Secure consumer programming device
A method is provided for operating a consumer programming device that provisions consumer electronic devices. The method includes receiving over a communication link a first enable message that authorizes the consumer programming device to make available one or more resources which enable it to provide services to consumer electronic devices. Services are provided to consumer electronic devices up until all the resources have been exhausted. Additional consumer electronic devices are provided with services only if a second enable message is received over the communication link.
Methods and devices for presenting email addresses
Methods and devices for data entry are disclosed. An example method includes executing an application on a mobile device, the application requiring a login to access at least a portion of data accessible via the application, accessing a store of email addresses associated with a user of the mobile device, the email addresses including at least a forwarding email address, and presenting the email addresses including the forwarding email address for selection as the login.
Automated message transmission prevention based on a physical reaction
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.
Method and system for object-based multi-level security in a service oriented architecture
A method for administering object-based multi-level security in a service oriented architecture includes: (a) defining a plurality of multi-level security attributes for each of selected respective life-cycle states of a plurality of life-cycle states of a service object; (b) receiving a request from a requestor for the service object; (c) determining permitted actions for the service object based upon at least one selected multi-level security attribute of the plurality of multi-level security attributes, and based upon at least one life-cycle state of the plurality of life-cycle states of the service object; and (d) generating a quality of service security contract based upon the determination of permitted actions.
Method and system for enabling enterprises to use detachable memory devices that contain data and executable files in controlled and secure way
Secure operation of SEMDs on a client computer in a host system is obtained by controlling what applications (i.e., U3 applications) that can run on the host system and access data on the SEMD. Applications allowed to run on each host machine are identified and any access to the SEMD by an allowed application is permitted and other access are prohibited. Security and/or privacy for data that is stored on a SEMD is provided by only allowing approved USB memory card based applications to access the data stored on the SEMD. All other applications, either unapproved USB memory card based applications or non-SEMD resident cannot access the data on the SEMD. Other security is provided by preventing access to the SEMD except for computers or systems that are a part of a company's private network and maintaining the data on the SEMD in an encrypted state.
System and method for protecting data stored on a removable data storage device
A system for protecting data stored in a memory of a removable data storage device is provided. The system includes a personal electronic device, a removable solid state data storage device operatively coupled to the personal electronic device, and a circuit including a data protection module and an authorization module. The data storage device includes a memory for storing data. The authorization module is configured to determine whether a preauthorized state is active. When the preauthorized state is not active, the data protection module is configured to protect at least some of the data stored in the memory in response to detecting impending removal of the data storage device from the personal electronic device. When the preauthorized state is active, the data protection module is configured to preserve certain data stored in the memory in response to detecting impending removal of the data storage device from the personal electronic device.
Systems and methods for data loss prevention for text fields
A computer-implemented method for data loss prevention for text fields may include (1) identifying a form submission sent from a client system, the form submission including a textual field, (2) storing at least one characteristic of a value of the textual field within the form submission in connection with an identifier of a form used to generate the form submission, (3) determining, based at least in part on the characteristic of the value of the textual field, that the textual field may include user-generated content, (4) intercepting a subsequent form submission derived from the form, (5) subjecting the textual field within the subsequent form submission to a data-loss-prevention analysis based at least in part on determining that the textual field may include user-generated content and (6) performing a data-loss-prevention action based on the data-loss-prevention analysis.
Heterogeneous sensors for network defense
Heterogeneous sensors simultaneously inspect network traffic for attacks. A signature-based sensor detects known attacks but has a blind spot, and a machine-learning based sensor that has been trained to detect attacks in the blind spot detects attacks that fail to conform to normal network traffic. False positive rates of the machine-learning based sensor are reduced by iterative testing using statistical techniques.
Techniques for protecting data in cloud computing environments
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its algorithms for processing raw data into secured data. The server computer receives and validates the secured data, and attempts to update the communicator if the secured data is invalid. The server computer may deem the client computer as being infected when the update is reinitiated a predetermined number of times. The raw data may be restructured, or encrypted using an encryption scheme where the key used for the encryption is not provided to the receiver of the data. The algorithm for data restructuring and encryption may be included in the update to the communicator. Communication between the client computer and the server computer may be on a dynamically selected channel indicated in a previous communication.
Restricting a processing system being compromised with a threat
A method, system, computer readable medium of instructions and/or computer program product. The method comprises receiving, in a proxy server, response data from a remote processing system, according to a request from the client processing system to download data from the remote processing system; using, in one or more emulated operating systems of the proxy server, the downloaded data; monitoring behavior of the use of the data in the one or more emulated operating systems; and in response to detecting malicious behavior indicative of a threat, restricting the client processing system being compromised with the threat of the response data.
Method and system for managing object level security using an object definition hierarchy
In one embodiment the present invention includes a computer-implemented method comprising receiving a request from a user to perform an action on a first object in a software application, accessing a predefined hierarchy of a plurality of different object definitions, accessing user authorization data, and granting the user permission to perform the action on said first object, wherein the permission is determined from the predefined hierarchy and the user authorization data, wherein determining the permission includes traversing the predefined hierarchy.
Smart storage device
A smart storage device can have a smart-card portion with access control circuitry and integrated memory, a controller in selective communication with the smart-card portion, and a memory device in communication with the controller. The memory device can be separate from the smart-card portion and can store one or more smart-card applications.
Electronic device, password control method, and program
There is provided an electronic device capable of safely obtaining password information even when a password of an external storage device of any type is forgotten. An electronic device 100 includes an external memory card connection unit 108 connecting a memory card 200 capable of being locked by a card password, a password retention unit 101 retaining the password information including the card password, a device password retention unit 112 retaining a device password of the electronic device 100, an input unit 102 for inputting data, a device setting cancellation unit 111 determining whether or not the device password inputted by the input unit 102 and the device password retained in the device password retention unit 112 match with each other, and a control unit 109 outputting the password information or changing the card password of the external storage device set in the external storage device when the device passwords match with each other as a result of the determination.
Providing integrity verification and attestation in a hidden execution environment
In one embodiment, a processor includes a microcode storage including processor instructions to create and execute a hidden resource manager (HRM) to execute in a hidden environment that is not visible to system software. The processor may further include an extend register to store security information including a measurement of at least one kernel code module of the hidden environment and a status of a verification of the at least one kernel code module. Other embodiments are described and claimed.
Anonymous biometric verification
The present invention discloses an anonymous biometric verification system and method. In an embodiment of the invention, the system comprises a non-anonymous sector that retrieves biometric data (probes) by using biometric client(s). A unique identifier (“token”) is retrieved from a database that contains biographic and demographic data associated to the token, but without comprising the biographic or demographic data. The biometric data in form of template(s) along with the token are then sent via a cloud network to an anonymous sector. A query router, located at the non-anonymous sector may receive probes with the token and send them to one or more biometric query engine(s), wherein query engine(s) may either work in stripped or mirrored operation mode. Query engine(s) may search for location of template(s) in a templates database linked to a query search engine.
Database system, computer system, and computer-readable storage medium for decrypting a data record
A database system comprising: a memory containing multiple data records, wherein each of the data records has a data record asymmetric key pair for cryptographic encryption and decryption, wherein each data record asymmetric key pair comprises a data record public key and a data record private key, wherein the data contained in each of the multiple data records is encrypted by the data record public key, wherein the data record private key of each data record asymmetric key pair is encrypted with the public key of another asymmetric key pair; a set of user accounts, wherein each of the user accounts has a user asymmetric key pair for encryption and decryption, wherein each user asymmetric key pair has a user public key and a user private key; wherein data is added to a data record by encrypting it with the data record public key; wherein access to the data record is granted to a user account by encrypting the data record private key with the public key of an asymmetric cryptographic key pair whose encrypted private key is accessible from the user account via a sequence of successive decryptions of encrypted private keys; and wherein the data record private key allows decryption of the data record.
Method of assigning a user key in a convergence network
Discussed is a method of operating a CPNS (converged personal network service) gateway apparatus. The method includes transmitting a registration request message including user information to a server; transmitting an installation request message including the user information to a terminal; generating first authentication data on the basis of authentication information received by a user input; transmitting a trigger message including the first authentication data to the terminal; receiving a key assignment request message including second authentication data from the terminal in response to the trigger message; transmitting the received key assignment request message to the server; receiving a key assignment response message including a user key for the terminal in response to the key assignment request message; and transmitting the received key assignment response message to the terminal.
Information providing system and design information providing server
A design information providing system, which does not allow continuation of manufacturing of products unless a patent license contract is concluded, includes a terminal apparatus (40a) of a user manufacturing a product (BD player (50)) and includes a patent license issuing server (20a) issuing, to the terminal apparatus (40a), a contract certificate (60) certifying the conclusion of the contract, when a contract for a license necessary for manufacturing the BD player (50) is concluded with the user of the terminal apparatus (40a). Further, the design information providing system includes a design information providing server (an encryption key issuing server (30a)) transmitting an encryption key (80) to the terminal apparatus (40a) on condition of the confirmation of the contract certificate (60), when a request for design information (encryption key (80)) unique to the BD player (50) is transmitted from the terminal apparatus (40a).
Handover method of mobile terminal between heterogeneous networks
A handover method of a mobile terminal between heterogeneous networks for facilitating the handover with pre-authentication procedure is provided. A handover method between heterogeneous networks includes receiving, at a mobile terminal connected to a source network, information on at least one target authenticator of a target network from a source authenticator in response to an attach request; creating an authentication key between the mobile terminal and the target authenticator selected among the at least one target authenticator through a pre-authentication process; determining, when the mobile terminal transmits a handover request to the selected target authenticator, whether the authentication key contained in the handover request matches with the authentication key stored in the selected target authenticator; and connecting, when the authentication keys match with each other, to the target network via the selected target authenticator.
JUBISM: judgement based information sharing with monitoring
A new system for information sharing is described which uses human judgement to accelerate the flow of information, while simultaneously applying brakes to restrict the velocity. This combination results in a system where information is shared judiciously while minimizing the likelihood of information leakage or information overload. A built in monitor allows for the detection over time of sharing characteristics. Information in this system is stored on a server, however, is optionally encrypted in a fashion that makes it impossible for the server to actually see the information. Further innovations are also described including the ability to overlay incentive mechanisms to facilitate appropriate information sharing, and the notion of introducing automated bots into the system to augment human filter based information sharing.
Flexible quasi out of band authentication architecture
To obtain user approval of network transactions at different levels of security, a network site selects a form in which a transaction with be presented to the user from a group of transaction presentation forms including presentation of the transaction in a browser pop-up window on a user network device, in a security software application window on the user network device, and in a security application window on another user network device. The network site also selects a type of approval of the transaction required from the user from a group of transaction approval types including approval requiring no action by the user after presentation of the transaction, the user to actively approve the presented transaction, and the user to sign the presented transaction. The transaction, the selected transaction presentation form, and the selected type of user transaction approval, are transmitted to obtain approval of the transaction by the user.
Privacy preserving authorisation in pervasive environments
A method for preserving privacy during authorization in pervasive environments is described. The method includes an authorization phase in which the user is provided with a reusable credential associated with verifiable constraints, and an operation phase where the service provider verifies the reusable credential before authorizing the user. Third parties cannot link plural uses of the credential to each other, and the service provider cannot link plural uses of said credential to each other.
Browser-based prevention of unsecure online transmission of sensitive information
A device receives, from an online provider device, content of a website and connection information associated with the website, and provides the content of the website for display to a user. The device also receives, from the user, information requested by the website and a request to provide the information to the online provider device, and determines whether the information includes sensitive information. The device further provides the information to the online provider device, based on the request, when the information does not include sensitive information, and determines, when the information includes sensitive information, whether the website is safe or unsafe based on the connection information. The device provides a warning for display to the user, when the information includes sensitive information and when the website is an unsafe website, where the warning indicates that sensitive information is to be transmitted to the unsafe website.
Access to network content
A method and system for improving access to search results are provided in the disclosure herein. Aspects of this disclosure minimize the delay in accessing network content by priming certain regularly viewed content (e.g., a search engine home page or a web search page) in a hidden browser instance. As the user accesses the content prerendered in the invisible browser instance, a new instance of the prerendered content is created to facilitate future accesses to the network content (e.g., future search queries). The security state of the network content may be determined and/or monitored, and appropriate action taken in response to a change in the security state.
