Scanning probe microscopy cantilever comprising an electromagnetic sensor
An apparatus and method directed to a scanning probe microscopy cantilever. The apparatus includes body and an electromagnetic sensor having a detectable electromagnetic property varying upon deformation of the body. The method includes scanning the surface of a material with the cantilever, such that the body of the cantilever undergoes deformations and detecting the electromagnetic property varying upon deformation of the body of the cantilever.
Privacy selection based on social groups
A method of setting privacy level values for a user. The method includes receiving a designation of a relative privacy level for the user and receiving a selection of a group of other users for the user. Plural sets of privacy level values are associated with the group of other users. The method also includes setting privacy level values for the user based on the designation of the relative privacy level and the plural sets of privacy level values associated with the selected group of other users.
Managing network identities
Techniques for managing network identities include generating, with a local computing system, a tree structure representing a network comprising a plurality of entities, the tree structure comprising a plurality of nodes, each node of the plurality of nodes representing an entity of the plurality of entities, at least one entity of the plurality of entities is represented by more than one node of the plurality of nodes; assigning a unique identifier to each node; identifying each node of the plurality of nodes as being a protected node or an unprotected node; and transmitting, to a remote computing system, the tree structure, the unique identifiers for the protected nodes, and identity information of the entities for the unprotected nodes.
Customization restrictions for multi-layer XML customization
Embodiments of the present invention provide techniques for customizing aspects of a metadata-driven software application. In particular, embodiments of the present invention provide (1) a self-contained metadata engine for generating customized metadata documents from base metadata documents and customizations; (2) a customization syntax for defining customizations; (3) a customization creation/update component for creating and updating customizations; (4) a customization restriction mechanism for restricting the creation of new customizations by specific users or groups of users; and (5) memory and caching optimizations for optimizing the storage and lookup of customized metadata documents.
Anonymization of data over multiple temporal releases
The present disclosure is directed to systems, methods, and computer-readable storage media for anonymizing data over multiple temporal releases. Data is received, and nodes and connections in the data are identified. The data also is analyzed to identify predicted connections. The nodes, the connections, and the predicted connections are analyzed to determine how to group the nodes in the data. The data is published, and the grouping of the nodes is extended to subsequent temporal releases of the data, the nodes of which are grouped in accordance with the grouping used with the data.
Interactive analysis of a security specification
Analyzing a security specification. An embodiment can include identifying a downgrader in a computer program under test. Via a processor, testing on the downgrader can be performed in a first level of analysis. Responsive to the downgrader not passing the testing performed in the first level of analysis, a counter example for the downgrader can be automatically synthesized. Further, a test unit can be created for the downgrader using the counter example as an input parameter to the downgrader. The test unit can be executed to perform testing on the downgrader in a second level of analysis. Responsive to the downgrader passing the testing performed in the second level of analysis, a user can be prompted to simplify a model of the downgrader.
System and method for cloud-based detection of computer malware
Disclosed are systems, methods and computer program products for detecting computer malware. In one example, a security server receives information about a suspicious software object detected by a client computer using one or more malware detection methods. The server identifies the malware detection methods used to detect the suspicious object, and selects one or more different malware detection methods to check whether the suspicious object is malicious or clean. The server analyzes the suspicious object using the selected one or more different malware analysis methods to check whether the object is malicious or clean. If the object is determined to be malicious, the server generates and sends to the client computer detection instructions specific to the one or more malware detection methods used by the client computer for detecting and blocking the malicious object on the client computer.
Network virtual user risk control method and system
Embodiments of the present application relate to a method of controlling user risk, a system for controlling user risk, and a computer program product for controlling user risk. A method is provided. The method includes retrieving association data of a first user and association data of a second user, the association data including multidimensional data, and data relating to each dimension identifying a user and serving as an association dimension, based on the association data, computing an association value between the first user and the second user for an association dimension, gathering the association value to obtain a degree of real association, and determining that the other user is malicious.
Accessing a processing device
The invention relates to a method of controlling access to a processing device using an access token with a machine readable identity. The method comprises reading the identity of the access token at the location of the processing device and querying a database comprising valid identities of access tokens, wherein each identity is associated with an access permission level. If the identity is a valid identity, the method further comprises determining the associated level of access and allowing a level of access to the processing device according to the associated access permission level. In some embodiments, the processing device is an Automated Teller Machine (ATM).
Protecting an electronic device against unathorized hardware use
Embodiments of the present invention provide an approach for protecting electronic devices against the use of unqualified and/or unauthorized (e.g., “grey market”) hardware components. Specifically, in a typical embodiment, a hardware component that a user is attempting to use with an electronic device will be detected. Then, the device information associated with the hardware component (e.g., serial number, vital product data (VPD), etc.) will be identified from the hardware component (e.g., as stored therein).
Forcing all mobile network traffic over a secure tunnel connection
A process is disclosed in which all network traffic between a mobile device and an untrusted network arriving before the establishment of a VPN tunnel are dropped in response to rules imposed by the mobile device's operating system. Once a VPN tunnel is established all communication from the mobile device is secured, without an intervention on the part of the user of the device. A device supporting such a process is also disclosed.
Ultra-low power single-chip firewall security device, system and method
A firewall security device, system and corresponding method are provided that includes an operating system of an entirely new architecture. The operating system is based fundamentally around a protocol stack (e.g., TCP/IP stack), rather than including a transport/network layer in a conventional core operating system. The firewall security device may include a processor and an operating system (OS) embedded in the processor. The OS may include a kernel. The operating system kernel is a state machine and may include a protocol stack for communicating with one or more devices via a network interface. The OS may be configured to receive and transmit data packets and block unauthorized data packets within one or more layers of the protocol stack based on predetermined firewall policies.
Firewall for controlling connections between a client machine and a network
A firewall system adapted for location outside the client machine, preferably in the same data processing device as the client machine but outside a virtual machine containing the client machine. Control logic of the firewall system receives incoming and outgoing connections from the network and client machine respectively. In response to a connection request initiating a connection between respective endpoints in the network and client machine, the control logic performs a security assessment comprising obtaining from at least one of the network and client machine information indicative of the security state of the endpoint therein, and allows or inhibits the connection in dependence on the result of the security assessment. The security assessment may be performed in accordance with a security policy of the system, and different security assessments may be performed for different connection requests in accordance with the security policy.
User initiated and controlled identity federation establishment and revocation mechanism
A method for single sign-on with established federation includes triggering a single sign-on operation from a first service to a second service, retrieving, by the first service, an associated federation key and pseudo identification for a user agent, generating, by the first service, a token signed with a federation key for the user agent based on the pseudo identification, redirecting, by the first service, the user agent to the second service, wherein the user agent transfers the token to the second service, verifying, by the second service, the token and determining an associated identification in the second service, and returning, by the second service, a resource to the user agent.
Browser session privacy lock
Techniques are shown for executing a web browser on a client computing device and requesting access to applications available from a hosting server over a network in communication with the client device. The web browser stores authorization credentials for accessing designated applications available from the hosting server in a lockbox. A message received at the web browser provides instructions to lock all designated applications by rendering at least partially blanked-out or partially obscured visual displays for the designated applications, with no viewing of, access to, or operation on selected data within the designated applications permitted, while the locked designated applications remain logged-in. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
Active learning-based fraud detection in adaptive authentication systems
Active learning-based fraud detection techniques are provided in adaptive authentication systems. An authentication request from an authentication requestor is processed by receiving the authentication request from the authentication requester; comparing current data for the user associated with the user identifier with historical data for the user; generating an adaptive authentication result based on the comparison indicating a likelihood current user data is associated with a fraudulent user; and performing one or more additional authentication operations to improve learning if the request satisfies one or more predefined non-risk based criteria. The predefined non-risk based criteria comprises, for example, (i) the request receiving a riskiness score below a threshold based on current data and wherein the request was expected to have a risk score above a threshold, or (ii) the request being in a bucket having a number of tagged events below a threshold.
System, method and program for off-line two-factor user authentication
Provided is an off-line two-factor user authentication system. The off-line two-factor user authentication system is designed to use, as a password, a one-time-password derivation rule to be applied to certain pattern elements included in a presentation pattern at specific positions so as to create a one-time password, and further use, as a second authentication factor, information identifying a client to be used by a user. A plurality of pattern seed values each adapted to uniquely specify a presentation pattern in combination with a client ID, and a plurality of verification codes corresponding to respective ones of the pattern seed values, are stored in an off-line two-factor authentication client. A presentation pattern is created based on a selected one of the pattern seed values and a client ID, and an entered one-time password is verified based on a verification code corresponding to the selected pattern seed value.
Constraining a login to a subset of access rights
This document describes tools that constrain a login to a subset of access rights. In one embodiment, the tools generate a constrained password by executing a cryptographic algorithm on a user ID, general password, and one or more desired constraints. The constrained password is used in place of the general password to gain access rights that are a subset of the access rights that would be granted if the general password were used instead.
Optical media protection driver
A method to protect content within protected data areas on a target optical record carrier against unauthorized reading and/or copying with a computer, comprises the steps of—determining whether a target optical record carrier or a non-target optical record carrier is inserted into a drive of the computer, and—in case a target optical record carrier is inserted into the drive of the computer—modifying read requests to the protected data areas so that no data is read or the read data is useless, and/or—modifying write commands in respect to the data within the protected data areas to a recordable record carrier or other storage so that the written data is useless.
Isolation VLAN for layer two access networks
In general, techniques are described for providing an isolation virtual local area network (VLAN) for layer two access networks. A server comprising an interface and a control unit may implement the techniques. The interface receives a message that initiates a request for a layer three (L3) network address for use by a client device via an isolation virtual local area network (VLAN) that supports transmitting data from a network device to the server, where the network device is intermediately positioned between the client device and the server. The message includes a layer two (L2) address associated with the client device. The control unit determines whether to allow the client device to access the network and assigns the L3 network address to the client device based on the determination.
Controlling access to a software application
A system for controlling access to a software application includes a policy machine template generator and a policy machine generator. The policy machine template generator may generate a policy machine template based on roles and permissions. The policy machine generator is coupled to the policy machine template generator and may generate a policy machine based on users and objects. The combination of the policy machine template and the policy machine is also claimed, as is a method for controlling access to a software application.
Systems, methods, and computer program products for managing secure elements
Systems, methods, and computer program products are provided for performing content management operations. At least one memory stores data, and a central security domain manages instructions on behalf of one or more service provider security domains. The instructions are received, over a network, from a trusted service manager. The instructions are processed in at least one of the one or more determined service provider security domains, using the data stored in the at least one memory. The data includes one or more generic applications, each of which can be instantiated for one or more service providers.
High assurance classification level disambiguation for displays
A method for disambiguating entities on a multi-level security display includes receiving a selection of a particular security level and rendering entities having a different security level in a visually distinct way. Visual distinction may include not drawing the entities on the multi-level security display.
Access control in data processing system
A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with a user request to access a resource and for the request to be granted in absence of an authorization determinative of the request. If the structure does not define an authorization for a request to access a resource, it is determined whether the structure defines a dynamic access requirement determinative for the request, and if so, whether to grant the request in accordance with the respective set of attributes associated with the request. For at least one request, after determining whether to grant the request, a dynamic authorization relating to authorization to access the resource within the request is added to the structure.
Proxy-based network access protection
In certain embodiments, a method includes receiving, at a proxy, a request for access to a network from an application on an endpoint. The method also includes determining, by the proxy, information about the application on the endpoint by examining one or more headers of the request received at the proxy from the application. The method further includes determining, by the proxy, whether the one or more headers comprise expected information based on the determined information about the application. In response to determining that the one or more headers do not comprise the expected information, the method includes denying, by the proxy, the request for access to the network. In addition, in response to determining that the one or more headers comprise the expected information, the method includes forwarding, by the proxy, the request to the network on behalf of the application.
A delay controller performs a delay control so as to stepwise increase a first delay amount in a first delay generator or second delay generator so as to minimize the delay amount of a video signal and an audio signal output from a first AV decoder and a second AV decoder. Thus, immediately after channel selection, the first video signal and the first audio signal or the second video signal and the second audio signal are output without a delay. This can provide a receiver capable of synchronizing the video signal output and the audio signal output between a plurality of receivable broadcast methods.
In a television, which can be connected to a portable information terminal, it is possible to display video based on the data of a multimedia file stored on a storage medium even in cases where there is no built-in decoder. In cases where a TV itself does not possess a decoder which can decode the data of a multimedia file selected by the user from the multimedia files stored on the USB memory, the CPU of the TV transmits to a smartphone the data of the selected multimedia file and a decoding request command to request that the data be decoded, thus receiving a video signal and/or an audio signal obtained by various types of decoders of the smartphone. Consequently, the CPU of the TV can output video and/or audio to a display unit and a speaker on the basis of the data of the selected multimedia file.
Video conference touch blur
A system for providing video conference touch blur. More specifically, in certain embodiments, a video conference touch blur operation is performed by actuating (e.g., via touch or via a mouse operation) a video conference screen image to blur areas that are not to be transmitted in high definition.
Mobile video device having unicast and multicast modes and methods for use therewith
A mobile video device includes a transceiver module that receives navigation data corresponding to a plurality of video programs including at least one unicast video program and at least one multicast video program, that transmits selection data and that receives a video signal in response thereto. An interface module receives interface data in response to actions of a user. A video display device generates a selection display based on selection display data in a video selection mode and that generates a video display in a video display mode based on the video signal. A video application module generates the selection display data based on navigation data, that generates selection data based on user interface data.
Set top/back box, system and method for providing a remote control device
A set top/back box and system and method for providing a remote control device are disclosed. In one embodiment, one or more wireless transceivers are located within a housing, which also interconnectively includes television input/output, a processor, and memory. The set top/back box may establish a pairing with a programmable device, such as a proximate wireless-enabled interactive handheld device having a touch screen display, whereby formatted parallel audiovisual experience instructions, including virtual buttons, may be transmitted to the programmable device for display on the touch screen display to create a experience parallel to the experience on the television. The set top/back box receives and processes virtual remote control functionality input instructions from the programmable device to control amenities associated with the set top/back box.
Multizone audio-visual system
A multi-zone audio-visual (AV) system that includes: (a) one or more AV devices (such as a TV) operable to provide audio and/or visual information; (b) a set-top box (STB) associated with each AV device; (c) a router; (d) an Ethernet connection between each STB and the router; and (e) a control server which operates to receive and record data from the router, the data including data indicative of the operating status (e.g., on or off) of the or each AV device, the operating configuration (e.g., TV channel) and the time of each change of status and/or configuration of the or each AV. The system comprises at least two remote AV control devices (Human Interface Devices, “HIDs”) for each AV device. The HIDs associated with each AV device operate to be automatically synchronized to the same status and configuration. The system may include a web server and a content server.
Method and apparatus for multiple audio outputs
A method for transmitting audio signals. The method of transmitting audio signals may include separately transmitting a video signal and an audio signal. Further, the method of transmitting audio signals may include transmitting a first video signal and a first audio signal to one component, transmitting a second video signal to the same component and separately transmitting a second audio signal to a second component.
Device for reproducing content and method thereof
Provided are an electronic device and an operating method thereof. When a predetermined event occurs while contents are being output, a video and a sound of the contents are controlled to be respectively output through different electronic devices, thus improving a content provision environment for a user.
Method and system for monitoring and displaying signals corresponding to a transponder of a satellite in a satellite communication system
A method and system for monitoring signals corresponding to a satellite having a first transponder generating a first plurality of channel signals, a plurality of integrated receiver decoders receiving the first plurality of signals and generating a first plurality of received channel signals corresponding to the first plurality of channel signals and a monitoring system displaying all of the first plurality of received channel signals corresponding to the first transponder.
Electronic television program guide schedule system and method with scan feature
An electronic program schedule system which utilizes a receiver for receiving broadcast, satellite or cablecast television programs for a plurality of television channels and a tuner for tuning a television receiver to a selected one of the plurality of channels. A data processor receives and stores in a memory television program schedule information for a plurality of television programs to appear on the plurality of television channels. A user control apparatus, such as a remote controller, is utilized by a viewer to choose user control commands and transmit signals in response to the data processor which receives the signals in response to user control commands. A television receiver is used to display the television programs and television program schedule information. A video display generator receives video control commands from the data processor and program schedule information from the memory and displays a portion of the program schedule information in overlaying relationship with a television program appearing on a television channel in at least one mode of operation of the television programming guide. The data processor controls the video display generator with video control commands, issued in response to the user control commands, to display program schedule information for any chosen one of the plurality of television programs in overlaying relationship with at least one television program then appearing on any chosen one of the plurality of channels on the television receiver. The system includes a scan feature to permit the user to scan program schedule listings for multiple programs in any of the operational modes of the system with the issuance of a single user control command.
Apparatus and method of providing a recommended broadcast program
Described herein is an apparatus that provides recommended program information based on a viewing history of an audience. The apparatus includes an extractor to extract, based on a specific performer whom a viewing audience likes, a similar performer. The extractor extracts the similar performer using a relation between a plurality of performers. The extractor selects a node satisfying a first condition that a number of links between a first node corresponding to the specific performer and one or more second nodes corresponding to the similar performer is not more than a predetermined upper limit and a second condition that the number of links between the first node and second nodes is not more than a threshold from the second nodes. The apparatus also includes a selector to select a recommended program from a plurality of broadcast planned programs, and a creator to create the recommended program information.
Method and system for presenting media content
A system that incorporates teachings of the present disclosure may include, for example, a system having a controller to detect a selection of media content from a media content source, detect that the selected media content comprises a plurality of media content types, present a plurality of media content type options, each option corresponding to one of the plurality of media content types or combinations thereof, detect a selection from the plurality of media content type options, submit a request to a targeted communication device to accept or decline the selected media content according to the selected media content type option, retrieve one or more metadata pointers from the media content source for retrieving the selected media content responsive to receiving an acceptance from the targeted communication device, and store the one or more metadata pointers and the selected media content type option. Other embodiments are disclosed.
Method and device for controlling a video receiver
A method and device for displaying an electronic program guide on a handheld device. The guide includes a plurality of tiles, each tile associated with a television program. The device receives a related content request input through its touchscreen and, in response, sends a related content request message to a gateway server over a wireless network connection, the related content request message includes information identifying one of the plurality of programs. The device receives and displays related media content from the gateway server in reply to the related content request message.
System and method for retrieving one of multiple media-components associated with a single broadcasting traffic log entry
Disclosed herein is a system and method for retrieving one of multiple media-components associated with a single traffic log entry. In one example, a method for retrieving a video-component (VC) in a television-broadcasting environment is disclosed. The method includes (i) associating an identifier with an evergreen VC, a time-sensitive VC, and an expiration time of the time-sensitive VC; (ii) determining whether the expiration time has lapsed; (iii) if the expiration time has lapsed, determining that the identifier corresponds to the evergreen VC; (iv) if the expiration time has not lapsed, determining that the identifier corresponds to the time-sensitive VC; (v) selecting a log entry; (vi) determining that the selected entry includes the identifier; and (vii) responsive to determining that the selected entry includes the identifier, retrieving from a data storage, the one of the evergreen VC and the time-sensitive VC that the identifier corresponds to.
Privacy application and method
A computing device comprising an operating system comprising one or more operating system features, a plurality of applications and a background service. A first of the plurality of applications is adapted to create one or more privacy groups and associate a remainder of the plurality of applications with at least one of the one or more privacy groups. The background service is adapted to (i) communicate with the first of the plurality of applications and the one or more operating system features, and (ii) associate at least one of the remainder of the plurality of applications and one of the one or more privacy groups with the one or more operating system features.
Methods and systems for setting access to a list of class entities
In an embodiment, a feature is an aspect of a class which represents information, data, behaviors, or capabilities encapsulated by the class. An accessing class may be given access to one or more specified features encapsulated by an accessed class, without gaining access to other features encapsulated by the accessed class. Accordingly, special access may be granted only to the behavior and data specifically designed for the accessing class, without allowing the accessing class access to all private data and behaviors of the accessed class, and without allowing all classes in a package access to the accessed class.
Deployment of pre-scheduled tasks in clusters
A method of managing a triggerable task in a cluster environment is described. The method includes accessing a definition of a task, wherein the definition includes a triggering event, and an action to be performed when the triggering event occurs. The method further includes, accessing a cluster policy defining how triggering events are interpreted on a node task basis for a plurality of nodes in a cluster. Based on the cluster policy, the method includes determining that the triggering event has occurred. As a result of the determination that the triggering event has occurred, the method further includes attempting to perform the action.
Utility-optimized scheduling of time-sensitive tasks in a resource-constrained environment
Systems and methods implementing utility-maximized scheduling of time-sensitive tasks in a resource constrained-environment are described herein. Some embodiments include a method for utility-optimized scheduling of computer system tasks performed by a processor of a first computer system that includes determining a time window including a candidate schedule of a new task to be executed on a second computer system, identifying other tasks scheduled to be executed on the second computer system within said time window, and identifying candidate schedules that each specifies the execution times for at least one of the tasks (which include the new task and the other tasks). The method further includes calculating an overall utility for each candidate schedule based upon a task utility calculated for each of the tasks when scheduled according to each corresponding candidate schedule and queuing the new task for execution according to a preferred schedule with the highest overall utility.
Job scheduling on a multiprocessing system based on reliability and performance rankings of processors and weighted effect of detected errors
A multi processor computing system managing tasks based on the health index of the plurality of processors and the priority of tasks to be scheduled. The method comprise receiving the tasks to be scheduled on the computing system; preparing a queue of the tasks based on a scheduling algorithm; computing a health index value for each processor of the computing system; and scheduling the tasks on processors based on the health index value of the processors. A task from a processor with a lower health index may be moved to an available processor with a higher health index.
Method and process for tracking documents by monitoring each document's electronic processing status and physical location
A method and apparatus are provided for tracking documents. The documents are tracked by simultaneously monitoring each document's electronic processing status and physical location. Determinations are made whether specific combinations of electronic processing states and physical locations are valid and whether specific movements of documents are permitted. Invalid combinations or movements are reported to a reporting station. The preparation of batches of documents prior to scanning may be monitored and operator metrics related to the batch prep process may be tracked. Exception documents rejected during document processing may be monitored to enable retrieval of such documents.
Assigning component operations of a task to multiple servers using orchestrated web service proxy
A load balancer or other network device in a server farm acts as a web services proxy and performs service orchestration among servers and other resources within the server farm. The load balancer receives an initial service request from a client and is able to optimize orchestration by assigning component operations of the service to multiple different servers. In this manner, a one-to-many allocation of resources can be mapped whereby a single client service request can result in multiple physical servers or other devices, processes or resources being used to handle the service request while maintaining a single back-end flow per multiple transactions.
Active/active storage and virtual machine mobility over asynchronous distances
A system for providing mobility of a virtual machine between a first site and a second site of an active/active system is disclosed. For a virtual machine operating on the first site, it may be determined that the second site is a destination site between the first site and the second site. While the virtual machine is operating on the first site, storage data may be transferred from the first site to the second site. Operation of the virtual machine may be suspended on the first site. Operation of the virtual machine may be resumed on the second site. In the event of link failure between the first site and the second site, operation of the virtual machine may be maintained on the second site.
Method and apparatus for implementing virtual proxy to support heterogeneous systems management
A computer system apparatus includes a first virtual machine hosted by a first physical machine. A target machine is communicatively coupled to the first virtual machine. The target machine is one of another physical machine and another virtual machine. The first virtual machine serves as a virtual proxy for the target machine.
Vehicle-mounted software updating apparatus
A vehicle-mounted software updating apparatus for performing a software update by downloading software from outside a vehicle includes a storage unit storing a past on/off status of an accessory (ACC); a software update period determining unit determining a software update period in which software update is to be performed based on information in the storage unit such that the software update is performed in an ACC-off period; and a software update performing unit performing the software update in the software update period determined by the software update period determining unit.
Framework for multi-type and multi-location firmware updates and hardware feature updates through a single interface protocol
Disclosed are a method, system, and/or apparatus to enable multi-type and multi-location firmware updates and hardware feature updates through a single interface protocol. In one embodiment, a computer-implemented method of updating a platform system firmware and a component device firmware through a single interface protocol includes assigning a unique index number to each of a platform system and a component device, generating a platform system firmware payload, receiving a component device firmware payload, and generating a firmware update package comprising the platform system firmware payload and the component device firmware payload. The method also includes querying the platform payload header and the component payload header using a check image application programming interface and updating at least one of the platform system firmware and the component device firmware by passing at least one of the platform system firmware payload and the component device firmware payload to a set image API.
Type merging technique to reduce class loading during Java verification
An apparatus, process, and computer program product to merge types in an object-oriented program is disclosed herein. In one embodiment, a process may include analyzing a method within an object-oriented program to identify merge candidates. These merge candidates may then be recorded in a merge candidate list. The process may further include identifying at least two code paths in the method that merge into a single code path and that operate on different types. The types in these code paths may then be merged to a nearest common superclass listed in the merge candidate list. In selected embodiments, the types may be merged to the java.lang.Object class in the event the merge candidate list is empty.
Intermediate language representation and modification
A system and method for facilitating analysis and modification of a computer program. A directed graph is generated from an intermediate language representation of a computer program function, with a node representing each instruction. Meta-edges or meta-nodes are inserted into the directed graph to facilitate location of instruction nodes. One type of meta-edge is a back edge that identifies branch instruction nodes. Some meta-nodes may identify instructions of a specific type. Some meta-nodes may identify exception blocks and corresponding handlers. Analysis of a program function may include insertion of new instructions prior to execution of the function.
Run-time bottleneck detection
A method of detecting a bottleneck in a data flow program includes executing the data flow program, wherein the data flow program comprises a kernel, determining a percentage of time the kernel spends on a computation, and determining the kernel to be a bottleneck upon comparing the percentage of time the kernel spends on the computation to a condition.
Automated testing process
A method, computer program product, and system for automating a test environment is provided. The method may include providing, at one or more computing devices, a superclass and a class-under-test, the superclass and the class-under-test having an inheritance chain therebetween. The method may further include inserting, via the computing device, an intermediate mock class between the superclass and the class-under-test. The method may also include automatically modifying, via the computing device, the class-under-test at runtime.
Method of testing multiple language versions of a software system using one test script
A system and method for testing software systems having a plurality of linguistic versions is presented. The method comprises creating an initial test script in one linguistic version of the plurality of linguistic versions, executing and modifying this test script, and executing the modified initial test script in additional linguistic versions. Executing the initial test script can comprise performing test steps, and storing a result of each test step as log data in a log file, each test step usually having Windows controls to test. Modifying the initial test script can comprise recognizing the test step controls using the log data, performing the test step, and replacing the test step control text with another text. Alternatively, modifying the initial test script can comprise entering into a test step having a control text, recognizing the control based on the control attributes, performing the test step, and replacing the test step control text.
Multiple browser architecture and method
Aspects of the invention enable testing and operation of scripts or other applications on multiple browsers at the same time. The browsers may run on different operating systems and platforms. This permits the user to observe and manage any differences in script functionality in the different browsers. An application developer may create a script or other application, run the application in one browser and observe results simultaneously in one or more other browsers. Operation may occur in a step by step process in a specific domain to determine how the script/application works in the different browsers. Such operation may occur in a real time procedure, providing instantaneous feedback and speeding up the application development process.
Managing symbolic links in documentation
A method of managing links can include inserting a universal resource identifier for a software asset within a link resolution file, wherein a symbolic link within a document that is independent of the link resolution file references the link resolution file. The method also can include publishing the document and the link resolution file and, responsive to a selection of the symbolic link within the document, resolving the symbolic link to the universal resource identifier using the link resolution file.
Workflow engine for execution of web mashups
A software-implemented workflow engine is described that executes a Web mashup within the context of a Web browser running on a computer. The workflow engine is configured to parse a Web mashup definition obtained from a remote server to identify distinct units of execution within the Web mashup, referred to as components. The workflow engine is further configured to obtain programming logic and metadata associated with each type of component identified in the Web mashup definition from the remote server and to use such information to generate executable versions of the identified components. Finally, the workflow engine is configured to run each of the executable components, thereby executing the Web mashup. The workflow engine is configured to manage the order of execution of each of the executable components so that the Web mashup runs in an optimized and reliable fashion.
Systems and methods for a mobile application development and deployment platform
Systems and methods for developing, customizing, and deploying mobile device applications are provided through a mobile application development and deployment platform. Preferably, these systems and methods are implemented in an Internet based environment that allows non-technical users to build sophisticated, highly-customizable cross-platform mobile applications. The platform allows users to select, input, create, customize, and combine various content, design characteristics, and application components, such as modules, some of which utilize features and functionality associated with various mobile devices and mobile operating systems. In certain embodiments, the platform allows users to compile, and generate a configuration file for, the mobile application that can be distributed to end users for execution on various mobile devices and mobile operating systems. When the mobile application is installed on, or executed by the mobile device, the configuration file may enable the retrieval of various data associated with the mobile application.
Integrated development and operations solution
Embodiments of the invention are directed to a system, method, or computer program product for integrated development and operations solution. The claimed invention aims to automate the implementation of deploying software from development to production by leveraging familiar processes and technologies to increase communication and collaboration between the development and operations teams. Further, the claimed invention enables continuous delivery of change by providing visibility into the status change in all environments, insight into release/change status (delays, cancellations, or the like), enabling quality driven change progression and will consolidate tools as appropriate.
Method and system for monitoring metadata related to software artifacts
Collecting and storing an artifact identifier for one or more artifacts, project identifiers for one or more software projects that use each artifact, and information about the temporal version for the artifacts. Collecting and storing project information related to the software projects, including a project identifier for each project, and contact information for a user of each software project. Collecting Metadata associated with the software artifacts, which includes information identifying the artifact, information about security risks associated with the artifact, information about a license associated with the artifact, or information indicative of a level of use or user rating of the artifact. The metadata is periodically or continually monitored to determine whether there has been any actionable change, and notifying the user about the actionable change.
Programmable macros for metal/via programmable gate array integrated circuits
A design methodology is provided to fully automate the creation of multiple-personality programmable macros for use in metal/via programmable ICs. Programmability is achieved using programmable switches, each of which may include one or more metal traces and/or vias on one or more layers configured in series, in parallel, or in combination. Multiple overlapping switches may exist in the same location. That is, switches may be defined that use some of the same resources. Any one of the switches may be “turned on,” while the remaining switches remain turned off. As part of the design methodology, different nets or parts of an electrical circuit design are programmed by replacing the switches with hard connections that close the circuit, or with no connections so as to open the circuit, or cause the circuit to remain open. The methodology allows for sharing routing or programming resources to achieve optimize layout area usage.
Reference library generation method for methods of inspection, inspection apparatus and lithographic apparatus
A library of model diffraction patterns is generated where each represents a diffraction pattern expected from a target structure defined by a set of parameters and having a first part and a second part, the first part comprising a scattering object. The target structure is defined. The scattering effect of the first part of the target structure is defined by a set of first part parameters, for a plurality of different sets of first part parameters. The scattering effect of the second part of the target structure defined by a set of second part parameters, for a plurality of different sets of second part parameters. The results of the calculations is used to calculate the model diffraction patterns.
Formal fault detection
A method for formal fault detection in a design model includes providing a plurality of faults which are individually activatable in the design model, and providing a plurality of properties for the design model wherein each property of the plurality of properties is valid if none of the plurality of faults is activated. The method further includes selecting a property of the plurality of properties, and determining, by a formal property checker, whether activation of one fault of the plurality of faults causes the selected property to fail. If the formal property checker finds a particular fault which, when activated, causes the selected property to fail, determining that the selected property is capable to detect the particular fault, and if the formal property checker does not find any particular fault which, when activated, causes the selected property to fail, determining that the selected property is not capable to detect any fault of the plurality of faults.
Generation of internal interfaces for a block-based design
A method relating generally to computer aided design is disclosed. In such method, a block-based model of a hardware realizable system is obtained. An internal gateway-in and an internal gateway-out of a module of the block-based model are identified. An interface protocol is assigned for the internal gateway-in and the internal gateway-out. Data type and data propagation for the module at the internal gateway-in and the internal gateway-out are analyzed. The internal gateway-in and the gateway-out are transformed into an input/output interface. Integrated code is generated for subsequent realization of the input/output interface in hardware.
