of additional content to messages sent between mobile communications devices. The system provides for a point system which allows users of the system to accumulate points for additional content sent with text messages. The points may be used for various functions such as purchasing premium services or may be applied towards the user's service charges.
Redemption system for mobile device
A redemption system for a mobile device includes a database module for determining a target customer. A streaming module is connected to the database module for serving content to the target customer. A priority module is connected to the streaming module for implementing a content delivery schedule. The streaming module serves first content data to the target customer. If the target customer affirmatively responds to the first content data, the priority module causes the system to send a redemption mechanism embedded in second content data to the target customer. The redemption mechanism enables the target customer to engage in a redemption activity using the mobile device.
System for verifying access based on a determined geographic location of a subscriber of a service provided via a computer network
A method of limiting presentation of rules based events includes receiving a request to view a rules based event at a computer. A first estimate of a first geographic location of the computer is obtained. The first estimate includes a first confidence determination. If the first confidence determination is less than a first established confidence level, a second estimate of the first geographic location of the computer is obtained. The second estimate includes a second confidence determination for comparison to a second established confidence level. The first estimate and the second estimate define a composite estimated geographic location of the computer. Information on a second geographic location of the rules based event is retrieved. The retrieved information is compared with the composite estimated geographic location of the computer. Access to the rules based event is provided based on access rules, the comparison, and the composite estimated geographic location.
System and method for optimizing network communication in response to network conditions
A system and method for facilitating communications between a mobile device and a network application are provided. A mobile device transmits a request for data change information that includes a time out interval. The network application receives the request and measures a time elapsed since the receipt of the data change request. The network application will only transmit a notification to the mobile device client if new data is received or the time out interval has elapsed. As notifications are received, the mobile client device tunes the time out interval based upon network and device parameters.
Method and system for accessing completion of call to busy subscriber service based on identity
A method for accessing a CCBS service based on an identity comprises: when receiving a call invite and determining that the call invite includes a call completion indicator, a Terminating Application Server (T_AS) authenticates the identity of a caller initiating the call invite, allows the access of the caller when the identity authentication is passed; and rejects the access of the caller when the identity authentication is failed. A system for accessing a CCBS service based on an identity comprises: a receiving unit, configured to receive a call invite and to trigger the authenticating unit when determining that the call invite includes a call completion indicator; an authenticating unit, configured to authenticate the identity of a caller in the call invite, to trigger the accessing unit when the authentication is passed and to trigger the rejecting unit when the authentication is failed; an accessing unit, configured to access the call from the caller; and a rejecting unit, configured to reject access of the call from the caller. A call access device is provided. The disclosure fully ensures the call order of accessing a calling subscriber to a called subscriber, embodies the call access justification and prevents the preferential call access right of a malicious subscriber.
Providing network access
A wireless service provider identifies a mobile computing device capable of short-range wireless communication and in an agreement to receive service from a cellular network. The wireless service provider provides, to the mobile computing device, terms for a third party computing device to accept in order to gain access to the cellular network via the mobile computing device. In response to a third party computing device agreeing to the terms, the wireless service provider indicates to the mobile computing device to allow the third party computing device to access the cellular network via the mobile computing device.
Attenuator and method for attenuating
A semiconductor device is provided, including an input attenuator configured to receive an antenna signal and to output a first attenuated signal, the first attenuated signal corresponding to the antenna signal attenuated by a first attenuation factor, the input attenuator being further configured to receive a control signal and to select one of a plurality of predetermined attenuation factors as said first attenuation factor depending on the control signal; an analog to digital converter configured to generate an intermediate signal by digitizing the first attenuated signal; and a digital attenuator configured to receive the intermediate signal and to output a second attenuated signal, the second attenuated signal corresponding to the intermediate signal attenuated by a second attenuation factor, the second attenuation factor being set so as to compensate a gain quantization error of the control signal.