Assigning clients to VLANs on a digital network. A client attaching to a digital network through a network device is initially assigned to a first VLAN. This VLAN may have restricted access and is used for authentication. The device snoops DHCP traffic on this first VLAN rewriting DHCP traffic from the client to request a short lease time for the client. A short lease time may be on the order of 30 seconds. The device optionally rewrites DHCP traffic to the client on the first VLAN to assure a short lease time is returned; this rewriting supports DHCP servers which do not issue short leases. Traffic on this first VLAN may be limited to authentication such as captive portals, 802.1x, Kerberos, and the like. If client authentication on the first VLAN does not succeed, when the short lease expires, the client will receive another short lease on the first VLAN. The network device snoops authentication traffic. When authentication succeeds, the device snoops this traffic and derives information such as roles and the target VLAN for the client, saving this information. When the short DHCP lease expires for the client, and the client restarts the DHCP process, the device assigns the client to the target VLAN and all further processing occurs on this target VLAN.
System and method for single sign on process for websites with multiple applications and services
A system and method for integrating the Internet front end-sign on processes of the various systems of a financial institution which allows a customer to view and access its various financial accounts with the institution.During the initial sign up for the online access. to its accounts, a customer creates his/her User ID and password online during the same session. Once the customer has signed on (password) and verified ownership of at least one account, the system displays all of the customer's accounts that are available for access via the Internet website. The online ownership verification uses only a single account of the customer and the ownership verification criteria associated with the account. The account used for verifying a customer is first determined based on the accounts selected by the customer for accessing online. From the selected accounts, the system of the present invention creates a verification hierarchy with respect to the accounts. When determining the verification to use for the single ownership verification, the present invention selects the account from the hierarchy with the most stringent requirements.
System and method for a cloud computing abstraction layer
According to one system of the invention, the system provides a cloud-computing service from a cloud-computing environment having a plurality of cloud-computing resources. The system may include a management module configured to manage a cloud-computing resource of the plurality of cloud-computing resources as a cloud-computing service, wherein the cloud-computing service performs a computer workload, an adapter configured to connect to the cloud-computing resource to the system and translate a management instruction received from the management module into a proprietary cloud application program interface call for the cloud-computing resource, a cloud service bus configured to route the management instruction from the management module to the adapter, a consumption module configured to allow a user to subscribe the cloud-computing service, a planning module configured to plan the cloud-computing service, and a build module configured to build the cloud-computing service from the cloud-computing resource.
Updating content libraries by transmitting release data
There are many boxes (e.g., set-top boxes) in a system offering media services to users. Each of the boxes maintains a library with a significant number of titles. Techniques for updating the library in each of these boxes using a transmission infrastructure are described. According to one aspect of the techniques, a service provider is provided with a high bandwidth broadcasting or multicasting capability, a release fragmented into a header and several segments is transmitted to all boxes that are respectively configured to receive a proper release package to update the library. Alternatively, separate release packages may be transmitted via different channels to the boxes, wherein each of the boxes is tuned to a proper channel to receive a proper release package.
Multicasting in a wireless display system
This disclosure relates to techniques to establish a multicast communication session between a source device and multiple sink devices in a Wireless Display (WD) system. Two or more sink devices may be interested in receiving the same media data from the source device. According to the techniques, the source device establishes a multicast session with the sink devices in the WD system, and sends a single copy of multicast media data for the multicast session to the interested sink devices using a receiving multicast port. The source device selects a receiving multicast port number as a destination identifier for each multicast session. The sink devices interested in receiving the media data of a given multicast session bind on the receiving multicast port for the multicast session. This disclosure describes several exemplary multicast subscription procedures to ensure correct binding on the receiving multicast port at each of the sink devices.
Systems and methods of adjusting bandwidth among multiple media streams
Disclosed herein are systems and method for adjusting bitrate among multiple media streams delivered on a common subscriber connection. One such method comprises receiving information describing a maximum bitrate provisioned on the subscriber connection, and receiving a plurality of media streams. Each media stream utilizes a corresponding bitrate, and the plurality of media streams has a combined bitrate. The method also comprises adjusting the bitrate of at least a portion of the plurality of media streams so that the combined bitrate is related to the maximum bitrate provisioned on the subscriber connection.
Transmission apparatus, information transmission method, reception apparatus, and information processing method
On a reception side, display processing and the like is easily performed in synchronization with content data. A cam coder transmits reproduction content data to a television set through a TMDS line of an HDMI cable. The cam coder transmits processing information used to perform the display processing in synchronization with the reproduction content data to the television set through a bidirectional communication path included in the cable before the reproduction content data is transmitted. Index information is added to the processing information for each unit of processing. Index information corresponding to the index information added to the processing information is added to the reproduction content data at a timing when the processing information of each unit of processing is processed. The television set superposes information on a shooting location, a date and time, and the like on an image in accordance with the processing information corresponding to the index information at a timing when the index information is added to the received content data.
MVDDS asymmetric dynamic routing
A method for dynamic routing is provided. Status information of a multichannel video and data distribution service (MVDDS) channel from customer premises equipment (CPE) is received. The status information is evaluated to determine if data destined for the CPE over the MVDDS channel should be routed over a secondary channel. Data destined for the CPE is route over the secondary channel when the data is determined to be routed over the secondary channel.
Multi-functional display device having a channel map and method of controlling the same
A multi-functional display device having a channel map and a method for controlling the same are disclosed herein. The multi-functional display device may include a display, an input interface, a network interface for communicating with at least one second multi-functional display device, and a controller for controlling a display of the channel map and content associated with a channel selected in the channel map. The channel map may include a first channel number associated with a broadcast channel and a channel name for the first channel, and a second channel number associated with a social network service (SNS) account for an individual or entity and an SNS channel name for the second channel.
Smart catch-up for media content viewing
A method and system of providing access to related content includes a primary display that is tuned to a desired program. Information that identifies the desired program is retrieved from an electronic program guide using a content processor. A plurality of locations on a communication network are automatically searched for additional episodes of the desired program using the retrieved information via an interne interface. Links for accessing the additional episodes of the tune program are provided via a user interface display processor on a secondary display.
Display device and method for searching channel
Provided are a display device and a channel search method thereof. The display device comprises: a key input unit for inputting a request command from a user; a tuner unit for sequentially searching broadcast channels of each band according to a channel search command input from the key input unit; and a control unit for controlling a channel re-search to be performed sequentially from an already-searched channel when a channel re-search command is input from the key input unit during the sequential channel search.
System, mobile terminal and method for displaying object information in real time
A system, mobile terminal and a method for displaying object information corresponding to an image object in real time are described in this disclosure. The system includes: a TV to transmit an image frame and supplementary data for the image frame, the supplementary data including the object information; and a mobile terminal to receive the image frame and the supplementary data, and to display the object information in real time based on a position of the object displayed on the TV.
Method and system for providing virtual co-presence to broadcast audiences in an online broadcasting system
There is provided an online broadcasting system for providing virtual co-presence to broadcast audiences. The online broadcasting system may comprise a plurality of user terminals, a user reaction processing server and a broadcast server configured to transmit broadcast program data to the user terminals. The user terminals may be configured to: display a broadcast program based on the broadcast program data; receive individual user reaction data from a user input interface; and transmit the received individual user reaction data to the broadcast server. The user reaction processing server may be configured to: receive the individual user reaction data from each of the user terminals; aggregate the individual user reaction data to create total user reaction data based on the received individual user reaction data; generate interface control data based on the total user reaction data, wherein the interface control data, when executed, is operative to cause a client application to generate output indicative of the total user reaction data; and transmit the generated interface control data to at least one of the user terminals.
A native application portion is configured for execution in a native environment. A native kernel is defined in the native environment, the native kernel including one or more native plugin services accessible by the native application portion. A non-native application portion is configured for execution in a web view context. A non-native kernel is defined in the web view context, the non-native kernel including one or more non-native plugin services accessible by the non-native application portion. A native kernel bridge service is interfaced with the native kernel, and a non-native kernel bridge service is interfaced with the non-native kernel. The native kernel bridge service and non-native kernel bridge service are interfaced with each other, enabling the non-native application portion to access the native plugin services of the native kernel, and enabling the native application portion to access the non-native plugin services of the non-native kernel.
Application add-on platform
An application add-on platform of a user device receives a query for add-ons from an application running on the user device. The application add-on platform notifies the application of one or more add-ons that are compatible with the application. The application add-on platform receives an access request from the application for an add-on of the one or more add-ons. The application add-on platform connects the application to the add-on.
Method to customize native operating system views using web technologies in mobile devices
Systems, methods, routines and/or techniques for customizing native operating system views using web technologies in mobile devices are described. A messaging system may be used to allow and/or facilitate communication between two or more native views, for example, via one or more software development kits (SDKs). A method may include executing, in a first native operating system view, messaging code to communicate one or more messages from the first native operating system view to a second native operating system view. The method may include executing the software development kit code to receive and/or handle the one or more messages from the first native operating system view and route and/or transmit the one or more first messages to the second native operating system view. In some embodiments, the first native operating system view is a WebView and the second native operating system view is a VideoView.
System and method for automated content distribution objects
Provided is a system and method for centralizing common messaging functionality across a plurality of heterogeneous Mobile data processing System (MS) applications, and for synergistically bringing new messaging functionality to those applications. New synergistic presentation/messaging capability is provided with distributable presentation objects in areas of Out-Going Messages (OGMs), Out-going Caller Messages (OCMs), Confirmation Of delivery Messages (COMs) and ADvertising messages (ADs). OGMs include messages which are played to callers in a phone call recording system. OCMs include messages that can be left automatically to a phone call recording system by a caller. COMs include messages that are automatically sent based on a delivery. ADs include messages for conveying advertising information. Different message types and messaging objects are automatically distributed for a variety of triggering events. In a preferred embodiment, the Location Based eXchange method and system is leveraged.
Network management system event notification shortcut
Provided are techniques for a network management system notification shortcut. Also provides are techniques controlling an event notification shortcut in a network management system. The network management system comprising: a probe for intercepting a system event from a monitored system and creating an event item or modifying an event item associated with the system event; a collection database server for collecting a new event item or modification to an existing event item and forwarding a event notification to a second database server; a second database server for receiving the event notification, requesting the event item data or modification data and forwarding the event item to a first client; a first client for receiving the event notification and requesting the event item data or modification data; whereby the collection database server sends the event notification directly to the first client bypassing the second database server if the event satisfies a priority condition.
Virtualized management of remote presentation sessions using virtual machines having load above or below thresholds
Systems, methods, and computer-readable storage media are disclosed for virtualized eco-friendly remote presentation session roles. In an embodiment, a connection broker monitors the servers of a server farm, and, based upon characteristics of remote presentation sessions served by VMs executing on those servers, directs VMs on those servers to be migrated between servers, changed from sleeping to running or vice versa, or other operations that may improve the performance of the server farm as a whole.
Mechanisms to avoid inefficient core hopping and provide hardware assisted low-power state selection
An apparatus and method is described herein for avoiding inefficient core hopping and providing hardware assisted power state selection. Future idle-activity of cores is predicted. If the residency of activity patterns for efficient core hop scenarios is predicted to be large enough, a core is determined to be efficient and allowed. However, if efficient activity patterns are not predicted to be resident for long enough—inefficient patterns are instead predicted to be resident for longer—then a core hop request is denied. As a result, designers may implement a policy for avoiding core hops that weighs the potential gain of the core hop, such as alleviation of a core hop condition, against a penalty for performing the core hop, such as a temporal penalty for the core hop. Separately, idle durations associated with hardware power states for cores may be predicted in hardware. Furthermore, accuracy of the idle duration prediction is determined. Upon receipt of a request for a core to enter a power state, a power management unit may select either the hardware predicted power state, if the accuracy is high enough, or utilize the requested power state, if the accuracy of the hardware prediction is not high enough.
High performance locks
Systems and methods of enhancing computing performance may provide for detecting a request to acquire a lock associated with a shared resource in a multi-threaded execution environment. A determination may be made as to whether to grant the request based on a context-based lock condition. In one example, the context-based lock condition includes a lock redundancy component and an execution context component.
Task assignment in cloud computing environment
Technologies are generally described for a system and method for assigning a task in a cloud. In some examples, the method may include receiving a task request relating to a task and determining service related data relating to the task based on the task request. In some examples, the method may include receiving resource data relating to a first and second resource in the cloud. In some examples, the method may include determining a first correlation value between the task and the first resource and a second correlation value between the task and the second resource based on the service related data and the resource data. In some examples, the method may include assigning the task to the first resource based on the first and second correlation value.