Performing image calculation based on spatial coherence
Computer-implemented techniques for pixel source optics calculations using spatial coherence are disclosed. Pixelated sources are used for source-mask co-optimization to enhance semiconductor lithography. Calculation of a partially coherent imaging system is used for optical-lithography simulation. The spatial coherence property of neighboring source points is used to reduce imaging calculation complexity. Two or more neighboring points are treated as one pseudo-spatially coherent area element.
Enhancing usability of a moving touch screen
A system and method for improving the usability of a touch screen on a moving mobile device are provided. Upon determining the mobile device is moving in a pattern that is consistent with a person walking while carrying the mobile device, a new interface that is easier to use is displayed. The new interface may be easier to use than a standard interface by showing less action buttons, zooming into a portion of the standard interface, and/or by requiring less user input to complete a requested task.
Document management framework
Disclosed is a method, in a system (FIG. 5) comprising a user computer (509) (509) and a SharePoint server (506) (506), of enabling, using Outlook (514) running on the user computer (509), document management of files stored by the SharePoint server (506). The method comprises executing (1001) Outlook (514) (514) on the user computer (509) thereby creating an Outlook display window, invoking (1002), using a DMF client application (511) (511) running on the user computer (509), a software application (512) (512) (509) to create a DMF pane (516) (101) in the Outlook display window (102), and then retrieving displaying and updating a displayed tree view of the user's SharePoint environment, either from a DMF client side cache (510) (510) (509) or, if the DMF client side cache (510) is unavailable, from a DMF web service application (507) (507) running on the SharePoint server (506).
Interface for creating and viewing medical decision support rules
A first statement of a rule and a first icon associated with the first statement are displayed. A user's selection of the first icon is received, and the selection of a Boolean operator is received in association with the selection. A second statement is displayed, and a link between the first statement and the second statement is displayed to form a compound statement including the first and second statements. The link includes an indication of the Boolean operator selected by the user. A second icon is displayed in association with the second statement, where the second icon is selectable by the user to allow selection of Boolean operators with which the user may link the second statement to a third statement. A third icon is displayed in association with the compound statement, where the icon is selectable by the user to allow selection of a Boolean operator to link the compound statement to a third statement.
Focus change upon application launch
Embodiments are described for handling focus when a gesture is input in a multi-screen device. In embodiments, a first image displayed on a first touch sensitive display of a first screen may be currently in focus. In embodiments, the gesture is a tap on a second touch sensitive display of the device. In response to the gesture, an application is launched, which displays a second image on a second display of a second screen. Focus is then changed from the first image on the first touch sensitive display to the second image on the second touch sensitive display.
Sliding window manager
The subject matter of this specification can be implemented in, among other things, a method that includes presenting a first window in a graphical user interface. The method includes presenting at least a portion of each secondary window. The method includes presenting one or more indicators indicating that additional windows exist. The method includes receiving a first user selection of a first one of the indicators. The method includes bringing at least one of the additional windows to the foreground, moving the at least one of the additional windows across the graphical user interface to be in view of the graphical user interface, sending the first window and the secondary windows behind the at least one of the additional windows, and moving at least one of the first window and the secondary windows across the graphical user interface to be out of view of the graphical user interface.
Criteria-based structured ratings
Criterion-based feedback allows users to provide useful information in a quick and easy to understand fashion. When information for an item is relayed to a user, the user is provided with the ability to provide feedback for any criteria relating to the item. In some embodiments, this feedback takes the form of a submission of a response to a question or statement pertaining to a criterion for the item. The user is able to create new responses if the existing responses do not adequately convey the feedback that the users wishes to submit. Further, a user can also submit entirely new questions and/or statements, along with corresponding new responses, that correspond to a criterion relating to the item. Such an approach provides flexibility for users to quickly and easily provide feedback on specific criteria that might be useful for other users viewing information for that item.
System and method of navigating through notifications
A method for navigating through notifications on a wireless device having a primary user interface shown on a primary display and a secondary user interface shown on a secondary display, the method comprising the steps of: generating a notification at the wireless device, the notification being associated with an event; detecting if the secondary user interface is being shown; indicating the notification on the secondary user interface if the secondary user interface is being shown; displaying a preview of the event on the secondary user interface in response to a selection of the notification in a preview mode; and closing the preview of the event on the secondary user interface in response to a deselection of the notification and bringing the secondary user interface out of the preview mode; wherein the notification is still maintained after displaying the preview of the associated event.
Methods and systems for providing feedback on an interface controlling a robotic device
Methods and systems for providing feedback on an interface for controlling a robotic device are provided. An example method includes receiving an input on an interface of a device within an area on a display of the interface. The input may indicate an orientation command and a velocity command for a robotic device. The method may further include providing a display of direction indicators on the interface representing a location of the input based on the location of the input. A location of the direction indicators may represent a direction associated with the orientation command. The method may also include providing a display of a geometric shape within the area on the display representing the location of the input, such that a size of the geometric shape corresponds to a magnitude of velocity associated with the velocity command. In this manner, visual feedback may be provided while receiving the input.
Post edit localization evaluation in offline context of an application
Applications can be localized by localization experts to allow them to be used by a broader customer base. The localization can be done given interface context to produce more applicable results. Multiple localization experts may be given an editable interface of the application and may provide multiple localizations based on the editable interface of the application. Multiple evaluators may evaluate the localizations provided by the multiple localization experts. Multiple developers may extract localization data and the localization data may be incorporated into the application and may result in a localized application.
Graphical representation of out-of-bound image selection
This is directed to differentiating between portions of a selection area that are within the boundary of displayed information and portions of the selection area that are beyond the boundary of the displayed information. In some embodiments, the graphical representation of the selection area can change based on the position of the selection area relative to the boundary of the displayed information. In particular, the representation of portions or regions of the selection area that are within the boundary of the displayed information can be different than the representation of the portions or regions of the selection area that extend beyond the boundary of the displayed information. For example, the electronic device can provide different fills in each of the regions, or different line patterns around the peripheries of each of the selection area regions.
Method of image processing with dynamic anonymization
A method is provided for processing at least one image, comprising a representation of a first user for presentation to a second user, comprising steps for: obtaining an indication representative, either of an absence of relationship between the first and the second user, or of a relationship existing between the first and the second user; and modifying said image before presentation to the second user, in such a way that the first user is not identifiable by the second user, said modifying step being intended to be executed if it is determined, in accordance with at least one anonymization rule defined in relation to said cue, that said image need undergo such a modification.
Systems and methods for shared multimedia experiences in virtual videoconference rooms
A new approach is proposed that contemplates systems and methods to support the operation of a Virtual Media Room or Virtual Meeting Room (VMR), wherein each VMR can accept from a plurality of participants at different geographic locations a variety of video conferencing feeds of audio and video streams from video conference endpoints. The approach provides collaborative viewing of an event through the VMR so that the participants at geographically distributed locations are able to simultaneously participate and share the experience of the event together. An initiating participant of the event sharing is further offered with in-meeting management and control over the content to be shared at the event. A globally distributed infrastructure supports the sharing of the event among the participants at geographically distributed locations through a plurality of MCUs (Multipoint Control Unit), each configured to process the plurality of audio and video streams from the plurality of video conference endpoints in real time.
Color coding and selection highlighting of e-mail item listing
A method for rendering an e-mail item listing within a graphical user interface of an e-mail application on a display device is disclosed. The method includes identifying a field of the e-mail item listing having a displayed value that matches a pre-determined value, applying a color coding to the identified field so that the color coding is visually distinguishable from a background color of the e-mail item listing, receiving an input from an input device to select either an item of the e-mail item listing that includes a color coded field or an item related to the item that includes the color coded field, and applying a selection highlighting to the item that includes the color coded field so that the applied selection highlighting is visually distinguishable from the color coded field and the background color.
Active mail thread
A computer-implemented method includes, on a client system, receiving an email message that is a part of an email thread. The received email message includes gadget instructions and associated gadget data. In response to user selection of the received email message, updated gadget data is obtained and the gadget instructions are executed. Also in response to user selection of the received email message, an instance of a gadget associated with the gadget instructions in the email message is displayed in the client application. The displayed gadget is updated to reflect the obtained updated gadget data.
User collaboration system
A user collaboration system providing for the efficient utilization of an organization's resources, such as the bandwidth associated with call center activity. At the same time, the user collaboration system enables users to quickly and easily receive help in a particular subject matter area, without requiring the user to know who within the organization may be able to provide that assistance. The user collaboration system also maintains an organization's user profile information that tracks employee subject matter expertise and allows users to request assistance from an anonymous expert. The assistance may be provided via a collaboration session which may be optimized based on available network resources.
Directed communication in a virtual environment
The present invention is directed to directed communication in a virtual environment. A method for method for providing directed communication between avatars in a virtual environment in accordance with an embodiment of the present invention includes: determining a relative location of a first avatar and a second avatar in a virtual environment; and adjusting an aspect of a communication between the first avatar and the second avatar based on the relative location.
Media-editing application with media clips grouping capabilities
A media-editing application of some embodiments allows a user of the application to group media clips displayed in the timeline into a single clip representation. A composite display area of the media-editing application often displays numerous clips at various instances in time and at various levels in the compositing hierarchy. To reduce the number of media clips in the timeline, the media-editing application of some embodiments allows the user to select several media clips and combine them into a one media clip representation. In this manner, the media-editing application reduces the congestion in the timeline. These single clip representations are referred to as “compound clips.” Compound clips can be viewed as containers that can include several media clips of the same type in some embodiments, or that can include several media clips of several different types in other embodiments.
Method of manipulating media object in media player and apparatus therefor
Provided is a method for manipulating a media object in a media player and an apparatus using the same. The method includes generating a rendering map for managing a region of a media object in a rendering interface according to time, receiving a user input via the rendering interface; updating the rendering map based on a user input; re-composing a scene based on the updated rendering map, and rendering the media object according to the re-composed scene.
Virtual cultural attache
A method and system for presenting choices of different translations of a message and corresponding interpretations of the different translations. The message that is input by a sender to be sent to an intended recipient is received. Choices of the different translations of the message and different corresponding interpretations of the different translations are retrieved and presented. The different translations are in a language understood by the recipient. The different interpretations are specific to a culture of the recipient. A selection of a translation of the different translations is received. The selection of the translation is based on a review of the different interpretations by the sender. The selected translation is presented to the recipient.
Method and apparatus to convert digital ink images for use in a structured text/graphics editor
In accordance with one aspect of the present invention, disclosed is an image analysis and conversion method and system, where digital ink images are converted to structured object representations of the digital ink images, capable of being edited by a structured text/graphics editor.
Front-end tool for displaying diagnostic information to facilitate web page development
The disclosed embodiments relate to a system that displays diagnostic information to facilitate web page development. While a web page is being assembled at a front-end system using data gathered from one or more back-end systems, the system accumulates metadata associated with the assembly process. Next, the system renders the web page using the gathered data. Finally, the system sends the rendered web page along with the metadata to a browser to be displayed to a user, wherein the browser is configured to selectively display the metadata when the web page is displayed.
Systems and methodologies providing for collaboration among a plurality of users at a plurality of computing appliances
A system and methodology for collaboration among a plurality of users at a plurality of computing appliances. A respective one computing appliance of the plurality of computing appliances is for use by each respective one user of the plurality of users. Each said respective one computing appliance is comprised of a processor, a display apparatus providing a display presentation, and a communications interface providing coupling of data between itself and at least one other of the plurality of computing appliances. A memory provides storage that is associatively structured as a plurality of data layers. Each of the data layers is associatively mapped to a respective at least one of said plurality of computing appliances, to provide mapped storage in each respective data layer of respective layer data representative of annotations originated from at least one respective one of said plurality of computing appliances, preferably for each of at least two of said plurality of the computing appliances. The display apparatus at at least one of said plurality of the computing appliances provides a display presentation generated responsive to said at least two of the plurality of the data layers. In one embodiment, the display apparatus for at least two of the computing appliances provide a same said display presentation. In a preferred embodiment, said same said display presentation is comprised of an underlying image which appears as an underlying display relative to which is aligned a display presentation of the annotations as made atop the respective underlying image.
Systems and methods employing multiple crop areas
A system comprises an editable electronic document and a plurality of selectable sub areas in the document, each independently actionable for cropping.
Systems and methods for low latency media defect detection
Various embodiments of the present invention provide systems and methods for media defect detection. For example, a media defect detection systems is disclosed that includes a data input derived from a medium, a fast envelope calculation circuit that receives the data input and provides a fast decay envelope value based on the data input, a slow envelope calculation circuit that receives the data input and provides a slow decay envelope value based on the data input, and a media defect detection circuit. The media defect detection circuit receives the slow decay envelope value and the fast decay envelope value, calculates a ratio value of the fast decay envelope value to the slow decay envelope value, and asserts a defect output based at least in part on the comparison of the ratio value to a defect threshold value.
Low cost adjacent double error correcting code
A device includes a controller configured to provide a data word and check bits for the data word to decoding logic, the decoding logic configured to generate a decoding of the data word and check bits for the data word in conformance with an H-matrix having the following properties:(a) no all 0 columns;(b) all columns are distinct;(c) no linear dependency involving three or less columns;(d) no linear dependency involving columns Ci, Cj, Ck, Cm, where m>k>j>i, where j=i+1 and m=k+1; and(e) no linear dependency involving columns Ci, Cj, Ck, Cm, where m>k>j>i, where (j=i+1 and m−k=q) or (k=j+1 and m−i=q) or (m=k+1 and j−i=q) for all integer values of q such that q>1 and q<=d, where d>=2 and d<=n−1 where n−k is a number of the check bits.
Partial-maximum distance separable (PMDS) erasure correcting codes for storage arrays
Embodiments of the invention relate to storing data in a storage array. An aspect of the invention includes receiving and arranging read data in array that includes m rows and n columns of entries, with each entry including at least one sector. In the array, mr+s locations are assigned to parity entries, such that each row has at least r parity entries. The parity entries correspond to a partial-maximum distance separable (PMDS) code that allows recovery from up to r erasures in each of the m rows as well as s additional erasures in any locations in the data array, where s is an integer greater than zero. The write data and the associated parity entries are written to the set of storage devices.
Systems and methods to initiate updating of reference voltages
In a data storage device that includes a non-volatile memory, a method includes determining that a current error correction code page count (CEC) is at least as large as a target error correction code page count (TEC). The CEC is a page count of error correction code (ECC) pages of data read from the memory during a time period from a previous time to a particular time using a set of reference voltages. In response to the CEC being at least as large as the TEC, the method includes updating a subset of the set of reference voltages conditioned upon a difference between a current mean error count (CMEC) and a previous mean error count being at least as large as a target mean delta error. The CMEC is based on a count of read errors associated with the ECC pages read during the time period.
Pre-fetching data segments stored in a dispersed storage network
A method begins by a processing module receiving a data segment retrieval request regarding a data segment, which is stored in a dispersed storage network (DSN) memory. The method continues with the processing module processing the data segment retrieval request, determining pre-fetch segment buffering information, and when the pre-fetch segment buffering information indicates pre-fetching one or more other data segments, generating one or more pre-fetch segment retrieval requests for the one or more other data segments, receiving, one or more sets of at least a decode threshold number of encoded data slices, decoding, in accordance with a dispersed storage error coding function, the one or more sets of at least a decode threshold number of encoded data slices to reproduce the one or more other data segments, and updating a pre-fetch segment buffer with the one or more other data segments.
Modification of error statistics behind equalizer to improve inter-working with different FEC codes
This invention relates to a receiver circuit which comprises an equalizer (27) and an error decorrelator (25). The error decorrelator being configured for changing (501; 601, 602) the position of symbols. The invention further relates to a corresponding method. This invention finally relates to an interleaving or deinterleaving method which comprises selecting a first number of symbols (204; 302) within a stream of digital data (13; 28) thereby obtaining selected symbols. The method further comprises exchanging (601, 602) the position of at least half of said first number of symbols of said selected symbols with the position of other symbols from said selected symbols. The invention further relates to an interleaving or deinterleaving circuit.
Storage device including error correction function and error correction method
According to one embodiment, a storage device includes a first encoder, a storage medium, a second encoder, and a wireless communication unit. The first encoder generates a first codeword including a first information part corresponding to at least a part of write data, and a first redundant part used to correct the first information part. The storage medium stores the first codeword. The second encoder generates a second redundant part used to correct a second information part corresponding to the first codeword or the first information part. The wireless communication unit wirelessly transmits the second redundant part to an external storage device.
Method of creating target storage layout table referenced for partitioning storage space of storage device and related electronic device and machine-readable medium
An exemplary method of creating a target storage layout table referenced for partitioning a storage space of a storage device includes following steps: identifying defective storage areas in the storage space of the storage device, and accordingly generating an identification result; and creating the target storage layout table according to the identification result.
Chip applied to serial transmission system and associated fail safe method
A chip applied to a serial transmission system includes an input terminal, a core circuit, an output terminal, a first transmission line, a second transmission line and a spare transmission line, where the input terminal is used to receive an input signal from a source outside the chip, the output terminal is used to output an output signal, the first transmission lines is coupled between the input terminal and the core circuit, the second transmission line is coupled between the core circuit and the output terminal, and the spare transmission line is coupled between the input terminal and the output terminal. When the core circuit cannot process the input terminal normally, the input signal is directly transmitted to the output terminal via the spare transmission line, and the input signal serves as the output signal to be outputted from the output terminal.
Three dimensional(3D) memory device sparing
According to one embodiment of the present invention, a method for bank sparing in a 3D memory device that includes detecting, by a memory controller, a first error in the 3D memory device and detecting a second error in a first element in a first rank of the 3D memory device, wherein the first element in the first rank has an associated first chip select. The method also includes sending a command to the 3D memory device to set mode registers in a master logic portion of the 3D memory device that enable a second element to receive communications directed to the first element and wherein the second element is in a second rank of the 3D memory device, wherein the first element and second element are each either a bank or a bank group that comprise a plurality of chips.
Providing error handling support to legacy devices
In one embodiment, the present invention includes a method for handling a request received in an agent designed in accordance with a peripheral component interconnect (PCI) specification using PCI Express semantics. More specifically, responsive to determining that the agent does not support the request, an unsupported request detection register of the agent can be updated, and a response sent from the agent to indicate that the agent does not support the request. Other embodiments are described and claimed.
Methods and structure to assure data integrity in a storage device cache in the presence of intermittent failures of cache memory subsystem
Methods and structure for enabling re-training of a DDR memory controller in a storage device without loss of data in the DDR memory devices of the cache memory in response to detecting failure of the memory subsystem during operation of the storage device. In response to detecting a failure of the memory subsystem, the memory controller is reset without resetting the memory devices. The memory controller is then re-trained for operation with the memory device. During the re-training, self-refresh mode of the memory devices is disabled and manual refresh is performed by a processor of the storage device to thereby retain any user data in the memory device.
Managing code-tracing data
A method of managing code-tracing data is described. The method comprises the steps of: analyzing a log of code-tracing data to identify a module in which an error occurred; activating code-tracing at a high detail level in that module; identifying modules associated with that module; and activating code-tracing at a high detail level in those identified modules.
Storage device error simulator tool
The system and method provide establishment of hooks in a send-path at inter-object interfaces of a layered stack of the storage driver and hooks in the completion-path execution sequence of storage driver of a storage system, the completion-path hook inserts replacement storage response messages to simulate the specified storage access error.
Controlling program code execution shared among a plurality of processors
The present invention enables program codes to be shared among processors 211. To prevent the debug operation of one processor 211 from affecting the debug operation of the other processors 211, when detecting a breakpoint during execution of a program code, a debugger 410 or a debugger stub 520 controls the execution of the program code while exchanging breakpoint information 800 with the other debuggers 410 or the other debugger stubs 520. Furthermore, a circuit 170 is created which prevents the program code being carelessly rewritten due to thermal runaway, a bug, and the like of a processor 211, and the protection setting by the protection logic 71 in the circuit 170 is released only in case the processor 211 accesses each of a plurality of registers from 65 to 67 in specified order.
Detecting problems in content distribution
Detecting a problem in a content distribution is disclosed. Performance information associated with a first content player is received form a first client. Performance information associated with a second content player is received from a second client. The information received from the first client and the second client is aggregated. A determination is made, from the aggregated information, that a problem is indicated. Alternate techniques for detecting a problem in a content distribution are also disclosed.
Error detection in a mirrored data storage system
A method and system for are provided for error detection in a mirrored data storage system. The method includes a first mirrored system applying a first error correction code (ECC) algorithm and a second mirrored system applying a second error correction code algorithm. The method reads recovered data in each of the first and second mirrored systems and processes the recovered data in each of the first and second mirrored systems by applying both first and second error correction code algorithms to produce four calculated error correction code values. The method uses the calculated error correction code values to determine the correct recovered data of the first and second mirrored systems.
Dynamic cache correction mechanism to allow constant access to addressable index
A technique is provided for a cache. A cache controller accesses a set in a congruence class and determines that the set contains corrupted data based on an error being found. The cache controller determines that a delete parameter for taking the set offline is met and determines that a number of currently offline sets in the congruence class is higher than an allowable offline number threshold. The cache controller determines not to take the set in which the error was found offline based on determining that the number of currently offline sets in the congruence class is higher than the allowable offline number threshold.
System and method of cloud testing and remote monitoring for integrated circuit components in system validation
In a method and system for cloud testing and remote monitoring of an IC component during validation of a computerized system connected to a cloud server via a wide area network, upon determining that a unique system code of a system platform and a unique component code of the IC component transmitted from the computerized system in response to execution of an identification operating system (OS) program and a driver from the cloud server match identification data, the cloud server transmits a corresponding test OS and a corresponding test program to the computerized system such that the computerized system produces test data corresponding to the corresponding test program in response to execution of the corresponding test OS and test program.
Power management for input/output devices
A method for managing power consumption by a network device is disclosed. The network device includes first and second ports, each of the first and second ports identified by a unique identifier and adapted to handle separate network traffic. The method includes verifying that the first and the second ports are connected to a common network end node; shutting off a link between the first port and the network end node; obtaining the unique identifier of the first port; creating, on the second port, a virtual port in response to the unique identifier of the first port; discovering the virtual port on the network device; and redirecting traffic formerly routed through the link through the virtual port.
Control for electrically isolating power supply from external source with momentary switch and latching relay controlled by signal generated from power supply voltage
A system includes a power supply and a power switch to connect an external power source that is external to the system to the power supply. The power switch has an on position and an off position. The power switch if actuated to the off position causes the system to be electrically isolated from the external power source. A control circuit is responsive to actuation of the power switch to provide a signal to cause software control of a power state of the system.
Construction equipment remote control system and method for controlling data transmission/reception while the construction equipment is in engine-off state
The present disclosure relates to a system and a method of remote management of a construction equipment for controlling transmission and reception of data of the construction equipment in a a key-off state. To this end, a system of remote management of a construction equipment according to the present disclosure includes a server communicatable with a communication terminal through a communication network; and a construction equipment where the communication terminal, a equipment control unit, and a plurality of electronic control devices are installed, wherein the communication terminal, the equipment control unit, and the electronic control devices are supplied standby power from a battery provided in the construction equipment, when the equipment control unit receives a key-off signal, the equipment control unit transfers a sleep mode switching command to the communication terminal and the electronic control devices of which operation modes are switched to a sleep mode, when the communication terminal wakes up from the sleep mode state at the time of receiving an operation request from the server and thereafter, wakes up the equipment control unit and transfers the requested operation of the server, and the equipment control unit performs the operation singly when performing the operation singly and thereafter, switches over to the sleep mode when completing the operation, and when the operation is associated with at least one of the electronic control devices, the equipment control unit performs the operation by waking up the corresponding electronic control device and switches the waked up electronic control device to the sleep mode when completing the operation.
Provided is a communication device connected to a network access device constituting a network and capable of communication through the network, includes: a circumstance determining unit that determines whether or not the network is in a circumstance of executing a protocol causing blocking of communication on the network by changing the link speed to the network access device; a power saving determining unit that determines whether or not a predetermined power saving performance condition is satisfied; and a link speed control unit that maintains the link speed when it is determined that the power saving performance condition is satisfied and when the network is in the circumstance of executing the protocol.
Asynchronous management of access requests to control power consumption
Systems and methods are disclosed for asynchronous management of access requests to control power consumption. In some cases, by asynchronously managing power within a system, multiple dies of a NVM can simultaneously draw current in order to match the power demand. In particular, an arbiter of the system can receive multiple requests to draw current, where each request may be associated with a different die of the NVM. In some embodiments, the arbiter can determine the servicing order using the time of arrival of the request (e.g., a first-in, first-out scheme). In other embodiments, the arbiter can simultaneously service multiple requests so long as the servicing of the multiple requests does not exceed a power budget.
Apparatus and method for controlling power consumption using printer settings
The present invention provides an information processing apparatus including: a first control section that, when execution of printing at a printing device connected via a communications section is instructed, performs control to display at a display section a print settings screen for making settings relating to the printing; a calculation section that calculates an estimated value of power consumption that the printing device will consume if the printing is executed on the basis of the settings relating to printing; and a second control section that, when a pre-specified operation is performed at the print settings screen, performs control to display the estimated value of power consumption and display at the display section an energy saving settings screen for making, of the settings relating to printing, settings relating to energy saving.
Terminal device, verification device, key distribution device, content playback method, key distribution method, and recording medium
The terminal device 600 comprises: a read unit configured to read encrypted content and a content signature from a regular region of a recording medium device 700, and to read a converted title key from an authorized region of the recording medium device 700, the converted title key having been converted from a title key with use of a content signature generated by an authorized signature device 500; a title key reconstruction unit configured to generate a reconstructed title key by reversely converting the converted title key with use of the content signature read by the read unit; and a playback unit configured to decrypt the encrypted content with use of the reconstructed title key to obtain decrypted content, and to play back the decrypted content.
Nonvolatile memory device and operating method
Disclosed is an operating method of a non-volatile memory device which comprises randomizing data to store the randomized data; erasing the randomized data; and outputting erase data according to information of a flag cell of the non-volatile memory device at a read operation.
A storage system stores information about a graph in an encrypted form. A query module can submit a token to the storage system to retrieve specified information about the graph, e.g., to determine the neighbors of an entity in the graph, or to determine whether a first entity is connected to a second entity, etc. The storage system formulates its reply to the token in a lookup result. Through this process, the storage system gives selective access to information about the graph to authorized agents, yet otherwise maintains the general secrecy of the graph from the perspective of unauthorized agents, including the storage system itself. A graph processing module can produce encrypted graph information by encrypting any representation of the graph, such as an adjacency matrix, an index, etc.
Cross domain discovery
Aspects of the disclosure provide methods and systems for cross domain discovery. According to the disclosure, an object can include multiple entities defined by an originator. The multiple entities have different scopes corresponding to different access restrictions. Further, the originator defines keywords for each of the multiple entities. A system for cross domain discovery stores the multiple entities in an object service component, and stores the keywords and access restrictions in a search service component. The search service component conducts a search based on the keywords and access restrictions in response to a search request from a user. An entity is provided to the user based on the user's credential and the searching.
System and method for obfuscating constants in a computer program
Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for obfuscating constants in a binary. The method includes generating a table of constants, allocating an array in source code, compiling the source code to a binary, transforming the table of constants to match Pcode entries in an indirection table so that each constant in the table of constants can be fetched by an entry in the indirection table. A Pcode is a data representation of a set of instructions populating the indirection table with offsets toward the table of constants storing the indirection table in the allocated array in the compiled binary. The method further includes populating the indirection table with offsets equivalent to the table of constants, and storing the indirection table in the allocated array in the compiled binary. Constants can be of any data type. Constants can be one byte each or more than one byte each. In one aspect, the method further includes splitting constants into two or more segments, treating each segment as a separate constant when transforming the table of constants, and generating a function to retrieve and reconstruct the split constants.
Systems and methods to scan memory for a threat
A computer-implemented method to scan memory for a threat is described. At least one application programming interface (API) is monitored. A back-trace operation is performed from the at least one API to identify a process that called the at least one API. An address in memory is retrieved for the identified process. At least a portion of the memory associated with the address of the identified process is scanned. A signature based on the scanned portion of the memory is generated.
Policy-based signature authentication system and method
In various example embodiments, a system and method for providing policy-based authentication is provided. In example embodiments, a request to access and sign a document is received from a device of an intended signer. A policy assigned to the intended signer is determined. Based on the policy, a determination is made whether an authentication mechanism is applicable to the intended signer. In response to the determining that the authentication mechanism is applicable to the intended signer, the intended user is required to perform the authentication mechanism. The intended user is provided access to view and sign the document based on the intended user satisfying the authentication mechanism.
Systems and methods for multi-layered authentication/verification of trusted platform updates
In accordance with the present disclosure, a system and method for multilayered authentication of trusted platform updates is described. The method may include storing first cryptographic data in a personality module of an information handling system, with the first cryptographic data corresponding to a verified firmware component. A second cryptographic data may also be determined, with the second cryptographic data corresponding to an unverified firmware component. The unverified firmware component may be stored in a memory element of the information handling system, and the second cryptographic data may be determined using a processor of the information handling system. The method may further include determining if the first cryptographic data matches the second cryptographic data and updating firmware in the information handling system with the unverified firmware component if the first cryptographic data matches the second cryptographic data, and the unverified firmware component includes a digital signature of a manufacturer.
Verifying cryptographic signature from stored primitives of previously received signature
Embodiments provide systems and methods to optimize signature verification time for a cryptographic cache. Time is reduced by eliminating at least some of the duplicative application of cryptographic primitives. In some embodiments, systems and methods for signature verification comprise obtaining a signature which was previously generated using an asymmetrical cryptographic scheme, and determining whether an identical signature has previously been stored in a signature cache. If an identical signature has been previously stored in the signature cache, retrieving previously generated results corresponding to the previously stored identical signature, the results a consequence of application of cryptographic primitives of the asymmetrical cryptographic scheme corresponding to the identical signature. The results are forwarded to a signature verifier. In at least some embodiments, at least one of these functions occurs in a secure execution environment.
Conditional access method and system for broadcast services
A method for conditionally allowing fruition of broadcast contents, broadcast by a contents broadcaster and received by a user by means of a receiving equipment, includes: performing, locally at the receiving equipment of the user, a first fruition entitlement check based on first fruition entitlement data available locally at the receiving equipment; having the receiving equipment provide to the contents broadcaster the first fruition entitlement data exploiting a return communications channel of the receiving equipment; having the contents broadcaster perform a second fruition entitlement check based on a comparison between the received first fruition entitlement data and second fruition entitlement data available locally to the contents broadcaster; and conditioned on a result of the second check, having the contents broadcaster provide to the receiving equipment, exploiting the return communications channel, a fruition entitlement confirmation notification; at the receiving equipment, conditioning the fruition of the broadcast contents based on the receipt of the fruition entitlement confirmation by the contents broadcaster.
Introduction of discrete roots of trust
Systems and methods may provide introducing a first root of trust on a platform to a second root of trust on the same platform. In one example, the method may include using an authenticated code module to transfer a first encryption key from a first root of trust on a platform to a second root of trust on the platform, receiving a challenge response from the first root of trust at the second root of trust, and using the first encryption key to verify the challenge response.
Process for storing data on a central server
This disclosure describes a process for storing data on a central server with a plurality of users, each of them having their own user password used for creating a user key, being respectively assigned to some of these users, and some of the data, being divided into data blocks to be uploaded, and each data block being compared to data blocks on the server based on a unique data block ID value in order to determine whether a corresponding data block is already stored on the server and to upload to the server those data blocks which are not already present, a data block list to be uploaded being created and uploaded to the central server, so that in a data recovery step data stored on the central server which are requested by the user can be restored in their original form based on said list.
Authentication of data streaming service
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and determining whether the security token is valid. Providing the service may also involve determining a session security token if the security token is valid and generating a service response including the session security token. Providing the service may further involve receiving a service request including the session security token, determining whether the session security token is valid, and, if the session security token is valid, generating a second service response.
Method of switching between multiple operating systems of computer system
A method of switching between multiple operating systems of a computer system includes the following steps. Firstly, the computer system is in an environment of a first operating system. Then, a system management interrupt is triggered to allow the computer system to enter a system management mode, and a controlling authority of the computer system is transferred from the first operating system to a basic input output system. Then, a backup of a first environmental parameter of the first operating system is created. If the second environmental parameter is not included in the computer system, a second operating system is loaded in a normal mode. On the other hand, if the second environmental parameter is included in the computer system, the second operating system is booted according to the second environmental parameter.