Receiver capable of reducing local oscillation leakage and in-phase/quadrature-phase (I/Q) mismatch and an adjusting method thereof
A receiver having a mixer for mixing a radio frequency signal and a local oscillator signal so as to generate a base band signal, a detecting unit for generating from the base band signal a detection signal that represents an extent of local oscillation leakage, and an adjusting unit coupled electrically to said mixer for outputting a control signal thereto to control a current operating state of said mixer, said adjusting unit being further coupled electrically to said detecting unit, and determining whether there is a reduction in the extent of local oscillation leakage based on the detection signal from said detecting unit. In operation, the adjusting unit maintains an adjusting direction for the control signal upon determining that the extent of local oscillation leakage is reduced, reverses the adjusting direction upon determining that the extent of local oscillation leakage is not reduced, and adjusts the control signal according to the adjusting direction.
Channel monitoring with plural frequency agile receivers
A system and method to efficiently use a plurality of ‘receivers’ to monitor a larger plurality of ‘sources’ for audio content. Upon identifying that a source is active, one of the plural receivers is assigned to convey the content to a destination. All other receivers are prevented from monitoring that specific source for the duration of its activity, but continue to monitor the remaining sources. ‘Source’ includes any source of information containing audio content. ‘Receiver’ includes any device capable of selectively conveying such content, including physical switches, hardware or software multiplexers, microphones, radio receivers, or any other means of obtaining such content.
Power harvesting wireless transmitter
Apparatus for a power harvesting wireless transmitter. The wireless transmitter includes a magnet, an inductor, a power supply, a processor, and a transmitter with an antenna. The magnet interacting with the inductor provides a sole source of power sufficient to power the transmitter. The inductor is connected to the power supply. The power supply includes a voltage multiplier, a storage unit, and, in one embodiment, a voltage regulator. The processor includes at least one input connected to one or more local switches, sensors, and instruments. The processor outputs an identifier and data corresponding to the inputs. The processor output is connected to the transmitter, which sends a wireless signal containing the identifier and data.
Electronic device including elongate connectors between stacked circuit boards and related methods
An electronic device may include a plurality of circuit boards, data processing circuitry carried by the plurality of circuit boards, and a plurality of connectors electrically and mechanically coupling the circuit boards in a stacked spaced relation defining a plurality of levels. The elongate connectors may include pairs of parallel first and second elongate connectors between adjacent circuit boards, and with each pair of parallel first and second elongate connectors being rotationally offset in successive levels.
DA converter and wireless communication apparatus
In general, according to one embodiment, a DA converter configured to convert a digital signal comprising n (n>1) bits to an analog current to output the analog current from an output terminal, includes n voltage-current converters. Each of them corresponds to each bit of the digital signal and is configured to generate a current depending on the corresponding bit. A k-th (k is an integer of 0 to n−1) voltage-current converter includes a first transistor whose threshold voltage is adjustable. The first transistor includes a semiconductor substrate, a first diffusion region, a second diffusion region, an insulating film, a charge accumulating film, and a gate.
Radio base station and method of adjusting radio parameter
A radio base station controls an antenna by adjusting a radio parameter value of the radio base station, and notifies another radio base station of the adjustment of the radio parameter value. The radio base station receives information from the other radio base station. The information relates to an influence on a radio characteristic of a cell formed by the other radio base station. The radio characteristic is influenced by the adjustment of the radio parameter of the radio base station. The radio base station readjusts the radio parameter value of the radio base station based on the information. The information relates to the influence on the radio characteristic of the cell formed by the other radio base station.
Communications device with selective spectrum assignment and related methods
A communications device may include a wireless radio frequency (RF) transceiver, and a controller coupled to the wireless RF transceiver. The controller may be configured to determine received signal characteristics and perform a spectral estimation operation associated with a frequency spectrum on the received signal characteristics, determine a channel selection method characteristic associated with a channel in the frequency spectrum including channels, generate statistical values for each channel based upon the received signal characteristics, and select a portion of the frequency spectrum for a signal to be transmitted by the wireless RF transceiver based upon the spectral estimation operation, the statistical values, and the channel selection method characteristic.