Dynamic cluster expansion through virtualization-based live cloning
Methods and apparatus, including computer program products, are provided for transitioning one or more aspect of a dynamic cluster of computers to one or more virtual machines. In one aspect, there is provided a computer-implemented method. The method may include receiving a selection representing a node of a cluster selected for cloning. An indication may be provided to the node to prepare for cloning. The indication may be provided by accessing an interface at the node. When the selection is received and the node is prepared for cloning, the cloning of the node may be initiated. In some implementations, the node comprises a virtual machine including an application. Related apparatus, systems, methods, and articles are also described.
Systems and methods for managing updates to applications installed on electronic devices
Systems and methods are provided for leveraging recommendations to determine whether to download certain application updates. According to certain aspects, an electronic device retrieves (710) a recommendation for an update to an application installed on the electronic device. The electronic device annunciates (730) an indication of the recommendation and receives (745) an instruction to download the update from an application server. Further, the electronic device requests (755) the update from the application server, receives (760) the update from the application server, and installs (765) the update on the electronic device.
Time shift configuration management for software product installation
Systems, methods and computer program products for providing software product configuration management through a time shift responsive to software product installation content, user inputs, and software product applicability rules are disclosed. A configuration engines may be loaded on a computing device, which access installation product content related to the software product via one or more data stores. The configuration engine detects the initial configuration state of the software product and accepts a user input identifying a desired final configuration state of the software product. The configuration engine applies at least one applicability rule to determine whether the installation product content needs to be acquired from the data store to achieve the desired final configuration state. The configuration engine modifies the software product from the initial configuration state to the desired final configuration state in a succinct and efficient manner without causing inoperability of the software product.
System for inspecting information processing unit to which software update is applied
A method and an inspection apparatus for inspecting an information processing unit to which software update is applied. The apparatus includes a collection component configured to collect the behavior, for a plurality of times of software update, of the information processing unit to which one software update is applied. The apparatus also includes a determination component configured to compare the behavior collected for the plurality of times of software update to one another to determine whether the behavior of the information processing unit after the one software update is applied thereto is normal.
Firmware updates during limited time period
When providing a user with native access to at least a portion of device hardware, the user can be prevented from modifying firmware and other configuration information by controlling the mechanisms used to update that information. In some embodiments, an asymmetric keying approach can be used to encrypt or sign the firmware. In other cases access can be controlled by enabling firmware updates only through a channel or port that is not exposed to the customer, or by mapping only those portions of the hardware that are to be accessible to the user. In other embodiments, the user can be prevented from modifying firmware by only provisioning the user on a machine after an initial mutability period wherein firmware can be modified, such that the user never has access to a device when firmware can be updated. Combinations and variations of the above also can be used.
Detecting non-touch applications
A computer-implemented method, computer-readable media, and wireless device that automatically determines whether an application requires a virtual input mechanism are provided. The wireless device includes a virtual machine and database. The virtual machine executes the application and parses code associated with the application to determine whether a virtual input mechanism is necessary. The database stores metadata that indicates whether the type of input needed for the application is touch or key.
Computer-implemented systems and methods for automated generation of a customized software product
Systems and methods are provided for automated generation of a customized software product. A system includes a computer-readable medium encoded with a project parameters data structure, where the project parameters data structure includes a plurality of project requirement records, and a project prototype. One or more data processors are configured to process a plurality of initial characteristics for the customized software product, populate the project parameters data structure at least based on the initial characteristics, and generate the project prototype based on the project parameters data structure. The one or more data processors are further configured to output a requirements matrix data structure at least based on the project parameters data structure and the project prototype and to generate the customized software product at least based on the requirements matrix data structure and the project prototype.
Version control in modeling environments
Methods and systems for controlling versions of models in modeling environments are disclosed. The versions of models and component interfaces are stored in a repository and checked in and out of the repository. The version designation of a model is changed when the model is checked in the repository. A selected version of the model is checked out of the repository and loaded directly in a memory so that users may load the selected version of the model without error. The loaded model is displayed with information on the version of the model. The version information may include the version number and author of the version. The version information may also include information on whether the model is locked with a version or in a read only mode.
Validation of process models
In computer-implemented methods to validate process models, the models carry semantic information that is related to the process steps, including pre-conditions that indicate whether a step would be executable under certain conditions and post-conditions relating to results from executing a step. Steps are related as predecessor/successor so that a post-condition of the predecessor step can be the pre-condition of a successor step. During model validation, variables are exchanged and propagated between the step conditions. Instead of validating the model for potentially all initial values of variables and conditions, the system identifies portions of the model that can be validated separately for a reduced set of initial states.
Find and track information of interface usage of software libraries by other software
A library controller that ranks shared libraries that are available from an operating system is described. In one embodiment, the library controller receives multiple different software, where each of the different software use one or more of the shared libraries. The library controller extracts library usage details for each of the multiple different software and provisioning details from each of the shared libraries. Furthermore, the library controller ranks the shared libraries based on the library usage and provisioning details.
Register clustering for clock network topology generation
In some embodiments, in a method performed by at least one processor, a physical netlist of a placed integrated circuit (IC) chip design is received by the at least one processor. The physical netlist comprises a plurality of registers. Timing criticalities of register pairs in the registers are obtained by the at least one processor. Clusters of the registers are formed by the at least one processor. When forming cluster of the registers, candidate registers that are in physical vicinity of a first cluster are identified, and a first register is selected to be added to the first cluster by giving priority to a candidate register in a register pair across a boundary of the first cluster and with a higher timing criticality over a candidate register located closer to the first cluster. The registers in the same cluster have shorter non-common clock paths than the registers in different clusters.
Assigning method, recording medium, information processing apparatus, and analysis system
A method includes: calculating a position-dependent processing load to be caused by a process that depends on a position of a cell, for each of cells into which a spatial area specified as a target of an analysis to be executed by processing devices that are included in a first number of processing devices and synchronize for each unit in time domain is divided; and assigning the cells to a second number of processing devices which are part or all of the first number of processing devices, under a condition where a criterion determined with respect to uniformity in a total processing time among processing devices used for the analysis is met. The total processing time of each processing device includes a length of time to be taken to execute each process depending on the position of each of cell(s) to be assigned to this processing device.
Automatic tap driver generation in a hybrid clock distribution system
A hybrid clock distribution system uses a distribution fabric to distribute clock signals across longer physical distances and local sub-distribution networks to distribute clock signals more locally and to implement logic functions such as clock gating. A set of tap drivers connect the distribution fabric to the sub-distribution networks. A design tool automatically generates and places the set of tap drivers.
Test validation planning
A computer-implemented method, computerized apparatus, and computer program product for test validation planning. The computer-implemented method, performed by a processor, comprising: having a test validation activity to be performed to validate results of two or more tests of a test suite; and automatically determining, by a processor, a subset of the two or more tests for which to perform the test validation activity; whereby avoiding performing duplicate validation activities. Optionally, for each test of the test suite a valuation of a set of functional attributes is available, and a subset of the functional attributes is deemed as relevant functional attributes with respect to the test validation activity. In such an embodiment, said determining is based on the valuation of the relevant functional attributes.
Inspection method and apparatus and lithographic processing cell
A method of calculating process corrections for a lithographic tool, and associated apparatuses. The method comprises measuring process defect data on a substrate that has been previously exposed using the lithographic tool; fitting a process signature model to the measured process defect data, so as to obtain a model of the process signature for the lithographic tool; and using the process signature model to calculate the process corrections for the lithographic tool.
Method of generating a bias-adjusted layout design of a conductive feature and method of generating a simulation model of a predefined fabrication process
A method of generating a bias-adjusted layout design of a conductive feature includes receiving a layout design of the conductive feature. If a geometry configuration of the layout design is within a first set of predetermined criteria, the bias-adjusted layout design of the conductive feature is generated according to a first layout bias rule. If the geometry configuration of the layout design is within a second set of predetermined criteria, the bias-adjusted layout design of the conductive feature is generated according to a second layout bias rule.
Calibration pattern selection based on noise sensitivity
The preset invention provides methods, systems and computer program product for selection of an optimum set of patterns to calibrate a lithography model so that the model can predict imaging performance of a lithography apparatus/system more accurately and reliably without being prohibitively expensive in terms of using computational and metrology resources and time. The method is based on modeling sensitivity of the calibration patterns to measurement noise. In one aspect of the present invention, a method is disclosed, comprising: identifying a model of at least a portion of a lithographic process; identifying a set of patterns for calibrating the model; and, estimating measurement noise associated with the set of patterns.
Correction for flare effects in lithography system
A method for reducing an effect of flare produced by a lithographic apparatus for imaging a design layout onto a substrate is described. A flare map in an exposure field of the lithographic apparatus is simulated by mathematically combining a density map of the design layout at the exposure field with a point spread function (PSF), wherein system-specific effects on the flare map may be incorporated in the simulation. Location-dependent flare corrections for the design layout are calculated by using the determined flare map, thereby reducing the effect of flare. Some of the system-specific effects included in the simulation are: a flare effect due to reflection from black border of a mask, a flare effect due to reflection from one or more reticle-masking blades defining an exposure slit, a flare effect due to overscan, a flare effect due reflections from a gas-lock sub-aperture of a dynamic gas lock (DGL) mechanism, and a flare effect due to contribution from neighboring exposure fields.
Method of determining input pattern and computer readable storage medium
A method of determining input pattern is adapted to be implemented on an electronic apparatus equipped with a touch panel and includes the steps of: detecting a plurality of boundary points between an input pattern inputted through the touch panel and a circumscribed polygon of the input pattern, detecting an area ratio of a polygon defined by the boundary points to the circumscribed polygon, and determining the shape of the input pattern at least according to the area ratio. The present invention also provides a computer readable storage medium having a program stored therein. When the program is executed which enables an electronic apparatus equipped with a touch panel to determine the shape and/or direction of an input pattern inputted through the touch panel.
Friends lists with dynamic ordering and dynamic avatar appearance
Techniques are disclosed for presenting information related to a user's friends within a virtual environment. For example, when a user requests to view a friends list, the virtual environment may respond by identifying interactions between that user and their friends. From this, the virtual environment may determine an order to present the users in the list. For example, individual with whom the user interacts with frequently may be more prominently displayed. However, the user may fix or “pin” the position of certain users (e.g., a close friend with whom contact is infrequent). Further, in addition to displaying friends' names, the list may display an animation of a user's friend generated based on the then current activity, location, or appearance of that friend within a virtual environment.
Method for generating an on-screen menu
A method for generating an on-screen menu comprising menu buttons and other menu items, e.g. help text, is characterized in that one or more groups of menu buttons or menu items are defined, wherein a group comprises one or more menu buttons or menu items and has associated a defined area on the screen. A state is assigned to a button, the state being “enabled” or “disabled”, wherein only an enabled button or item may be displayed, and wherein within a group not more than one button or item may be enabled. The state of a button can be changed by commands associated with other buttons.
Contact selector that facilitates granular sharing of contact data
Described herein are technologies pertaining to transmitting electronic contact data from a first application to a second application by way of an operating system without generating a centralized contact store or providing the second application with programmatic access to all electronic contact data retained by first application.
Surfacing of detailed information via formlets
Certain examples provide systems, methods, apparatus, etc., to provide varying levels of detail in clinical data for one or more patients to a user. An example method to surface varying degrees of patient data via a formlet-based user interface includes providing a high-level view of data for one or more patients, the high-level view having a first level of detail. The example method includes generating, in response to a hover over a portion of the high-level view, a hover view providing a second level of detail of the data associated with the portion of the high-level view. The example method includes providing an inspector to access a third level of detail of the data. The example method includes generating a fourth level of detail in response to a trigger within the inspector.
Dynamic content navigation
Content displayed in a graphical user interface (GUI) such as a Web browser can be dynamically managed based on factors such as a current view or focus position, allowing a user to view information in a list of objects without having to load all the objects at one time, which could slow down operation of the GUI. Where a number of objects to be displayed is known, a page size can be set so that navigational elements of the GUI function as if all the objects are loaded, even though only a portion might be loaded at any given time. A background image can provide information where an object has not yet been loaded, providing a type of temporary content for the entire page without slowing down operation of the GUI.