Thread synchronization in a multi-thread, multi-flow network communications processor architecture
Described embodiments provide a packet classifier for a network processor that generates tasks corresponding to each received packet. The packet classifier includes a scheduler to generate contexts corresponding to tasks received by the packet classifier from processing modules of the network processor. The packet classifier processes threads of instructions, each thread of instructions corresponding to a context received from the scheduler, and each thread associated with a data flow. A thread status table has N entries to track up to N active threads. Each status entry includes a valid status indicator, a sequence value, a thread indicator and a flow indicator. A sequence counter generates a sequence value for each data flow of each thread and is incremented when processing of a thread is started, and is decremented when a thread is completed. Instructions are processed in the order in which the threads were started for each data flow.
Dynamic VVDS expansion
A method for addressing an out-of-space condition for a Virtual Storage Access Method (VSAM) Volume Data Set (VVDS) includes detecting an out-of-space condition in a VVDS on a volume. The method creates, in response to the out-of-space condition, a new VVDS on the volume without adding a record to the old VVDS (e.g., by bypassing “catalog services”). The new VVDS is assigned a temporary name. The method then copies records from the old VVDS to the new VVDS. The method may then rename the old VVDS to a temporary name and rename the new VVDS to the original name of the old VVDS. The old VVDS may then be deleted. Alternatively, instead of renaming the old VVDS to a temporary name, the old VVDS may be deleted. The new VVDS may then be renamed to the original name of the old VVDS. A corresponding apparatus and computer program product are also described.
Memory access system
Embodiments of the present invention provide methods of reading data from and writing data to a memory, computer program products for performing such methods, and apparatus for reading data from and writing data to, a memory, which apparatus may be implemented, for example, as a Field Programmable Gate Array (FPGA). A key associated with data to be read from or written to the memory is converted into two separate values, which values are themselves converted into first and second index values, each having an associated signature value. The index values are used as indices to a signature table containing a signature value for each data entry stored in the memory from which data is to be read or to which data is to be written. In a read operation, a signature of the signature table which matches one of the signature values derived from the key is identified and a read address is calculated based on the index value associated with the matching signature value derived from the key. In a write operation, a signature value is written to the signature table at an address corresponding to one of the index values derived from the key, and a write address is calculated based on that index value.
Method for selectively enabling and disabling read caching in a storage subsystem
A mechanism for selectively disabling and enabling read caching based on past performance of the cache and current read/write requests. The system improves overall performance by using an autonomic algorithm to disable read caching for regions of backend disk storage (i.e., the backstore) that have had historically low cache hit ratios. The result is that more cache becomes available for workloads with larger hit ratios, and less time and machine cycles are spent searching the cache for data that is unlikely to be there.
Local and global memory request predictor
A method, circuit arrangement, and design structure utilize broadcast prediction data to determine whether to globally broadcast a memory request in a computing system of the type that includes a plurality of nodes, each node including a plurality of processing units. The method includes updating broadcast prediction data for a cache line associated with a first memory request within a hardware-based broadcast prediction data structure in turn associated with a first processing unit in response to the first memory request, the broadcast prediction data for the cache line including data associated with a history of ownership of the cache line. The method further comprises accessing the broadcast prediction data structure and determining whether to perform an early broadcast of a second memory request to a second node based on broadcast prediction data within the broadcast prediction data structure in response to that second memory request associated with the cache line.
Sectored cache with a tag structure capable of tracking sectors of data stored for a particular cache way
Technologies are generally described for a system for copying particular data in a particular sector of a particular block from a memory into a cache, in some examples, the cache includes a tag array and a data array. In some examples, a processor may be adapted to copy data in the particular sector from the memory into a way of the data array starling at a start sector. In some examples, the processor may be adapted to update the tag array to identify the particular sector. In some examples, the processor may be adapted to update the tag array to identify the way in the data array, in some examples, the processor may be adapted to update the tag array to identify the start sector.
Intelligence for controlling virtual storage appliance storage allocation
A change in workload characteristics detected at one tier of a multi-tiered cache is communicated to another tier of the multi-tiered cache. Multiple caching elements exist at different tiers, and at least one tier includes a cache element that is dynamically resizable. The communicated change in workload characteristics causes the receiving tier to adjust at least one aspect of cache performance in the multi-tiered cache. In one aspect, at least one dynamically resizable element in the multi-tiered cache is resized responsive to the change in workload characteristics.
Padding buffer requests to avoid reads of invalid data
A system and method for buffering intermediate data in a processing pipeline architecture stores the intermediate data in a shared cache that is coupled between one or more pipeline processing units and an external memory. The shared cache provides storage that is used by multiple pipeline processing units. The storage capacity of the shared cache is dynamically allocated to the different pipeline processing units as needed, to avoid stalling the upstream units, thereby improving overall system throughput.
Systems with programmable heterogeneous memory controllers for main memory
A translating memory module is disclosed including a printed circuit board, at least one memory integrated circuit coupled to the printed board, and at least one support chip coupled to the printed circuit board and coupled between the edge connector and the at least one memory integrated circuit. The at least one support chip includes a bi-directional translator to translate between a first memory communication protocol for the at least one memory integrated circuit and a second memory communication protocol for a memory channel differing from the first memory communication protocol. The second memory communication protocol to communicate data, address, and control signals over the memory channel bus to read and write data into the memory of the translating memory module.
Adaptive prestaging in a storage controller
In one aspect of the present description, at least one of the value of a prestage trigger and the value of the prestage amount, may be modified as a function of the drive speed of the storage drive from which the units of read data are prestaged into a cache memory. Thus, cache prestaging operations in accordance with another aspect of the present description may take into account storage devices of varying speeds and bandwidths for purposes of modifying a prestage trigger and the prestage amount. Other features and aspects may be realized, depending upon the particular application.
Providing dynamic databases for a TCAM
A network device allocates a particular number of memory blocks in a ternary content-addressable memory (TCAM) of the network device to each database of multiple databases, and creates a list of additional memory blocks in an external TCAM of the network device. The network device also receives, by the external TCAM, a request for an additional memory block to provide one or more rules from one of the multiple databases, and allocates, by the external TCAM and to the requesting database, an additional memory block from the list of additional memory blocks.
Embedded memory and dedicated processor structure within an integrated circuit
An integrated circuit can include a programmable circuitry operable according to a first clock frequency and a block random access memory. The block random access memory can include a random access memory (RAM) element having at least one data port and a memory processor coupled to the data port of the RAM element and to the programmable circuitry. The memory processor can be operable according to a second clock frequency that is higher than the first clock frequency. Further, the memory processor can be hardwired and dedicated to perform operations in the RAM element of the block random access memory.
Scheduling policy for queues in a non-volatile solid-state storage
A method of applying scheduling policies is provided. The method includes distributing user data throughout a plurality of storage nodes through erasure coding, wherein the plurality of storage nodes are housed within a single chassis coupling the storage nodes as a cluster. The method includes receiving operations relating to a non-volatile memory of one of the plurality of storage nodes into a plurality of operation queues. The method includes evaluating each of the operations in the plurality of operation queues as to benefit to the non-volatile solid-state storage according to a plurality of policies. For each channel of a plurality of channels coupling the operation queues to the non-volatile memory, the method includes iterating a selection and an execution of a next operation from the plurality of operation queues, with each next operation having a greater benefit than at least a subset of operations remaining in the operation queues.
Data placement based on data properties in a tiered storage device system
A method for managing non-volatile memory is provided. The method includes determining at least one property of a data and determining to which type of a plurality of types of flash memory to write the data, based on the at least one property of the data. The plurality of types of flash memory includes at least two types having differing numbers of bits per cell. The method includes writing the data to a flash memory of the determined type. A flash manager and a flash storage device are provided.
Method for controlling memory array of flash memory, and flash memory using the same
A control method for a Flash memory array and a Flash memory is disclosed. The Flash memory array includes a plurality of blocks which are classified into groups and each group includes at least one block. The control method includes the steps of: recognizing an attribute of data transferred from a host, obtaining a storage group selected from the groups based on the attribute of the data, and storing the data into the blocks of the storage group and thereby the blocks of a same group store data of a same attribute; and performing a valid data collection, restricted to the blocks belonging to a same group, to release blocks of space.
Storage system and storage system control method
The device controller (a) executes a data I/O process with respect to a physical storage area in accordance with an I/O command, and (b) sends to the storage controller an I/O command-related response comprising status information subsequent to being changed in accordance with the I/O process. The storage controller (A) receives the response from the target physical storage device, and (B) based on the status information included in the response received in (A), makes a determination as to whether or not to execute internal processing, and in a case where the result of the determination is to execute internal processing, sends to the target physical storage device an internal processing execution command instructing the execution of internal processing. The device controller in the target physical storage device (c), upon receiving the internal processing execution command, executes internal processing in accordance with the internal processing execution command.
Scheduling access requests for a multi-bank low-latency random read memory device
Described herein are method and apparatus for scheduling access requests for a multi-bank low-latency random read memory (LLRRM) device within a storage system. The LLRRM device comprising a plurality of memory banks, each bank being simultaneously and independently accessible. A queuing layer residing in storage system may allocate a plurality of request-queuing data structures (“queues”), each queue being assigned to a memory bank. The queuing layer may receive access requests for memory banks in the LLRRM device and store each received access request in the queue assigned to the requested memory bank. The queuing layer may then send, to the LLRRM device for processing, an access request from each request-queuing data structure in successive order. As such, requests sent to the LLRRM device will comprise requests that will be applied to each memory bank in successive order as well, thereby reducing access latencies of the LLRRM device.
A monitoring system including a first and a second portion. The first portion includes a controller for receiving a code sequence. The first portion is configured to connect the system to a common data bus. The first portion is configured to provide a synchronization signal to the second portion when the two portions are in a predetermined position. The second portion includes a controller for providing the code sequence to the first portion and the first portion being further configured to output the code sequence for verification by a verification entity.
System for out of band management of rack-mounted field replaceable units
A system for the management of rack-mounted field replaceable units (FRUs) that affords the enhanced availability and serviceability of FRUs provided by blade-based systems but in a manner that accommodates different types of FRUs (e.g., in relation to form factors, functionality, and the like) installed within a rack or cabinet.
Resolving address conflicts for master-slave communications over a single-wire bus between a master circuit and at least two slave circuits
A method of transmission over a serial bus, between a master circuit and two slave circuits, wherein each slave circuit makes the transmission of a first one of two binary states depend on the absence of a transmission of the second binary state by the other slave circuit.
Switch-state information aggregation
One switch-state aggregation technique uses a digital-to-analog converter in combination with an analog-to-digital converter to aggregate the state of a plurality of switches. Another switch-state aggregation technique uses input/output lines of a processor to aggregate the state of a plurality of switches and to communicate data other than the state of the switches. These techniques can be used to aggregate information about whether a plug or other connector is inserted into the ports of a patch panel or other telecommunication or communication assembly, system, or device.
Assembly and a method of receiving and storing data while saving bandwidth by controlling updating of fill levels of queues
An assembly where a number of receivers receiving packets for storing in queues in a storage and a means for de-queuing data from the storage. A controller determines addresses for the storage, the address being determined on the basis of at least a fill level of the queue(s), where information relating to de-queues addresses is only read-out when the fill-level(s) exceed a limit so as to not spend bandwidth on this information before it is required.
Storage-side storage request management
Techniques are provided for managing, within a storage system, the sequence in which I/O requests are processed by the storage system based, at least in part, on one or more logical characteristics of the I/O requests. The logical characteristics may include, for example, the identity of the user for whom the I/O request was submitted, the service that submitted the I/O request, the database targeted by the I/O request, an indication of a consumer group to which the I/O request maps, the reason why the I/O request was issued, a priority category of the I/O request, etc. Techniques are also provided for automatically establishing a scheduling policy within a storage system, and for dynamically changing the scheduling policy in response to changes in workload.
Methods and apparatus for managing multipathing software
An embodiment of a method of managing multipathing in a computer system including the steps of establishing a plurality of concurrent multipathing processes on the computer system; disassociating a plurality of operational data paths from a first of the multipathing processes; and associating the operational data paths with a second of the multipathing processes.
High performance and grid computing with quality of service control
High performance computing (HPC) and grid computing processing for seismic and reservoir simulation are performed without impacting or losing processing time in case of failures. A Data Distribution Service (DDS) standard is implemented in High Performance Computing (HPC) and grid computing platforms, to avoid the shortcomings of current Message Passing Interface (MPI) communication between computing modules, and provide quality of service (QoS) for such applications. QoS properties of the processing can be controlled.
Parameter management apparatus for acoustic apparatus
A parameter management apparatus manages a plurality of parameters provided for control of an externally connected acoustic apparatus. The parameter management apparatus has a storing portion for storing a plurality of parameters stored in the acoustic apparatus. The parameter management apparatus selects, from among the parameters stored in the storing portion and the acoustic apparatus, respectively, at least one parameter for which a match is caused between the storing portion and the acoustic apparatus. The parameter management apparatus then causes exact a match between the at least one parameter stored in the storing portion and the at least one parameter stored in the acoustic apparatus.
Aspect oriented application of a mediator in an enterprise service bus (ESB) of a service oriented architected data processing system
Embodiments of the present invention address deficiencies of the art in respect to mediation application in an ESB and provide a novel and non-obvious method, system and computer program product for aspect oriented application of a mediation in an ESB. In one embodiment, a method for aspect oriented application of a mediation in an ESB can be provided. The method can include installing an aspect in an ESB, the aspect referencing at least one mediation and associating the at least one mediation with at least one target in the ESB. The method further can include applying the at least one mediation in the aspect to each associated target in the ESB.
Techniques for using a general query to circumvent specific query response failure in an IGMP system
Flexibility of handling of multicast information using an Internet Group Management Protocol (IGMP) is improved by overcoming failures to respond to group specific queries. Such failures occur when heterogenous host devices are used on a common network. When a failure to respond to a group specific query is experienced, a general query is used to obtain information that was not provided by the group specific query.
Methods and apparatus for improving header compression
A method and apparatus for reducing HTTP header is provided. The method may include receiving a suppression identifier list, wherein the suppression identifier list associates header identifier values with at least a portion of one or more header content items in an HTTP header, replacing the one or more header content items with the corresponding header field identifier from the suppression identifier list, and transmitting the data packet with the one or more header field identifiers replacing the corresponding one or more header content items.
Automatically reconnecting a client across reliable and persistent communication sessions
The invention relates to methods and systems for reconnecting a client and providing user authentication across a reliable and persistent communication session. The method includes providing a first connection between a client and first protocol service and a second connection between the first protocol service and a host service. The first protocol service detects a disruption in the first connection. The client re-establishes the first connection between the client and the first protocol service while maintaining the second connection between the first protocol service and the host service. The first protocol service receives a ticket associated with the client and validates the ticket. The first protocol service links the re-established first connection to the maintained second connection after the ticket is validated.
Application based routing arrangements and method thereof
An application-based routing arrangement for routing a plurality of data packets associated with a set of applications partially through a network is provided. The application based policy includes the first set of rules associated with the first application of the set of applications, which includes the first routing specification for routing the first set of data packets. The application routing table is configured to dynamically update the first set of parameters when the first application is connected to the network. The application routing table also includes a hook module to configure the matching of the first data packet associated with the first application against the application routing table to determine the first routing specification using the first routing specification if a match is found.
Optimized consumption of third-party web services in a composite service
Technologies are described herein for routing a service request to an appropriate web service. A first service request is routed from a first web service to a second web service. Routing factors associated with the second web service are monitored. A determination is made as to whether the routing factors indicate that the second web service is no longer appropriate for handling service requests. If the routing factors indicate that the first web service is no longer appropriate for handling service requests, then a second service request is routed from the first web service to a third web service. The first web service, the second web service, and the third web service are included in a composite service.
Network traffic control by association of network packets and processes
An information handling system (IHS) includes a plurality of processors that include a cache memory, and a receive side scaling (RSS) indirection table with a plurality of pointers each pointing to a processor. A network data packet received by the IHS determines a pointer to a first processor. In response, information associated with the network data packet is transferred to the cache memory of the first processor, The IHS also includes a process scheduler that moves a process associated with the network data packet from a second processor to the first processor, and RSS module that directs the process scheduler to move the process and associates the first pointer with the processor in response to directing the process scheduler. In one embodiment, the processes are virtual machines so that network packets associated with a virtual machine are processed by sending an interrupt to a processor supporting executing the virtual machine.
Method and system for forwarding messages received at a traffic manager
A method and system for forwarding messages received at a traffic manager. A traffic manager receives a message from a first connection to a client computer. At least a part of the message is to be forwarded to a server. If a connection exists to the server that matches the first connection, at least a part of the message is forwarded to the server by employing the existing connection. Otherwise, a source address is selected with which to communicate with the server. A new connection that includes the source address and a destination address associated with the server is opened. In addition, information associating the source address and the destination address with the first connection is stored. This information may then be used to map a response received from the server to the first connection.
Configurable download timing and reward system in a data network
A system and method are provided for determining whether a transaction between a subscriber and a merchant website requires downloading and/or streaming digital objects. In response to a determination that the transaction does require downloading and/or streaming of digital objects, a subscriber is provided with various options for delaying such downloading and/or streaming in return for incentives of varying value.
Data buffering and notification system and methods thereof
An interceptor program at a computer device intercepts certain externally initiated communications intended for the peer program before those communications are placed on the network stack. Further, the interceptor program stores the received communications in a buffer in application space, rather than kernel space. The interceptor program can then intercept polling requests from the peer program inquiring if data for the peer program is located at the network stack, and provide the buffered communications to the peer program in response. Because the communications are stored in application space, rather than kernel space, the data can be rapidly provided to the peer program, improving the speed with which the program can respond to the client communications.
Method and apparatus for retrieving and rendering live streaming data
A live streaming system/method provides cross platform live streaming capabilities to mobile devices. A file format compatible with legacy HTTP infrastructure is used to deliver media over a persistent connection. Legacy client media players can dynamically change the encoded rate of the media delivered over a persistent connection. Standard HTTP servers may be used without modification, leveraging standard media players embedded in mobile devices for seamless media delivery over wireless networks with high bandwidth fluctuations.
Balancing a distributed system by replacing overloaded servers
Load-balancing a distributed system by replacing overloaded servers, including the steps of retrieving, by an assembling device using a fragment pull protocol, erasure-coded fragments associated with segments, from a set of fractional-storage servers. Occasionally, while retrieving the fragments, identifying at least one server from the set that is loaded to a degree requiring replacement, and replacing, using the fragment pull protocol, the identified server with a substitute server that is not loaded to the degree requiring replacement. Wherein the substitute server and the remaining servers of the set are capable of delivering enough erasure-coded fragments in the course of reconstructing the segments.
Obtaining group and individual emergency preparedness communication information
A method begins by a processing module obtaining a temporary set of group information, wherein group information pertains to a group identifier (ID), and wherein the group ID is associated with a corresponding set of individual identifiers (IDs) of a plurality of individual IDs. The method continues with the processing module obtaining at least one set of individual information, wherein individual information pertains to an individual ID of the plurality of individual IDs. The method continues with the processing module obtaining a set of group information associated with the at least one set of individual information based on the temporary set of group information.
Using a knowledge network for file transfer protocol
Systems, methods, and apparatus, including software tangibly stored on a computer readable medium, involve executing file transfer protocol (FTP) operations. An FTP request is received, and a first sequence of FTP operations is executed in response to the request. The first sequence of FTP operations defines a first path in a knowledge network that includes multiple nodes. The first path includes a first subset of the nodes. A second sequence of FTP operations is executed. The second sequence of operations defines a second path in the knowledge network, and the second path includes a second subset of the nodes. The first sequence and/or the second sequence is selected as a preferred sequence of operations based at least in part on the execution of the first and second sequences of operations. An identification of the preferred sequence of operations is stored, for example, for use in responding to a subsequent FTP request.
Agile network protocol for secure communications with assured system availability
A plurality of computer nodes communicates using seemingly random IP source and destination addresses and (optionally) a seemingly random discriminator field. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are rejected. In addition to “hopping” of IP addresses and discriminator fields, hardware addresses such as Media Access Control addresses can be hopped. The hopped addresses are generated by random number generators having non-repeating sequence lengths that are easily determined a-priori, which can quickly jump ahead in sequence by an arbitrary number of random steps and which have the property that future random numbers are difficult to guess without knowing the random number generator's parameters. Synchronization techniques can be used to re-establish synchronization between sending and receiving nodes.
Facilitating group access control to data objects in peer-to-peer overlay networks
Methods and apparatuses are provided for facilitating group access controls in peer-to-peer or other similar overlay networks. A group administrator may create a group in the overlay network and may assign peer-specific certificates to each member of the group for indicating membership in the group. A group member peer node can access data objects in the overlay network using its respective peer-specific certificate to authenticate itself as a group member. The authentication is performed by another peer node in the network. The validating peer node can authenticate that the group member is the rightful possessor of the peer-specific certificate using a public key associated with the peer node to which the peer-specific certificate was issued. The validating peer node can also validate that the peer-specific certificate was properly issued to the group member using a public key of the apparatus that issued the peer-specific certificate.
Methods for providing security over untrusted networks
Methods for providing for secure communications across data networks, including untrusted networks. In one embodiment, the method comprises establishing security associations between devices on the network using a digital certificate and key exchange protocol. In one variant, the digital certificate comprises a public encryption key; the recipient of the certificate authenticates the sender using at least the signature, and then generates a cryptographic element (e.g., key), and initialization vector. The key is encrypted and sent back to the originator, where it is decrypted and used to encrypt datagrams sent between the devices. The initialization vector may be used to initialize the encryption algorithm on the receiving device.
Refreshing a session initiation protocol (SIP) session
In one embodiment, a session is refreshed using a message that is simplified for refresh purposes. The refresh message that is used is a message used for another purpose in a protocol (e.g., SIP). For example, a reINVITE message may be used as a refresh message. If the reINVITE message is used for its intended purpose, the reINVITE message may be used to change the characteristics of a session. This reINVITE message includes an SDP and full header such that the parameters can be properly changed. However, the reINVITE message may be used to refresh a session. This may be referred to as a simple refresh message. But, the simple refresh message does not include an SDP or any other message body. The simple refresh message includes only a reduced header. This reduces time spent building and parsing the simple refresh message.
Methods, devices and computer program products for actionable alerting of malevolent network addresses based on generalized traffic anomaly analysis of IP address aggregates
Methods for providing alerts in a network are disclosed. Some methods include collecting network traffic data corresponding to multiple subsets of network addresses during a predefined time interval. A suspect subset of the subsets of network addresses that corresponds to anomalous network activity may be identified based on the network traffic data and using at least one of multiple anomaly detection metrics. A source network address within the suspect subset of network addresses that corresponds to the anomalous network activity is identified. An alert corresponding to the source network address may be generated.
Session initiation protocol adaptor
A SIP adaptor modifies the format of a session initiation protocol (SIP) message. A SIP message in a first format is received by the SIP adaptor from a first SIP server that is based on the first message format. The SIP adaptor modifies the SIP message to a second format and forwards the modified SIP message to a second SIP server that is based on the second message format. By modifying SIP messages, the SIP adaptor allows communications sessions to be established between clients of SIP servers that utilize dissimilar SIP message formats.
Method of facilitating IP connections to hosts behind middleboxes
The present invention relates to a method and arrangement of facilitating the establishment of peer-to-peer IP connections between a public network and hosts in a private or home network. The method uses a port mapping table residing in a NAT that maps external public IP addresses and external port numbers to private IP addresses and internal port numbers. This table has so far been configured manually by a user of the private or home network. Apart from being cumbersome, it demands skills in router and network technology, skills an ordinary user of a home network often does not have. The present invention solves this problem by automatically configuring the table comprising the steps of scanning the hosts using a port scanner and detecting the internal ports in the hosts that are in an open state.
Optimized cooperation between resource list servers and presence servers
A method, system and computer program product for optimized cooperation between resource list servers and presence servers. The method including receiving a subscription request from a watcher, where the subscription request identifies a resource list and is a request to receive presence information regarding each of a plurality of presentities listed on the resource list, and generating a subscription request to a presence server for presence information regarding any presentity listed on the resource list only if no other currently-active subscription request is known by the resource list server to exist for presence information regarding the presentity.
Provision of other than 1:1 resource mapping
A method for providing other than a 1:1 resource mapping may include receiving an indication of a selected resource reference element, receiving an indication of at least one resource to be associated with the resource reference element, and generating, via processing circuitry, a registry including a declarative policy defining an association of the selected resource reference element and the at least one resource in which the registry defines an other than 1:1 mapping between resource reference elements and resources.
Candidate set solver with user advice
A stream application uses small chunks of executable code configured to process data tuples flowing into a processing element. A scheduler allocates the processing elements to individual compute nodes or hosts for execution. However, the stream application may assign various constraints that stipulate which hosts are suitable for a particular processing element. If a host meets the constraints, it may be categorized as an unconditional candidate host. In addition, the scheduler may also track conditional candidate hosts that would be suitable for the processing element if a certain user action is performed—e.g., modifying a constraint, removing a constraint, modifying a stream element, and the like. The list of conditional candidate hosts may then be displayed to the user who can choose to perform the one or more actions to change the conditional candidate host to an unconditional candidate host for the processing element.
Location based access control for content delivery network resources
Mechanisms are provided to allow efficient delivery of content through a content delivery network (CDN) without taxing an origin server while maintaining fine grained location based access control. Requests to a CDN are augmented with quantized and non-quantized versions of location information. A CDN can use quantized location information in a URI to identify and return content if content corresponding to the URI is available in cache. If the content is not available in cache, the CDN can contact an origin server to obtain a result for the request using non-quantized location information. The origin server examines the non-quantized location information to determine whether to respond to the client request with content. The origin server examines the area corresponding to the quantized location information to determine whether the content should be cached at the CDN.
System and method for automatically optimizing capacity between server clusters
A resource management system for a virtual machine computing environment includes a software component that optimizes capacity between server clusters or groups by monitoring the capacity of server clusters or groups and automatically adding and removing host systems to and from server clusters or groups. The software component may be implemented at a server cluster management level to monitor and execute host system moves between server clusters and/or at a higher level in the resource management hierarchy. At the higher level, the software component is configured to monitor and execute host system moves between sets of server clusters being managed by different server cluster management agents.
Customer experience monitor
A network monitoring system is provided that includes a plurality of tiers being arranged in a network having a plurality of hardware and software resources for executing a selective number of applications. The tiers include disparate technology stack formats. A platform resource receives monitoring information from the tiers in their respective disparate technology formats and stores the monitoring information where the monitoring information is normalized into a format that is universally recognized. An aggregation presentation module aggregates and analyzes the monitoring information from the platform resource to determine if there are any anomalies of the hardware and software resources, and formats the monitoring information to be presented as selected real-time performance analytics to a user.
System and method for end-to-end network-based services usage metering validation
Systems and methods for end-to-end network-based services metering validation in a network-based services system may support configuring a client usage simulator on one or more computers to simulate client usage of a network-based services system. The system and method may include implementing an external usage meter in the client usage simulator to monitor and record one or more types of usage and send the information to an auditor implemented on one or more computers. An internal meter in the network-based services system may monitor and record usage of the network-based services system by the client usage simulator. The recorded information may be sent to an auditor for comparison with the external records.
Non-modal dialog for managing blocking of multiple web browser cookies
In order to provide a user with control of how persistent information is used in a Web browser to aid in the display of website content in a non-disruptive manner, a system and a method are provided that allow a user to access a non-modal graphical user interface control using a Web browser. The non-modal graphical user interface control allows the user to specify one or more pieces of persistent information that the Web browser associates with the website content. The Web browser then uses the persistent information to aid in displaying the Web content while allowing the user to continue to use the browser.
System and method for customizing information handling system product and service offerings based on usage profiles
Usage data monitored at information handling systems is collected and analyzed to provide a basis for component selection for information handling systems by associating components with end user usage profiles. For example, a monitor tracks usage data at an end user information handling system and determines that the end user's usage falls within usage pattern defined by analysis of plural other end users. The end user is directed towards selection of components associate with the defined usage pattern to replace components of the information handling system or for use in a replacement information handling system. Analysis on an enterprise-wide basis helps an enterprise to allocate components and information handling systems to end users of an enterprise.
Source detection device for detecting a source of sending a virus and/or a DNS attack linked to an application, method thereof, and program thereof
An original attacker which has set a computer as a springboard is detected by detecting a source of a virus or a DNS attack linked to an application, which attacks other computers. A source detection device for detecting a source of a virus or a DNS attack captures packets from a network under setting conditions, and extracts required information. The source detection device stores data such as information concerning behaviors and/or features of viruses and/or DNS attacks, and/or logs of respective servers, which are required for an application traceback. Linkage of a virus or a DNS attack is determined from an application traceback processing result stored in a database and from various data, and new conditions are set accordingly. Under the new conditions, source detection is carried out for a virus or a DNS attack. Data is updated and accumulated accordingly, and linkage and a relationship between a behavior of an attack and a virus or a DNS attack is determined, thereby to detect a source of the attack.
Interactive tool for visualizing performance data in real-time to enable adaptive performance optimization and feedback
An interactive tool is disclosed for visualizing performance data in real-time to enable adaptive performance optimization for an application running on a massively parallel computer system. The interactive tool may be used to visualize network congestion (and other) performance counters for an application as it runs on the parallel system in real-time. Further, a developer may use the interactive tool to experiment with various tuning options and optimization approaches on-the-fly.
Apparatus and method for monitoring a telecommunications network
A method and apparatus for monitoring telecommunications network elements, especially where direct access to those network elements is not available. The invention allows a network manager to build and maintain significant relationship information, as well as model the state of network elements with a high degree of accuracy, but based only on the information contained within the transactions built from the network traffic which is being monitored. In particular, it allows the network manager to obtain the same results that would previously have required direct access to an operator's network elements.
Context-aware network and situation management for crypto-partitioned networks
This disclosure describes a context aware scalable dynamic network whereby network information concerning network elements in an untrusted (Black) network are gathered by network sensors, stored at a network sensor collector, and sent to another network sensor collector in a trusted (Red) network through a one-way guard. At the Red network, the network information from the Black network may be combined with network information from one or more Red networks. The combined network information may then be used to visualize a cross-domain network topology of both Red and Black networks, and to implement network management functions.
Method and device for storing domain name system records, method and device for parsing domain name
A method for storing domain name system (DNS) records includes locally storing received DNS records needed to be stored. If the size of all the stored DNS records does not satisfy a preset storing threshold, a part of the stored DNS records are deleted to make the size of the remaining DNS records after deletion satisfy the storing threshold. A domain name parsing method, device, and server are also provided.
Method and apparatus for pairing a mobile device to an output device
Methods and systems for associating or pairing a mobile device with a local output device via a central or mobile connect server system are provided. Pairing is performed by initiating a pairing request from an output device that is passed to the mobile connect server for processing. The mobile connect server responds to the request with a pairing code that is displayed by the output device. A user of the mobile device then enters the displayed pairing code in the mobile device. The mobile device transmits the entered pairing code to the mobile connect server and, in response to a match, the mobile device is paired to the output device. Pairing can enable various functions, including an ability to apply stored user preference data to control programming or other information displayed by the output device in response to commands entered in the mobile device.
Methods and systems for location correction are provided. In one exemplary method, a first routing identifier of a first location associated with a location correction may be identified. The first location and the first routing identifier may be stored. A second routing identifier associated with a location request may be identified. A second location based at least in part on a comparison of the first routing number and the second routing number may be predicted. Finally, the location request may be responded to with the second location.
System and method for differentiated services in adaptive streaming
A system and method for differentiated services in adaptive streaming are provided. A method for server operations includes: determining an optimization of aggregated quality of experience scores for a set of candidate subscribers served by a server; adjusting a service rate of at least one subscriber based on the determined optimization of aggregated quality of experience scores; and streaming information to the at least one subscriber based on the adjusted service rate. The optimization is based on one or more of: a subscriber level for one or more of the plurality of subscribers; a current service rate; and available service rates.
Semi-automatic discovery and generation of useful service blueprints
According to one general aspect, a method of semi-automatically discovering and generating useful service blueprints may include collecting, by an apparatus, a plurality of configuration information sets regarding a plurality of network service applications. The method may also include converting, by the apparatus, the plurality of configuration information sets into one or more normalized application instance graphs. The method may further include generating, by the apparatus, one or more application blueprint files based, at least in part, upon the one or more normalized application instance graphs.