Apparatus, method and radio system
An apparatus is provided to include a detector. The detector can detect that an interfering communications connection to a received satellite system signal in a mobile terminal is to be established by the mobile terminal. The apparatus include a processor that can prevent interference to the received satellite system signal due to the interfering communications connection by controlling uplink resource allocation of the mobile terminal based on the detection.
Systems and methods for customizing broadband content based upon passive presence detection of users
Systems and methods for customizing broadband content based upon passive presence detection of users are provided. A user device in proximity to a customer premise device may be detected. The customer premise device may be configured to output programming content received from a service provider. An identifier of the detected user device may be determined. Based at least in part on the identifier, an identity of a user may be determined. Based at least in part on the identity of the user, content that is output by the customer premise device may be customized.
Method and system for a mesh network utilizing leaky wave antennas
Methods and systems for a mesh network utilizing leaky wave antennas (LWAs) are disclosed and may include configuring one or more devices as a mesh network in a wireless device coupled to a plurality of LWAs, and communicating data between said devices via the configured mesh network. A resonant frequency of the LWAs may be configured utilizing micro-electro-mechanical systems (MEMS) deflection. A plurality of the LWAs may be configured to enable beamforming. The LWAs may comprise microstrip or coplanar waveguides, wherein a cavity height of the LWAs is dependent on spacing between conductive lines in the waveguides. The plurality of LWAs may be integrated in one or more of: integrated circuits, integrated circuit packages, and printed circuit boards. The devices may be internal to the wireless device. The data may be communicated via the mesh network to devices external to the wireless device.
Es/No based carrier-in-carrier RF power control
A method of transmitting telecommunications data comprising modulating first and second data signals, selecting transmit powers first and second terminals to achieve a predetermined power equivalent bandwidth (PEB) through an un-attenuated, transmitting the first data signal to the second terminal and the second data signal to the first terminal through a remote receiver, measuring a total received signal-to-noise ratio of the first and second data signals and a total received signal-to-noise ratio received at the second and first terminals, respectively, measuring a signal-power density ratio between the first and second signals, determining a ratio of excess uplink to downlink losses based a rain model parameter and operating frequency, calculating excess uplink and downlink losses relative an optimized, un-attenuated telecommunications channel, and changing a transmit power of a terminal such that the predetermined PEB is maintained when at least one of the signals experiences attenuation.
Method of determining reliability of received signal, method of calculating code phase error, and apparatus for determining reliability of received signal
A method of determining reliability of a received signal is provided, which includes correlating a received signal from a satellite to a replica code, determining reliability of the received signal according to a predetermined reference using a first value and a second value, the first value being a correlation value of a peak phase obtained from the correlating and the second value being a correlation value of a phase delayed for a predetermined phase from the peak phase and changing the reference according to the satellite.
Wireless, self-contained relay device
A relay apparatus comprising a housing having a bottom surface, a radio, and a processor, both mounted within the housing. A self-righting mechanism is mounted to the housing such that the self-righting mechanism is configured to reposition the housing from any initial position to an upright position so that the housing rests on the bottom surface. The radio is configured to relay RF signals and to operate as a node in an ad hoc telecommunications network. The processor is operatively coupled to the radio and the self-righting mechanism.
Methods and apparatus for supporting sharing of content between mobile communications devices and home based devices
Methods and apparatus for allowing a telephone user to share captured audio and/or video with a set top box user are described. Methods and apparatus can be implemented without the need for a called party to support video conferencing and/or have a computer system. In various embodiments a telephone call is used to contact a party to who content from a telephone may be streamed, e.g., in real time. Assuming the contacted party is interested a video session is established with a STB or other device corresponding to the called party and video content delivered from the cell phone. Audio may also be streamed with the video and/or the initial telephone call is maintained while video content is delivered allowing for bi-direction communication via the calling and called party's telephones. While IP signaling maybe used for video delivery an analog VOD session may alternatively be used.