Touch display unlock mechanism
An unlock system for a computer such as a tablet. The screen of the tablet can be automatically locked after time were based on an action. Once locked, the contents of this screen are blocked by the locking screen which can be a blank screen or screen which shows status parts. Areas on the locking screen are defined, within which the user can touch the locking screen and drag it to the opposite side. During the time of dragging, the items underneath, showing the actual content of the screen, are revealed. In one embodiment, the unlock action may automatically continue after a certain point on the screen has been reached.
Terminal and method of storing and executing contents thereof
A terminal and a method of storing and executing contents thereof are provided. The method of storing and executing contents of a terminal includes displaying a container to store contents on a screen, selecting a content and storing the content in the container, displaying the stored content and an application corresponding thereto if the container is selected, and executing the corresponding content if the specific content and an application corresponding thereto are selected.
Configuration of custom controls in data-driven environments
The subject disclosure relates to systems and methods for providing custom controls configuration. In one embodiment, a system comprises a custom controls component configured to receive view information associated with a default view of controls, and receive customized configuration information indicative of a customization of at least one aspect of the controls. The default view of controls is based on data and default configuration information, and the data and the default configuration information are represented via a data-driven programming language. The custom control component is also configured to generate a customized view of the controls based, at least, on the default view of the controls and the customized configuration information. The configuration information comprises metadata, and the customized view of the controls includes a modified view, help text, or a description of a field associated with the controls.
Synchronized graphical and tabular performance data display
Performance data for a computing device is displayed in both graphical and tabular portions concurrently. The performance data displayed in the different portions is synchronized, being performance data for the same time range. A user can select a portion of the time range, in response to which the graphical portion displays an indication of the selected portion and the tabular portion displays an indication of which attributes of a performance aspect of the performance data contribute to the performance aspect in the selected portion. A user can also select a particular attribute of a performance aspect in the tabular portion, in response to which the graphical portion displays an indication of the portions of the time range to which the selected attribute contributes to the performance aspect of the performance data.
Reshaping interfaces using content-preserving warps
Technologies are generally described herein for reshaping a graphical user interface. The graphical user interface may include one or more content elements. An interface design tool may enable users to define one or more borders with respect to the graphical user interface. The interface design tool may also perform a content-preserving warp on the graphical user interface. When the interface design tool performs the content-preserving warp, the interface design tool may preserve a shape and dimensions of any content elements defined by the borders.
Conference calls for social streams
A system and method for generating a conference call within a social network is disclosed. The participants are all members of an affinity group and they communicate with each other using different social streams. When the stream becomes too complicated, a participant transforms the social stream into a conference call so that the discussion is held in real-time. The participant that requests the conference call is designated as a moderator. The moderator controls the conference, including the members of the affinity group, through a user interface. Once the conference is established a notification can be sent to invitees and other members of the affinity group. The notification can also be published on a social network.
Communicating plans for users of a social networking system
Exemplary systems and methods for calendaring are provided. Exemplary systems include a natural language receiving component configured to receive a natural language entry corresponding to a future status, a calendar generation engine configured to create a calendar entry based on the natural language entry, a social network database configured for accessing and querying by the calendar generation engine, a privacy component configured to receive a privacy setting indicating a person who is approved to view the calendar entry, and a display module configured to display the calendar entry on a calendar. Exemplary methods include receiving a natural language entry corresponding to a future status, creating a calendar entry, and displaying the calendar entry.
Desktop sharing method and system
In a distributed computer network where displayed information is shared between at least two computers, a method of enabling remote control of a host computer having a display region that is to be shared with at least one client computer. The method includes tracking time lapsed since a local user input event has occurred while the host computer is under local control and in the event that the time lapsed exceeds a threshold, enabling remote control of the host computer by a client computer.
Web command prompt
A method of streamlined web site navigation includes providing a command line interface supplemental to a graphic user interface. The command line interface accepts entry of verbs and parameters from a web site-specific vocabulary. The web site-specific vocabulary allows a user to access functions of a graphic user interface page of the web site by entering at least one verb and without navigating page links to reach the graphic user interface page. The method receives data entered at the command line interface, including the at least one verb. The method continues with identifying a particular web page responsive to the verb, and sending the particular web page towards a client system. The method may further include receiving with the data entered at the command line interface at least one parameter that modifies the verb, and identifying the particular web page responsive to the verb combined with the parameter.
Variable screen magnifier user interface
The magnifier interface system determines a level of user activity with a screen magnifier user interface and determines a current user interface mode. If the system is currently in the full mode and the level of user activity indicates user interaction with the screen magnifier user interface below a threshold, then the system transitions from the full mode to the watermark mode based on the lack of determined user activity. If the system is currently in the watermark mode and the level of user activity indicates user interaction with the screen magnifier user interface, then the system transitions from the watermark mode to the full mode based on the determined user activity. Thus, the magnifier interface system presents a full user interface that transitions into a smaller watermark interface when not in use to take up less screen real restate yet remain available to users.
System and method of web-based keyboard, video and mouse (KVM) redirection and application of the same
Certain aspects of the present disclosure are directed to a method of performing web-based keyboard, video and mouse (KVM) redirection implemented by a baseboard management controller (BMC). The method includes: (a) receiving, at a BMC, first and second video frames redirected from a host computer, the BMC performing a management function of the host computer, (b) generating a webpage at a web server of the BMC and sending the webpage to a browser program running on a computing device in a network, the webpage being programmed to instruct the browser program to initiate a drawable area and to establish a Web Socket connection with the web server, (c) generating a processed image representing the second video frame, (d) establishing a Web Socket connection between the web server and the browser program, and (e) sending the processed image to the browser program through the Web Socket connection.
Method and apparatus of locally controlling display content of a remote system
A method and apparatus of controlling the viewable content of a remote computer system on a local computer system is disclosed. The method may include establishing a remote control session over a network to the remote computer system and accessing the viewable content currently displayed on the remote computer system. The method may also include reformatting the viewable content to change a size of the viewable content and displaying the reformatted viewable content on the local computer system while the remote computer system and the local computer system are communicatively connected.
Methods and devices for recording changes in visual stimuli observed through browser-based interfaces
The disclosed technology reconstructs stimuli displayed to a user as they interact with online-content. The technology may provide for a record of selected technical parameters and relevant data that may impact the manner in which online content is displayed, taking into consideration the current browser context. The technology may record events as reported from a browser interface. The events may be recorded in a format and syntax to form a primary index of events and related outcomes which comprise the user's interface experience. Events may be detected at the browser interface and identified, categorized, and filtered as to their relevance to visual stimuli. A unique identifier may then be assigned in the form of an alphanumeric string to each relevant event. Selected events may be recorded into a log (along with their categorization), a unique identifier, and the time in which the event occurred.
Presentation remote control
In general, the subject matter described in this specification can be embodied in methods for accessing a presentation stored on a remote server with a first computing device that is connected to the remote server over a network. The first computing device communicates with the network over a wireless connection. The first computing device is used to cause a second computing device to display the presentation. The second computing device is connected to the remote server over a network. The display of the presentation is substantially controlled with communication between the first computing device and the second computing device. The communication occurs only through the remote server.
System and method for providing data links
Systems and methods for providing data verification are disclosed. In one exemplary method, the data is displayed in at least one display field and information related to the data is stored in at least one source file. The method includes creating a link between the display field and the source file, wherein the link is displayed in a verification panel associated with the display field. The method further includes saving link identification information, wherein the link identification information includes category information of the display field and location information of the source file, and obtaining the source file at the location specified by the link identification information, if the link is selected for display; and opening the source file and displaying the source file.
Extrapolating tabular structure in a freeform document
Various embodiments of systems and methods for extrapolating tabular structure to facilitate manipulation of elements in the freeform document are described herein. The freeform document includes an unstructured canvas providing users the ability to place one or more elements in the canvas. A primary column is determined by the selection of at least one element in the freeform document. Further, one or more secondary columns in the freeform document corresponding to the primary column are determined. A tabular structure in the freeform document is extrapolated based on the determined primary column and the one or more secondary columns to facilitate manipulation of elements in the freeform document, such as reordering, resizing and deleting the one or more elements, and inserting one or more new elements in the freeform document.
Automatic linking of documents
A document publishing system. Documents can be automatically linked. Links are automatically created within a first document to other documents, or to locations within the first document and then modified as necessary depending on a destination location to which the first document is moved.
Capturing structured data about previous events from users of a social networking system
The invention provides a display interface in a social networking system that enables the presentation of information related to a user in a timeline or map view. The system accesses information about a user of a social networking system, including both data about the user and social network activities related to the user. The system then selects one or more of these pieces of data and/or activities from a certain time period and gathers them into timeline units based on their relatedness and their relevance to users. These timeline units are ranked by relevance to the user, and are used to generate a timeline or map view for the user containing visual representations of the timeline units organized by location or time. The timeline or map view is then provided to other users of the social networking system that wish to view information about the user.
Systems and methods for short media defect detection
Various embodiments of the present invention provide systems and methods for media defect detection. As an example, a data processing circuit is disclosed that includes a defect detector circuit and a comparator circuit. The defect detector circuit is operable to calculate a correlation value combining at least three of a data input derived from a medium, a detector extrinsic output, a detector intrinsic output and a decoder output. The comparator circuit is operable to compare the correlation value to a threshold value and to assert a media defect indicator when the correlation value is less than the threshold value.
Techniques for storing data in stuck memory cells
A data storage system includes a memory circuit and a control circuit. The control circuit is operable to receive data bits provided for storage in memory cells of the memory circuit. The control circuit is operable to compare each of the data bits provided for storage in a corresponding one of the memory cells having a stuck-at fault to a value of the stuck-at fault, and to invert each of the data bits having a different value than the value of the stuck-at fault of the corresponding one of the memory cells to generate encoded data bits. The control circuit is operable to generate redundant bits that indicate the encoded data bits to invert to regenerate the data bits.
Continuously interleaved error correction
Continuously interleaved codewords are used in a communication system to provide error correction capability. In general, each codeword shares symbols with both preceding and subsequent codewords, when the codewords are arranged in an order, such that correction of symbols in any one codeword also corrects symbols in another codeword and correction of symbols in any codeword may allow, considering possible corrections of intermediate codewords, for further correction of any codeword in the order of codewords. In one embodiment received information may be arranged in subframes, with each subframe including terminal symbols of a plurality of codewords, each of the plurality of codewords including symbols in multiple subframes.
Method and system for providing efficient on-product clock generation for domains compatible with compression
A method and system for providing on-product clocks for domains compatible with compression is disclosed. According to one embodiment, a base signal received from automated test equipment has a frequency for testing a plurality of clock domains and programming instruction for first and second clock domains of a plurality of clock domains. First and second clock signals are generated from the base clock signal based on the programming instruction. A first delay for the first clock signal and a second delay for the second clock signal are determined from the programming instruction. A test sequence is provided to test a first clock domain and a second clock domain. The test sequence comprises the first clock signal delayed by the first delay and the second clock signal delayed by the second delay. The first clock drives the first clock domain and the second clock derives the second clock domain.
Erased page confirmation in multilevel memory
In a multi-level cell memory array, a flag that indicates that a logical page is unwritten is subject to a two-step verification. In a first verification step, the logical page is read, and ECC decoding is applied. If the first verification step indicates that the logical page is unwritten, then a second verification step counts the number of cells that are not in an unwritten condition.
Maintenance planning and failure prediction from data observed within a time window
A system for predicting a failure of equipment from prior maintenance data of the equipment collected during a time duration estimate a number of preceding failures of the equipment prior to the time duration. The system constructs a model, based on the prior maintenance data, of an impact of an external intervention on a failure of the equipment. The system constructs a model, based on the constructed model of the impact of the external intervention and the estimated number of preceding failures, of a replacement policy of the equipment and a probability of a subsequent failure of the equipment in a subsequent time period.
Proactive failure handling in database services
Embodiments are directed to predicting the health of a computer node using health report data and to proactively handling failures in database services. In an embodiment, a computer system monitors various health indicators for multiple nodes in a database cluster. The computer system accesses stored health indicators that provide a health history for the database cluster nodes. The computer system then generates a health status based on the monitored health factors and the health history. The generated health status indicates the likelihood that the node will be healthy within a specified future time period. The computer system then leverages the generated health status to handle current or predicted failures. The computer system also presents the generated health status to a user or other entity.