Network apparatus, communication control method, and recording medium
A disclosed network apparatus is capable of being connected to one of a restricted area where a communication is restricted and a non-restricted area where a communication is not restricted via a DHCP server and a network based on a DHCP address assigned by the DHCP server. The network apparatus includes a communication unit configured to carry out communications including a broadcast communication and a multicast communication, and a reporting unit configured to generate a report containing apparatus own information of the network apparatus to be sent over the network. In network apparatus, when the network apparatus is connected to the non-restricted area based on the DHCP address, the communication unit sends the report containing the apparatus own information of the network apparatus via the broadcast communication in place of the multicast communication.
Optimizing storage of data files
Disclosed are systems, methods, and machine-readable storage mediums for managing storage of a computing device associated with a user. In at least some embodiments, a method includes receiving a request to synchronize a data file from a cloud storage system from a the computing device, determining a classification of the computing device and an access pattern associated with the file, determining a storage optimization operation to be performed on the data file based on the access pattern and the classification, transmitting the file to the device subsequent to execution of the storage optimization operation, and transmitting an updated file based on an updated access pattern. The storage optimization operation can include downsampling, lossy compression, lossless compression, or a combination thereof.
Adaptive packaging of network resources
In one embodiment, a method includes accessing a data store comprising a log of requests transmitted by a plurality of remote hosts, each request corresponding to one or more resources maintained by a web site; analyzing the requests and one or more attributes of the resources corresponding to the respective requests using a cost function relating to network performance, wherein a first component of the cost function is directed to a performance improvement achieved by grouping one or more of the resources for transmission to one or more remote hosts and a second component is directed to a performance inefficiency caused by grouping the one or more resources for transmission to the one or more remote hosts; and identifying one or more groupings of one or more resources that optimize the cost function for network performance.
Service access using a service address
A method is disclosed that includes assigning a service address to a service of a private network. The service of the private network is accessible, via a gateway, by a client computer. The method also includes turning off duplicate address detection at the gateway. The gateway is associated with a public network address that is different from the service address.
Motor vehicle having an internet connection and method of operating same
In a motor vehicle having an Internet connection and at least two computer units to which at least one operating location respectively is assigned for using the Internet, each operating location includes at least one display unit and operating devices. By each computer unit, at least one browser application for the display of Internet pages is implementable such that, by way of the input devices, Internet pages can be called at each operating location via Internet addresses and can be displayed on the display unit. An Internet address used at a first operating location, which is assigned to a first computer unit, can be automatically stored in a central address memory such that the Internet address can be made available by an access taking place from a second computer unit to the address memory at a second operating location assigned to this second computer unit. This permits a facilitated address input by the operating devices of the second operating location.
System and method for dynamically modifying content based on user expectations
Systems and methods for dynamically rendering content based on user expectations and user tolerance levels are disclosed. Content is delivered to a user in a way that maximizes user experience and minimizes frustration while accessing web content. Because every user's expectations and tolerance levels are different, embodiments of the invention exploit these two parameters to deliver optimized web content to users within an acceptable time frame, thus ensuring a better browsing experience. In one embodiment of the invention, the method includes intercepting at a computing device a request for content from a server, determining a quality of service value based on user expectations and a user tolerance level from the content and a user profile, and delivering a modified version of the content to the user based on the quality of service value. The system is a computing device programmed with instructions to accomplish these functional steps.
Composite graph cache management
Methods, systems, and computer program products for synchronizing data between a mobile application and an enterprise data source are provided. A computer-implemented method may include receiving a request for data from an application executing on a mobile device, receiving a document including the requested data from a data source where the document represents a graph of data having a plurality of nodes, and providing a partial graph of data to the application where the partial graph is derived from the received document and at least includes the requested data.
Recipient change notification
An electronic communication device may, perhaps with the assistance of a mobile device server, determining that a new electronic message received by the device is part of a message thread that includes the new message and at least one prior electronic message previously received at the device. A comparison may be made of address information of the new message with address information of the at least one prior electronic message in the message thread to determine that there has been a change in addressed recipients between the new message and the at least one prior electronic message. The device may then notify a user of the device of the change.
Message thread management using dynamic pointers
Embodiments of the present invention provide a method, system and computer program product for message thread management using dynamic pointers. In an embodiment of the invention, a method for message thread management using dynamic pointers is provided. The method includes selecting a message thread in a message inbox of a messaging client, comparing characteristics of the message thread to a pre-established set of criteria, and removing the selected message thread to remote storage, generating a message thread pointer to the selected message thread and inserting the message thread pointer into the message inbox in place of the selected message thread in response to the characteristics of the message thread satisfying the criteria.
System for optimizing social networking
Systems, methods and computer program products are provided for optimizing social networks. In the systems and methods, account data associated with a user account is received and the account data is stored in a storage device. Pluralities of networking opportunities are identified based on the account data. Furthermore, based on the account data triggers may be detected indicating a user's interest in one or more social networking opportunities. The system then offers the user, based at least partially on the detected trigger, the one or more social networking opportunities.
Communication using delegates, such as delegates specified in an email or scheduling application
A facility allows for automatic delegation of incoming real-time communications based on a delegation scheme. The delegation scheme may be rules-based and may be applied to a single real-time communication channel or multiple communication channels, including both real-time and non-real-time communication channels. The delegate information may include rules that indicate under what circumstances a communication should be rerouted, which delegate the communication should be rerouted to, and whether other associated actions should be taken in connection with the rerouting (or lack thereof). In some cases, the context of the incoming communication may play a role in how or whether a communication is rerouted to a delegate.
Directing messages based on domain names
A communication system has a plurality of collections. Each collection comprises a security boundary within which private data is accessible. Each collection is associated with a director. The directors receive messages that specify domains. When a director for a given collection receives a message, the director identifies one of the collections as being a home collection for the domain specified by the message. If the specified domain's home collection is the given collection or another collection within a given privacy boundary, the director forwards the message to a server pool associated with the specified domain's home collection. Otherwise, if the specified domain's home collection is not within the given privacy boundary, the director forwards the message to the director of the specified domain's home collection.
Linking topics in a publish/subscribe messaging environment
Topics are linked in a publish/subscribe messaging environment. A first topic is linked to at least a second topic, and a message on the first topic is published to subscribers to the first topic. In the same transaction, any reference to the topics linked to the first topic are published in the message to subscribers of the topics linked to the first topic. A tree of topics is defined with topic nodes for each topic. A topic string is provided in a path through the tree of topics to a topic node, wherein the first topic and the at least a second topic have no commonality of topic string.
Systems, apparatus and methods for facilitating display and management of information for communication devices
Apparatus, methods and computer-readable storage media are provided for information management and display. In one embodiment, a method includes displaying, via a user interface of a communication device, a dynamically updatable wallpaper comprising a personalized theme personalized to a user of the communication device. The method also includes updating the dynamically updatable wallpaper to display one or more animated icons. Displaying the animated icons is based, at least, on detected activity of respective contacts associated with the one or more animated icons. In another embodiment, an apparatus comprises: a user interface component configured to display images indicative of contacts, wherein the plurality of contacts are predefined by a user of the apparatus. The apparatus also includes a messaging component configured to: integrate different types of text messages for one of the contacts; and provide concurrent display of the text messages and social media information for one of the contacts.
E-mail receiving device, network server, and expiration management method for received E-mail
A mail receiver includes: a mail receiving unit that receives a mail to which an attached file and a reference time limit of the attached file are appended; a monitoring unit that monitors whether the attached file was referred to by a user; and a warning unit that warns the user of one which the reference time limit is approaching among a non-referenced attached file.Therefore it can manage time limits regarding a received mail more certainly.
Method and apparatus for controlling unsolicited messages in a messaging network using an authoritative domain name server
Methods for controlling unsolicited messages in a messaging network using an authoritative domain name (DNS) server, in which a requester intending to send an e-mail message to a recipient queries the DNS server associated with the recipient's domain. The response sent from the DNS server is dependent upon a security policy associated with the requester, which results from interrogations to determine the probability that the requester is sending unsolicited messages or spam. A validity factor is set to a first indicator if the request passes or to a second indicator if the request fails. The response from the DNS server provides the network address if the validity factor is set to the first indicator. A suitable not-the-network-address response is sent if the validity factor is set to the second indicator. The authoritative DNS server thereby controls, blocks, or reroutes the message and lightens the load on the recipient's mail server and ISP(s).
Method and system providing spectator information for a multimedia application
A method and system for allowing spectators to experience multimedia information over a network generated by an online video game running on a participant's device comprises a participant system and a universal spectator client system. A participant may utilize a device to experience game play. Each spectator may also have an associated device, which may allow the spectator to receive multimedia information generated by the participant system over a network. A spectator may experience multimedia information generated by a participant regardless of whether the spectator has the same title installed on an associated device and regardless of whether the associated spectator device provides the same capabilities and functionality as the participant device.
Method and apparatus for simulating end user responses to spam email messages
A method and system for simulating end user responses to spam email messages are described. In one embodiment, the method includes receiving a probe email message indicative of spam and identifying a seeding component in the probe email message. The method further includes activating the seeding component utilizing a selected email address. The selected email address may then appear to the originator of the probe email message as an active email account.
Method for securely distributing meeting data from interactive whiteboard projector
Distributing meeting data from an interactive whiteboard projector to at least one computer of a meeting member, comprises: in the interactive whiteboard projector, using a processor to save meeting data, generate a password, display a screen with a URL of the projector and the password and use a web server to transfer the meeting data from the interactive whiteboard projector to the at least one computer.
System for processing requests to portlets
Portlet processing for portal applications aggregating content from sources is provided. This processing may include client intervention and publish/subscribe system use. Topic information used for rendering may be obtained by using a subscription/publisher methodology targeting clients for receipt of the topic information. The topic information from a publish/subscribe system may be inserted into placeholders on a portal page, the placeholders previously created at the client for receipt of the topic information by the client.
Determination of a spammer through social network characterization
A system for determining a spammer includes a session division apparatus configured to acquire short message events associated with a user and divide them into a plurality of sessions in terms of time; a social network building and characteristic calculating apparatus configured to build a social network of the user in each of the sessions, and calculate at least one type of social network characteristic in each of the sessions, respectively; and a determination apparatus configured to determine whether the user is a spammer or not according to the social network characteristic.
Message managing system, message managing method and recording medium storing program for that method execution
Disclosed are a message management system, a message management method, and a recording medium storing a program for executing the method. When message information transmitted by a user terminal through the Internet is managed, a message is transmitted through the user terminal, a contents node for storing message information is set for each user to store information, a priority of the contents nodes is set according to a generation time of the stored message, and a predetermined number of the contents nodes are deleted starting from the lowest node in the case of deletion timing. The stored message for the existing contents node is checked whether it is a message to be filtered. Address information of the highest node is checked and a predetermined number of the contents node is checked and a predetermined number of the contents nodes starting from the highest node are checked to check whether the stored message is a message to be filtered.
Managing adaptive streaming of data via a communication connection
Data are received at a receiving device from a server, where the data are encoded into one of a plurality of different versions, each version having a different fidelity level. A data stream having a buffer with an initial maximum window size for buffering received data is requested from the server, wherein the data stream initially has a first fidelity level. The maximum window size is managed to prevent the current window size from falling below a threshold that might trigger an adjustment by the server in the fidelity level of the data stream sent by the server, unless and until the accumulation of data in the buffer due to a decrease in the present processing capabilities of the controller of the receiving device falls below a threshold of processing power necessary for processing the data stream at the higher fidelity level for more than a transitory period of time.
Determining coefficients for digital low pass filter given cutoff and boost values for corresponding analog version
Methods and apparatus are provided for determining coefficients for a digital low pass filter, given cutoff and boost values for a corresponding analog version of the digital low pass filter. Coefficients are determined for a digital low pass filter by obtaining cutoff and boost values for a corresponding analog version of the digital low pass filter; and determining the coefficients for the digital low pass filter based on the obtained cutoff and boost values. The coefficients can be determined, for example, by generating a transfer function, H(s), for the corresponding analog version using the obtained cutoff and boost values: transforming the transfer function, H(s), to a frequency domain characterization, H(z), using one or more bilinear transforms to obtain a plurality of coefficients for an infinite impulse response (IIR) filter; generating the IIR filter using the plurality of coefficients for the IIR filter; and applying an impulse to the IIR filter to obtain the one or more coefficients for the digital low pass filter. In another variation, the coefficients are pre-computed and obtained from a look-up table.
Data storage and transfer
A method and apparatus for storing data regarding parameter values by making a series of measurements of parameter values at times separated by predetermined time intervals, processing the series of measurements of parameter values made at predetermined time intervals to identify events at different times, generating a further series of measurements of parameter values at each of said different times, and storing each of said further series of measurements of parameter values in association with said respective different time.
Flexible order of authoring for data integration solutions
A method includes connecting an integration process to a first set of inputs. The first set of inputs may include one or more inputs. The integration process includes one or more data transformation operations using the inputs. The method further includes receiving metadata about one or more of the inputs in the first set of inputs. The metadata about one or more of the inputs in the first set of inputs is cached. The integration process is then connected to a second set of inputs based on the cached metadata about one or more of the inputs in the first set of inputs.
Method and apparatus for implementing a learning model for facilitating answering a query on a database
A method and apparatus for implementing a learning model for facilitating answering a query on a database. Example embodiments include processing logic to: receive access to a database having a plurality of rows; determine for each row in the plurality of rows which of a plurality of child nodes to associate with a row based on the row and current parameters, where the current parameters correspond to parameters of a probability distribution for the plurality of child nodes; determine new parameters for the plurality of child nodes based on associated rows of the plurality of rows; determine whether or not to return a result which indicates the new parameters based on the current parameters, the new parameters, and the plurality of rows; and return a result which indicates the new parameters.
Semantic discovery and mapping between data sources
An apparatus and method are described for the discovery of semantics, relationships and mappings between data in different software applications, databases, files, reports, messages, or systems. In one aspect, semantics and relationships and mappings are identified between a first and a second data source. A binding condition is discovered between portions of data in the first and the second data source. The binding condition is used to discover correlations between portions of data in the first and the second data source. The binding condition and the correlations are used to discover a transformation function between portions of data in the first and the second data source.
Configuring a syndicated feed to track changes to user content in an online social network
In one embodiment, a method includes accessing a profile page of a user on an online social network, accessing cached content from a syndicated feed, determining the last time the content from the syndicated feed was updated, and if the last time the content was update was before a particular time, then updated the profile page of the user to include the cached content, else, accessing the syndicated feed and updating the profile page of the user to include updated content.
Mobile terminal and method of searching a contact in the mobile terminal
A mobile terminal includes a wireless communication unit communicating with a server providing a social network service, a memory storing a contact list and account information related to the social network service, a user input unit receiving a search query, a controller searching for a contact person in the contact list based on the search query, the controller also connecting and transmitting information of the contact person found in the contact list to the server, and receiving a search result from the server, and a display unit displaying the search result.
Sourcing terms into a search engine
Information may be presented to a user by receiving a selection of one or more terms passively displayed in a document, loading the terms to a search configuration, generating first results responsive to a user's predicted interest as expressed in the search configuration, and enabling display of the first results.
Method and apparatus for automatically incorporating hypothetical context information into recommendation queries
A system facilitates automatically determining the hypothetical context information or the distribution of hypothetical contexts. During operation, the system receives a request from a user for one or more recommendations. The system also receives a current context substantially associated with the request. The system then determines a hypothetical context for the request, wherein the hypothetical context may be determined by considering several sources of information, including but not limited to the current context, past contexts, and relationships between the current context and past contexts. Next, the system determines one or more recommendations for the user based on the hypothetical context. Finally, the system returns the one or more recommendations to the user.
SADL query view—a model-driven approach to speed-up read-only use cases
Embodiments of the invention relate to computing, and in particular, to a systems and methods for a querying a database. Certain embodiments implement a model-driven database query (“the SADL query”) facilitating a design-time tool that allows a developer to create the query based upon existing Business Objects (BOs) and their associations. This SADL query leverages mapping between business-layer entities and database-layer entities, such mapping being derived from association metadata already extant in the business model used to create the Business Objects. In certain embodiments, query views may be based upon associations present within the business layer, rather than upon database-level entities (such as joins or restriction rules) that are typically relied upon in conventional query creation. Embodiments of the present invention may thus align query creation more closely with the structure of the business layer, and may also render query design agnostic relative to the identity of the underlying database.
System and method for building a cloud aware massive data analytics solution background
Embodiments of the invention provide data management solutions that go beyond the traditional warehousing system to support advanced analytics. Furthermore, embodiments of the invention relate to systems and methods for extracting data from an existing data warehouse, storing the extracted data in a reusable (intermediate) form using data parallel and compute parallel techniques over cloud, query processing over the data with/without compute parallel techniques, and providing querying using high level querying languages.
Method and system for an executable specification
According to some embodiments, a method and system provides executing, by a processor, a software module under test to obtain a first reference set of data; executing, by the processor, the software module under test to obtain a second reference set data; transforming, by the processor, the first reference set of data and the second reference set of data into a first formal text form representation and a second formal text form representation, respectively; determining a plurality of differences between the first set of reference data and the second set of reference data by comparing the first formal text form representation and the second formal text form representation; filtering the plurality of differences to obtain a sub-set of the plurality of differences based on at least one filter criteria; and generating a report of the sub-set of plurality of differences.
Image processing system and method
An image processing system and method receives one or more digital images in the form of image data, including selected object data of a digital image, and determines, by an electronic recognition process, if a recognition match is available between the selected object data of the digital image and image object library data associated with image descriptor library data. An automated library user interface presents selectable matched object descriptor data associated with the image descriptor library data when a recognition match occurs between the selected object data of the digital image and the image descriptor library data. In response, the automated library user interface provides user feedback data to confirm that the image descriptor library data corresponds with the selected object data of the digital image, or entered descriptor data if no match or an incorrect match occurs, to create library descriptor associated image data.
Search with my location history
A method for incorporating information pertaining to geographic locations previously visited by a user into a search. The method includes: obtaining location information corresponding to a user account; determining, from the location information, one or more geographic locations that correspond to the location information; providing a user interface that includes a prompt that accepts search terms as input to a search query and an option to include a group of one or more geographic locations in the search query; and providing for display results related to the search terms and to one or more geographic locations in the group of one or more geographic locations when the option to include the group of one or more geographic locations is selected.
Testing data silo
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for creating a data silo and testing with a data silo including, for example, initiating a test sequence against a production database within a host organization, wherein the test sequence specifies: (a) new data for insertion into the production database during the test sequence and (b) one or more queries for execution against the production database during the test sequence. Such a method further includes inserting the new data into the production database; recording one or more row IDs corresponding to the inserted new data; injecting a test context filter into the one or more queries based on the one or more row IDs; and executing the one or more queries against the production database.
Adjust similar users identification based on performance feedback
A method of setting a threshold similarity score value for a first plurality of network user identifiers. The first plurality of network user identifiers, a second plurality of network user identifiers and characteristic data associated with the network user identifiers is received. A performance target and an experimental threshold similarity score value are designated. A similarity score between the first and second plurality of network user identifiers is calculated. Performance statistics data for each of the second plurality of network user identifiers having a similarity score greater than or equal to the experimental threshold similarity score value is collected and compared to the similarity score of the network user identifier. Based on the comparison, the experimental threshold similarity score value is adjusted to a similarity score value that achieves the performance target and the threshold similarity score value is set to the adjusted experimental threshold similarity score value.
Method and apparatus of generating update parameters and displaying correlated keywords
Provided is a method of generating updating parameters. The method obtains search keywords used by users within a predetermined time period; counts the search keywords to obtain primary keywords, related keywords, co-search frequencies of each primary keyword and the respective related keywords being searched together, and search frequencies of the primary keywords being searched alone; computes first feature values based on the search frequencies of the primary keywords being searched alone; and then computes second feature values based on the first feature values and the co-search frequencies of the primary keywords and the respective related keywords. The second feature values serve as updating parameters for determining displaying modes of the related keywords. An apparatus of generating updating parameters, and a method and an apparatus of displaying related keywords according to the updating parameters are also provided. The solution keeps abreast with the user trends to allow a better user experience and improve computing performance and efficiency. For a service provider, no special secret algorithm is needed, and the operation is easy with a low development cost.
System and method for triaging of information feeds
A system and method for triaging of information feeds is provided. A plurality of information feeds are received. At least one topic is identified from each information feed. At least one topic is presented to a user in topic facet including a plurality of identified topics. A selection of one of the plurality of topics is received from the user. The user interface is updated to display only the feeds that contain the selected topic.
Intelligent default weighting process for criteria utilized to score media content items
A system and method are provided for intelligently, or programmatically, assigning weights for one or more criterion utilized to score media content items based on an analysis of a group of media content items. In general, scoring criteria to be used to score media content items for a user are defined. A group of media content items associated with the user is then analyzed with respect to the criteria to provide results such as a number or percentage of media content items from the group of media content items that satisfy each of the scoring criteria. Based on the results of the analysis, a weight is assigned to each of the scoring criteria. Thereafter, media content items are scored for the user as a function of the weights assigned to the scoring criteria.
Systems and methods for identifying and visualizing elements of query results
The systems and methods described herein generally relate to increasing user productivity in reviewing query results by visually depicting the presence/absence of a set of query terms in a set of paragraphs across a set of documents.
Systems and methods regarding keyword extraction
One exemplary aspect comprises a computer system comprising: (a) a preprocessing unit that extracts text from a webpage to produce at least a first set of candidate keywords, applies language processing to produce at least a second set of candidate keywords, and combines said first and second sets of candidate keywords into a first candidate pool; (b) a candidate extraction unit that receives data from said preprocessing unit describing at least said first candidate pool and produces a second candidate pool; (c) a feature extraction unit that receives data describing at least said second candidate pool and analyzes said second candidate pool for general features and linguistic features; and (d) a classification unit that receives said data describing at least said second candidate pool and related data from said feature extraction unit, and determines a likelihood of each candidate in said second candidate pool being a primary or secondary keyword.
Variable personalization of search results in a search engine
A search engine provides personalized rankings of search results. A user interest profile identifies topics of interest to a user. Each topic is associated with one or more sites, and a boost value, which can be used to augment an information retrieval score of any document from the site. Search results from any search are provided to the user, with a variable control of the ranking of the results. The results can be ranked by their unboosted information retrieval score, thus reflecting no personalization, or by their fully or partially boosted information retrieval scores. This allows the user to selectively control how their interests affect the ranking of the documents.
Time-addressed database management system
A method of constructing a database for a database application, the method involving for each of a plurality of transactions, receiving input from a user via the database application; constructing a corresponding record that embodies the received input for that transaction; appending a time address to the corresponding record for that transaction, wherein the time address identifies when the corresponding transaction was completed; and storing the corresponding record for that transaction in a non-volatile data storage, wherein the time address for that corresponding record is permanently associated with that stored corresponding record and wherein the database application during normal operation prevents any overwriting of that stored corresponding record with any other record.
Ranking and ordering items in user-streams
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for identifying a set of items that are displayed to a user of a social networking service, the items comprising digital content distributed using the social networking service and being associated with item features, the item features comprising item-dependent features and user-dependent features; receiving feature values that are associated with one of an item-dependent feature and a user-dependent feature; receiving probabilities that are associated with a group and reflecting a likelihood that the user is a type of user associated with the group, the groups including a set of weights; determining an item score based on the feature values and a set of weights to provide item scores, the set of weights being identified based on the probabilities; and determining a subset of items to be displayed to the user based on the item scores.
Automated generation of ontologies
A method for data access includes defining an ontology (26) pertaining to a given sphere of knowledge. A computer (22) receives a search query generated using the ontology and provides to a user of the computer at least one document in response to the query. The computer receives tags that the user has associated with data elements in the at least one document and automatically updates the ontology responsively to the tags.
System and method for measuring the quality of document sets
Systems and methods are described that calculate the interestingness of a set of one or more records in a database, either absolutely (i.e., compared to an overall collection of records) or relative to some other set of records. In one embodiment, the measure is a relative entropy value that has been normalized. Various applications of the measure are described in the context of an information retrieval system. These applications include, for example, guiding query interpretation, guiding view selection and summarization, intelligent ranges, event detection, concept triggers and interpreting user actions, hierarchy discovery, and adaptive data mining.
Data source-independent search system architecture
A search system architecture is disclosed. The search system architecture includes a search server, which in turn includes a search services module and a search engine adapter. The search services module and the search engine adapter are communicatively coupled to one another. The search services module is configured to communicate with a user interface. The search engine adapter is configured to communicate with a search engine.
Method for semantic classification of numeric data sets
A system and method for semantically classifying numerical data includes using semantic classification techniques on ‘nearby’ non-numerical data to identify a context whereby opaque data sets of numbers can be semantically classified inside of that context. An Electronic Knowledge Base is used to query against the context and determine the semantics of the opaque numeric data sets.
Method and apparatus for video synthesis
An approach is provided for generating a compilation of media items. A plurality of media items is received. Respective context vectors for the media items are determined. The context vectors include, at least in part, orientation information, tilt information, altitude information, geo-location information, timing information, or a combination thereof associated with the creation of the respective media items. A compilation of at least a portion of the media items is generated based, at least in part, on the context vectors.
Performance of RCU-based searches and updates of cyclic data structures
A technique for improving the performance of RCU-based searches and updates to a shared data element group where readers must see consistent data with respect to the group as a whole. An updater creates one or more new group data elements and assigns each element a new generation number that is different than a global generation number associated with the data element group, allowing readers to track update versions. The updater links the new data elements into the data element group and then updates the global generation number so that referential integrity is maintained. This is done using a generation number element that is referenced by a header pointer for the data element group, and which in turn references or forms part of one of the data elements. After a grace period has elapsed, the any prior version of the generation number element may be freed.
Methods and systems for encoding/decoding files and transmissions thereof
In one embodiment, the instant invention includes a computer system that includes at least the following components: a) a first computer that performs, in concurrent manner, at least the following tasks: dividing a computer file into a plurality of segments, compressing segments, and sending the compressed segments to a second computer over a network; b) the second computer that performs, in concurrent manner, at least the following tasks: decompressing the compressed segments and assembling the decompressed segment to reconstruct the computer file, where the compressing task performed by the first computer and the decompressing task performed by the second computer are synchronized and performed concurrently.
User-determinable method and system for manipulating and displaying textual and graphical information
One or more aspects of the invention include transforming source data in order to display a work product. A plurality of rules relating to content manipulation of the source data include at least one rule relating to content selection and at least one rule relating to content compression. Source data for content manipulation may also be received. A selected portion of the source data and a compressed portion of the source data may be formed. The compressed portion may then be received and presented on a computer a work product.
Hierarchical display and navigation of document revision histories
A system and technique for displaying a document's workflow history are disclosed. The system includes a graphical user interface for displaying one or more graphical representations of events generated by an application configured to edit a document. Each of the events generated by the application may be stored in a data structure that is associated with one or more portions of the document. The data structure may also be associated with a digital image that reflects the state of the document at the time the event was generated and one or more frames of digital video captured substantially simultaneously with the generation of the event. The system may display the stored events via graphical representations in the graphical user interface that represent a portion of the total document workflow history. A user may navigate through the graphical events based on a hierarchical algorithm for clustering events.
Management of multimedia content
Disclosed are method and apparatus for managing multimedia content. The uniform resource locators of multimedia content accessed via the Internet are saved in collections stored in the database of a multimedia access system, which is shared by multiple users via individual user accounts. Collections may be copied from one user account to another user account, e-mailed, and posted on a website. Collections in the database may be searched by keywords associated with the collections.
Summarizing file system operations with a file system journal
Embodiments include methods, apparatus, and systems for summarizing file system operations with a file system journal. One embodiment includes a method that stores journal operations for files in a journal file system into a hierarchical tree. The method then summarizes changes made to the files in the hierarchical tree to determine which files require being read and backed up due to changes to content and which files have change but do not require being read and backed up.
Encapsulation of multiplicity and sparsity in multidimensional query execution systems
Provided are techniques for processing a multidimensional query. For each multidimensional expression in the multidimensional query, the multidimensional expression is evaluated to generate a representation that includes an evaluation context, a degeneration status, and condensed value storage that does not store data that would be replicated due to degeneration, and the representation is stored.
Synchronizing files between base and detachable device
An apparatus and method are disclosed for synchronizing states. A management module selects a file to synchronize between a base and a detachable device. The detachable device provides a display and a network connection for the base if the base and detachable device are connected. A synchronize module establishes a control connection and a data connection between the base and the detachable device and transmits the file to a memory space over the data connection in response to a command communicated over the control connection.
Real time datamining
A method and apparatus for real time datamining. In one embodiment, the method includes receiving a user request for datamining with respect to a value from a report associated with a specific pyramid level, identifying a datamining function to be performed for statistical analysis of lower level data pertaining to the value from the report, identifying dimensions to be used as variables for the statistical analysis, and determining criteria for selecting the lower level data associated with the value from the report. The method may further include submitting a request to one or more source databases, the request reflecting the identified dimensions and the determined criteria, performing the datamining function on a data set received from the source databases, and creating a datamining report based on a result of the performed datamining function.
Rule based processing system and method for identifying events
The present invention generally relates to a computerized system and method for creating, optimizing, and using a rules processing system that evaluates multiple rules against facts and events and detects, identifies, reacts to, and reports on events of interest. Events of interest may pertain to any subject matter, and in an embodiment, relate to securities (e.g., stocks, bonds, etc.) transactions. The system and method of the present invention also identifies patterns in large data sets using dynamically changing rules, and as a result, makes the processing and use of rules more efficient.
Method and system for controlling environmental conditions of different entities
The invention relates to a controlling system for adjusting environmental conditions of at least one entity, wherein the entity has desired environmental conditions for at least two different states. The system comprises equipments controlled by controlling means for changing and/or maintaining the environmental condition of the entities. The controlling means is adapted to provide controlling parameters to equipments for adjusting the environmental condition of said entity so that at least one parameter used for controlling the environmental condition of said entity depends on at least one measured environmental condition parameter of another entity being different from the entity, which environmental condition is adjusted by said equipment.
Encoding and decoding machine with recurrent neural networks
Techniques for reconstructing a signal encoded with a time encoding machine (TEM) using a recurrent neural network including receiving a TEM-encoded signal, processing the TEM-encoded signal, and reconstructing the TEM-encoded signal with a recurrent neural network.
Method and system to detect invalid and fraudulent impressions and clicks in web-based advertisement systems
This invention improves upon existing pay-per-click arrangements by periodically generating a code associated with the search-engine end users. This code, preferably in the form of a serial number, is compared to the end user of the website, such that by observing a metric like the number of clicks for a given period of time, be it a short time or a longer period, such as a day or a week, the system can automatically determine if certain clicks are illegitimate. This allows the pay-per-click company to more fairly invoice the merchants, thereby preventing fraudulent over use.
Multifactorial optimization system and method
A method for providing unequal allocation of rights among agents while operating according to fair principles, comprising assigning a hierarchal rank to each agent; providing a synthetic economic value to a first set of agents at the a high level of the hierarchy; allocating portions of the synthetic economic value by the first set of agents to a second set of agents at respectively different hierarchal rank than the first set of agents; and conducting an auction amongst agents using the synthetic economic value as the currency. A method for allocation among agents, comprising assigning a wealth generation function for generating future wealth to each of a plurality of agents, communicating subjective market information between agents, and transferring wealth generated by the secure wealth generation function between agents in consideration of a market transaction. The method may further comprise the step of transferring at least a portion of the wealth generation function between agents.
Communication server, communication method, memory medium and integrated circuit for mediating requests for content delivery according to expectation values of a probability of acceptance of the request, desired location, and history information
A communication server 200 acquires a request specifying a desired location for content creation from a requester terminal 310, and provides a notification of the request to an accepter terminal 300 accepting the content creation. The notification history managing unit 206 stores, as notification history, the distance from an accepter terminal to be provided with the notification to the desired recoding location and acceptance information. Upon acquisition of a new request, a request notification terminal selecting unit 203 selects a accepter terminal 300 that is likely to accept the request according to the notification history, and the request notifying unit 204 provides the selected accepter terminal 300 with the notification.
Methods and apparatus for produce identification using time resolved reflectance spectroscopy
Systems and techniques for produce identification for transaction processing. A produce item to be entered into a transaction is identified using time resolved reflectance spectroscopy. A produce item is injected with laser light over a selected range of wavelengths, and light emitted from the produce item is detected and measured over time. The measurement is processed to generate absorption and scattering spectra for the produce item. The absorption and scattering spectra are compared against those of known produce items, and upon determination that an acceptable match has been achieved, a transaction record is updated with information relating to the produce item.