Sheet detecting apparatus and image forming apparatus
A sheet detecting apparatus including: a sheet detecting member having a plurality of abutment surfaces in a peripheral direction thereof, the sheet detecting member being rotated by a conveyed sheet abutting against one of the plurality of abutment surfaces; a detection portion which operates in association with the sheet detecting member; a sensor which generates a signal based on a position of the detection portion; and an urging portion which generates an urging force for positioning the one of the plurality of abutment surfaces of the sheet detecting member in a waiting position in which the leading edge of a sheet conveyed by a conveying portion abuts against the one of the plurality of abutment surfaces, and thereafter the urging portion switching the urging force to an urging force for positioning, in the waiting position, another one of the plurality of abutment surfaces against which a succeeding sheet abuts.
Transfer device of image forming apparatus and related image forming apparatus
The transfer device transfers a toner image to a recording medium. The recording medium passes through a nip portion formed by a belt roller which is disposed on a main body of an apparatus and a transfer roller which is disposed on an opening and closing cover. The opening and closing cover opens and closes an opening of a main body of the apparatus. The main body includes a positioning member which positions the transfer roller which moves according to a closing operation of the opening and closing cover, to a predetermined distance with respect to the belt roller. The main body also includes an engaging member which engages with the transfer roller and pushes the transfer roller toward a positioning position of the positioning member, by being urged by a pressurizing spring.
Cap for developer container and developer container having the same
In a cap for sealing a filling port formed in a developer container, a base is in the shape of a circular plate. A first cylindrical portion is in the shape of a cylinder extending from a peripheral portion of the base in a first direction. A second cylindrical portion is in the shape of a cylinder extending from the peripheral portion of the base in a second direction that is opposite to the first direction. A first projecting portion projects radially outwardly from an outer circumferential surface of the first cylindrical portion with a predetermined projecting amount. A second projecting portion projects radially outwardly from an outer circumferential surface of the second cylindrical portion with a projecting amount equal to the predetermined projecting amount of the first projecting portion.
Development device and image formation apparatus
A development device includes a regulation member partially defining a developer room and configured to regulate the thickness of a developer layer on a developer carrier, the regulation member including a regulation edge facing the developer carrier to control the thickness of the developer layer on the developer carrier, and an end facing an inner wall surface of the developer room; a first seal member attached to the inner wall surface of the developer room at a position facing the end of the regulation member; and a second seal member attached to the regulation member at a portion in the vicinity of the end of the regulation member and being in contact with the first seal member to seal between the first seal member and the end of the regulation member. The second seal member is lower in hardness than the first seal member.
Electronic apparatus having pivotable support member for supporting electric circuit board
An electronic apparatus includes a functional unit, an electric circuit board, a pivotable support member, an outer cover, and wiring. The functional unit is disposed inside the electronic apparatus. The electric circuit board is configured to control the functional unit. The pivotable support member is shaped rectangular having a vertical length that is shorter than a horizontal length thereof and is pivotally movable about a pivoting axis defined to extend along one horizontally extending side of the pivotable support member between a closed position in which the pivotable support member covers the functional unit and an open position in which the functional unit is exposed. The outer cover is disposed more outwardly than the pivotable support member. The wiring passes through a pivoting axis side of the pivotable support member to connect the functional unit to the electric circuit board.
Image forming apparatus
An image forming apparatus includes a stack surface on which recording materials having images are stacked, the stack surface being provided on an upper surface of an apparatus body, and a movable unit shaped like a flat plate and provided on the upper surface of the apparatus body, the movable unit having a display portion configured to display information. At least a portion of the movable unit overlaps with the stack surface, as viewed in a vertical direction. A flat portion of the movable unit is movable between a first position along the upper surface of the apparatus body and a second position where a distance between the movable unit and the stack surface in the vertical direction is longer than at the first position.
Image forming device
Disclosed is an image forming device including a fixing unit that fixes a first image to be fixed onto a sheet, the first image to be fixed being supported on the sheet, a target fixing temperature varying unit that varies a target fixing temperature during a time period in which a fixing process is performed, and a gradation processing unit that applies a gradation process to first image information. The target fixing temperature varying unit varies the target fixing temperature for the sheet of the recording medium to which the fixing process is applied, depending on presence or absence of a halftone process, and depending on a type of the gradation process to be utilized.