Hardware security module and processing method in such a module with augmented communication features
The present invention relates to the field of processing within hardware security modules, such as for example debugging of compiled programs. A debugging module includes a microprocessor and a compiled program to be executed by the microprocessor in order to carry out an operation, and is configured to exchange with an external entity, in a master/slave mode, messages relating to the operation. The compiled program includes at least one debugging instruction which whether or not it is executed does not modify the execution of the operation. The hardware security module is moreover configured to transmit, during the execution of the compiled program, data generated, for example by the debugging instruction, over a communication channel initiated by the hardware security module, to an entity external to the hardware security module.
Block management schemes in hybrid SLC/MLC memory
A method for data storage includes storing data in a memory including multiple analog memory cells arranged in blocks. A first subset of the blocks is defined for storing first data with a first storage density, and a second subset of the blocks is defined for storing second data with a second storage density, larger than the first storage density. In each of the first and second subsets, one or more blocks are allocated to serve as spare blocks and blocks that become faulty are replaced with the spare blocks. Upon detecting that a number of the spare blocks in the second subset has decreased below a predefined threshold, the data is copied from at least one block in the second subset to the first subset, and the at least one block is added to the spare blocks of the second subset.
According to one embodiment, a memory device includes a semiconductor memory and a controller that controls the semiconductor memory. The controller includes a first command issuing module, second command issuing module, error correction module and control module. The first command issuing module is configured to issue a read command to the semiconductor memory. The second command issuing module is configured to issue a first command instructing a process that does not involve reading data from the semiconductor memory independently from the first command issuing module to the semiconductor memory. The error correction module is configured to correct an error contained in data supplied from the semiconductor memory. The control module is configured to control the error correction module, first command issuing module and second command issuing module.
Method of calibrating signal skews in MIPI and related transmission system
In calibration mode, a clock signal and a data signal are respectively transmitted via a clock lane and a data lane of an MIPI. A test clock signal is provided by adjusting the phase of the clock signal, and a test data signal is provided by adjusting the phase of the data signal. By latching the test data signal according to the test clock signal, a latched data may be acquired for determining an optimized phase relationship corresponding to the clock lane and the data lane. When transmitting the clock signal and the data signal in normal mode, the signal delays of the clock lane and the data lane may be adjusted according to the optimized phase relationship.
Computer and power control method thereof
A computer including a system part, a battery mounted from the outside to supply power to the system part, a detector to detect a residual amount of the battery, and a controller to calculate a decreased residual amount of the battery based on the residual amount of the battery, and to control power supplied to the system part if the decreased residual amount of the battery is lower than a predetermined value, and if the residual amount of the battery is lower than a predetermined critical residual amount.
Data processing apparatus, data processing method, and storage medium for communicating with external apparatus
A data processing apparatus includes a control unit configured to control data processing, and a communication unit configured to communicate with other apparatuses. The control unit determines, before the control unit shifts to a predetermined power-saving state, a communication speed of the communication unit to communicate with the other apparatuses when the control unit is in the power-saving state, based on an amount of packets received by the communication unit, and sets the determined communication speed for the communication unit. The communication unit communicates with the other apparatuses at the set communication speed, when the control unit is in the power-saving state.
Management of background tasks
Background tasks are managed through background task settings that allow or prevent the execution of agents associated with mobile device applications in the background of a mobile computing device. Background task management can extend the battery life of a mobile device and can be done by a user, the mobile device or a combination thereof. Agents scheduled for execution by a mobile device are executed according to the background task settings associated with the application. Background task settings can be controlled via background task control panels. Background task settings can be set on a system-wide, application or background task basis. Disabled background tasks can be enabled when the application is next launched. A user can be invited to navigate to the background task control panels when various events occur such as the battery life dropping below a threshold or the current power consumption exceeding a threshold.
Method and system for managing power consumption utilizing inter-gateway communication
Aspects of a method and system for managing power consumption utilizing inter-gateway communication are provided. In this regard, a first broadband gateway residing in a first location may determine past, present, and/or expected power consumption of the first location. The gateway may receive, from one or more other broadband gateways residing in one or more other locations, information that enables determining past, present, and/or expected power consumption of the other location(s). The gateway may control power consumption of the first location by controlling a state of operation of devices residing in the first location. The gateway may determine aggregate power consumption of the first location and the other location(s). The gateway may control power consumption of the first location by enabling operation of one or more devices during periods of lower aggregate power consumption and disabling operation the devices during periods of higher aggregate power consumption.
A first controller can provide system state information and a second controller can receive the system state information. The second controller can be programmed to control the state of a component. The state of the component can be based on information programmed in the second controller and the system state information. The component can include an off state and an operating state indicated by a signal from the second controller.
System employing signaling at a powered communications interface to modify or override a power-withholding policy at a power-sourcing equipment
A power-sourcing equipment (PSE) has a powered communications interface to which a powered device (PD) is coupled. The PD presents a valid PD signature indicating that the PD is attached and capable of receiving normal operating power from the PSE. Per a power-withholding policy, the PSE operates in a power-withholding state to withhold the normal operating power notwithstanding the valid PD signature, and monitors for a signal via the powered communications interface indicating that the normal operating power should be delivered to the PD. The signal may be an alternative signature generated by a user-activated switch for example. In response to receiving the signal in the power-withholding state, the PSE enters a power-providing state in which it provides the normal operating power to the PD notwithstanding the power-withholding policy. An intermediate device (dongle) may be employed to generate the signal.
Secure relocation of encrypted files
Systems and methods are disclosed for secure relocation of encrypted files for a system having non-volatile memory (“NVM”). A system can include an encryption module that is configured to use a temporary encryption seed (e.g., a randomly generated key and a corresponding initialization vector) to decrypt and encrypt data files in an NVM. These data files may have originally been encrypted with different encryption seeds. Using such an approach, data files can be securely relocated even if the system does not have access to the original encryption seeds. In addition, the temporary encryption seed allows the system to bypass a default key scheme.
Application installing method
An application installing method according to the present invention in which an application file includes at least two application encrypting data in which the executable files are respectively encrypted using different encryption algorithms, and a license file includes at least two license encryption data in which application decryption keys for decrypting the application encryption data are encrypted using respectively different encryption algorithms. The process execution apparatus includes a calculation unit configured to execute the executable file, and a storage unit configured to store the application file and the license file. The method includes a step of decrypting the application encryption data by use of the application decryption key with the calculation unit based on the level of priority of the predesignated application encryption data stored in the storage unit, and installing the executable file corresponding to the application encryption data.
Secure processor and a program for a secure processor
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key which is specific to the core where the instruction code is executed or an authenticated key by a specific key to perform an encryption processing for the input and output data between the core and the outside.
Systems, methods, software, and components using tamper-proof real-time clock
The write-access control line for an RTC is combined with a clear line for an RTC signature register, so that changes to the RTC will cause subsequent reads to return an invalidity flag.
Data storage apparatus having cryption and method thereof
A storage apparatus including a storage unit to store data, a processor unit to process the data according to a command received from an external device, a key unit to store a plurality of crypto keys, and a decoder unit to select one of the crypto keys according to address information of the command received from the external device. Hardware encryption is more secure and less complex to manage.
Method of controlling a transaction
A method of securely authenticating a user's response to a challenge request before completing a transaction is disclosed. When a user wishes to complete a transaction, an image is projected onto the user's face. The user reads the image in a mirror and responds accordingly. If the user identifies the correct image, the transaction is allowed to proceed.
Method, apparatus and system for verifying authenticity of an object
The invention relates to a method for proving authenticity of a prover PRV to a verifier VER, the method comprising generating a secret S using a physical token by the prover PRV. Obtaining a public value PV by the verifier, where the public value PV has been derived from the secret S using a function for which the inverse of said function is computationally expensive. The method further comprising a step for conducting a zero knowledge protocol between the prover PRV and the verifier VER in order to prove to the verifier VER, with a pre-determined probability, that the prover PRV has access to the physical token, where the prover PRV makes use of the secret S and the verifier VER makes use of the public value PV. The invention further relates to a system employing the method, and an object for proving authenticity.
Apparatus, methods, and computer program products for facilitating secure password creation and management
Apparatus, methods and/or computer program products are provided that facilitate the creation and management of secure passwords. Upon receiving a proposed password from a user for use in a computer system, apparatus or other communication system, the proposed password is evaluated for compliance with security guidelines. If the password complies at least with a minimum level of security, the password is evaluated and a relative level of the password is determined and assigned to the password. A lifespan for the password is selected based on the assigned relative security level of security. The user is notified of the assigned lifespan. Operations for evaluating the password, assigning the lifespan, and notifying the user of the lifespan may be performed in substantially real-time.
Identity management on a wireless device
A wireless device may perform a local authentication to reduce the traffic on a network. The local authentication may be performed using a local web server and/or a local OpenID provider (OP) associated with the wireless device. The local web server and/or local OP may be implemented on a security module, such as a smartcard or a trusted execution environment for example. The local OP and/or local web server may be used to implement a provisioning phase to derive a session key, associated with a service provider, from an authentication between the wireless device and the network. The session key may be reusable for subsequent local authentications to locally authenticate a user of the wireless device to the service provider.
Optimized integrity verification procedures
Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by applying a hashing function to a particular portion of the digital content, where the particular portion is less than the entire digital content. The method supplies the signature and the digital content to a device. At the device, the method applies the hashing function to the particular portion of the digital content in order to verify the supplied signature, and thereby verifies the integrity of the supplied digital content.
Augmented reality based privacy and decryption
A method, non-transitory computer readable medium and apparatus for decrypting a document are disclosed. For example, the method captures a tag on an encrypted document, transmits the tag to an application server of a communication network to request a per-document decryption key, receives the per-document decryption key if the tag is authenticated, and decrypts a portion of the encrypted document using a temporary decryption key contained in the tag, the tag decrypted with the per-document decryption key.
Method and system for generating a secure message as an URL message
A method for generating and delivering a message via a web service is provided. A message for a recipient is converted to a URL and sent. A request is received from a sender to send a message to a recipient. A URL message is created in response to receiving the request to send the message to the recipient and the URL message is sent to the recipient. A URL message response is received from the recipient and a landing message is sent to the recipient in response to receiving the URL message response. The landing message includes a hint requesting an answer from the recipient. An answer is received from the recipient and the message is sent to the recipient in response to receiving the answer.
System and method for cross-site reference forgery attack prevention using double validated tokens with time sensitivity
A method and system for validating a form, that includes providing, to a client, the form comprising a primary token, receiving, in response to the client loading the page form, a request for a secondary token, providing the secondary token in response to receiving the request, and receiving the form comprising the primary token and a secondary token from a client. The method further includes validating the form, where validating the form includes obtaining a first primary token hash from the secondary token, applying a first hash function to the primary token to obtain a second primary token hash, and determining that the first primary token hash and the second primary token hash match. The method further includes accepting the form upon validating the form.
PCI DSS compliant proxy service
The innovation includes systems and methods of facilitating electronic commerce (e-commerce) via a proxy service. Such a method can include the acts of receiving a hypertext transfer protocol with secure socket layer (HTTPS) request from a client application and translating the HTTPS request to a format appropriate for an e-commerce web application. Additionally, such a method can include the steps of sending the translated request to the e-commerce web application via HTTPS and receiving a response based at least in part on the translated HTTPS request. The method can also include the acts of translating the HTTPS response to a format appropriate for the client application and sending the translated response to the client application via HTTPS. Secure information can be encrypted and stored at the client application separately from the encryption key, which can be stored by the proxy service.
Key management device, system and method having a rekey mechanism
According to some embodiments, a key management apparatus for deploying in a smart grid system adapted to receive metering data from smart meters connected to at least one relay via a network, includes: a key control mechanism that derives a key array of individual purpose specific keys from one master key such that the purpose specific key in the key array are each independent cryptographic keys for each specific usage in an application or for each application if there is only one specific usage in an application.
Streamlined provisioning and configuration of computing devices
Methods and systems for provisioning a computing device are provided. An example method may include receiving, by a computing device, information indicating a uniform resource identifier (URI) and a wireless access point configured to allow the computing device to connect to a wireless network to enable the computing device to access the URI. The method may also include downloading, onto the computing device, a provisioning software application from the URI. The method may also include executing the provisioning software application on the computing device, wherein the provisioning software application is configured to provision the computing device such that the provisioned computing device is configured to operate in a limited function mode. The method may also include locking the provisioned computing device to prevent changes to the limited function mode.