Retail loss prevention using biometric data
Systems and methods are disclosed herein for estimating the risk of criminal activity in a retail setting. Using video data, biometric data for an individual may be obtained. A baseline biometric measurement is taken upon enqueuing of an individual, which may include entry of the individual into the field of view of a camera having a point of sale (POS) in its field of view. A biometric measurement is also taken when the individual is adjacent the POS. According to an analysis of these measurements, an estimate of risk is calculated, such as by comparing the baseline measurement to a POS measurement. Based on this risk assessment, an alert may be generated. The alert may be a graphical indicator displayed on the POS or transmitted to a device operated by a store representative. The risk assessment may also be used to select transactions for auditing in a self-checkout system.
Dynamically sizing incentive rewards for location-based actions by groups
A method of dynamically sizing incentive rewards for location-based actions by groups is disclosed. A first incentive reward that is to be provided based on a first number of times members of a group of users complete a location-based action is determined. A second incentive reward that is to be provided based on a second number of times members of the group of users complete the location-based action is determined. A magnitude of the second incentive reward is greater than a magnitude of the first incentive reward based on the second number of times being greater than the first number of times. The group of users is notified of the incentive reward and the additional incentive reward.
Efficient system for realizing business process families using model-driven techniques
The present invention provides a system and method for developing a set of business process definitions sharing the common business intent as a business process family using model-driven techniques. The present invention minimizes on development time and resources thus leading to a cost effective system and method for developing business process families. The invention enables to create a business process family which can be easily configured to behave as a specific business process thus meeting the needs of a set of apriori known situations. The invention supports configuration process at different stages (i.e. design time, and run time) of the business process application and also support extension of the configuration structure at different stages (i.e. design time, and run time). The invention enables to create a business process family which can be easily extended to meet the needs of an as yet unseen situation.
Event synchronized reporting in process control systems
Methods, systems, and computer-executable instructions for event synchronized reporting in an process control system are disclosed. Events may be synchronized by a synchronization parameter, whose instances of occurrence may be non-contiguous in time. Examples of synchronization parameters may include a work shift, a work group, an individual's on-duty time, a logged-on period of an individual, the execution times of a process control entity, a batch run type, and a procedure or sub-unit of a batch run. Instances of occurrence of the synchronization parameter may be recorded into a process control event database. Event synchronized reports may contain at least one synchronization value based on both the instances of occurrence of the synchronization parameter as well as historical process control data. Data from various historian databases may be accessed from process control system tools and integrated into a single report.
Healthcare marketing data optimization system and method
Healthcare marketing data may be cleaned and normalized according to data validity and/or data canonicity rules prior to being merged into a healthcare marketing database. The merging process may include a fuzzy de-duplication operation utilizing a configurable field scoring table for automatically identifying matching and non-matching records. Potential duplicates that cannot be automatically resolved may be provided to an operator to provide merge or no-merge instructions.
Methods and systems for managing distributed digital medical data
A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care provider and connected to a central system. Periodically the agents collect local information relating to patient medical files and/or data streams, for example diagnostic images and associated reports, and process that information into metadata files acting as pointers to the original files. The metadata files are transmitted to the central system where they are parsed and the attributes are stored on the central system in patient records with records from the same patient grouped together whenever possible. Registered users can search the central system, even in the absence of a unique identifier, to identify patient records pointing to the remote patient medical files. Upon finding a patient medical file, the invention provides a streamlined process for communicating access authorization from the patient to the hospital or facility storing the medical files. Once patient authorization is received, secure processes are provided for transferring the data in its entirety to or for viewing by the user in a peer-to-peer fashion.
Method and apparatus for downmixing multi-channel audio signals
Downmixing multi-channel audio signals to target channels by pre-downmixing frequency coefficients that are encoded using a most frequently used block type in stereo channels in the frequency domain, thereby reducing an amount of calculations and an amount of power required to downmix the multi-channel audio signals.
Inferring switching conditions for switching between modalities in a speech application environment extended for interactive text exchanges
The disclosed solution includes a method for dynamically switching modalities based upon inferred conditions in a dialog session involving a speech application. The method establishes a dialog session between a user and the speech application. During the dialog session, the user interacts using an original modality and a second modality. The speech application interacts using a speech modality only. A set of conditions indicative of interaction problems using the original modality can be inferred. Responsive to the inferring step, the original modality can be changed to the second modality. A modality transition to the second modality can be transparent the speech application and can occur without interrupting the dialog session. The original modality and the second modality can be different modalities; one including a text exchange modality and another including a speech modality.
System and method for funneling user responses in an internet voice portal system to determine a desired item or servicebackground of the invention
A method of funneling user responses in a voice portal system to determine a desired item or service includes (a) querying a user for an attribute value associated with a first particular attribute of the desired item or service; and (b) determining if the attribute value given by the user satisfies an end state. If the end state is not satisfied, steps (a) and (b) are performed with a new particular attribute.
Noise suppression using multiple sensors of a communication device
Techniques are described herein that suppress noise using multiple sensors (e.g., microphones) of a communication device. Noise modeling (e.g., estimation of noise basis vectors and noise weighting vectors) is performed with respect to a noise signal during operation of a communication device to provide a noise model. The noise model includes noise basis vectors and noise coefficients that represent noise provided by audio sources other than a user of the communication device. Speech modeling (e.g., estimation of speech basis vectors and speech weighting) is performed to provide a speech model. The speech model includes speech basis vectors and speech coefficients that represent speech of the user. A noisy speech signal is processed using the noise basis vectors, the noise coefficients, the speech basis vectors, and the speech coefficients to provide a clean speech signal.
Systems and methods for blind source signal separation
Signal separation techniques based on frequency dependency are described. In one implementation, a blind signal separation process is provided that avoids the permutation problem of previous signal separation processes. In the process, two or more signal sources are provided, with each signal source having recognized frequency dependencies. The process uses these inter-frequency dependencies to more robustly separate the source signals. The process receives a set of mixed signal input signals, and samples each input signal using a rolling window process. The sampled data is transformed into the frequency domain, which provides channel inputs to the inter-frequency dependent separation process. Since frequency dependencies have been defined for each source, the process is able to use the frequency dependency to more accurately separate the signals. The process can use a learning algorithm that preserves frequency dependencies within each source signal, and can remove dependencies between or among the signal sources.
Method and apparatus for modifying an encoded signal for voice quality enhancement
Adaptive Gain Control (AGC) is performed directly in a coded domain. A Coded Domain Adaptive Gain Control (CD-AGC) system modifies at least one parameter of a first encoded signal, resulting in corresponding modified parameter(s). The CD-VQE system replaces the parameter(s) of the first encoded signal with the modified parameter(s), resulting in a second encoded signal. In a decoded state, the second encoded signal approximates a target signal that is a function of two signals, including the first encoded signal and a third encoded signal, in at least a partially decoded states. Thus, the first encoded signal does not have to go through intermediate decode/re-encode processes, which can degrade overall speech quality. Computational resources required for a complete re-encoding are not needed. Overall delay of the system is minimized. The CD-AGC system can be used in any network in which signals are communicated in a coded domain, such as a Third Generation (3G) wireless network.
Delay in video for language translation
Disclosed are various embodiments for translation of speech in a video messaging application. A segment of streaming video is decoded to separate the visual component from the audio component. The audio component is then converted to text, which may then be translated and converted to a translation output comprising a new language. In response, the translation output may be encoded with the previously separated visual component. A delay is imposed on the visual component to account for any delays that may arise in translation. The translated video may then be streamed to participants giving the appearance of real-time video conferencing.
Method and apparatus for fast translation memory search
Methods and systems for fast translation memory search include, in response to an input query string, identifying a plurality of hypothesis strings stored in a translation memory as candidates to match the query string. One or more candidates are eliminated, using a processor, where string lengths between the candidates and the query string are at least a cutoff value representing a string edit distance. One or more candidates are eliminated where differences in word frequency distributions between the candidates and the query string are at least the cutoff value. One or more candidates are eliminated by employing a dynamic programming matrix where string edit distances between the candidates and the query string are at least the cutoff value. A number of remaining candidates are outputted as matches to the query string.
In-context exact (ICE) matching
Methods, systems and program product are disclosed for determining matching level of a text lookup segment with a plurality of source texts in a translation memory in terms of context. The invention determines exact matches for the lookup segment in the plurality of source texts, and determines, in the case that at least one exact match is determined, that a respective exact match is an in-context exact match for the lookup segment in the case that a context of the lookup segment matches that of the respective exact match. Degree of context matching required can be predetermined, and results prioritized. The invention also includes methods, systems and program products for storing a translation pair of source text and target text in a translation memory including context, and the translation memory so formed. The invention ensures that content is translated the same as previously translated content and reduces translator intervention.
Implementing performance-dependent transfer or execution decisions from service emulation indications
A system, method, computer program product, and carrier are described for obtaining data from a first emulator and from a first emulation environment hosting software; and signaling a decision whether to transfer any of the data to a second emulator at least partly as a result of the first emulation environment hosting the software.
Model-based scanner tuning systems and methods
Systems and methods for tuning photolithographic processes are described. A model of a target scanner is maintained defining sensitivity of the target scanner with reference to a set of tunable parameters. A differential model represents deviations of the target scanner from the reference. The target scanner may be tuned based on the settings of the reference scanner and the differential model. Performance of a family of related scanners may be characterized relative to the performance of a reference scanner. Differential models may include information such as parametric offsets and other differences that may be used to simulate the difference in imaging behavior.
Systems and methods for automated simulation of a propulsion system and testing of propulsion control systems
A multiple application automated test set (MAATS) system can simulate the operation of a power plant. To simulate the operation of the power plant, the MAATS system can be configured to “stand in” for the power plant by receiving the control signals from a controller and by generating electrical signals, readable by the controller, that represent the operating parameters and conditions of the power plant.
Process tool chemical and gas usage optimization
A resource usage optimization server determines a degradation caused by a first resource. The resource usage optimization server determines a cleaning caused by a second resource. The resource usage optimization server calculates a ratio of the degradation and the cleaning.
Processing system, method, and program for modeling system
A processing system, method, and program for a modeling system. A math equation including a differential equation is prepared. A CAS solves the differential equation normally and by using an interval coefficient in accordance with an interval analysis technique. A coefficient vector of the two solutions are compared to determine if a distance between the vectors is equal to or less than a preset value, and if so, the CAS solves the math equation including a differential equation with the target coefficient set to zero. The coefficient vectors of the solution thus obtained and the normally solved solution are compared to determine if the distance between the vectors is equal to or less than a preset value, and if so, the differential equation is simplified by omitting a term of the target coefficient from the differential equation.
Integrated tool for compliance testing within an enterprise content management system
Methods, tools, systems and computer readable media for compliance testing instrumentation and/or software. Data from one or more analytical instruments and/or software is converted to a technology-neutral format, which is independent of instrument type, instrument model, instrument manufacturer and data type of the analytical instrument or software from which the data was outputted. Calculations are performed on the converted data to produce one or more outputs, and then selection is made from the one or more outputs to populate a final report, wherein the one or more outputs are standardized and are directly comparable to outputs resultant from carrying out the method on another set of one or more other analytical instruments and/or software, irrespective of manufacturer or model of the other analytical instruments and/or software.
Wide area positioning system
Systems and methods for estimating a height of a mobile device are described. A reference pressure estimate is generated using atmospheric data from one or more reference locations. Various approaches for determining the reference pressure estimate are described. The reference pressure estimate is used, along with a pressure measurement at a position of a mobile device, to estimate the height of the mobile device.
User-invoked calibration of modular system using an embedded calibration signal generator
A user obtains a set of modules, inserts them into slots of a chassis, and interconnects the modules to form a modular instrument. A signal path extends through the modules. To support calibration of the signal path, a first of the modules (or the chassis or a calibration module) includes a calibration signal generator. A computer directs the first module to apply the calibration signal from the generator to the signal path, and measures the power (or amplitude) of the output of the signal path. The computer reads a factory-measured value A of the calibration signal amplitude from a memory of the first module (or the chassis or the calibration module). The value A and the measured output power of the signal path are used to determine a gain of the signal path. The system compensates for that gain when the signal path is used to measure live operational signals.
A method for determining a power reduction due to ageing of a photovoltaic module includes measuring a variable associated with a performance of the module in one or more time periods within a given year, each time period defining a class, and constructing curves of discrete values, each power curve constructed from the measured electric variable at a plurality of times of a day within each class, and the curves constructed for a plurality of years. The method includes determining energy values based on the constructed curves for at least one class for each of the plurality of years, and determining a power reduction of the photovoltaic module with respect to one or several previous years by calculating a difference between the energy output values of a given class in a particular year and the energy output values of the given class in a year previous to the particular year.
Flow sensor assemblies
A flow sensor assembly is provided and includes a flow conduit configured to impart a disturbance to a flow, multiple sensors disposed at respective sensing locations along the flow conduit. Each sensor is responsive to the disturbance of the flow and generates a corresponding response signal. The flow sensor assembly further includes a processor operably connected to each sensor, the processor being configured to compute a cross-correlation function between the response signals generated by said sensors, and determine a flow rate and a direction for the flow through the conduit based on the computed cross-correlation function. Additional flow sensor assembly arrangements are also disclosed.
Air flow measurement device and air flow correction method
An air flow measurement device measures a flow amount of air. A flow sensor is configured to output a voltage value corresponding to a given flow amount of the air. A temperature sensor is configured to output temperature of the air. A correction coefficient memory portion is configured to store a correction coefficient for correcting the voltage value of the flow sensor to a corrected voltage value associated with the given flow amount based on a predetermined standard temperature. A relationship between the voltage value of the flow sensor and the flow amount of the air changes based on temperature of the air. A correction portion is configured to correct the output voltage value of the flow sensor to the corrected voltage value using the correction coefficient.
Method and system for determining a tyre load during the running of a motor vehicle
A method for determining a load exerted on a tire, fitted on a vehicle, during running of the vehicle on a rolling surface, is disclosed. The method includes acquiring a first signal comprising a first signal portion representative of a radial deformation; measuring an amplitude of the radial deformation in the first signal portion; estimating a rotation speed of the tire corresponding to the radial deformation; estimating an inflation pressure of the tire corresponding to the radial deformation; and deriving the load exerted on the tire from the amplitude, the rotation speed, and the inflation pressure. The first signal portion is representative of the radial deformation to which a first tread area portion of the tire is subjected during passage of the first tread area portion through a contact region between the tire and the rolling surface. A system for determining the load exerted on the tire is also disclosed.
Radiation detector and verification technique of positioning accuracy for radiation detector
The present invention provides, at low cost, a multilayer radiation detector whose position relative to a beam axis can be verified. The radiation detector includes a plurality of sensors that react to radiation and are stacked in parallel inlayers in a traveling direction of the radiation. The sensors are each sectioned into a central region including the center of the sensor and another region surrounding the central region. The radiation detector independently measures signals measured by the central regions and signals measured by the other regions. Thus, the position of the radiation detector can be verified.
Digital map projection
A computer receives a set of Cartesian data and a set of geodetic data. A set of control points may be generated. A plurality of sets of Cartesian coordinates for each control point may be determined, wherein each set of coordinates corresponds to a Cartesian system. A deviation is determined for a combination that includes a control point and a Cartesian system. For each set of Cartesian coordinates associated with the Cartesian system that is included in the combination, and further associated with a control point not in the combination, the set of coordinates is modified according to the deviation. A cumulative deviation is determined for a plurality of combinations by determining a sum of distances of each set of modified Cartesian coordinates from the coordinates of the corresponding point in the Cartesian data. A combination associated with a minimum cumulative deviation is identified.
Map information delivery system, method, and program
A map information delivery system, including a navigation apparatus, is capable of preferentially receiving map updating information based on a host vehicle's state. The updating information may be preferentially received based on whether a destination has been set, a location of the updating information relative to an updating position or a destination, and/or the size of the updating information.
Object detection and classification for autonomous vehicles
Aspects of the disclosure relate generally to safe and effective use of autonomous vehicles. More specifically, objects detected in a vehicle's surroundings may be detected by the vehicle's various sensors and identified based on their relative location in a roadgraph. The roadgraph may include a graph network of information such as roads, lanes, intersections, and the connections between these features. The roadgraph may also include the boundaries of areas, including for example, crosswalks or bicycle lanes. In one example, an object detected in a location corresponding to a crosswalk area of the roadgraph may be identified as a person. In another example, an object detected in a location corresponding to a bicycle area of the roadgraph and identified as a bicycle. By identifying the type of object in this way, an autonomous vehicle may be better prepared to react to or simply avoid the object.
Beam directed motion control system
A method and apparatus comprising an energy source, a position system, and a movement system. The energy source is configured to generate a beam of energy directed at an area on a target for a vehicle. The position system is configured to identify a first position of the area on the target at which the beam of energy is directed. The movement system is configured to move the vehicle in a manner that reduces a difference between the first position of the area on the target at which the beam of energy is directed and a reference position on the target.
System for and method for providing a communication system
A system for and method of establishing a communication link between mobile vehicles is presented. The method may include acquiring first information associated with a first mobile vehicle. The method may also include determining whether to update the first information associated with the first mobile vehicle. The method may further include transmitting, via a transceiver module, the first information associated with the first mobile vehicle based at least in part on the determination of not to update the first information associated with the first mobile vehicle.
Situation-aware personal information management for a mobile device
A technique for providing a mobile device user with a “when to leave” alarm on his or her mobile device. The user has scheduled an appointment at a given time and location in the user's personal information manager (PIM) executing on the mobile device. A representative PIM is a calendar on the mobile device. The “when to leave” alarm is provided to the end user in the form of a display widget (or “countdown alarm”) that automatically activates a given time (e.g., 30 minutes) before a latest departure time for an event in the user's PIM.
Determination of the center of gravity
A device for determining the actual center of gravity of a vehicle, having a control command input interface, a movement modeling unit, a sensor interface, and a computation unit. The control command input interface determines control command inputs for controlling the movement of the vehicle. The movement modeling unit calculates reference acceleration data at a model reference point of the vehicle on the basis of movements of the vehicle, which are derived from a vehicle movement model, with respect to the control command inputs. The sensor interface determines sensor acceleration data which are measured at a sensor reference point of the vehicle and relate to the vehicle's actual movements resulting from the command inputs. The computation unit determines the actual center of gravity of the vehicle on the basis of an assumed center of gravity and the difference between the reference acceleration data and the sensor acceleration data.
Method and system for dynamically positioning a vehicle relative to another vehicle in motion
A computer-implemented method is provided for automatically guiding a first vehicle to maintain a position relative to a second vehicle traveling in a given area. The method includes the steps of: (a) receiving location data on the first and second vehicles; (b) determining a legal travel path in the given area from the first vehicle toward an expected position of the second vehicle; (c) automatically controlling the first vehicle to travel along the legal travel path; and (d) repeating steps (a) through (c) to automatically move the first vehicle to a relative position from the second vehicle and then to automatically maintain the relative position as the first and second vehicles travel through the given area.
Method and system for expansion of real-time data on traffic networks
A method and structure of estimating traffic in a network. A real-time estimate of the network traffic is calculated, based on limited real-time data about the network traffic calculated in an offline phase and limited real-time data received in a real-time phase.
Method for determining a concentration of alcohol in a fuel mixture
A method for determining a concentration of alcohol in a fuel mixture, where a characteristic curve for a parameter describing the dynamics of an injector, by which the fuel mixture is injected in an internal combustion engine, is ascertained; and where the concentration of alcohol is determined in light of a course of the characteristic curve. The invention also relates to a method for operating an internal combustion engine and a system for determining a concentration of alcohol in a fuel mixture.
Method and system for identifying an erroneous speed of a vehicle
A method includes receiving an input size of a wheel of a vehicle, determining a derived speed of the vehicle that is based on the input size of the wheel, determining a reference speed of the vehicle as the vehicle moves, comparing the derived speed with the reference speed of the vehicle, and identifying an error in the input size of the wheel based on a difference between the derived speed and the reference speed. A system includes a control unit configured to determine a derived speed of a vehicle that is based on an input size of the wheel and a reference speed of the vehicle as the vehicle moves. The control unit compares the derived speed with the reference speed of the vehicle in order to identify an error in the input size of the wheel.
Regenerative braking feedback display and method
Driver braking performance feedback may be conveyed to a vehicle operator as a braking efficiency score using a vehicle display system. The display system may include a vehicle display for displaying a braking efficiency indicator or gauge corresponding to the braking efficiency score. The braking efficiency score may be based on a comparison of the total regenerative braking energy recaptured during at least one braking event to a either a maximum amount of braking energy that may be recaptured during the at least one braking event or an actual total braking energy expended during the at least one braking event. The braking efficiency score may be displayed upon the completion of a braking event or upon a completion of a trip including a plurality of braking events. The display may also convey a distance corresponding to a portion of a trip distance achieved through regenerative braking.
Method for controlling an automated friction clutch
A method of controlling an automated friction clutch arranged as a starting and shifting clutch in a vehicle between an engine driveshaft and an input shaft of a transmission. The clutch can be engaged passively by a contact pressure spring and disengaged and engaged by a pneumatic control cylinder. The air inlet and outlet valves are opened in a sustained-pulse operating mode, over a duration ΔtV calculated as the quotient of air mass difference ΔmK between the nominal mass mK—soll present in the pressure chamber of the control cylinder when the control piston is in its nominal position xK—soll and the actual air mass mK—ist present when the control piston is in its actual position xK—ist (ΔmK=mK—soll−mK—ist) and air mass flow mv passing through the control valve concerned, which depends on the existing pressure situation and the flow characteristics of the open inlet or air outlet valve (ΔtV=ΔmK/mv).
Method of estimating transmission torque of dry clutch of vehicle
A method of estimating transmission torque of a vehicle dry clutch may suitably estimate a variation in the characteristics of transmission torque relative to the actuator stroke of a dry clutch even during the driving of a vehicle, so that the dry clutch is more suitably controlled. In the method of estimating transmission torque of a dry clutch, a clutch is released so that a slip of the clutch occurs. If the slip of the clutch has occurred, the slip of the clutch is uniformly maintained. If the slip of the clutch is uniformly maintained, a relationship between a stroke of an actuator of the clutch and transmission torque of the clutch is determined from a relationship between the stroke of the actuator and torque of an engine in the uniformly maintained slip state.
Method for electronically controlling a bicycle gearshift and bicyle electronic system
A method for electronically controlling a bicycle gearshift and a bicycle electronic system, wherein when a gearshifting request is transmitted from an electronic control unit to a driving unit, the driving unit associates a wait for a waiting time therewith. In the case of a multiple gearshifting, the waiting time allows a chain to mesh securely with a toothed wheel. By providing for the wait to be carried out in a driving unit of a derailleur, the computing capability of an electronic control unit is not affected by the management of the wait, and the electronic control unit is free to carry out other functions, for example the management of errors of the electronic system, communication with a display unit or various sensors of the electronic system, etc.
Methods and systems for end of line full vehicle automatic transmission quick bed-in procedure
Featured is are methods and systems for bedding-in an automatic transmission of a vehicle prior to delivery of the vehicle to an end customer. Such a bedding-in method is performed so as to reduce the occurrence of shifting problems or concerns occurring during the initial stages of ownership of the vehicle. More particularly, such a bedding-in method includes providing an automatic transmission having a controller that is configured to measure and learn about powertrain variation(s) and configured to adapt one or more operational parameters associated with shifting of the automatic transmission. Such a method also includes operating the vehicle according to a predetermined protocol before the vehicle reaches an end customer. Such a protocol being established so the transmission controller can learn about powertrain variations and adapt operation of the transmission to minimize effects on shifting of the transmission.
Control apparatus for automatic transmission
In a control apparatus for an automatic transmission having two input shafts connected to an output shaft of a prime mover; two output shafts; and two drive force transmission paths including clutches and synch devices each of which is able to connect a speed gear to the associated one of the output shafts, it is configured to discriminate whether shifting required by an operator is a first shifting pattern or a second shifting pattern, supply fluid pressure to one of the drive force transmission paths associated with a desired speed gear, while engaging the lockup clutch, when the shifting is the first shifting pattern, and supply the fluid pressure to the one of the drive force transmission paths associated with the desired speed gear, while disengaging the lockup clutch, when the shifting is the second shifting pattern.
Sensor device and modular unit therefor
The invention relates to a modular unit (10) comprising a sensor device (11) for actuating a movable part (1, 33), in particular a flap (1) of a motor vehicle. Said unit comprises a support element (12), on which the sensor device (11) comprising at least one sensor (21, 22, 23) is situated, in order to detect (3) an object (4) in a detection region (5, 6, 40) that borders the motor vehicle (2), the detection operation (3) initiating the actuation of the movable part (1, 33). According to the invention, the modular unit (10) is designed as an individual module (10) that is easily fitted in such a way that said unit (10) can be fixed to the motor vehicle (2).
Device and method for generating a control signal
A device is described for generating a control signal for controlling a passenger protection arrangement of a motor vehicle, having a first acceleration sensor for generating a first acceleration signal, having a second acceleration sensor for generating a second acceleration signal, having a first structure-borne noise sensor for generating a first structure-borne noise signal, having a second structure-borne noise sensor for generating a second structure-borne noise signal, and having an evaluation circuit, the evaluation circuit (being configured for generating a combination signal from the first structure-borne noise signal and the second structure-borne noise signal, the evaluation circuit being configured for generating the control signal as a function of the first acceleration signal, the second acceleration signal and the combination signal.
Display control apparatus for vehicle
A display control apparatus for a vehicle includes a steering angle detector, an operation detector, a display section, and a setting section. The steering angle detector detects a steering angle of the vehicle. The operation detector detects an operation to an operation unit mounted on a steering wheel of the vehicle. The display section displays an operation image on a display unit located behind the steering wheel in such a manner that the operation image changes according to the operation detected by the operation detector. The setting section sets a display position of the operation image on the display unit according to the steering angle detected by the steering angle detector so that a driver of the vehicle views the operation image at a position adjacent to the operation unit.
Inverted pendulum type vehicle
An inverted pendulum type vehicle with a tiltable rider mounting section has a first travel operation unit and a second travel operation unit, which are disposed with an interval provided therebetween in the longitudinal direction and which are capable of traveling in all directions. In a situation wherein a predetermined representative point of the vehicle or the first travel operation unit is to be moved rightward or leftward, the traveling operations of the first travel operation unit and the second travel operation unit are controlled such that the travel velocity of the first travel operation unit and the travel velocity of the second travel operation unit in the lateral direction are different from each other.
Vehicle steering system
A current increase-decrease amount (ΔIγ*) computed by a command current increase-decrease amount computing unit is added to an immediately preceding value (Iγ*(n−1)) of a command current value (Iγ*) in an adder. The command current value (Iγ*) obtained by the adder is given to a high/low limit limiter. The high/low limit limiter limits the command current value (Iγ*), obtained by the adder, to a value between a low limit value (ξmin (ξmin≧0)) and a high limit value (ξmax (ξmax>ξmin)). A high limit value setting unit obtains the high limit value (ξmax) corresponding to the vehicle speed detected by the vehicle speed sensor, from a vehicle speed-vs.-high limit value map set by a map creating/updating unit, and sets the obtained high limit value (ξmax) in the high/low limit limiter.
Vehicle lane checking monitor
Vehicle lane changing monitor functions are implemented by a lane sensor disposed in a vehicle, a gaze detection sensor disposed in the vehicle, and a computer processor embedded in the vehicle. Logic that is executable by the computer processor implements a method. The method includes receiving data, from the lane sensor, indicating an occurrence of a lane shifting event that indicates the vehicle is drifting away from a vehicle lane. The method further includes monitoring biometric data received from the gaze detection sensor and, upon determining a gaze change event has not occurred within a threshold period of time with respect to the lane shifting event, a corrective action within the vehicle is initiated.
Automotive headlamp control apparatus and method
Provided are an automotive headlamp control apparatus and method which are employed to control an illumination pattern of a headlamp unit by rotating the headlamp unit and/or adjusting a light blocking region of the headlamp unit based on the position of a front vehicle located ahead in a driving direction. The automotive headlamp control apparatus includes an image capture unit capturing an image of an area ahead in a driving direction, a position determination unit determining a position of a front vehicle based on the captured image, a headlamp unit projecting light according to an illumination pattern formed by blocking part of light emitted from a light source, and a control unit controlling the illumination pattern of the headlamp unit by rotating the headlamp unit and/or adjusting a light blocking region of the headlamp unit based on the determined position of the front vehicle.
Control panel system for a vehicle
A method and apparatus for managing a programmable control panel for a vehicle. A number of first level control functions is assigned to the programmable control panel for the vehicle. A number of second level control functions is assigned to the programmable control panel based on a health of programmable control panels in the vehicle.
Device and method for determining the state of ageing of a hydraulic fluid of a hydraulic system of a vehicle
A device for determining ageing of a hydraulic fluid in a hydraulic system with a multitude of hydraulic components is provided. The device comprises at least one temperature determination device and at least one ageing determination device, wherein the temperature determination device determines the respective temperature of each discrete fluid volume of the hydraulic fluid in the hydraulic system, and from the aforesaid the ageing determination device determines an increase in ageing. Generally, the temperature determination device carries out a numerical thermal simulation of the hydraulic system, component by component, including determining at least one temperature of at least one hydraulic component of the hydraulic system, which simulation is supported by measuring the temperatures of individual hydraulic components by means of temperature sensors.
Fast detection of error conditions in vehicle vacuum sensors for a hydraulic boost compensation system
Systems and methods of monitoring redundant vacuum sensors in the same vacuum chamber of a braking system to determine when an error condition is present in a braking system. The braking system includes a first sensor positioned in a chamber of the braking system and a second sensor positioned in the same chamber. A first reading is received from the first sensor and a second reading is received from the second sensor. A difference between the first reading and the second reading is determined. An error condition is indicated when the difference between the first reading and the second reading is greater than a threshold.
Automotive scanner with advanced module programming options
Exemplary embodiments of an improved scanning tool with a module reprogramming capability are disclosed. In various embodiments, the improved scanning tool uses sophisticated identification software to identify automotive functional modules to identify the modules' part-numbers and resident software revisions. The appropriate update software can then be uploaded and programmed onto the modules of interest with minimal delay and human interaction.
Electric bicycle and control method thereof
An electric bicycle and a control method thereof are disclosed. The disclosed control method, which drives the electric bicycle by rotating a motor using electrical energy accumulated in a battery, includes receiving an acceleration command value input by a user to accelerate the electric bicycle upon starting the electric bicycle from a stopped state, comparing the input acceleration command value with a reference value, and increasing a time taken for a rotation speed of the motor to reach a target speed when the input acceleration command value is greater than the reference value.
Climate control advisory system and method
Many plug-in electric vehicles include a high voltage battery for outputting electrical power to a traction motor in order to propel the vehicle. The distance range of these vehicles may be impacted by usage of a climate control system. A user interface may inform vehicle operators when their current climate control usage may prevent their vehicle from reaching its next charge point. The user interface may also advise drivers to reduce their climate control usage in order to increase vehicle range when the battery is nearing low state of charge conditions.
Control device for vehicle power transmission device
It is provided a control device for a vehicle power transmission device having a stepped automatic transmission making up a portion of a power transmission path between an engine and a drive wheel, the control device setting a shift point of the automatic transmission in accordance with a request drive force of a driver and a vehicle speed, the control device setting a shift point of the automatic transmission in accordance with a rotation speed of the engine and a vehicle speed instead of the request drive force, if a vehicle is in a predetermined fuel consumption priority running state.
Adding weather icon to electronic flight strips
A method is provided, for displaying dynamically updated weather information for a vehicle using a computer system comprising a processor and a memory. A table is stored in the memory, the table defining, for a predetermined plurality of different weather conditions, a corresponding predetermined plurality of sets of visually distinguishable icon settings, wherein each weather condition corresponds to a corresponding respective set of icon settings, the respective set of icon settings defining the appearance of a first weather icon configured to appear on a display in operable communication with the processor, wherein the appearance of the weather icon, by itself, is sufficient to convey at least one weather condition. The appearance of the first icon is dynamically updated, during at least a portion of the travel by the vehicle along its travel path, to correspond to changes in the first set of weather data.