Key sharing system, communication terminal, management device, key sharing method, and computer program
In a case where another user's communication terminal (nTE113) departs from a group, user's communication terminal (TEb14) updates encryption information, using the terminal individual information of only the communication terminals (nTE213 and nTE313) which remain in the group (PNy). User's communication terminal (TEb14) encrypts the PN-shared key (KPNy), using the updated encryption information. User's communication terminal (TEb14) transmits the encrypted shared key information obtained from this encryption to a management device (PNSP11), and updates the encrypted shared key information stored in the management device (PNSP11).
DNS flood protection platform for a network
Embodiments are directed towards providing protection to DNS servers against DNS flood attacks by causing a requesting device to perform multiple DNS lookup requests for resolving a resource record. A request from a network device for a resolution of a domain name may be received by a device interposed between the requesting network device and a DNS server. Upon receiving the request to resolve the domain name, the interposed device may respond with a CNAME that includes a cookie. The requesting device may then send another request that includes the cookie preceded CNAME. The interposed device may then validate the returned cookie returned in the CNAME and if valid, forward the domain name resolution request on to a DNS server. The response may then be forwarded to the requesting device.
Method and system for device authentication
An information processing device, which is used by a user and includes a storage device, encodes target information required for a device authentication by a server by using device-specific information or information based on the device-specific information as an encryption key, and stores the encoded target information. The information processing device uses a decryption key that corresponds to the encryption key used in the generation of the stored encoded target information to decode the encoded target information, and sends the decoded target information to the server. The server receives the target information from the information processing device, and determines whether or not the received target information is correct.
Single-pass data compression and encryption
Embodiments compress and encrypt data in a single pass to reduce inefficiencies that occur from compression and encrypting data separately. Typically, compression and encryption are implemented in separate functional units. This has a few disadvantages: 1) encryption cannot make use of compression state to further secure the message, 2) processed data is read and written twice, 3) additional space, time, and resources are consumed, and 4) it is more prone to potential cipher-attacks since the encryption stage is independent from compression. Embodiments overcome these disadvantages by structuring these operations so that both compression and encryption is executed within the same processing loop. Thus: 1) encryption is stronger due to the dependence on the compression state, 2) I/O buffers are accessed only once reducing overhead, 3) system footprint is reduced, and 4) cipher analysis is more complex since the decryption process cannot be separated from the decompression process.
Associating tag to branch instruction to access array storing predicted target addresses for page crossing targets for comparison with resolved address at execution stage
A processor configured to facilitate transfer and storage of predicted targets for control transfer instructions (CTIs). In certain embodiments, the processor may be multithreaded and support storage of predicted targets for multiple threads. In some embodiments, a CTI branch target may be stored by one element of a processor and a tag may indicate the location of the stored target. The tag may be associated with the CTI rather than associating the complete target address with the CTI. When the CTI reaches an execution stage of the processor, the tag may be used to retrieve the predicted target address. In some embodiments using a tag to retrieve a predicted target, CTI instructions from different processor threads may be interleaved without affecting retrieval of predicted targets.
Apparatus and method for identifier management
An identifier management apparatus capable of setting identifier conversion information of a new user without affecting identifier conversion processings of other users, and an identifier management method. The identifier management apparatus converts an identifier given to communication data. Its memory stores multiple hash functions, output values of the hash functions corresponding to the respective plurality of hash functions, multiple entry tables that manage the identifier conversion information indicating a correspondence between the input identifier being an input value of the hash function and an output identifier obtained by converting the input identifier, and a management table for managing a setting status of the identifier conversion information in each entry table. When registering the new identifier conversion information in any entry table, its processor selects an entry table that should register new identifier conversion information depending on setting statuses of the identifier conversion information in the entry tables.
Dynamic memory cache size adjustment in a memory device
Methods for dynamic memory cache size adjustment, enabling dynamic memory cache size adjustment, memory devices, and memory systems are disclosed. One such method for dynamic memory cache size adjustment determines available memory space in a memory array and adjusts a size of a memory cache in the memory array responsive to the available memory space.
Methods, systems, and computer readable medium for allocating portions of physical storage in a storage array based on current or anticipated utilization of storage array resources
Systems, methods, and computer readable medium for allocating physical storage in a disk array are disclosed. According to one aspect, the subject matter described herein includes a method for allocating portions of storage area of a storage array. The method includes receiving, from a requesting entity, a request for allocation of a portion of storage area of a storage array, the storage array comprising a plurality of storage entities and a plurality of data buses for transferring data to and from the plurality of storage entities, wherein the plurality of storage entities are organized into at least one logical unit, wherein each logical unit is subdivided into at least one slice. In response to receiving the request for allocation, at least one slice is selected for allocation for use by the requesting entity, based on anticipated system resource utilization during access to data to be stored in the storage array.
Accessing objects in hosted storage
A first access control list method is stored in a hosted storage system and in association with a storage structure. The first access control list is designed to grant permission to write data objects to the storage structure but not designed to grant permission to read objects from the storage structure. The first access control list grants a first user permission to write data objects to the storage structure. A second access control list is stored in the hosted storage system and in association with a first data object stored in the storage structure. The second access control list is designed to grant permission to read the first data object. The second access control list grants a second user permission to read the first data object.
Managing memory requests based on priority
Managing access to an external memory in a computing system comprising one or more cores includes: receiving memory requests to access a memory at a memory controller coupled to at least one of the cores; assigning, by the memory controller, respective priorities to the memory requests, the priorities being based on priority configuration information; providing access, by the memory controller, to the memory based on the memory requests according to the assigned priorities. Messages are received at the memory controller to modify the priority configuration information.
Memory system having a plurality of types of memory chips and a memory controller for controlling the memory chips
A memory controller converts controller output signals output from a controller into memory input signals according to the operation specifications of memory chips to operate, and outputs the resultant to the memory chips through a common bus. The memory controller also receives memory output signals output from the memory chips through the common bus, and converts the received signals into controller input signals receivable to the controller. This allows the single memory controller to access the plurality of types of memory chips. As a result, the memory controller can be reduced in chip size, lowering the cost of the memory system.
System and method for fetching information in response to hazard indication information
A method for fetching information in response to hazard indication information, the method includes: (i) associating hazard indication information to at least one information unit that is being fetched to the cache module; (ii) receiving a request to perform a fetch operation; and (iii) determining whether to fetch at least one information unit to the cache module in response to the hazard indication information and in response to dirty information associated with the at least one information unit.
The present invention has an object of providing a high-speed, low-cost, and user-friendly information processing system that can ensure scalability of memory capacity. The information processing system is configured to include an information processing device, a volatile memory, and a nonvolatile memory. By serially connecting the information processing device, the volatile memory, and the nonvolatile memory and reducing the number of connection signals, processing speed is increased while maintaining the scalability of memory capacity. When transferring data of the nonvolatile memory to the volatile memory, error correction is performed, thereby improving reliability. The information processing system including the plurality of chips is configured as an information-processing system module in which the chips are alternately stacked and arranged, and wired by a ball grid array (BGA) or by bonding between the chips.
Memory module and method employing a multiplexer to replace a memory device
A memory module including memory devices, a spare memory device, a multiplexing unit, and a memory buffer is provided. The multiplexing unit is coupled with each of the memory devices and the spare memory device, while the memory buffer is coupled with the multiplexing unit. The memory buffer includes a serial interface over which commands are received from a memory controller. The memory buffer is configured to process the commands and provide the memory controller access to the memory device through the multiplexing unit in response to the commands. Also, in response to at least one of the commands, the memory buffer is configured to direct the multiplexing unit to couple the spare memory device to the memory buffer in place of one of the memory devices for at least a next access of the memory devices.
Systems and methods for managing memory core surface
Accessing a shared buffer can include receiving an identifier associated with a buffer from a sending process, requesting one or more attributes corresponding to the buffer based on the received identifier, mapping at least a first page of the buffer in accordance with the one or more requested attributes, and accessing an item of data stored in the buffer by the sending process. The identifier also can comprise a unique identifier. Further, the identifier can be passed to one or more other processes. Additionally, the one or more requested attributes can include at least one of a pointer to a memory location and a property describing the buffer.
System and method for improving cache performance
A method, computer program product, and computing system for identifying compressed content within a first cache system to a data array associated with the first cache system. Related content is located on the data array that is associated with the compressed content on the first cache system and it is determined whether the related content on the data array is compressible.
Method and apparatus of storage tier and cache management
Storage systems and methods directed to tier management and tier movement. Tier management is conducted based on access frequency of data in a storage subsystem in comparison to the storage subsystem tier. The storage system may then manage cache pre-fetch or tier movement as file location granularity without a special management interface from the host to the storage system.
TCAM action updates
Systems, and methods, including executable instructions and/or logic thereon are provided for ternary content addressable memory (TCAM) updates. A TCAM system includes a TCAM matching array, a TCAM action array that specifies actions that are taken upon a match in the TCAM array, and a TCAM driver that provides a programmable interface to the TCAM matching array and the TCAM action array. Program instructions are executed by the TCAM driver to add a divert object which encompasses actions associated with the TCAM actions array and to apply the divert object to update action fields in the TCAM action array, without changing the relative order of entries in the TCAM matching array, while hardware is simultaneously using the entries.
Counter management algorithm systems and methods for high bandwidth systems
A method, a statistics subsystem, and a system use a combination of commercially available high speed memory and high density low speed memory to mitigate cost, space, control, and power issues associated with storing counters for statistics updates, while meeting the growing width and depth needs of multi-hundred gigabit Carrier Class data network devices. The method, statistics subsystem, and system offer a Counter Management Algorithm (CMA) that relies on rollover bits stored within data of counters. An update to the low speed memory is substantially faster than a rollover time for the counter in the high speed memory thereby allowing statistics to be cached in the high speed memory while updates take place to the low speed memory.
Protecting groups of memory cells in a memory device
Methods for memory block protection and memory devices are disclosed. One such method for memory block protection includes programming protection data to protection bytes diagonally across different word lines of a particular memory block (e.g., Boot ROM). The protection data can be retrieved by an erase verify operation that can be performed at power-up of the memory device.
Managing memory data recovery upon power loss
A single segment data structure and method for storing data objects employing a single segment data object having a header and a data record. The header includes a segment length field describing the length of memory reserved for the data record and the data record contains at least one data instance object. Each of the data instance objects has a data instance header and data field. The header includes a data instance state field and a data instance length field. The data instance length field contains data representing the length of the data instance data field allowing for variable length “in place” updating. The data instance state field contains data representing an object state of the instance data. Only one of the data instance objects of the data record of the single segment data object has a valid object state. The state field facilitates a power loss recovery process.
Memory system and control method thereof
A memory system includes a nonvolatile memory including a plurality of blocks as data erase units, a measuring unit which measures an erase time at which data of each block is erased, and a block controller which writes data supplied from at least an exterior into a first block which is set in a free state and whose erase time is oldest.
Interface card apparatus
An interface card apparatus is provided. The interface card includes a transmission interface, an interface converter, a system on chip, a first connector, a bus switch, a network connector, and a power switch. The transmission interface includes a data channel, a power pin, a network channel, a switch pin, a power enabling pin, and a sharing pin. The system on chip, controlled by the sharing pin, performs a file sharing program. The bus switch, controlled by the switch pin, couples the connector to the channel or the interface converter. The network connector is coupled the system on chip and the network channel, and the power switch, controlled by the power enabling pin, couples the power pin to the system on chip.
Handy terminal for identifying a connected-to cradle based on a network terminal address thereof, and non-transitory computer readable medium
There is provided a handy terminal connected to a cradle in a removable manner, wherein the cradle has a communication function and is connected to a network. The handy terminal includes: a determining unit configured to determine whether or not the handy terminal is connected to the cradle; an identifying unit configured to identify the cradle when the determining unit determines that the handy terminal is connected to the cradle; and an address setting unit configured to set a network terminal address for identifying the handy terminal on the network, depending on the identified cradle.
Apparatus and method for dynamic alignment of source synchronous bus signals
An apparatus that compensates for misalignment on a synchronous data bus. The apparatus includes a replica distribution network, a bit lag control element, and a synchronous lag receiver. The replica distribution network receives a first signal, and generates a second signal, where the replica distribution network comprises replicated propagation characteristics of a radial distribution network for a strobe. The bit lag control element is configured to measure a propagation time beginning with assertion of the first signal and ending with assertion of the second signal, and is configured to generate a value on a lag bus that indicates the propagation time. The synchronous lag receiver is coupled to the bit lag control element, and is configured to receive a first one of a plurality of radially distributed strobes and a data bit, and is configured to delay registering of the data bit by the propagation time.
Systems and methods for uniquely identifying removable media by its manufacturing defects wherein defects includes bad memory or redundant cells or both
A system and method for determining media to be exported out of a media library is described. In some examples, the system determines a media component to be exported, determines the media component is in the media library for a specific process, and exports the media component after the process is completed.
Techniques for achieving complete interoperability between different types of data and multimedia interfaces in handheld devices
A triple-mode connectivity apparatus for enabling interoperability between a multimedia display interface and a data interface. The apparatus comprises a universal connector installed in a first device and structured to enable connectivity between the multimedia display interface and the data interface of a second device, the first device is connected to the second device using a cable having a first connector compliant with the universal connector and a second connecter compliant with the data interface of the second device; a physical layer interface for processing signals compliant with the multimedia display interface and the data interface; and a detector for detecting an interface type of the second device and setting the apparatus to process signals according to the determined interface type.
Method and device for assigning addresses in a system having a plurality of generator units positioned in parallel
A method for assigning addresses in a system having a first generator unit and at least one further generator unit positioned in parallel to the first generator unit. Each of the generator units has a control-signal input and a control-signal output. The control-signal input of each further generator unit is connected in each instance to the control-signal output of another of the generator units. Each of the further generator units receives an identification signal output at the control-signal output of a generator unit upstream of it, and assigns itself an individual address as a function of the respective identification signal received, the address depending on the length of the identification signal received.
I/O scheduling system and method
A method, computer program product, and computing system for associating a first I/O scheduling queue with a first process accessing a storage network. The first I/O scheduling queue is configured to receive a plurality of first process I/O requests. A second I/O scheduling queue is associated with a second process accessing the storage network. The second I/O scheduling queue is configured to receive a plurality of second process I/O requests.
Method and system for transferring packets to a guest operating system
In general, the invention relates to a method for transferring a packet. The method includes receiving the packet by a physical network interface, determining a virtual network interface card (VNIC) using a virtual switching table, where the VNIC is located on a computer operatively connected to the network express manager (NEM) via a chassis interconnect, and the VNIC is executing on a host operating system (OS) in the computer. The method further includes transferring the packet to a receive ring (RR) associated with the VNIC, wherein the RR is located on the NEM, providing the network express manager with a receive descriptor, transferring the packet to the guest OS memory using the receive descriptor, and notifying the guest OS that the packet is in the guest OS memory.
Selective use of anonymous proxies
A method and computer system for selectively using an anonymous proxy. A user request for content is received. A determination is made as to whether the user request satisfies context criteria. When the user request satisfies the context criteria, the user request is forwarded to an anonymous proxy. When the user request does not satisfy the context criteria, the request is sent directly to a content provider.
Method of communicating between several terminals
The invention relates to a method of communicating between at least two devices, comprising in particular the following steps: a step of hooking up a first device and at least one second device, and a step of transferring a first multimedia stream from the first device to the second device, characterized in that it also comprises the following steps: a step of determining, in the course of which it is noted that the first device or a first communication network to which the first device is connected or a second network to which the second device is connected is adapted for the production or transfer of a multimedia stream comprising N channels, and that the second device comprises means for processing a multimedia stream comprising P channels, and a step of trunking a second multimedia stream to the second device, carried out in parallel with the step of transferring the first multimedia stream. The invention also relates to an associated communication system. Application to telephony or videophony over IP.
System and method for providing service to end-point terminal in CPNS environment, and CPNS server, mobile communication terminal, and end-point terminal for the same
The present invention relates to a system and a method for providing a service to an end-point terminal in a CPNS environment, and to a CPNS server, a mobile communication terminal and an end-point terminal for the same. The system comprises a CPNS server which performs an authentication procedure based on received terminal information about the mobile communication terminal and requests a content providing server to execute the CPNS mobile communication terminal for opening a CPNS session with the end-point terminal when the CPNS server provides the CPNS; and the end-point terminal requests the CPNS reservation from the mobile communication terminal or the CPNS server and executes the CPNS provided by the CPNS server via the mobile communication terminal.
Federation and interoperability between social networks
Communications between social networks are enabled via authentication that provides single-sign-on (SSO) authentication of users such as individual users or social networks or social network services that desire access to network resources on a particular social network. The particular network requests authentication of the requesting user(s), and based on an authentication result the particular network provides or denies access to the resources. A social network services database maintains a listing of resources of different social networks, that a user can search to determine where to find resources on other networks. The user can then query the social networks hosting those resources or their social network services for access, and the networks or services can authenticate the user before granting access according to any conditions that the hosting social networks or social network services may choose to apply.
Auto-detection and selection of an optimal I/O system resource virtualization protocol
A means for automatic detection and selection of an optimal I/O system resource virtualization protocol. The invention is a solution for the problem of complexity and the resulting lack of optimization in I/O system resource virtualization implementations. The invention shields the user from the complexity of network analysis and allows the engaging of multiple I/O system resource virtualization protocols—as opposed to a single protocol. The invention enables automatic detection and selection of an optimal I/O system resource virtualization protocol on a per resource basis, which is a unique capability and something that has not been accomplished in the prior art. The net result is a simplified user experience and optimized performance when using virtualized I/O system resource.
Communication apparatus, timer control apparatus, and timer control method
A communication apparatus comprises a processor, a memory configured to store timer information, a cache configured to store timer information, and a timer controller configured to store timer information regarding an established connection in the cache. The timer controller notifies the processor of a time-out of the timer information stored in the cache and a time-out of the timer information stored in the memory.
Systems and methods for providing secure communications for transactions
Embodiments of the present invention provide systems and methods for providing secure communications. One aspect of an embodiment of the invention creates a virtual private connection to a remote server or network utilizing a connection server and at least one direct connection between a client device and the remote server, without utilizing the Internet. In another aspect of an embodiment of the present invention, a client operating system is taken over by a vertical function operating system to service the communication with the remote server. Still another aspect of an embodiment of the present invention comprises a client device establishing a connection with a remote server through a connection server and at least one direct connection, shutting down a first operating system, starting up a second secure operating system, and launching an interface application with the second operating system to conduct electronic transactions with the remote server.
Method, apparatus, and system for service control via I1 interface
Embodiments of the present invention disclose a method, an apparatus, and a system for service control via an I1 interface. The method includes: sending a Session Initiation Protocol Invite message to a user equipment through a Gm interface; if receiving a response message returned by the user equipment, where the response message indicates that the user equipment chooses to use a circuit switched bearer and use an I1 interface for control, sending an I1 Invite message to the user equipment through the I1 interface, where I1 Invite message carries information indicating that Gm interface control falls back to the I1 interface control and information used to associate the Session Initiation Protocol Invite message.
Method and device for improving a browsing experience
A wireless communication device (200) and method (300) for improving a browsing experience. The method (300) can include: monitoring (310) a user activity in a wireless communication device; providing (320) a program that correlates user activity and the need to access the internet; and pre-activating (330) an internet link, based on the monitored user activity and the program. Advantageously, the pre-activating (330) feature can decrease the time it takes to complete a wireless network connection, thus minimizing wait time. This feature is particularly useful in low and marginal coverage areas.
Method and system for provisioning specification subsets for standards-based communication network devices
A communication protocol specification is divided into subsets of parameters based on patterns established by equipment vendors. A combination of subsets is selected based on parameters and features supported by particular network devices installed in a network. A user interface facilitates convenient creation or modification of a configuration file, which instructs a network device how to format a communication message and what information is to be contained therein.After the configuration file is loaded into a device, it controls software switches in the device such that features and parameters corresponding to the parameters selected with the user interface and controlled by the switches are either enabled or disable based on the parameters selected. Supported parameter combinations for popular equipment may be prestored so that selection with the interface of a particular piece of equipment automatically edits the configuration file according to the features and parameters supported by said equipment.
Generic control layer in a cloud environment
A computing system implemented method, in one embodiment, can include a cloud control module receiving a constraint for cloud architecture. In addition, the method can include the cloud control module receiving a plurality of cloud service provider capabilities. Furthermore, the method can include the cloud control module filtering the plurality of cloud service provider capabilities to identify a cloud service provider capable of satisfying the constraint. Moreover, the method can include the cloud control module outputting an instruction for a resource from the cloud service provider.
Transport agnostic network access control
A computer-implemented method may include assigning a transport-agnostic identifier to a computing device. The computer-implemented method may include identifying a first attempt by the computing device to access a first network. The first attempt may be made via a first media-transport technology that identifies the computing device with a first transport-specific identifier. The computer-implemented method may also include receiving the transport-agnostic identifier from the computing device. The computer-implemented method may further include using the transport-agnostic identifier, instead of the first transport-specific identifier, to determine whether to allow the computing device to access the first network. Various other methods, systems, and computer-readable media are also disclosed.
System and method for traffic analysis
A system for traffic analysis which includes an analyzer, a content source and a user terminal, and an authentication mechanism that allows or rejects the connection of the analyzer in a traffic flow between the content source and the user terminal. The analyzer includes a storage device for storing at least parts of the traffic and a questionnaire generator that uses the recorded traffic data to generate a questionnaire with questions only regarding services or content accessed by the user terminal. The response may include parameter values that are filled in by a user or parameter values that are filled in by the user terminal. Traffic data and response from multiple user terminals can be stored for later analysis.
Identifying a similar user identifier
Systems and methods for identifying a similar user identifier include analyzing history data indicative of webpages visited by a set of user identifiers. A product category corresponding to a specific manufacturer or a specific product from the manufacturer may be identified using the history data and associated with the set of user identifiers. A user identifier may be identified as being similar to those in the set based in part on the user identifier also being associated with the product category.
Methods and systems for adjusting a traffic rate for a MSRP session
A system and method is provided for adjusting a traffic rate for a Message Session Relay Protocol (MSRP) session established between two network nodes at a per session level. Each MSRP session has a traffic rate for which MSRP messages are transmitted over the MSRP session. The traffic rate per session can be adjusted, and the adjusted traffic rate per session can be communicated to adjacent nodes.
Method and apparatus for binding devices into one or more groups
An approach is provided for binding devices into a group for one or more collaborative applications. A device binding application determined a request, from at least one host device, to bind one or more other devices for initiating at least one collaborative application. The device binding application determines an order for binding the one or more other devices to the at least one host device. The device binding application causes, at least in part, a presentation of one or more binding instructions to the at least one host device, the one or more other devices, or a combination thereof based, at least in part, on the order.
Moving enterprise software applications to a cloud domain
Methods and systems for moving or porting an enterprise software application from an enterprise environment to a cloud domain are disclosed. An automated moving software program identifies enterprise components of an enterprise software application. The program assigns an enterprise component tag to the identified enterprise component. The program then assigns an enterprise attribute tag to the identified enterprise component and searches an attribute relationship map for at least one cloud attribute related to the assigned enterprise attribute. On identification of such a cloud attribute, the cloud attribute is assigned to the identified enterprise component and the enterprise component is converted to cloud component by creating a new cloud component to replicate the functions of the enterprise component or assigning a cloud component tag to the enterprise component, provided the enterprise component is render-able on the cloud domain resources.
Communication apparatus and storing medium
A communication apparatus obtains first identification information of a particular device, obtains a particular IP address assigned to the particular device, attempts a unicast communication with the particular device by using the particular IP address, determines whether the unicast communication fails; generates a new IP address when the unicast communication fails, and broadcasts a setting packet to a network causes the receiving device to assign the new IP address to the receiving device.
Dynamic learning by a server in a network environment
In one embodiment, receiving a neighbor solicitation message from a stateless address configuration host; processing the neighbor solicitation message to obtain a device identifier and an internet protocol version six (IPv6) address; storing a mapping between the device identifier and the IPv6 address in a database associated with the network device; and sending the mapping in a new message to a server. In more particular embodiments, the method can include evaluating the database in order to determine whether a particular IPv6 address is a duplicate; and marking an entry associated with the particular IPv6 address in the database for deletion.