Steering angle control system for aircraft
An aircraft steering angle control system is provided that minimizes the amount of skidding of an airframe that is turning on a low-μ taxiway surface, such as an icy taxiway surface, and allows for directional control of the airframe by a steering command. The aircraft steering angle control system outputs an operation signal related to a steering angle as a control command signal for a nose steering wheel, and includes: a nose steering wheel envelope protection function including a reference steering angle setting unit that calculates a reference steering angle on the assumption that the airframe is not skidding; a skid detection unit that detects a skidding state of the airframe based on the reference steering angle; and a switch unit that selects a control command signal for the nose steering wheel in conjunction with the skid detection unit.
Robotic vehicle with drive means and method for activating drive means
The invention relates to a robotic vehicle (1), in particular a robotic vehicle (1) designed for self-contained operations, with drive means (5) for the movement of the vehicle (1) on the subsurface (11), and with control means (7) for the activation of the drive means (5) in accordance with the measured intensity of the infrared radiation. According to the invention, a light sensor (9) is provided to detect the intensity of light radiation from the visible spectrum reflected from the subsurface (11), and in addition the control means (7) are designed to activate the drive means (5) in accordance with the measured intensity of the light radiation. The invention further relates to a method of activation.
Robot-based material removal in unstable static equilibrium system
Method and System of removing material from a debris pile which includes blocks of material. The debris pile is characterized to create a static equilibrium diagram illustrating one or more forces acting on each of the plurality of blocks of material. The blocks are ranked according to a number of touch points that each block of material touches another block of material. A block having a least number of touch points is identified. The block is removed from the static equilibrium diagram. It is determined if the block is removable by a robot. It is determined if the pile of debris would be in static equilibrium after removal of the block. The robot is directed to remove the block. Also included is a computer program product.
Celestial navigation system for an autonomous robot
A navigational control system for an autonomous robot includes a transmitter subsystem having a stationary emitter for emitting at least one signal. An autonomous robot operating within a working area utilizes a receiving subsystem to detect the emitted signal. The receiver subsystem has a receiver for detecting the emitted signal emitted by the emitter and a processor for determining a relative location of the robot within the working area upon the receiver detecting the signal.
Operational space control of rigid-body dynamical systems including humanoid robots
An operational space control solution is provided for rigid-body dynamical systems such as humanoid or legged robots. The solution includes an operational space controller that decomposes rigid body dynamics into task space dynamics and null space dynamics. Then, for systems that are fully actuated and have constraints, the controller provides control signals defining task space torques and null space torques for each actuator (e.g., a motor for a rotary joint between two rigid links). In some embodiments, a minimum torque vector is determined such that the controller is a minimum-torque operational space controller. For systems that are underactuated, task and null space dynamics are again considered, and underactuation is addressed by using null space forces to indirectly apply torque at passive degrees of freedom such as at active joints to create task-irrelevant motion that moves passive joints to facilitate task performance by the robot or rigid-body dynamical system.
Method and system for controlling a mobile robot
A method and a system for operating a mobile robot comprise a range finder for collecting range data of one or more objects in an environment around the robot. A discriminator identifies uniquely identifiable ones of the objects as navigation landmarks. A data storage device stores a reference map of the navigation landmarks based on the collected range data. A data processor establishes a list or sequence of way points for the robot to visit. Each way point is defined with reference to one or more landmarks. A reader reads an optical message at or near one or more way points. A task manager manages a task based on the read optical message.
Method for transporting a substrate with a substrate support
A method of transporting a substrate with a substrate support, the method includes defining a frictional breakaway force between the substrate and the substrate support in a horizontal plane, moving the substrate in the horizontal plane along a horizontal trajectory, moving the substrate in a vertical direction along a vertical trajectory simultaneously while moving the substrate in the horizontal plane, and wherein the horizontal trajectory is determined based on the acceleration profile of the vertical trajectory and wherein the horizontal trajectory prevents the moving of the substrate from overcoming the coefficient of friction in the horizontal plane.
System and method for identifying and sorting material
An automatic sorting system identifying and sorting non-homogenous material includes a conveyor belt and an identification unit above the conveying surface for identifying material. The identification unit includes a projector projecting light downwardly onto material to be identified, which reflects light towards the identification unit. The identification unit includes a lens receiving the reflected light from the material, and a first processing unit linked to the lens for spectral analysis of reflected light captured by the lens to determine the nature of the material, and a second processing unit linked to the first processing unit for comparing spectral analysis results with data associated with different materials stored in a second processing unit database. A sorting unit links to the second processing unit and cooperates with the second end of the conveyor to sort material released from the second end depending on signals from the second processing unit.
Monitoring and control system for commodity loading
A system for in-vehicle monitoring and control of commodity loading, such a grain or loose or fluid materials, from a storage bin to a transport bin using a loading system, includes a loading system control device and a user interface device capable of mutual wireless communication. The system improves safety by eliminating the need for operators to crawl up the side of vehicle in order to check levels of commodity in the transport bin, while also trying to move the transport bin as required. The loading system control device includes a logic switching unit for selectively operating the loading system that transfers the commodity from the storage bin; one or more cameras providing visual feeds of the loading of commodity into the transport bin; and a security or safety feature. The user interface device includes a display for displaying the visual feeds and control switches for operating the loading system.
Spectrographic monitoring of a substrate during processing using index values
Methods, systems, and apparatus for spectrographic monitoring of a substrate during chemical mechanical polishing are described. In one aspect, a computer-implemented method includes storing a library having a plurality of reference spectra, each reference spectrum of the plurality of reference spectra having a stored associated index value, measuring a sequence of spectra in-situ during polishing to obtain measured spectra, for each measured spectrum of the sequence of spectra, finding a best matching reference spectrum to generate a sequence of best matching reference spectra, determining the associated index value for each best matching spectrum from the sequence of best matching reference spectra to generate a sequence of index values, fitting a linear function to the sequence of index values, and halting the polishing either when the linear function matches or exceeds a target index or when the associated index value from the determining step matches or exceeds the target index.
System and method for identifying music samples for recommendation by a user
A system and method for identifying music samples for recommendation by a user is provided. A music sample playing in an ambient environment is identified as selected by a recommending user. The music sample is recorded and information about the music sample is identified. A music recommendation describing the music sample is generated and includes at least a portion of the information. The music recommendation is transmitted from the recommending user to a recipient user. The portion of information from the music recommendation is integrated into a display of a music collection on a digital media player maintained by the recipient user and is displayed.
Cochlear implant electrode lead having a cross-section with variable height
An electrode lead for insertion into a patient's cochlea includes a substantially solid elongate carrier member having lateral and medial sides and opposing transverse surfaces extending between outer surfaces of the lateral and medial sides, wherein the carrier member has a thickness between outer surfaces of the lateral and medial sides, and a plurality of electrodes disposed on or in the medial side. A height of the lateral side between the transverse surfaces is generally greater than a height of the medial side between the transverse surfaces, wherein each of the heights is approximately perpendicular to the thickness.
Cochlear stimulation device
A cochlear stimulation device comprising an electrode array designed to provide enhanced charge injection capacity necessary for neural stimulation. The electrode array comprises electrodes with high surface area or a fractal geometry and correspondingly high electrode capacitance and low electrical impedance. The resultant electrodes have a robust surface and sufficient mechanical strength to withstand physical stress vital for long term stability. The device further comprises wire traces having a multilayer structure which provides a reduced width for the conducting part of the electrode array. The cochlear prosthesis is attached by a grommet to the cochleostomy that is made from a single piece of biocompatible polymer. The device, designed to achieve optimum neural stimulation by appropriate electrode design, is a significant improvement over commercially available hand-built devices.
Delivery catheter including side port and electrodes
A delivery catheter, including a catheter body, a side port, a first electrode, and a second electrode, is described. The catheter body may comprise a proximal end, a distal end, and a perimeter surface. The catheter body defines a delivery lumen extending longitudinally within the catheter body. The side port is defined in the perimeter surface of the catheter body proximate the distal end and in communication with the delivery lumen. The electrodes may be adjacent to and spaced from the side port. Techniques for using the delivery catheter to identify a desired lead implantation location, e.g., via the electrodes, and implant a medical lead or other implantable element at the desired location through the delivery lumen and side port are also described.
Electronic pacemaker and pacemaker lead
A pacemaker lead includes a body and an insulation layer. The body includes at least one carbon nanotube yarn. The at least one carbon nanotube yarn includes a plurality of carbon nanotubes. The carbon nanotubes are interconnected along an axis of the body by van der Waals force. The insulation layer covers an outer surface of the body.
Distributed neuro-modulation system with auxiliary stimulation-recording control units
Systems and methods for modulating a physiological process are provided to enable precise delivery of signals to a predetermined treatment site. The systems may comprise an implantable device and an electrical lead body. The electrical lead body may comprise a plurality of transducer contacts in close proximity to an end of the electrical lead body, and a control unit positioned within the lead body in close proximity to the plurality of transducer contacts.
Integrated fiber optic raman spectroscopy and radio frequency ablation
Technologies are generally described for detecting diseased tissues through fiber optic based Raman spectroscopy, image acquisition, and/or RF induced hyperthermia treatment of the detected tissues in an integrated manner. A fiber optic bundle for carrying optical and RF signals for the spectroscopy, visual imaging, and RF ablation may also be used to detect a temperature of the treated tissue such that level and duration of the RF signal can be controlled for optimum results. A shielding configuration in the form of a coaxial waveguide of the fiber optic bundle may be used to guide and deliver the RF signal. Sources and detectors for the optical and RF signals may be integrated into an endoscopic probe containing the fiber optic bundle or be externally positioned. An integrated or remote controller may be employed to manage the optical imaging, spectroscopy, RF ablation, and thermal sensing operations.
Devices and methods for non-invasive capacitive electrical stimulation and their use for vagus nerve stimulation on the neck of a patient
A non-invasive electrical stimulator shapes an elongated electric field of effect that can be oriented parallel to a long nerve, such as a vagus nerve in a patient's neck, producing a desired physiological response in the patient. The stimulator comprises a source of electrical power, at least one electrode and a continuous electrically conducting medium in contact with the electrodes. The conducting medium is also in contact with an interface element that may conform to the contour of a target body surface of the patient when the interface element is applied to that surface. When the interface element is made of insulating (dielectric) material, and disclosed stimulation waveforms are used, the power source need not supply high voltage, in order to capacitively stimulate the target nerve. The stimulator is configured to produce a peak pulse that is sufficient to produce a physiologically effective electric field in the vicinity of a target nerve, but not to substantially stimulate other nerves and muscles that lie in the vicinity of the target nerve and patient's skin.
Mitigation of pressure ulcers using electrical stimulation
A method is provided for treating pressure ulcers by transmitting an electrical stimulus sufficient to effect contraction of a loaded muscle, wherein the method comprises the steps of providing an electrical transmission for effecting contraction of the loaded muscle, transmitting sufficient electrical stimulation to the muscle to contract it for a predetermined short period of time, and ceasing transmission of the stimulus to the muscle for a predetermined longer period of muscle relaxation, whereby the predetermined period of relaxation is sufficient to minimize muscle fatigue and cause sustained reoxygenation.
Apparatus and methods for minimally invasive obesity treatment
Systems, apparatus, and methods for the treatment of obesity and/or gastro-esophageal reflux disease (GERD). An embodiment includes an implantable device having an adjustable curved portion configured for exerting a suitable mechanical force on one or more tissues or organs targeted for treatment. Embodiments of the device neuromodulate nerve tissue to effect treatment of obesity and/or GERD. Another embodiment includes an intraluminal guide for guiding placement of the implantable device in the patient.
Implantable pulse generator with a stacked capacitor, battery, and electronics
One embodiment of the present subject matter includes an implantable medical device which includes a first power source comprising a first plurality of substantially planar electrodes, the first power source including at least a first power source face, an electronics module including a first substantially planar electronics face, and a second electronics face opposed to the first substantially planar electronics face, with the first substantially planar electronics face adjacent to, and substantially coextensive with, the first power source face and a second power source comprising a second plurality of substantially planar electrodes, the second power source positioned adjacent to and adapted to interface with the second electronics face.
System and method for monitoring diastolic function using an implantable medical device
Diastolic function is monitored within a patient using a pacemaker or other implantable medical device. In one example, the implantable device uses morphological parameters derived from the T-wave evoked response waveform as proxies for ventricular relaxation rate and ventricular compliance. In particular, the magnitude of the peak of the T-wave evoked response is employed as a proxy for ventricular compliance. The maximum slew rate of the T-wave evoked response following its peak is employed as a proxy for ventricular relaxation. A metric is derived from these proxy values to represent diastolic function. The metric is tracked over time to evaluate changes in diastolic function. In other examples, specific values for ventricular compliance and ventricular relaxation are derived for the patient based on the T-wave evoked response parameters.
Method and apparatus for tissue protection against ischemia using remote conditioning
A stimulation system delivers stimulation to protect an ischemic region of a body from tissue damage caused by ischemia. The stimulation is delivered to one or more stimulation sites remote from the ischemic region to elicit a physiological effect that protects the ischemic region from the tissue damage caused by ischemia. In one embodiment, the stimulation system delivers cardioprotective stimulation to one or more stimulation sites remote from the heart to protect the heart from injuries associated with cardiac ischemic events. In another embodiment, the stimulation system delivers remote conditioning stimulation to one or more stimulation sites in or on the heart to protect a non-cardiac region from injuries associated with non-cardiac ischemic events.
Systems and methods for making and using electrical stimulation systems with improved RF compatibility
An implantable control module for an electrical stimulation system includes an electronic subassembly disposed in a casing. A sealed feedthrough housing is disposed along a portion of the casing. An electrically-conductive portion of the feedthrough housing is electrically coupled to an electrically-conductive portion of the casing. Feedthrough pins extend through the feedthrough housing and couple to the electronic subassembly via conductive pathways disposed in the casing. At least a portion of the conductive pathways extend along a non-conductive substrate. An RF-diverting assembly is disposed in the casing. The RF-diverting assembly includes a feedthrough ground electrically coupled to the electrically-conductive portion of the feedthrough housing. The RF-diverting assembly also includes a plurality of capacitive elements each coupling a different one of the plurality of conductive pathways to the feedthrough ground.
Implantable medical devices comprising isolated extracellular matrix
Implantable devices containing extracellular matrix and methods of using the devices are provided.
Intracerebral information measuring device
An intracerebral information measuring device which can be mounted on the head of a subject by simple surgery and which attains measurement of low invasion, high sensitivity, and high resolution is provided. An internally mounted unit is composed of a probe section to be inserted in the brain through a hole having a small diameter bored in the skull of the subject, and a head section integrated with the probe section and to be disposed between the skull and the scalp. The probe section includes an electrode for sensing an action potential. The head section includes a transmitter for wirelessly transmitting signals captured with the electrode to the outside. On the outside of the head, an external measuring unit for receiving the signal transmitted from the head section and reproducing the original signal is provided.
Methods and systems for analyzing T-wave alternans
Embodiments of the present invention relate to implantable systems, and methods for use therein, that can detect T-wave alternans and analyze the detected alternans to provide information regarding cardiac instabilities and predict impending arrhythmias.
Risk determination for ventricular arrhythmia
Risk determination for a near fatal ventricular arrhythmia of a patient. An electrocardiogram of a heart of the patient is obtained. A parameter is measured, using an electrocardiogram of a heart of the patient, indicative of an autonomic nervous system of the patient. A numeric score is assigned for the parameter indicative of the conduction system of the heart. A numeric score is assigned for the parameter indicative of the autonomic nervous system. A ratio of the numeric score of the parameter indicative of the conduction system of the heart of the patient and the numeric score of the parameter indicative of the autonomic nervous system of the patient is calculated. The risk of the potentially near fatal ventricular arrhythmia of the patient is determined to be significant if the ratio is greater than a predetermined threshold. An action responsive to the determining step is taken.
Methodology for automated signal morphology analysis in implantable electrotherapy and diagnostic systems
Systems and related methods for analyzing data sensed from a device implanted in a patient, such as a cardiac pacing system. The system detects and evaluates electric signals within the patient that share a common event marker. By using algorithms and graphical presentation of the collected signals having common event markers, deviations in signals over time can be identified and evaluated in consideration of taking further action related to the patient and the implanted device. The system can also be used in conjunction with an advanced patient management system that includes a programmer or repeater capable of gathering information from the implanted device and transmitting the data to a host via a communications network for evaluation at a remote location.
Image recording device for the simultaneous recording of magnetic resonance image data and nuclear medical image data
An image recording device is disclosed for the simultaneous recording of magnetic resonance image data and nuclear medical image data, in particular PET image data. In at least one embodiment, the image recording device includes a nuclear medical detector arrangement integrated into a magnetic resonance device, wherein a fluorescence detector arrangement including an optical system and designed for fluorescence imaging is also integrated into the magnetic resonance device.
Cardiac diagnostics using wall motion and perfusion cardiac MRI imaging and systems for cardiac diagnostics
Cardiac information of a patient is displayed by obtaining a plurality of MRI cine loops of the heart of the patient at a plurality of heart rates, the plurality of cine loops including both wall motion cine loops and at least one perfusion cine loops and simultaneously displaying both the wall motion cine loops and the at least one perfusion cine loop.
A mobile terminal is provided. The mobile terminal includes a body, a case and a label plate. The body has a socket into which an external device may be inserted. The case may be formed to cover the body. The label plate may have a label formed on one surface of the label plate and containing information that identifies a product. The label plate may be configured to slide in and out of a space located between the socket and the case. The label on the label plate may be exposed when the label plate slides out of the space. Alternatively, the label may be covered when the label plate slides in the space. The label may be a product identification label (“PID label”). The PID label may be a unique label that can confirm that the mobile terminal was manufactured by a particular company.
Discreetly positional camera housing
A camera housing positionably coupled to an electronic appliance is disclosed. Preferably, the camera housing is positionable in two discrete positions such that the camera can be positioned to face towards or away from the user. The appliance includes a recess sized to receive the camera housing. A cellular telephone includes a camera housing which is positionable in two discrete positions. In the first position, the camera faces the user. In the second position, the camera faces away from the user. The camera housing is coupled to the cellular telephone by a hinge mechanism that latches the camera into one of the two positions.
Reducing WLAN power consumption on a mobile device utilizing a cellular radio interface
A system and method of reducing the WLAN power consumption and limiting battery drain of a mobile communications device is provided. The mechanism continuously monitors for changes in the WLAN and cellular signal strength and modifies the WLAN profile scanning activity accordingly. By monitoring for changes, transitions can be detected which indicate the location of the mobile device (i.e., indoor or outdoor). An increase in cellular signal strength and a decrease in WLAN signal strength indicates the user is transitioning outdoors where WLAN coverage may be limited. To reduce battery power consumption, background scanning is suspended or its frequency significantly lowered. Moving indoors is indicated by a decrease in cellular signal strength and an increase in WLAN signal strength. Background/Connectivity scanning frequency is increased to provide shorter time-to-connect to WLAN Networks for the user within the WLAN coverage area.
Information processing device, position recording method, and program
An information processing device includes a main function unit which realizes main functions of the information processing device and is operated by being switched between a normal operation mode and a power-saving mode in which less power is consumed than in the normal operation mode, a position acquisition unit which acquires positional information indicating the current position, and a logging controller which causes a first storage unit to record movement trace information obtained by making the positional information acquired by the position acquisition unit correspond to the time when the positional information is acquired in the state where the main function unit is switched to the power-saving mode.
Extending instant audibles while in a voice call
For use in a wireless communication network, a method for communicating audible messages is provided. The method includes establishing a call. The method also includes determining if the mobile device is configured for playing a plurality of pre-recorded audible messages during the call. The method further includes displaying a plurality of graphical images, each graphical image corresponding to at least one pre-recorded audible message. The method still further includes receiving an indication that one of the graphical images has been pressed. The method also includes playing a pre-recorded audible message corresponding to the one graphical image that has been pressed.
Evaluating lost communication links with mobile stations
A wireless communication system (20) includes an ability to discern whether an end of a communication link between a mobile station (22) and a base station (26) corresponds to the mobile station (22) tuning away from a first service to a second, different service. In a disclosed example, a radio network controller (28) includes a link monitoring portion that uses information regarding the mobile station from the second service to determine a pattern of expected tune aways by the mobile station to the second service. In one disclosed example, the link monitoring portion uses observed mobile station behavior to estimate the pattern of expected tune aways. Whenever an end of a communication link with the mobile station corresponds to an expected tune away, that end is not considered for purposes of service measurement parameters. The disclosed examples provide the ability to avoid mistakenly considering a mobile station-initiated tune away as a dropped link or handoff failure resulting from an issue with the system.
Station comprising at least two transmit antennas, and a method of transmitting therefrom
A method is provided of transmitting a plurality of signals from a primary station to a respective plurality of secondary stations, said primary station comprising at least two transmit antennas, wherein each of said plurality of signals is transmitted from a respective subset of said at least two transmit antennas to a respective secondary station, in which each subset is selected at least according to a predetermined characteristic of the respective secondary station.
Automatic contact recognition from SMS
A first mobile device receives an input to send data via a text messaging protocol to a second mobile device. The data is marked up with one or more transparent text message characters to delimit fields in the data. The marked up data is transmitted via the text messaging protocol to the second mobile device.
Location blocking service from a wireless service provider
Subscriber authorization information from a wireless communication device is identified. The subscriber authorization information indicates that an identity of a subscriber associated with the wireless communication device is authorized to be shared without sharing information that identifies a location of the wireless communication device. Subsequent to the subscriber authorization information being identified, the identity of the subscriber associated with the wireless communication device is received or retrieved without information that identifies the location of the wireless communication device.
System and methods of mobile geolocation
A method and system for a cellular mobile communication system (900) are provided. The location of a mobile communication unit (905) in the cellular wireless communications system (900) can be estimated from: a first estimate of position, based on received signal power difference for signals received by the mobile communication unit (905) from at least two base stations (910); and a second estimate of the position of the mobile communication unit (905), from further information. A likelihood function for each estimate is weighted. The weighted first and second likelihood functions are combined, and one or more locations are selected as the estimated location. Propagation model parameters may be iteratively updated and/or refined, using location estimates obtained for large numbers of calls in the cellular mobile communication system (900).
Method and apparatus for dynamic power savings based on location
Techniques to dynamically manage power for a mobile computing device based on a location of the device are described. For example, a mobile computing device may comprise one or more wireless transceivers, a location module operative to monitor one or more location parameters for the mobile computing device, and a power management module operative to dynamically enable or disable one or more of the wireless transceivers based on a comparison of the one or more location parameters and information from a wireless communication technology database. Other embodiments are described and claimed.
Pre-fetching information based on gesture and/or location
Example methods, apparatuses, and articles of manufacture are disclosed that may be utilized to pre-fetch and/or obtain information for use with mobile devices based, at least in part, on a gesture of a user and/or location of a mobile device. By way of example, a method may include detecting an arrival of a mobile device at a location; and pre-fetching, in response to the detection of the arrival, information in connection with executing one or more applications and/or functions on the mobile device. In certain implementations, a method may include processing signals received from at least one sensor at a mobile device; inferring, in response to the processing the signals, a likelihood of a user executing one or more applications and/or functions on the mobile device; and pre-fetching information in connection with the executing applications and/or functions on the mobile device based, at least in part, on the likelihood.
Radio access network sharing
A method implemented in an apparatus used in a radio access network (RAN) sharing system including a plurality of basestations is disclosed. The method includes estimating resource requirement or demand of one or more entities in each base station according to feedback from the plurality of basestations, computing resource allocation for said one or more entities, and enforcing the computed resource allocation using basestation-level virtualization. Other methods, apparatuses, and systems also are disclosed.
Dual band LTE small cell
A dual band LTE small cell base station communicates on both licensed bands and unlicensed bands. The small cell base station modifies the communication protocol utilized by the licensed band to enable communication over an unlicensed band. This modification involves replacing the physical (PHY) layer of the licensed band communication protocol with the PHY layer of a to-be-used protocol in an unlicensed band.
Method and apparatus for secondary sharing
A node (105, 200) for a communications system (100), arranged to operate as a secondary user of part of a frequency spectrum, comprising a detection unit (210) for detecting other secondary users (110) who use all or part of said frequency spectrum and for detecting changes in such other secondary user's usage of their part of the frequency spectrum. The node (105, 200) also comprises a signaling unit (225) for signaling to detected other secondary users (110) that the node (105, 200) wishes to operate within their frequency spectrum as a secondary user, by means of transmitting interference signals according to a predefined pattern in the frequency spectrum of detected other secondary users. The node also comprises a decision unit (230) for deciding how the node (105, 200) should arrange its secondary operation in the frequency spectrum together with detected other secondary users (110).
Method for informing user equipment of downlink control message construction information in cellular system
A method for transmitting control messages from a base station to a user equipment in a cellular system includes grouping a plurality of control messages for at least one user equipment based on at least one criteria of whether or not uplink ACK/NACK channel indexes are allowed to be implicitly used in the control messages, whether or not the user equipment corresponding to the control messages is able to implicitly use the uplink ACK/NACK channel indexes, sizes of Information Elements (IEs) of the control messages, whether or not the control messages are segmented into a predetermined number of subblocks, MCS levels applied to the control messages, sizes of allocated IEs of the control messages after applying the MCS levels, and frequency partitions in which the IEs of the control messages are present, and transmitting the grouped control messages.
Avoiding formation of a call loop resulting from handling of a mobile terminated call in parallel with a location update in a wireless communication network
A call loop avoidance capability is provided for preventing formation of a call loop resulting from handling of a mobile terminated (MT) call in parallel with a location update for a mobile device (MD) in a wireless communication network. The call loop avoidance capability prevents formation of a call loop between an old mobility and call management entity (MCME) and a new MCME when delivery of an MT call to an MD is performed while the MD is in the process of moving from the old MCME to the new MCME using a location update procedure. An enhanced call routing procedure supports direct delivery of the MT call from the new MCME to the MD (rather than delivery of the MT call by the new MCME to the MD via the old MCME) in order to prevent formation of a call loop between the old MCME and the new MCME.
Service dependent inactivity timer
A node (20) of a communications network proposes an inactivity timer parameter for a radio access network bearer. The inactivity timer parameter indicates for how much time the bearer may be inactive for a session or a connection while the bearer is still allocated resources of the radio access network. The node proposes the inactivity timer parameter in dependence upon a service characteristic or a subscription characteristic for the session or the connection.
Uplink synchronization of TD-SCDMA multiple USIM mobile terminal during handover
Certain aspects of the present disclosure provide techniques and apparatus for uplink synchronization of a Time Division-Synchronous Code Division Multiple Access (TD-SCDMA) multiple Universal Subscriber Identity Module (USIM) mobile terminal during a handover. For certain aspects, a method of wireless communication generally includes transmitting, to a Node B, at least one uplink synchronization code from a UE comprising at least a first subscriber identity and a second subscriber identity, receiving timing information for uplink synchronization to the Node B, wherein the timing information is measured based on the at least one uplink synchronization code, and applying the timing information to calls for both of the first and second subscriber identities to synchronize uplink transmissions to the Node B.
System and method for automatic registration notification for over-the-air activation
A method and system automatically activates a mobile station in a wireless communications network. The system includes an over the air activation function (OTAF) processor in the network that initiates an activation process in response to receiving a registration message from a mobile switching center serving the mobile station requesting the activation. Each mobile station has a unit of information stored into it at the time of its manufacture to enable it to request over the air activation. That unit of information is either the network routing address of the OTAF processor, or alternately, it is a value that is translatable into that address, either an OTAF ID number that is the same value for every mobile station or it is a sequentially serialized dummy value for the mobile identification number (a dummy MIN).
Determining proximity of user equipment for device-to-device communication
Embodiments of apparatus, packages, computer-implemented methods, systems, devices, and computer-readable media (transitory and non-transitory) are described herein for ascertaining, e.g., by a traffic detection function (“TDF”), that a first user equipment (“UE”) and a second UE are, potentially, sufficiently proximate to each other to wirelessly exchange data directly. In various embodiments, an evolved serving mobile location center (“E-SMLC”) may be instructed, e.g., by the TDF, to obtain location change data associated with the first and second UEs. In various embodiments, a determination may be made, e.g., by the TDF, based on the location change data, whether the first and second UEs are sufficiently proximate to exchange data directly, and whether the first and second UEs are likely to remain proximate for at least a predetermined time interval. In various embodiments, the first and second UEs may be caused to commence device-to-device (“D2D”) communication based on the determination.
Feasibility, convergence, and optimization of LTE femto networks
Methods and systems used to plan, optimize, and manage LTE femtocell networks describes an analytical framework and algorithms that allow analysis and planning of various femtocell aspects including dynamic adjustment of femtocell power for interference mitigation, and optimization according to user selectable policies. The framework recommends using a hybrid of both distributed control and centralized policy enforcement. An algorithm having two closely related aspects is provided. The first part is an Iterative and Distributed Algorithm (IDA), which is intended to be executed inside the femtocells. The second part of the algorithm is intended to be used as a toolset and is called Analytic Computational Algorithm (ACA), which is intended to be used in a centralized planning and operations center. The ACA provides a set of conditions that are used to check for convergence of the IDA.
Systems and methods for rapid availability of critical functionalities on devices using cellular operating systems
Systems (100) and methods (400) for operating a hybrid communication device (106). The methods involve executing at least one boot program. Responsive to the boot program, a first and second code are concurrently executed. The first code is operative for booting at least a real-time operating system on which a radio processor of the hybrid communication device is built. The second code is operative for booting at least a mobile operating system on which a cellular processor of the hybrid communication device is built. The radio processor provides support for wireless radio communication while the mobile operating system is booting.
Techniques for improving cache effectiveness of caches with low user population
Techniques for improving cache effectiveness in areas with low user population are provided. In one aspect, a computer-based method for managing user traffic in a cellular network using proxy caches is provided. The method includes the following steps. A group of the proxy caches that has correlated user traffic is identified. Cache requests for each of the proxy caches in the group are observed. One or more patterns are found in the cache requests. A prediction is made as to which items will be requested from the proxy caches in the group in the future based on the one or more patterns found in the cache requests. The proxy caches in the group are pre-populated with the items.
Method and device for transferring radio access technology/frequency of select priority
An informing method and equipment for index parameter of access type/frequency of selection priority are provided. Said method includes that a Mobility Management Entity (MME) receives the voice capabilities and settings reported by User Equipment (UE) (101); the MME generates a Radio access type/Frequency of Selection Priority (RFSP) index according to the subscribed RFSP index, the voice capabilities and settings reported by said UE, and the operator's configuration policies (102); when the MME determines that said generated RFSP index is different from the RFSP index in use, it replaces the RFSP index in use with said generated RFSP index (104); the MME informs the Radio Access Network (RAN) of said generated RFSP index (105). The present invention overcomes the problem that the transmission of the new RFSP index in use can not be finished under the condition that the UE is in an idle state, the UE has no uplink data, and the MME does not receive the notification of the downlink data.
Automatic device capabilities change notification
An improved approach to mobile device capability management is described herein where a capability management device is provided at a mobile communication network. Upon change of a mobile device capability, a related notification is sent to the capability management device which applies a policy decision whether to track the capability change at the network side or not. Should the decision be ‘yes’, the capability management device starts a device management session to collect further information on a mobile device capability change beyond the information made available with the mobile device capability change notification. After retrieval of the mobile device capability change information, the capability management device will update its mobile device capability state accordingly.
Initiating communication from a mobile terminal by using a selected shortcut number
A method for initiating a communication in a mobile terminal, and a mobile terminal apparatus to perform the method, are provided. The method includes determining whether the mobile terminal has entered a shortcut mode, if the mobile terminal has entered the shortcut mode, searching a phone book for shortcut numbers, which consist of a predefined number of digits and start with an input number, obtaining phone book information corresponding to the shortcut numbers that were found in the phone book and displaying the shortcut numbers and their associated phone book information, and if any one of the displayed shortcut numbers and their associated phone book information is selected, initiating a communication using the selected phone book information or shortcut number.
Systems, methods, and computer-readable media for managing mobile wireless devices
Methods, systems, and computer-readable media are provided for managing mobile wireless communication devices. A method for managing a mobile wireless communication device includes generating a message that is based on a digital subscriber line (DSL) Forum protocol and providing the message to the mobile wireless communication device.
Apparatus and method for controlling wireless network access
Systems and methods for controlling access to a wireless network are provided. An access control device is configured to control access of a wireless device to the wireless network. The access control device includes a receiver configured to receive, from the wireless device, a first identifier. The first identifier has an identifier type. The access control device further includes a processor configured to select a database, from a first database and a second database, based on the identifier type. The processor is further configured to determine whether the first identifier is in the selected database. The processor is further configured to restrict access of the wireless device to the wireless network based on whether the first identifier is in the selected database.
Inhibition of allowed closed subscriber group list
Disclosed herein are techniques for inhibition of allowed closed subscriber group list. According to an aspect, a method may be implemented at a wireless transmit/receive unit (WTRU). The method may include identifying a public land mobile network (PLMN) in which the WTRU is operating. Further, the method may include controlling closed group subscriber (CSG) selection based on the identified PLMN. For example, on a per PLMN basis, the WTRU may display to the user all CSGs or only CSGs in an operator CSG list.
Apparatus and methods for protecting data on a wireless device
Apparatus, methods, and programs for protecting data on a wireless device may include a wireless device having a computer platform with a processing engine operable, based upon configurable parameters, to log data access attempt on the wireless device and transmit the log to a remote device. Furthermore, the wireless device may be configured to execute locally and remotely generated control commands on the wireless device, the commands operable to modify an operation of the wireless device. The embodiment may also include an apparatus operable to receive the transmitted log, analyze the received log and transmit a control command to the wireless device. The apparatus may further generate a data access report and make the report available to an authorized user.
Control method for home base station access and home base station gateway
A control method for H(e)NB access and a H(e)NB gateway are provided in the present invention. The method includes the following steps: a H(e)NB gateway interacting with a Broadband Policy Control Framework (BPCF) through a H(e)NB policy function, and requesting for the admission control of a fixed broadband access network; the BPCF returning the result of the admission control to the H(e)NB gateway through the H(e)NB policy function. The present invention performs policy control for the service access of the User Equipment (UE) accessing via the H(e)NB.
System and method for utilizing a user's mobile phone account as a funding source
The invention generally pertains to a method for providing a purchase incentive associated with the purchase of a product bundle to an end user using a mobile device connected to a transaction server over a mobile phone network. By way of example, a secure connection is created over the mobile phone network to exchange information between the transaction server and the mobile device. The end user selects the desired product bundle level—as a result receives a purchase incentive, i.e., cash rebate, remittance, refund and/or other monies—and delivery method using the mobile device. The mobile device connects to a third party payment processor over a secure connection, which charges the end user for the purchase of the product bundle. Specifically, the third party payment processor charges the purchase to the user's mobile phone account with a mobile carrier. Once the end user is notified of the successful purchase transaction, the desired value is delivered to the end user using the user selected delivery method.
System and method for adjusting the amount of data bandwidth provided to a mobile device
The invention provides a system for adjusting the amount of data bandwidth provided to a mobile device comprising a bandwidth adjustment facilitator arranged to receive a request from the mobile device for adjusting the amount of data bandwidth; a bandwidth throttler in communication with the bandwidth adjustment facilitator; the bandwidth throttler adapted to cap or allocate excess available data bandwidth to the mobile device; wherein on receipt of the request, the bandwidth adjustment facilitator process the request and if the request is successfully processed, adjusts the data bandwidth provided to the mobile device via the bandwidth throttler. The system may further be adapted for billing/charging based on either pay-per-specified-time model or pay per action model.The invention is conveniently suited for use in telecommunications system and does not require modifications to be made to existing telecommunications system.
Text message generation for emergency services as a backup to voice communications
A mobile device may detect when a calling party dials an emergency service to request emergency assistance. Following input of the dialed digits, the device may automatically generate a text message in addition to initiating a voice call, both of which may be transmitted over a wireless data network. The wireless network may correlate the two calls as originating from the same emergency situation and may attempt to deliver the two calls to a Public Services Answering Position (PSAP) at an appropriate emergency center. If the PSAP does not receive a voice call, the PSAP may communicate with the device via test messaging.
Emergency 911 data messaging
A data request is generated (e.g., text, email, SMS, multimedia messaging system (MMS), etc.) from a source device. The data request is delivered to a PSAP or other emergency monitoring service location in a useable format. Exemplary useable formats include a canned voice message, delivery to a call center that translates data to voice, text to speech, and text to instant messaging (IM). Additional information and location are staged for use by the PSAP or other monitoring service location.
Medical data access system
In order to access a user's medical data (DonM) saved within a mobile terminal (TM) of the user which has transmitted an emergency call to a call center (CA) over a telecommunications network (RT), the mobile terminal transmits an identifier (IdU) of the user to the call center, which assigns an authorized person to the user and transmits an identifier (IdP) of the authorized person and the users identifier (IdU) to a communication server (SC). The server generates a key (Ku) based on the authorized person's identifier and on the users identifier and transmits the key to the mobile terminal (TM) and to a terminal (TC) of the authorized person, in order to unlock access to the medical data (DonM) by way of the key (Ku).
Filtering apparatus and method for dual-band sensing circuit
A filtering apparatus and method for dual-band sensing circuit are disclosed. The invention features a dual-band sensing unit disposed in a filtering device that receives the signals from a sub-system with variable frequency spectrum. The signals are split up into several bands. After that, one or more frequency detecting units are used to detect the power of high-band and low-band signals, and convert the power into a voltage signal. Users can externally adjust the gain of a tunable gain amplifier for the voltage signal. Further, a comparison operation is processed by a comparator, and a signal resulted from the comparison operation is used to control the switch timing for an RF switching unit. Consequently, this like adaptive notch filter is achieved to determine the intensity of noise and thereby to turn on the high-band or low-band notch filters, so as to reduce the in-band loss.
Low variation current multiplier
Aspects of the present disclosure relate to a current multiplier that can generate an output current with high linearity and/or high temperature compensation. Such current multipliers can be implemented by complementary metal oxide semiconductor (CMOS) circuit elements. In one embodiment, the current multiplier can include a current divider and a core current multiplier. The current divider can generate a divided current by dividing an input current by an adjustable division ratio. The division ratio can be adjusted, for example, based on a comparison of the input current with a reference current. The core current multiplier can generate the output current based on multiplying the divided current and a different current. According to certain embodiments, the output current can be maintained within a predetermined range as the input current to the current divider varies within a relatively wide range.
A configurable transceiver may include a configurable receiver, a configurable transmitter, and a digital signal processor (DSP). One or more components of the configurable receiver and/or the configurable transmitter may be a block that includes an array of components, such as an array of amplifiers, an array of filters, etc. The DSP may determine a configuration of the configurable receiver that satisfies a bit error rate threshold and minimizes power consumption. The DSP may configure the blocks of the configurable receiver in accordance with the determined configuration of the configurable receiver. The DSP may receive an indication of a modulation scheme being used for transmitted data and may determine a configuration of the configurable transmitter for the modulation scheme that satisfies an error vector magnitude threshold and minimizes power consumption. The DSP may configure the blocks of the configurable transmitter in accordance with the determined configuration of the configurable transmitter.
Wireless device, and information processing apparatus and storage device including the wireless device
According to one embodiment, a wireless device includes a board, a semiconductor chip, a radiation element, a sealing resin, a conductive layer, and a first conductive wall. The semiconductor chip is mounted on the board and includes a transmission/reception circuit. The radiation element is formed on the board. The sealing resin seals the semiconductor chip. The conductive layer covers at least a portion of a surface of the sealing resin. The first conductive wall is provided between the semiconductor chip and the radiation element and is connected to the conductive layer.
Electronic device with service acquisition antenna switching
An electronic device may contain wireless communication circuitry. The wireless communication circuitry may include radio-frequency transceiver circuitry coupled to multiple antennas. The electronic device may use the multiple antennas to make received signal power measurements. The signal power measurements may be made for each frequency in a list of frequencies used most recently by the electronic device in conveying data traffic between the electronic device and a wireless network. Based on received signal power measurements, the electronic device may select which frequency to use in performing system acquisition operations to attempt to establish a wireless communications link between the electronic device and the wireless network. The device may make signal power measurements for each antenna in the device to determine which antenna should be used in performing the system acquisition operations or may rotate through antennas in sequence to identify an antenna that can successfully perform system acquisition operations.
Secure communications via NFC device
A system, method, and apparatus for negotiating a communication link between first and second near field communication (NFC) devices is disclosed. A third NFC device is placed in close proximity with a first host device operatively containing the first NFC device to determine communication information including at least one of a communication mechanism and a data transfer protocol usable by the first host device. The communication information usable by the first host device is stored in a portable device operatively containing the third NFC device. The third NFC device is momentarily placed in close proximity with the second NFC device. The stored communication information of the first host device is transferred from the portable device to a second host device operatively containing the second NFC device. A communication link is established between the first and second host devices to enable the first and second host devices to transfer data between them as a function of the determined communication information.
Method and system for quick Bluetooth low energy (BLE) protocol signal presence detection for coexistence
Aspects of the invention may comprise managing operations of BLE interfaces and/or other radio interfaces in a wireless device to mitigate interference to communication via the BLE interfaces by the other radio interfaces. Operating parameters may be communicated between the BLE interfaces and the other radio interfaces to enable mitigating the interference to the BLE interfaces, and at least some of the BLE interfaces and/or the other radio interfaces may be configured based on the communicated operating parameters. The operating parameters may comprise adaptive frequency hopping (AFH) maps that may be adjusted to prevent use of common and/or used channels. The communication device may detect energy associated with BLE communication via scan of all or some of channels used for BLE communication. BLE communication may be predicted based on monitoring of frequency bands used during BLE communication, and/or monitoring of events that may trigger and/or occur during BLE communication.
Mobile terminal and control method thereof
A mobile terminal includes a communication unit for performing near field communication (NFC) with a detected object and receiving data from the object; a display; and a controller monitoring time duration for which the terminal remains within a first threshold distance relative to the object; identify each of a plurality of time thresholds respectively occurring during the time duration; and cause the display to sequentially display a plurality of different data responsive to an occurrence of a corresponding time threshold of the plurality of time thresholds. Each of the plurality of different data corresponds to one of the plurality of time thresholds and the plurality of different data is based on the data received from the object.
Radio power transmitting apparatus and radio power transmitting system
There is provided a radio power transmitting apparatus including: a power transmitting coil, a band signal generating unit, a reflected signal measuring unit, an oscillator and a communication control unit. The coil is supplied with a signal and transmits the signal to a power receiving coil on a radio power receiving apparatus through magnetic coupling. The generating unit generates a band signal having an allowable transmission band and supplies the band signal to the power transmitting coil. The reflected signal measuring unit measures a reflected signal of the band signal from the power transmitting coil. The oscillator generates a carrier signal having a controllable oscillating frequency. The control unit determines a transmission frequency based on a frequency characteristic of the reflected signal and performs control so that a transmission signal generated by modulating the carrier signal of the transmission frequency is supplied to the power transmitting coil.
Oscillation detection and oscillation mitigation in amplifiers
An amplifier configured to handle oscillation is disclosed. The amplifier monitors a signal ratio to determine when the amplifier is oscillating. The gain is reduced when oscillation is detected and the amplifier is allowed to operate normally when oscillation is not detected.
Verifying oscillation in amplifiers and the mitigation thereof
A method is provided for detecting and mitigating oscillation in an amplifier. The amplifier is configured to sample a signal being amplified to determine whether the amplifier is oscillating. In addition, the status of the amplifier can be verified based on the apparent signal levels of the signals being amplified. The gain of the amplifier is then adjusted in accordance with whether the amplifier is oscillating or as necessary to maintain gain that is compatible with the system within which the amplifier is operating.
Terminal device, relay device, and base station communication method
A communication method includes at a relay device, receiving first data from the base station, the first data including first control information that represents a first communication mode from the base station to the relay device, adding second control information to the received first data, the second control information representing a second communication mode from the relay device to the terminal device, and relaying second data to the terminal device, the second data including the first data added with the second control information; and at a terminal device, receiving the first data of the first communication mode storing the first data in a buffer, performing reception processing on the second data based on the second control information included in the second data, performing reception processing on the first data based on the first control information included in the second data, and combining the first and second data.
Methods, systems, and computer program products for event attendance processing and attendee identification and related devices
A method of tracking attendance of an event includes detecting a presence of at least one mobile attendee device. The mobile attendee device includes personal identification information stored therein for an attendee associated therewith who is registered for the event. An ad hoc wireless data connection is established with the mobile attendee device responsive to detection thereof. An identification request is transmitted to the mobile attendee device via the ad hoc wireless data connection, and the personal identification information for the attendee is received from the mobile attendee device via the ad hoc wireless data connection. The received identification information is displayed on an administrator device. Related systems, devices, and computer program products are also discussed.
Systems and methods for providing a dynamic continual improvement educational environment
Dynamic systems and methods for gathering/tracking data, automatically adapting to an individual's pace of learning, selectively determining the type of content provided to an individual, selectively providing an exposure frequency for the content, and/or enabling rapid design modifications within the educational environment. Educational content is dynamically designed and customizably presented to an individual learner. An analysis is performed on the data to optimize learning. Modifications are selectively or automatically made to the educational content. The process of designing, implementing, analyzing, and selectively modifying creates a cycle that optimizes the learning process and adapts to individual learners. Furthermore, the educational content is dynamically provided to the learner on an iterative basis according to the need of that learner in the learning process.
Image forming method
In an image forming method of wet fixing system, the fixing solution contains an ester compound represented by at least one of general formula (1) and general formula (2) below: R11—(CO)—O—R12 General formula (1): where R11 represents a linear or branched alkyl group having at least one hydroxyl group and 2 to 11 carbon atoms, and R12 represents a linear or branched alkyl group having 1 to 4 carbon atoms; R21—O—(CO)—R22—(CO)—O—R23 General formula (2): where R21 represents a linear or branched aliphatic hydrocarbon group having 1 to 4 carbon atoms, R22 represents a linear or branched aliphatic hydrocarbon group having at least one hydroxyl group and 1 to 8 carbon atoms, and R23 represents a linear or branched aliphatic hydrocarbon group having 1 to 4 carbon atoms.
Developing member, process cartridge and electrophotographic apparatus
A high quality developing member that is excellent in deformation recovery property under a high temperature and that also satisfies filming resistance under a low temperature is provided. The developing member of the present invention includes a mandrel, an elastic layer formed on the outer periphery surface of the mandrel, and a surface layer covering the outer periphery surface of the elastic layer, wherein the surface layer contains a first resin and a second resin, the first resin has a particular structure between adjacent two urethane linkages, and the second resin is a resin having a particular structure and having a glass transition point Tg of 20° C. or higher and 120° C. or lower.
Developing device having movable coupling member for engagement to electrophotographic image forming apparatus
A developing device is usable with an electrophotographic image forming apparatus including a shaft and a rotary unit mounting the device. When mounted, the device is movable perpendicular to a shaft axial direction in response to movement of the rotary unit and the shaft is not movable in that direction. The device includes a developing roller that contacts and separates from a drum in response to movement of the rotary unit, and a coupler transmitting a rotating force to the roller. The coupler includes a portion engaging the shaft to receive a rotating force and a portion transmitting the received rotating force to the roller. The coupler takes a first position for transmitting the rotational force to the roller, a position before the coupler engages the shaft and is inclined away from the first position, and a position for the disengagement of the coupler and the shaft.
Image forming apparatus including a shock absorber
An image forming apparatus includes a main body, a document board to open and close an upper side of the main body while being pivoted, and a shock absorber to reduce impact generated when the document board closes the upper side of the main body, wherein the shock absorber includes a link pivotably mounted, at a first end thereof, to the document board while guide protrusions are formed at a second end thereof, and a guide slot formed so that each guide protrusion is movable. Since the guide slot applies a pressure gradually increased from the first end side of the guide slot to the second end side thereof, to the guide protrusion, a speed of the guide protrusion and a pivoting speed of the document board are restricted below a certain speed when the upper side of the main body is closed through the document board.
Image formation apparatus
An image formation apparatus includes: an image formation unit including an image carrier configured to carry a developer image; a drive unit configured to drive the image carrier; a holder provided with the drive unit; a transfer unit located to be opposed to the image carrier and configured to transfer the developer image from the image carrier on a transfer medium; and a switching unit configured to switch a position of the holder between an image formation position, at which the transfer unit transfers the developer image from the image carrier on the transfer medium, and a non-image formation position. The holder is configured to move together with the image formation unit.
Method for bias member charging a photoreceptor
A bias charge member is pulsed into contact with a photoreceptor at high frequency as a mean to reduce contamination and wearing on both the bias charge member and photoreceptor.
Image forming apparatus
In one embodiment, an image forming apparatus (100) is provided with a resin frame (300) made of resin and an image forming unit (200). The image forming apparatus further includes a first duct (410) that allows air to flow on one side of the image forming unit (200), a second duct (420) that allows air to flow on the other side, and a third duct (430) that allows air to flow between the first duct and the second duct. The resin frame (300) has a first duct portion (311) that constitutes at least a portion of the first duct (410), and a second duct portion (321) that constitutes at least a portion of the second duct (420).
A developing cartridge includes a case having a first sidewall and a second sidewall opposite to the first sidewall, and a developing roller disposed between the first sidewall and second sidewall. The developing roller can include a developing roller shaft and a developing roller member configured to carry a developing agent thereon, the developing roller member disposed around the developing roller shaft. Also, the developing cartridge can include an electrode disposed on the first sidewall adjacent to the developing roller shaft, the electrode electrically connected to the developing roller member, and a driven coupling disposed on the second sidewall. The electrode can include, an extending portion extending in a direction away from the first sidewall. An outermost periphery of the driven coupling defines a projection plane projecting in a direction towards the electrode, wherein at least a part of the extending portion is disposed within the projection plane.
Image heating apparatus
A toner image heater includes a heating roller; an external heater for heating the heating roller; a heater for heating the external heater; a detector for detecting a temperature of the external heater; a controller for maintaining the external heater at a target temperature; and an air blower for blowing air toward the heating roller when a predetermined kind of the recording material is separated from the heating roller, wherein the controller controls the target temperature in accordance with information corresponding to a temperature of the air blown from the air blower.
Image forming apparatus controlling power supplied to fixing unit
Adjusting the start timing for conveying a printing material from a printing material conveying unit based on a power supply update period for power supplied to a heater allows proper power correction timing to be attained for compensating for a drop in temperature of the endless belt following the printing material entering a fixing nip portion.
Image forming apparatus and image forming method
An image forming apparatus for fixing a toner image to a recording sheet by transporting the recording sheet through a fixing nip formed by a heating rotating body and a pressing rotating body that press against each other. The image forming apparatus includes an idle rotation unit that causes idle rotation of the heating rotating body and the pressing rotating body during a standby state of the image forming apparatus, a cumulative amount recording unit that measures an amount of the idle rotation and record a cumulative amount of the idle rotation, and a prohibiting unit that prohibits the idle rotation unit from causing the idle rotation when the cumulative amount reaches a predetermined allowable value.
Image forming apparatus with mechanism capable of moving transfer device with respect to toner image carrier and image forming method for moving transfer device with respect to toner image carrier
An image forming apparatus includes a transfer device separator that moves a transfer device between a contact position and a first isolation position within a shortened time. At the contact position, the transfer device contacts a toner image carrier. At the first isolation position, the transfer device is isolated from the toner image carrier with a first interval therebetween. A controller controls the transfer device separator to move the transfer device to the contact position as first to third toner images and a blank section between the first toner image and the second toner image carried by the toner image carrier pass through a transfer region and to the first isolation position as a toner patch section between the first toner image and the second toner image carried by the toner image carrier passes through the transfer region.
Developing device, image forming apparatus and method of controlling developing device
A developing device includes a development roller, a magnetic roller, a transformer, a switching portion, output control portion and a capacitor. The development roller is opposite a photoconductor drum. The magnetic roller performs, with a magnetic brush, the supply of a toner to the development roller and the removal of the toner. The transformer generates an alternating-current voltage applied to the development roller. The switching portion passes and interrupts a current to the transformer. The output control portion stepwise changes, when a duty ratio in switching is changed, the duty ratio a plurality of times from a first duty ratio to a second duty ratio. The capacitor has one end connected to the transformer and the other end connected to the switching portion.
Image forming apparatus
An image forming apparatus including an upper cover, an image forming unit including an image carrier and a developing device, a toner container detachably connectable to the developing device to supply toner to the developing device through an opening in the toner container, a shutter provided to the toner container and biased by a first elastic member in a direction to close the opening of the toner container, a link member integrated with the shutter, a shutter switching member to switch a position of the shutter to an open position by moving the link member to a pressing position, and an interlock mechanism to retract the shutter switching member from the pressing position in conjunction with opening of the upper cover. The opening is closed with the shutter by switching the shutter switching member to a retracted position in conjunction with the opening of the upper cover.
Adaptive equalization in coherent fiber optic communication
An embodiment of the invention is a technique to equalize received samples. A coefficient generator generates filter coefficients using an error vector and input samples. A filter stage generates equalized samples from input samples using the filter coefficients. The received samples are provided by a receiver front end in an optical transmission channel carrying transmitted symbols. Other embodiments are also described.
Digital coherent receiver and phase control method
A digital coherent receiver includes a sampling phase detector to detect a phase of a sampled digital signal, and a phase adjustor to adjust the sampling phase of the digital signal based upon the detected phase. The phase detector includes filters to equalize the digital signal with different equalization characteristics; sensitivity monitoring phase detectors, each connected to one of the filters and outputting a phase detection signal representing the phase of the output signal from the associated filter together with a sensitivity monitoring signal representing the sensitivity of the phase detection; sensitivity correction coefficient generators, each generating a sensitivity correction coefficient for correcting the associated phase detection signal using a square sum of the sensitivity monitoring signals; and an adder to add the phase detection signals that have been corrected by the sensitivity correction coefficients, and output a phase signal.
Optical transmission apparatus and optical transmission system
An optical transmission apparatus includes an optical transmitter that outputs a signal light corresponding to a wavelength of a WDM light, a multiplexer that multiplexes lights input to the plurality of input ports, and that outputs a light generated through the multiplexing from the one or more output port, an optical amplifier that amplifies the light output from the multiplexer; and an amplified spontaneous emission (ASE) transmitter that inputs branching off part of the light output from the optical amplifier by a splitter and multiplexes, with the signal light, ASE in a wavelength band corresponding to an unused wavelength adjacent to the signal light included in the branched-off light.
Optical interconnection modules for hybrid electrical-optical networks
An optical interconnection module (100) for connecting to a media converter module (20) as part of a hybrid electrical-optical network (10) is disclosed. The optical interconnection module includes a transmitter connector (136T) having transmit ports (POT(i)) and a receiver connector having receive ports (POR(i)). The optical interconnection module also has transmit/receive ports (POF(i)) that are optically connected via a set (F) of fibers (142) to the transmit and receive ports of the transmitter and receiver connectors using one of two port configurations. Hybrid electrical-optical networks that utilize a trunk cable (60) to connect the media converter module to the optical interconnection module are also disclosed.
Apparatus and methods for generating and receiving optical signals at substantially 100Gb/s and beyond
A substantially 400 Gb/s optical transceiver includes a substantially 400 Gb/s optical transmitter which includes a set of four substantially 100 Gb/s tunable optical transmitters, each transmitting a substantially 100 Gb/s optical signal in a wavelength division multiplexed form over four channel wavelengths selected such that the resulting 16 channel wavelengths are different from each other and are suitable for WDM, and an optical transmission interface including a set of four 1:4 wavelength division demultiplexers which are operative to demultiplex the substantially 100 Gb/s optical signals to produce substantially 25 Gb/s optical signals over each of the 16 different channel wavelengths, and a 16:1 wavelength division multiplexer which is operative to multiplex the substantially 25 Gb/s optical signals of the 16 different channel wavelengths to generate a substantially 400 Gb/s optical signal. Other embodiments refer to a substantially 400 Gb/s optical receiver, other optical transceivers that operate at substantially 100 Gb/s and beyond, and related apparatus and methods.
Logical-link management method and communication device
A logical-link management method to be executed in an optical communication system including a station side device (OLT) and a subscriber side device (ONU) that is capable of setting a plurality of logical links together with the OLT, in which the OLT transmits a signal for managing the ONU via a single logical link. The logical-link management method includes a status monitoring of the OLT monitoring whether there is a change in a connection status of the logical link between the OLT and the ONU and a link resetting of the OLT resetting, when a change of the connection status of the logical link is detected at the status monitoring, a device management logical link used for transmitting the signal for managing the ONU according to a predetermined procedure.
Method and apparatus for planning network configuration in an optical network
Optical regenerators and amplifiers are expensive to implement and maintain. A method or corresponding apparatus in an example embodiment of the present invention relates to an optical planning tool that plans an optical network configuration by determining a plurality of costs for maintaining signal strength in corresponding network configurations including (i) a configuration of regenerators, (ii) a configuration of pre-or post-amplifiers, and (iii) a configuration of pre- and post-amplifiers in candidate locations and regenerator modules. The candidate locations for placing pre-or post-amplifiers are determined based on loss in each span, expected traffic patterns, and proposed regeneration locations along paths of expected traffic. The regeneration modules are located in locations determined based on the candidate locations. The example embodiment selects a configuration from among the network configurations as a function of the plurality of costs, helping reduce the cost of network deployment.
Distributed scheduling for an optical switch
Scheduling methods and apparatus for use with optical switches with hybrid architectures are provided. An exemplary distributed scheduling process achieves 100% throughput for any admissible Bernoulli arrival traffic. The exemplary distributed scheduling process may be easily adapted to work for any finite round trip time, without sacrificing any throughput. Simulation results also showed that this distributed scheduling process can provide very good delay performance for different traffic patterns and for different round trip times associated with current switches.
Variable rate optical transmitter based on all-optical OFDM super-channel technology
The present invention is directed to a method including determining an appropriate power level for a phase modulator for an optimum number of subcarriers; and applying the determined appropriate power level via a controller to produce the optimum number of subcarriers, wherein the optimum number of subcarriers enables an optical-orthogonal frequency division multiplex O-OFDM based variable rate transmitter with automatic control by a controller to produce an optimum setting based on a required rate.
Technology for simulating and/or controlling communication optical networks
A technique for controlling power of a network node in an optical mesh network, comprising: determining a number of optical paths ingressing or expected to ingress the node, determining capacity or expected capacity of each of the paths; calculating for each of the paths a virtual input power Pvirtual, based on estimation of relative capacity of a specific path with respect to total capacity of all the paths; applying to the network node a power control mechanism, while utilizing a corresponding virtual input power Pvirtual as input power of any of the paths.
Predictive end-to-end management for SONET networks
A system and method is disclosed that allows for the monitoring, analyzing and reporting on performance, availability and quality of optical network paths. The correlation of PM parameter metrics to client connections, coupled with threshold-based alarm generation provides a proactive and predictive management, reporting and analyzing of the health and effectiveness of individual path connections to alert Operational Support (OS) staff and/or customers to signal degradation and impending Network Element (NE) failures. The system and method performs in real-time processing intervals required for alarm surveillance in a telecommunications network.
Electronic apparatus, control method of electronic apparatus, and computer-readable storage medium
An electronic apparatus includes a playback speed information acquiring module and a video signal output module. The playback speed information acquiring module is configured to acquire information relating to a playback speed of video. The video signal output module is configured to perform 3D depth estimation processing on the video according to the acquired information relating to the playback speed of the video and to output a video signal that is subjected to the 3D depth estimation processing.
System and method for automatically capturing user edits in a digital recording
A method and system for automatically capturing user edits in a digital recording are described. The method involves determining a beginning time stamp for an edit segment in a digital recording and an ending time stamp for the edit segment in the digital recording. The method then receives an indication from a user whether to modify the edit segment for subsequent viewing of the digital recording.
CPS unit management in the disc for downloaded data
An information processing device comprising: a data processing unit configured to load a disk, which stores content that is divided into content usage control units, and to execute processes for reading the content; and a local storage unit configured to store subsequential data obtained and/or generated subsequentially, wherein the data processing unit is configured to perform processes to: select a title that is an index for reading the subsequential data from dummy titles stored in advance on the disk; set the title as a title for the subsequential data; and store the subsequential data in the local storage unit.
Particle filled polymer waveguide
A polymer waveguide including a polymer matrix and particles, wherein the particles are embedded in the polymer matrix and have lower optical bulk losses than the polymer matrix.
Organosilica nanoparticles and method for making
Preparation of Free-Flowing Organosilica Nanoparticles by Forming a solution of an organosilica nanoparticle precursor in a mixed solvent system comprising a first solvent and a second solvent, wherein the first solvent is different from the second solvent, wherein the second solvent has a boiling point which is greater than a boiling point of the first solvent, and wherein the nanoparticle precursor has a greater solubility in the first solvent than in the second solvent; removing at least 50% of the first solvent to form nanoparticles having a mean particle size less than about 25 nanometers dispersed in the solution; adding a coupling agent to the solution to facilitate reacting of the coupling agent with the nanoparticles; and recovering the nanoparticles from the solution, wherein the recovered nanoparticles have the mean particle size of less than about 25 nanometers
Low bend loss optical fiber
An optical fiber includes a central glass core region comprising maximum refractive index delta percent Δ1, a first inner annular region surrounding said core comprising refractive index delta percent Δ2, a depressed annular region surrounding said inner annular region and comprising Δ3 and a third annular region surrounding the depressed annular region comprising refractive index delta percent Δ4; wherein the third annular region comprises chlorine an amount greater than 0.2 weight percent in a region which is within 5 microns from the depressed annular region, wherein Δ1MAX>Δ4>Δ2>Δ3. The difference between Δ4 and Δ2 is greater than 0.01 and profile volume, |V3| is at least 50% Δμm2.
Low-loss optical fiber over wide wavelength range and method of manufacturing the same
A low-loss optical fiber over wide wavelength range includes a transmission loss of less than or equal to 40 dB/km in a whole wavelength range of 400-1400 nm, and being manufactured by drawing an optical fiber preform including a core composed of a silica glass having a hydroxyl-group concentration of less than or equal to 1 ppm and a cladding composed of a silica glass having a fluorine concentration of more than or equal to 3.2 wt %.
Footwear sole sections including bladders with internal flexibility sipes therebetween and an attachment between sipe surfaces
A wire or optical fiber cable configured for electronic devices, including at least one wire or optical fiber; at least one inner layer surrounding a portion of the at least one wire or optical fiber; at least one outer layer surrounding a portion of the at least one inner layer; at least one internal sipe separating at least a part of one outer layer and at least a part of one inner layer and a Faraday cage. The internal sipe is formed by at least a portion of an inner surface of the outer layer and at least a portion of an outer surface of the inner layer; and the inner and outer surface portions forming the internal sipe oppose each other and can move relative to each other in a sliding motion.
Optical module with pig-tailed fiber and method to assembly the same
A method to assemble a pig-tailed optical module and an arrangement thereof are disclosed. The method includes a step to recover the optical coupling efficiency between the optical device in the optical module and the pig-tailed fiber. The method includes a step to iterating the YAG laser welding at points axially distributed but with an inconstant pitch as slightly rotating the optical module around the optical axis of the pig-tailed fiber clock wise and counter clock wise depending on the enhancement and/or the degradation of the optical coupling efficiency between the optical device and the pig-tailed fiber.
Optical-electric converting element and optical-electric converting module
An optical-electric converting element includes a lower surface and a side surface. The lower surface defines a cavity. A bottom portion of the cavity forms at least one first light-gathering coupling lens and at least one first light-emitting coupling lens. A diameter of the at least one first light-receiving coupling lens is equal to d1, and a diameter of the at least one first light-emitting coupling lenses is equal to d2. The side surface perpendicularly connects to the lower surface. The side surface forms at least one second light-receiving coupling lens and at least one second light-emitting coupling lens. A diameter of the at least one second light-emitting coupling lens is equal to d3, a diameter of the at least one second light-receiving coupling lens is equal to d4; wherein d1>d3 and d4>d2.
Reconfigurable optical add-drop multiplexer
A reconfigurable optical device including input and output ports, and add or drop ports, has a high degree of flexibility such that any wavelength channel from any optical signal introduced through the add ports may be added to any of the optical signals transmitted through the output ports. In addition, any wavelength channel from any optical signal received through the inputs ports may be dropped through any of the drop ports. Furthermore, the optical device is configurable to allow the same wavelength channel from two different optical signals supplied respectively through any two inputs ports to be simultaneously directed to two different drop ports.
Wavelength selective switch
A wavelength selective switch according to the present invention includes at least one input port for inputting wavelength-multiplexed light, a dispersive element which receives the light from the input port, and disperses the received light, a light converging element which converges dispersed light which has been dispersed for each wavelength, a light deflecting member having a plurality of reflecting optical elements which are capable of independently deflecting each dispersed light from the light converging element, and at least one output port which receives light which has been deflected by the light deflecting member. An area having a reflectivity higher than a central area of the reflecting surface is formed in at least a part of an end portion of the reflecting surface in the dispersive direction by the dispersive element.
Method and apparatus for aligning a laser to a waveguide
An apparatus includes a slider structure having a waveguide and a cavity configured to align a laser to the waveguide. The cavity includes a plurality of solder bumps on a bottom of the cavity configured to electrically and thermally couple the laser to the slider. At least one mechanical stopper is disposed in the cavity to facilitate vertical alignment between an output of the laser and an input of the waveguide. At least one solder bump is disposed on the mechanical stopper to facilitate lateral alignment between the output of the laser and the input of the waveguide in response to a reflow of the solder bumps.
Modal rotation in optical waveguides
An optical waveguide structure includes a rotator having a dual-layer core. A first layer of the dual-layer core may include a tapering portion. A second layer of the dual-layer core may include a rib portion disposed on the tapering portion. The combination of the rib portion and the tapering portion may receive a pair of optical signals, one being polarized in a TE mode and the other being polarized in a TM mode, and convert them to a pair of TE mode optical signals.
Polarization independent wavelength converter and polarization independent wavelength conversion method
A polarization independent wavelength converter includes a polarization maintaining optical fiber which includes a first and a second ends and has a first polarization axis and a second polarization axis, the first and the second polarization axes being orthogonal to each other and propagating light at different velocities, and a group velocity difference cancellation unit that receives a signal light having a certain polarization state and a pump light including a polarization component parallel to the first polarization axis and a polarization component parallel to the second polarization axis and that causes the signal light and a wavelength-converted light generated in the polarization maintaining optical fiber by the signal and the pump lights to pass through the polarization maintaining optical fiber in a manner not to be influenced by a group velocity difference of each of the signal and the wavelength-converted lights between the first and the second polarization axes.
Nano-wire optical block devices for amplifying, modulating, and detecting optical signals
A nano-wire optical block device for amplifying, modulating, and detecting an optical signal in a large-core hollow metallized waveguide. The nano-wire optical block device comprises a substrate with a plurality of nano-wires coupled to the substrate to form the nano-wire optical block. Each properly formed nano-wire is comprised of a p-doped region, an intrinsic region, and an n-doped region. The nano-wire optical block is operable to be inserted into the large-core hollow metallized waveguide to provide at least one of amplifying, modulating, and detecting the optical signal.
Trainable handheld optical character recognition systems and methods
A handheld scanner incorporates vision software to allow the handheld scanner to be trained for OCR. The handheld scanner can include a user interface to allow a user to associate an image of a mark with electronic data for the mark. The user interface, along with a range finder, can also be used to influence variables that affect the quality of an image scan, thereby improving the quality of results for the image scan and/or decode process.
Image processing apparatus
An image processing apparatus comprises a processing unit for computing displacement amounts between a basis image and each reference image, a processing unit for generating multiple deformed images based on the displacement amounts, the basis image and multiple reference images, a processing unit for setting a threshold of a parameter, a processing unit for selecting image information from the reference image by the threshold, a processing unit for generating composed images and weighted images based on the basis image, the displacement amounts and the image information, a processing unit for generating high-resolution grid images by dividing the composed image by the weighted image, a processing unit for generating simplified interpolation images based on high-resolution grid images, a processing unit for generating assistance images, a display unit for displaying the assistance images and a control unit that controls the necessary processing as necessary.
Bicubic downsampling in a constrained environment
An system is described for managing bicubic downsampling in a constrained environment. The system may be configured to detect a request for a destination image, access a read-copy pattern for the ratio of downsampling, access the source image, and generate the destination image using the source image and the read-copy pattern.
Systems and methods for resizing an image
In some instances, an image may have dimensions that do not correspond to a slot to display the image. For example, an image content item may have dimensions that do not correspond to a content item slot. The image may be resized using seam carving to add or remove pixels of the image. A saliency map for the image may be used having saliency scores for each pixel of the image. Evaluation metrics may be used before, during, and after, seam carving to determine whether salient content is affected by the seam carving. In some instances, a seam cost threshold value may be used for adaptive step size during the seam carving. The resized image may then be outputted, such as for an image content item to be served with a resource.
Illusion image generating apparatus, medium, image data, illusion image generating method, printing medium manufacturing method, and program
The present invention obtains subband signals by performing a multiresolution decomposition by a wavelet frame with orientation selectivity or a filterbank with orientation selectivity that is a set of an approximate filter with no orientation and a plurality of detail filters with respective orientations on image data, and, when an image is reconstructed by summing the obtained subband signals, generates reconstructed image data that creates a floating illusion by attenuating or amplifying a subband signal corresponding to at least one of detail filters with a predetermined orientation relative to a floating direction, in which an image is desired to be floated due to an illusion, among the detail filters.
Image processing apparatus and method with reduced processing load
An image processing apparatus includes: a rate control section that performs rate control of output data by preferentially deleting lower-level-side coded data, as necessary, from respective pieces of coded data where respective bit-planes with levels higher than a predetermined level of a bit-plane group, in which coefficient data obtained by orthogonally transforming image data is developed in a bit depth direction, are coded; and a synthesizing section that generates the output data by synthesizing the coded data, from which the lower-level-side coded data is preferentially deleted as necessary by the rate control section, and respective bit-planes with levels lower than the predetermined level of the bit-plane group.
Adaptive false contouring prevention in layered coding of images with extended dynamic range
An encoder receives a sequence of images in extended or visual dynamic range (VDR). For each image, a dynamic range compression function and associated parameters are selected to convert the input image into a second image with a lower dynamic range. Using the input image and the second image, a residual image is computed. The input VDR image sequence is coded using a layered codec that uses the second image as a base layer and a residual image that is derived from the input and second images as one or more residual layers. Using the residual image, a false contour detection method (FCD) estimates the number of potential perceptually visible false contours in the decoded VDR image and iteratively adjusts the dynamic range compression parameters to prevent or reduce the number of false contours. Examples that use a uniform dynamic range compression function are also described.
Image predictive encoding and decoding system
In image predictive encoding according to an embodiment, one or more motion information sets are derived from plural pieces of motion information stored in a computer readable storage medium. Each of the one or more information sets includes two pieces of motion information between which any one of constituent elements differ in value. A predicted signal of a target region in a picture is generated by motion compensation, using two pieces of motion information in a motion information set selected from the one or more motion information sets. The two pieces of motion information in the selected motion information set are stored in the computer readable storage medium, and are used for generation of a predicted signal of another region.
Image decoding apparatus and method for handling intra-image predictive decoding with various color spaces and color signal resolutions
The present invention is directed to an image information decoding apparatus adapted for performing intra-image decoding based on resolution of color components and color space of an input image signal. An intra prediction unit serves to adaptively change block size in generating a prediction image based on a chroma format signal indicating whether resolution of color components is one of 4:2:0 format, 4:2:2 format, and 4:4:4 format, and a color space signal indicating whether color space is one of YCbCr, RGB, and XYZ. An inverse orthogonal transform unit and an inverse quantization unit serve to also change orthogonal transform technique and quantization technique in accordance with the chroma format signal and the color space signal. A decoding unit decodes the chroma format signal and the color space signal to generate a prediction image corresponding to the chroma format signal and the color space signal.
Image encoding apparatus and method for handling intra-image predictive encoding with various color spaces and color signal resolutions
The present invention is directed to an image information encoding apparatus adapted for performing intra-image encoding based on resolution of color components and color space of an input image signal. An intra prediction unit serves to adaptively change block size in generating a prediction image based on a chroma format signal indicating whether resolution of color components is one of 4:2:0 format, 4:2:2 format, and 4:4:4 format, and a color space signal indicating whether color space is one of YCbCr, RGB, and XYZ. An inverse orthogonal transform unit and an inverse quantization unit serve to also change orthogonal transform technique and quantization technique in accordance with the chroma format signal and the color space signal. An encoding unit encodes the chroma format signal and the color space signal to generate a prediction image corresponding to the chroma format signal and the color space signal.
Algorithm for FAST corner detection
An apparatus and method to find a specified number of corners and/or interest points in an image is presented. In some embodiments, a method to find a specified number of corners in a digital image comprises receiving a digital image containing a plurality of candidate corners; directly calculating a threshold score (S) for a center pixel, for each of the plurality of candidate corners, to form a plurality of scores; sorting, by the plurality of scores, the plurality of candidate corners to form a sorted list; and selecting corner locations sequentially from the sorted list based on the certain number of corners. The methods described may be implemented using any combination of hardware, software and firmware.
Methods and systems for automatic content-boundary detection
Aspects of the present invention are related to systems and methods for automatic content-boundary detection in a digital image. According to one aspect of the present invention a received image may be preconditioned to form a normalized image from which image-content edges may be detected. Projection histograms in the direction of a known skew angle associated with the image and the normal to the skew angle may be formed to determine image-content boundaries.
Video processing apparatus and method
In one embodiment, a method is disclosed for performing a video processing. The method can extract one or more common video segments. The method can select a common summarization segment based on a first summarization score. The method can extract one or more individual video segments in which the number of segments included therein is not more than a third threshold value that is less than a second threshold value. The method can select an individual summarization segment based on a second summarization score. In addition, the method can integrate the common summarization segment and the individual summarization segment to create the summary video.
Apparatus, method, device and computer program product providing enhanced text copy capability with touch input display
A device includes a display having touch sensitive display surface that is responsive to pen-based user input, and a control unit that is bidirectionally coupled to the display. The control unit is responsive to a user selecting displayed text from a first display location using the pen, and is further responsive to a first signal generated using the pen, to copy the selected displayed text to a buffer associated with a text window and to display the copied text in the text window. The control unit is further responsive to the user selecting a second display location using the pen, and to a second signal, to copy the displayed text from the text window to the second display location, thereby implementing a copy and paste function. A cut and paste function may also be implemented.
Mobile image search and indexing system and method
A computer-implemented system and method are described for image searching and image indexing that may be incorporated in a mobile device that is part of an object identification system. A computer-implemented system and method relating to a MISIS client and MISIS server that may be associated with mobile pointing and identification system for the searching and indexing of objects in in situ images in geographic space taken from the perspective of a system user located near the surface of the Earth including horizontal, oblique, and airborne perspectives.
Apparatus and method for extracting foreground layer in image sequence
Disclosed are an apparatus and a method for extracting a foreground layer from an image sequence that extract a foreground object layer area in which a depth value is discontinuous with that of a background from an input image sequence. By using the present disclosure, the layer area is automatically tracked in the subsequent frames through user's setting in the start frame in the image sequence in which the depth values of the foreground and the background are discontinuous, thereby extracting the foreground layer area in which the drift phenomenon and the flickering phenomenon are reduced.
Methods and systems for content processing
Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Others relate to processing of image data. Still others concern metadata generation, processing, and representation. Yet others relate to coping with fixed focus limitations of cell phone cameras, e.g., in reading digital watermark data. Still others concern user interface improvements. A great number of other features and arrangements are also detailed.
System for presenting high-interest-level images
A system comprising an image display; a digital camera positioned to capture images of persons viewing the image display; and a memory system storing instructions configured to cause a data processing system to implement a method for presenting digital images having a high interest level to a particular person selected from a set of candidate digital images. The method includes using the digital camera to capture an image including a particular person positioned to view the image display. The candidate digital images are analyzed to designate one or more image elements, and familiarity levels of the designated image elements to the particular person are determined. For each candidate digital image, an associated interest level to the particular person is determined responsive to the determined familiarity levels. One or more of the candidate digital images are selected based on the determined interest levels and are presented to the particular person.
Image processing apparatus and image processing method
According to one embodiment, an image processing apparatus includes: a reduction module configured to reduce image data that is input to output reduced data; an extraction module configured to extract a diffuse reflection component from the reduced data; an enlargement module configured to enlarge the diffuse reflection component to a size before reduction of the input image data to output enlarged data; a high-frequency acquisition module configured to acquire a high-frequency component removed by reduction from difference between the input image data and the reduced data; a high-frequency addition module configured to output first data obtained by adding the high-frequency component acquired to the enlarged data; and a gloss component acquisition module configured to acquire a gloss component from difference between the input image data and the first data.
Method of demosaicing a digital raw image, corresponding computer program and graphics or imager circuit
A method of demosaicing a digital raw image in the form of a matrix of pixels, each dedicated to a single color among several predetermined colors from color filters, includes obtaining a color digital image of the same resolution as the raw image and in which each pixel results from corresponding pixels in a luminance image and in chrominance images reconstructed from the raw image, transformation of the raw image by applying local convolution kernels to its pixels, taking into account neighboring pixels of different colors, to obtain an image of low frequency coefficients using a low frequency local kernel and images of high frequency coefficients using high frequency local kernels; reconstruction of the luminance image using at least the image of low frequency coefficients; reconstruction of the chrominance images using the images of high frequency coefficients.
Image-based crack detection
Contact-less remote-sensing crack detection and/quantification methodologies are described, which are based on three-dimensional (3D) scene reconstruction, image processing, and pattern recognition. The systems and methodologies can utilize depth perception for detecting and/or quantifying cracks. These methodologies can provide the ability to analyze images captured from any distance and using any focal length or resolution. This adaptive feature may be especially useful for incorporation into mobile systems, such as unmanned aerial vehicles (UAV) or mobile autonomous or semi-autonomous robotic systems such as wheel-based or track-based radio controlled robots, as utilizing such structural inspection methods onto those mobile platforms may allow inaccessible regions to be properly inspected for cracks.
Device for processing paper sheets or the like
A paper sheet processing apparatus capable of preventing conveyance failure of a paper sheet. The apparatus includes a bill insertion slot, a bill conveyance mechanism capable of conveying a bill inserted from the bill insertion slot, a bill reader reading the bill conveyed by the bill conveyance mechanism, an authenticity determination mechanism determining the authentication of the bill read by the bill reader, a bill determination processing part for determining, before the reading of the banknote by the banknote reader is completed, damage to the bill based on a shape of a portion of the bill which is read and on a shape of a reference bill, and a controller controlling conveyance of the bill by the bill conveyance mechanism based on a result of the determination by the bill determination processing part.
Determination of spatial proximity between features of interest in biological tissue
Exemplary embodiments enable determination of spatial proximity between two or more features in biological tissue. An exemplary method includes identifying a morphological feature in an image of the biological tissue based on expression levels of a first biomarker indicative of the morphological feature, and receiving a result of a segmentation analysis performed on the image of the biological tissue identifying a set of morphological units in the image external to the morphological feature. An exemplary method includes determining an expression level of a second biomarker corresponding to each unit in the set of morphological units in the image of the biological tissue, and determining a spatial distance between the morphological feature and each unit in the set of morphological units. An exemplary method further includes automatically determining a relationship between expression levels of the second biomarker and corresponding spatial distance from the morphological feature of the set of morphological units.
Method of noise reduction in digital X-rayograms
The invention relates to the field of digital image processing and can find use in suppression of noise in digital images, formed by high-energy radiation, including X-ray radiation. Specifically, the invention relates to a method for suppression of noise in digital x-ray images. The objective of the invention is to provide a method for noise suppression in digital X-ray images that has extended functionality, specifically, a method that makes it possible to reduce residual noise level and amount of artifacts in the form of discontinuities, directed along local orientation of object borders in textured image areas, to reduce residual LF noise level, and to eliminate over-smoothing (excessive filtering) of fine details. The technical innovation achieved is the improvement of digital image processing quality.
Method for sorting CT image slices and method for constructing 3D CT image
A method for sorting CT image slices comprising, if no image slice comprises a target respiratory phase at a couch position, determining a target breathing feature value corresponding to the target respiratory phase based on a respiratory motion curve of a scanned patient, searching from a plurality of image slices at the couch position for one or more image slices comprising a breathing feature value close to the target breathing feature value to serve as candidate image slices, and selecting, based on a breathing feature value difference between the breathing feature value of each of the candidate image slices and the target breathing feature value and/or an image difference between each of the candidate image slices and at least one reference image slice, a single image slice from the candidate image slices for constructing the 3D CT image for the target respiratory phase.
System and apparatus for the remote analysis of chemical compound microarrays
A remote microarray analysis system, method and apparatus for use in the remote analysis of a chemical compound microarray supported on a substrate is disclosed. Pixel image data is received from a remote location including image data that depicts (a) a calibration scale associated with the substrate and (b) the microarray. A transformation action of said pixel data corresponding to the calibration scale is determined and the received image data corresponding to at least the microarray is adjusted by applying the transformation action. The adjusted image of the microarray is compared with a database of stored microarray pixel data to extract information from said image.
System and method for using fingerprint sequences for secured identity verification
According to one embodiment of the present disclosure, a method includes receiving session information including first fingerprint data corresponding to each of one or more fingers presented by an individual in a sequence on a sensor. The method also includes comparing the session information to stored information associated with the individual. The method further includes determining whether the identity of the individual is verified based on the session information and the sequence.
Application of Z-webs and Z-factors to analytics, search engine, learning, recognition, natural language, and other utilities
Here, we introduce Z-webs, including Z-factors and Z-nodes, for the understanding of relationships between objects, subjects, abstract ideas, concepts, or the like, including face, car, images, people, emotions, mood, text, natural language, voice, music, video, locations, formulas, facts, historical data, landmarks, personalities, ownership, family, friends, love, happiness, social behavior, voting behavior, and the like, to be used for many applications in our life, including on the search engine, analytics, Big Data processing, natural language processing, economy forecasting, face recognition, dealing with reliability and certainty, medical diagnosis, pattern recognition, object recognition, biometrics, security analysis, risk analysis, fraud detection, satellite image analysis, machine generated data analysis, machine learning, training samples, extracting data or patterns (from the video, images, and the like), editing video or images, and the like. Z-factors include reliability factor, confidence factor, expertise factor, bias factor, and the like, which is associated with each Z-node in the Z-web.
Method and apparatus for face tracking utilizing integral gradient projections
A method, apparatus and computer program product are provided for estimating and verifying translation motion and/or a scaling factor between face regions in respective frames during face tracking. A method determines translation motion between face regions in two successive frames based upon integral gradient projections of a face region in a first frame and a corresponding window in a second frame. The method also verifies the translation motion between the first and second frames utilizing integral gradient projections. A method also determines a transfer function relating integral projection curves of a face region in a first frame that has a predefined position and a predetermined size and a co-located window of same size in a second frame, determines a scaling factor based upon the transfer function and then verifies the scaling factor utilizing integral gradient projections.
Image processing apparatus, image processing method, and program
There is provided an image processing apparatus that includes a move detecting unit that detects a move of a subject contained in a moving image from plural frame images, based on an image signal that indicates the moving image including the frame image and delay time information that indicates a delay time of an image pickup, and a correcting unit that corrects the image signal, based on the image signal and move information that indicates a move of a detected subject.
Method and means for determining change in pipe diameter
A diameter sensing assembly is provided for determining the location of a change in diameter in a pipe from a remote location outside of the pipe. The assembly includes an imaging device operatively connected to an imaging cable and a diameter sensing device operatively connected to a sensing cable. The sensing device is positioned generally forward of the imaging device, and includes a plurality of flexible arms that are rigid enough to stay horizontal, but flexible enough to bend or depress easily. The two cables are connected to one another such that the entire assembly is able to be moved through a pipe at a constant speed. Marks are placed on one of the cables to determine the length to the change in diameter, and the length of portions of pipes having different diameters.
Road-shoulder detecting device and vehicle using road-shoulder detecting device
Disclosed is a road-shoulder detecting device including a distance-information calculating portion for calculating the presence of a physical object and the distance from the subject vehicle to the object from input three-dimensional image information relating to an environment around the vehicle, a vehicular road surface detecting portion for detecting a vehicular road surface with the subject vehicle from a distance image, a height difference calculating portion for measuring height difference between the detected vehicular road and an off-road region, and a road shoulder decision portion for deciding height difference as to whether the road shoulder is boundary between the surface and the region in a case where there is an off-road region lower than the vehicular road surface.
Method and apparatus for camera tracking
A camera pose tracking apparatus may track a camera pose based on frames photographed using at least three cameras, may extract and track at least one first feature in multiple-frames, and may track a pose of each camera in each of the multiple-frames based on first features. When the first features are tracked in the multiple-frames, the camera pose tracking apparatus may track each camera pose in each of at least one single-frame based on at least one second feature of each of the at least one single-frame. Each of the at least one second feature may correspond to one of the at least one first feature, and each of the at least one single-frame may be a previous frame of an initial frame of which the number of tracked second features is less than a threshold, among frames consecutive to multiple-frames.
Identification of objects in a video
Techniques related to identifying objects in a video are generally described. One example method for identifying a moving object in a video may include generating a background frame and a foreground frame based on the video, comparing the foreground and the background frames at each corresponding location, acquiring an object area based on the comparison, determining if object area contains a moving object based on size and shape of the object area, identifying the moving object against templates of target objects, and updating the background frame according to the comparison.
Methods for tracking objects using random projections, distance learning and a hybrid template library and apparatuses thereof
A method, non-transitory computer readable medium, and apparatus that tracks an object includes utilizing random projections to represent an object in a region of an initial frame in a transformed space with at least one less dimension. One of a plurality of regions in a subsequent frame with a closest similarity between the represented object and one or more of plurality of templates is identified as a location for the object in the subsequent frame. A learned distance is applied for template matching, and techniques that incrementally update the distance metric online are utilized in order to model the appearance of the object and increase the discrimination between the object and the background. A hybrid template library, with stable templates and hybrid templates that contains appearances of the object during the initial stage of tracking as well as more recent ones is utilized to achieve robustness with respect to pose variation and illumination changes.
Reducing watermark perceptibility and extending detection distortion tolerances
The present disclosures relates generally to digital watermarking and data hiding. One claim recites an apparatus comprising: memory for storing data representing video; one or more electronic processors programmed for: embedding a first watermark signal in a first portion of the data, the first watermark signal comprising a first signal polarity and corresponding to first detection preconditioning; embedding a second watermark signal in a second portion of the data, the second watermark signal comprising a second signal polarity that is inversely related to the first signal polarity and corresponding to seconding detection preconditioning; controlling provision of the watermarked video for display in real time, in which temporal averaging of the first watermark signal and second watermark signal over time conceals the first watermark signal and the second watermark signal from a human observer of the video. Of course, other claims are provided too.
Mass analysis data processing method and mass analysis data processing apparatus
The present invention provides a method and apparatus for efficiently handling a large amount of data collected by an imaging mass analysis to present significant information for the analysis of the tissue structure of a biological sample or other objects in an intuitively understandable form for analysis operators. For each pixel 8b on a sample 8, a mass-to-charge ratio m/z(i) corresponding to the maximum intensity MI(i) in a mass spectrum is listed, and the largest value MII of the maximum intensities of all the pixels are extracted. A color scale corresponding to the intensity values within a range of 0 to MII is defined. For each pixel, the maximum intensity MI is compared with the color scale to assign a color to that pixel. A mapping image with the pixels shown in the respective colors is created and displayed. Simultaneously, a spectrum showing the relationship between MI(i) and m/z(i) of all the pixels is created in such a manner that the peak colors correspond to the pixel colors on the mapping image. The mapping image shows the tissue structure of the sample. By comparing this image with the spectrum, the m/z of a noticeable substance in the sample can be identified.
Loudspeaker resin molding component and loudspeaker using the same and electronic device and mobile apparatus using the loudspeaker
A loudspeaker resin molding component includes resin and bamboo fibers refined to have a microfibril status and carbonized. By this configuration, such a loudspeaker resin molding component can achieve both of a high elastic modulus and a large internal loss.
A speaker includes a base defining a pair of receiving cavities separated from each other in a longitudinal direction and an engaging portion disposed between the pair of receiving cavities, a pair of magnetic circuit systems received into the pair of the receiving cavities, a diaphragm attached on the base, a pair of voice coil members connecting with the diaphragm, and a suspension mounted on the base. The suspension defines a pair of separating portions separated from each other in a lateral direction. Each separating portion defines a fixing portion engaging with the engaging portion of the base, a pair of connecting portions extending from two ends of the fixing portion and towards the diaphragm, and a pair of supporting portions connecting with the connecting portion for engaging with the pair of voice coil members, respectively.
Articulating microphone mount
A microphone having an integral ball along the microphone body is mounted in a housing that defines a socket for receiving the ball. The microphone may be articulated on the ball and socket mount and the resistance to the articulation force may be varied by tightening and loosening a slotted cap that exerts a spring force on the microphone. The microphone and housing may be mounted to a surface such as a wall or ceiling and plenum ratings may be maintained through ceiling mounts.
Hearing aid with a casing element
The hearing aid comprises a casing element enclosing electronic components and a battery drawer hingedly connected to the casing element for pivotal movement with respect to the casing element. Bushings in the casing element corresponding to seats in the battery drawer are provided coaxially with the desired pivotal axle and a metal hinge pin is provided coaxially with the desired pivotal axle and extends centrally through holes in the bushings, the battery drawer and the casing parts.
Method for operating a hearing device having reduced comb filter perception and hearing device having reduced comb filter perception
A method of operating a hearing device monitors for a head movement of a hearing device wearer. When a head movement is detected, an acoustic signal acquired by a microphone is output in an amplified and phase-modulated manner with a receiver. Furthermore, a hearing device includes a motion sensor and a signal processing unit that is configured to execute the method.
Sound processing apparatus, sound image localization method and sound image localization program
A sound processing apparatus includes: a filter means for providing a sound signal with a frequency-gain characteristic according to a spectrum difference between a previously measured first head-related transfer function of a sound generated from a virtual sound image position to an ear of a listener and a previously measured second head-related transfer function of a sound generated from a real sound source position to the ear, and outputting the sound signal.
Disclosed is a piezoelectric speaker including: a piezoelectric layer that converts electrical signals into oscillation and outputs sound; an electrode that is formed on a top or a bottom of the piezoelectric layer to apply the electrical signals to the piezoelectric layer; an acoustic diaphragm that is made of a hetero material including a first acoustic diaphragm and a second acoustic diaphragm and is attached to the bottom of the piezoelectric layer on which the electrode is formed; and a frame attached in a form enclosing a side of the acoustic diaphragm.
Managing audio of a device including transmitting a signal through a port of the device in response to an audio device coupling to the port, initializing an audio mixer of the device in response to detecting the signal, and configuring the audio mixer to manage audio transferred between the device and the audio device.
Process for adjusting the sound volume of a digital sound recording
The present invention relates to a process for adjusting the sound volume of a digital sound recording characterized in that it comprises: a step consisting of determining, in absolute values, for a recording, the maximum amplitude values for sound frequencies audible for the human ear, a step consisting of calculating the possible gain for a specified sound level setting, between the maximum amplitude value determined above and the maximum amplitude value for all frequencies combined, a step consisting of reproducing the recording with a sound card by automatically adjusting the amplification gain level making it possible to obtain a sound level for the recording of a specified value so that it corresponds to the gain calculated for this recording.
Sound signal processor and sound signal processing methods
According to one embodiment, a sound signal processor includes: a connector; an input module; and a generator. The connector is connectable with an earphone. The input module receives and processes a plurality of sound signals corresponding to sound of a plurality of times output from the earphone, respectively. The generator generates, by using first data indicating a frequency characteristic of a first sound signal among the received and processed sound signals and second data indicating a frequency characteristic of a second sound signal among the received and processed sound signals, correction data correcting a frequency characteristic of the earphone to be a target frequency characteristic set as a target. The first data is used for a first frequency band lower than or equal to a reference. The second data is used for a second frequency band higher than the reference.
Noise reduction communication device
To provide a noise reduction transmitter which can secure clarity of sounds collected in very noisy environments and maintain a quality of sounds without devising a noise insulation cover particularly.A transmission microphone 7 is arranged inside a noise insulation cover 2 worn on and covering at least a user's 1 mouth. A noise detection microphone 9 which detects external noises is arranged outside the noise insulation cover, and a noise component cancellation circuit 11 is provided which generates a noise component cancellation signal based on an output signal from the noise detection microphone. An electroacoustic transducer 8 is arranged in the noise insulation cover to reproduce a noise component cancellation sound based on an output signal from the noise component cancellation circuit 11.
Service key delivery system
A Service Key Delivery (SKD) system for delivering a service keys to client devices in a communications network. The delivered service keys are operable to be used to decrypt an encrypted key operable to be used to decrypt an encrypted digital content. The SKD system includes a data input interface for receiving a distribution time frame for the keys and a listing of client device identifications. The SKD system also includes a scheduling module to partition at least part of the distribution time frame into a number of time slots in which the number may be based on a variety of factors. The scheduling module assigns the time slots in the partitioned part of the distribution time frame to the client devices based on the identifications in the listing. The SKD system also includes a message generator configured to send key delivery messages to the client devices.
Secure wireless link between two devices using probes
A secure wireless communication link (pairing) between two devices can be established using cleartext wireless transmissions between devices not joined to a network (“probes”). One device can broadcast a first probe indicating that it is seeking to establish a pairing. The other device can respond with a second probe, and the two devices can establish a shared secret, e.g., by exchanging further information using additional probes. Thereafter, either device can send a message to the other by encrypting the message using a cryptographic key derived from the shared secret; encrypted messages can also be sent within probes. The receiving device can extract an encrypted message from a probe and decrypt it using the cryptographic key. The encrypted message can include credentials usable by the receiving device to join a wireless network.
Establishing secure links between wireless devices in proximity using ambient wireless signals
Wireless devices in proximity are securely paired with one another autonomously by generating a common cryptographic key directly from a time-varying wireless environment shared among the wireless devices. The shared key can be used by the wireless devices to authenticate each wireless device's physical proximity and then to facilitate confidential communication between the wireless devices. The algorithm used to create the shared key is secure against a computationally unbounded adversary and its computational complexity is linear in the size of the shared key.
Multi-user searchable encryption system and method with index validation and tracing
A multi-user searchable encryption system includes a key generation center to issue a private secret key to a user and trace information regarding a user who has generated an index, and a user terminal device to generate an index for searching for a database using the private secret key. The multi-user searchable encryption system includes a database (DB) server that verifies the index generated by the user terminal device and searches for corresponding data to the verified index.
Establishing, at least in part, secure communication channel between nodes so as to permit inspection, at least in part, of encrypted communication carried out, at least in part, between the nodes
An embodiment may include circuitry to establish, at least in part, a secure communication channel between, at least in part, a client in a first domain and a server in a second domain. The channel may include a first and second domain sessions in the first and second domains. The circuitry may generate first and second domain session keys that may encrypt, at least in part, respectively, the first and second domain sessions. The first domain session key may be generated based upon a first domain key assigned to the first domain and a first data set associated with the first domain session. The second domain session key may be generated based upon a second domain key assigned to the second domain and a second data set associated with the second domain session.
Protection of a calculation on an elliptic curve
A method for protecting a calculation on an elliptic curve, by an electronic circuit, wherein a point of an elliptic curve is multiplied by a digital quantity, comprising the steps of: initializing a first variable with a value which is a function of a random quantity; initializing at least a second variable with a value which is a function of the digital quantity; at least for a bit at 1 of the digital quantity, the first variable is updated by: a) subtracting a multiple of the random quantity; and b) adding the content of the second variable; and once all the bits of the digital quantity have been processed, subtracting from the first variable the product of the point by the random quantity to provide the result.
Instant message contact management in a contact center
The present invention is directed to a method for servicing a transaction in a contact center. When an instant message communication associated with a transaction is suspended prematurely, special treatment may be provided to the transaction initiator. The special treatment includes: (a) maintaining the assigned service priority for the transaction for assignment to a subsequent communication; (b) scheduling a subsequent outbound instant message to an external endpoint associated with the transaction initiator; (c) assigning to the transaction initiator a favored service priority when the subsequent inbound instant message is received by the contact center; and (d) maintaining previously selected item(s) in memory and providing the item(s) to the transaction initiator in a subsequent communication.
Controlling hold queue position adjustment
A computer system detects a call from a caller at a hold queue, wherein an identity of the caller is authenticated according to a voice identity of the caller. The computer system accesses a caller profile according to the identity of the caller, wherein the caller profile comprises at least one previously earned advancement token. The computer system offers the caller an option of redeeming the previously earned advancement token for adjustment of a position of the caller in the hold queue.