Systems, methods, and apparatus to monitor mobile internet activity
Systems, methods, and apparatus to monitor mobile Internet activity are disclosed. An example method comprises receiving a request for Internet content on a port of a proxy, the request originating from a mobile device transmitting requests via a cellular wireless access point; associating the request for Internet content with a mobile device based on the first port; requesting content from an Internet content provider identified in the request for Internet content, the Internet content provider being different than the proxy; and transmitting the content.
Method and system for remote device management
A system for remote device management includes in a network an auto-configuration server managing device, at least one database, and a plurality of auto-configuration servers. The auto-configuration server managing device and the database are coupled in a communicative connection. The database holds information for identification of electronic devices. The auto-configuration server managing device is arranged for communication with a manageable electronic device over the network. The auto-configuration server manager is further being arranged for: receiving a request from the manageable electronic device for configuration data, determining an identification of the manageable electronic device by comparing the request with the information for identification of electronic devices of the database, determining an identification of an auto-configuration server from the plurality of auto-configuration servers in accordance with the identification of the manageable electronic device.
Method and system for providing distributed allowed domains in a data network
Method and system for providing distributed domains in a fiber channel fabric including determining a domain configuration of a resource, retrieving one or more current domain configuration parameters, determining a list of domains in a fiber channel fabric, and generating an updated domain list for the resource in the fabric is disclosed.
Selective content pre-warming in content delivery networks based on user actions and content categorizations
Systems and methods are provided for streaming content over the Internet via a CDN to an end user system. Requests from end user systems for streaming content objects being handled by the CDN are tracked to identify, for each request the tracked requests, a first content object being requested. For each request of the tracked requests, a category of the requested first content object is identified. The identified category is stored. Aggregated data indicating an amount of requests being for content objects with a specific category is generated. A prediction is made that a second content object will be requested in the future based on the aggregated data and a category of the second content object. Access to the second content object is improved such that the second content object is set to be provided faster in response to a request for the second content object than would otherwise occur.
Read-only storage device having network interface, a system including the device and a method of distributing files over a network
A Read-only storage device having network interface, a system including the device, and a method of distributing files over a network. The storage device comprises a processor communicably connected to a computer interface, a network interface, and a storage means. The processor communicates with a computer and a file server through the computer interface and the network interface, respectively. The computer may request a file from the processor and the processor responds by either (1) providing the requested file to the computer on a read-only basis if the file is cached on the storage means, (2) obtains the file from the file server if the file is available from the file server, caches the obtained file on the storage means, and provides the obtained file to the computer on a read-only basis, or (3) returns a file unavailable notice to the computer.
Sharing resources in a local serving office
Managing the storage and deletion of content on a content store shared by more than one local distribution office.
Systems and methods for tracking responses on an online social network
Disclosed are systems, apparatus, methods, and computer readable media for performing actions in response to information updates provided in an information feed such as a news feed capable of being displayed on a display device. In one implementation, an information update to be displayed in the information feed is received. The information update may be stored in a feed table for inclusion in the information feed. In some implementations, an indication of activation of a response request rule is received. The response request rule may be configured to create a response request related to an identified information update to request information from one or more recipients. The response request may be stored, accessed and presented in association with the identified information update in an information feed.
System and method for predicitive trick play using adaptive video streaming
A system utilized by a user, a server, and a content output device; the server being operable to provide a stream of input content. The content output device can output content based on the stream of input content. The stream of input content includes a chunk of content data. The system includes a receiver, an interactive playback controller portion, a playback indicator, a storage portion and an output portion. The receiver can receive the stream of input content as downloaded data. The playback indicator can indicate a location of the chunk within the stream of input content. The storage portion can store the downloaded data. The output portion can output an output signal, based on the downloaded data, to the content output device. The interactive playback controller portion can enable the user to instruct the output portion to output the chunk of content data as the output signal.
Stream duration management
In general, in one aspect, streaming content is received from a server, the streaming content being stored and queued for client-side playback from the server. Information about the streaming content is received. A virtual current duration of the streaming content is determined at a client-side application based on the information about the streaming content. A timeline control is generated based on the determined virtual duration, the timeline control presenting a representation of the virtual duration and allowing navigation forward and backward in the streaming content. The timeline control is displayed at the client-side display device.
System and method for interactive marketing
A system and method of interactive, location-based presentation and advertising that enables users with wireless network addressable communications devices to control multi-media content on network addressable screens and enables marketers to track, monitor and respond to users interactions in real time. A Proxy Gateway directs a network addressable client PC, connected to a digital display, to serve local content or pull content from one or more web servers. A wireless, network addressable device, typically a mobile phone, is used to communicate commands to the physically remote Proxy Gateway. The Proxy Gateway bridges between the communications device and the display by interpreting the commands from the communications device, forwarding them to the client PC which may pull content from the appropriate web server, or display native message content.
Virtual computing environments
Methods, systems, and apparatus, including computer program products, for discovering entities in a first portion of a data center network, examining information associated with the discovered entities to determine relationships that exist between pairs of entities in the first portion of the data center network, and generating a specification of the relationships that exist between pairs of entities in the first portion of the data center network based on results of the examining.
System and method for optimizing transfers of downloadable content
A system and method for optimizing transfers of downloadable content is described. Embodiments of the invention begin to execute downloadable content before the content is downloaded in full, providing users with faster access to the content. In addition, embodiments disclosed herein reduce bandwidth usage, are less sensitive to consumer internet speed, and are not limited by end-user product storage size. The embodiments are dynamic, thus expanding application of the system and method to both static and interactive content. The disclosed embodiments can be implemented with a patch or driver on the operating system of the user device, rendering it unnecessary to heavily modify the source code of the content. Disclosed embodiments can also operate independent from and/or invisible to the executing content, minimizing the amount of errors observed by a user when the content is displayed.
Methods and apparatus for a data driven system implementation using model components
Methods and apparatus for receiving a request from a user of a system, the request having a format defined by a template, expanding the request to combine user supplied data and data from a model component containing data for a component of the system to form an expanded request, wherein the expanded request has a predetermined format, acquiring information to determine how to process the expanded request, communicating with a host computer to extract information needed to satisfy the expanded request, generating an internal response to the expanded request containing the acquired information, inserting result data from the internal response into the model component, generating a user response to the user request, and sending the user response to the user to satisfy the user request.
Verifying domain ownership
Systems and processes are provided for verifying ownership of a network identifier or domain name. A content provider can verify that a first entity owns the network identifier by instructing the first entity to modify data associated with the network identifier in a defined manner. The content provider can verify that the first entity owns the network identifier by confirming that the data associated with the network identifier has been modified in the defined manner.
Diagnostic module for distributed industrial network including industrial control devices
A network component for an industrial automation system. The component includes a network switch processor configured to implement a networking switching function, at least one communication port configured to provide a communication channel between the network switch processor and at least one industrial control device over a network, and a diagnostic module configured to be implemented by the network switch processor and configured to retrieve diagnostic information from the at least one industrial control device.
Load balancing in multi-grid systems using peer-to-peer protocols
A load-balancing mechanism for grids in a multi-grid network. Using embodiments, one or more job submitters may distribute jobs to grids in a multi-grid network according to the load of the grids, thus spreading the load of jobs to be processed among the grids and helping to insure that jobs are handled in a timely fashion. In one embodiment, a job submitter may use peer-to-peer platform protocols to obtain load information about the grids, and then use the information about the grids to select one of the grids to perform a particular job according to the load of the grids. Determining the load on the grids may be based on information acquired from the grids including one or more of, but not limited to, how many jobs are pending in a grid's job queue and estimated time for completing the jobs in the grid's job queue.
System and method of browsing offline and queried content
Embodiments of systems and methods for browsing offline and queried content are presented herein. Specifically, embodiments may receive a request for content from a mobile application. Embodiments may also determine whether the requested content is in a cache associated with the mobile application. If it is determined that the content is not in the cache, embodiments may deliver the requested content to the mobile application.
Electronic messages using predefined templates
A computer-implemented method for sending a personalized electronic message using predefined templates including personalization symbols is provided. The method includes receiving a selection of an electronic message template from a user, wherein the electronic message template is stored in a data structure and wherein the electronic message template comprises a predefined personalization symbol for personalizing the electronic message template. The method also includes obtaining the electronic message template from the data structure, and generating content for inclusion in a personalized electronic message body based on the electronic message template, the step of generating comprising replacing the personalization symbol, based on a predefined rule, with a default value associated with the personalization symbol. The method further includes providing a draft electronic message comprising the personalized electronic message body. Systems and machine-readable media are also provided.
Methods and devices for authorization in collaborative communications sessions
In an embodiment, a method for changing a collaborative communications session may be provided. The method may include: sending a request message requesting for authorizing a change of a collaborative communications session to an end device of the collaborative communications session; determining whether an authorization message is received from the end device in response to the request message sent; and changing the collaborative communications session, in case it is determined that an authorization message is received from the end device in response to the request message sent.
Merging instances of a modular document
A first instance of a modular document is received, where the modular document is composed of plural parts, and where the modular document contains a merge definition. A second instance of the modular document is received, where the second instance and the first instance of the modular document have been modified with respect to each other. The second instance is merged with the first instance, where any conflict between the second instance and the first instance is resolved according to the merge definition.
Short impromptu communications in presence-based systems
An apparatus and methods are disclosed for enabling certain types of communications to occur, even when presence information might indicate that a particular user is unavailable. In the illustrative embodiment, a first user submits a request to communicate with a second user, where the request specifies a maximum time duration for the communication, and optionally: a minimum time duration, an expected time duration, a priority, a subject, and a type of communication. A presence server receives the request and decides whether the request should be granted based on the information specified in the request, and one or both of: presence information for the second user, and the contents of a calendar. The illustrative embodiment is also capable of detecting inconsistencies between calendars and presence information, as well as events that might affect a user's presence or indicate a departure from scheduled activities.
Client device, information processing system and associated methodology of accessing networked services
A system provides access to services from different servers via a common API. The system includes service-offering servers, a client that uses services offered by the service-offering servers, and an interchange server that acts as an intermediary when the client uses a service. The client communicates with the interchange server using a common API when the client uses service from the service-offering servers. The interchange server uses a unique API, which is unique to the service-offering server that offers the service being used by the client, to execute a processing sequence that is unique to the service-offering server. Thus client is able to use services offered by the service-offering servers with the use of a common API and without any need to use a different unique API for each service-offering server.
Dynamically determining a tile budget when pre-fetching data in a client device
A pre-fetching map data system and method identifies a subset of map data to corresponding to one or more points of interest to be displayed on the map. The map data is stored on a remote map database in map data tiles. The pre-fetching map data system identifies those map data tiles that correspond to the one or more points of interest, where the identified pre-fetch map data tiles are sent from the remote database to a client device for cache storage. The number of pre-fetch map data tiles are determined using a tile budget that is dynamically adjusted in response to changing conditions on a client device.
File system adapted for use with a dispersed data storage network
A computer a network interface and a central processing unit. The network interface communicates with a network. The central processing unit (CPU) is operable to receive a networked file system access request packet and to identify a root directory based on the networked file system access request packet. The CPU then identifies a file directory based on the root directory and the networked file system access request packet. The CPU then identifies file object metadata based on the file directory and identifies a set of slice servers based on the file object metadata and the networked file system access request packet. The CPU then issues, via the network interface, a set of commands to a set of slice servers regarding the networked file system access request packet.
System and method for efficient image and document upload
There is disclosed a system and method for uploading a document from the device to a server. In an embodiment, the method comprises: (i) generating and storing a scaled down version of the document on the device; (ii) determining the type of connection the device has established with the server; (iii) if the device has established a specified type of high bandwidth connection to the server, then: uploading the document from the device to the server; deleting the document from the device; and creating an upload record of data associated with the scaled down version of the document on the device to subsequently access the uploaded document; (iv) else, if the device has not established a specified type of high bandwidth connection to the server, then uploading the scaled down version of the document.
Intervention processing of requests relative to syndication data feed items
Syndication data feed items, corresponding to hosted content, are provided to a user program. A resource locator to hosted content to which a syndication data feed item corresponds is processed, including adjusting the resource locator to associate the resource locator with an intervention service with regard to the syndication data feed item. The processed syndication data feed items are provided to the user program. In addition, requests are processed to view hosted content corresponding to syndication data feed items. An intervention service receives a request from a user program to view hosted content to which a syndication data feed item corresponds, including a resource locator to the host that has been adjusted in the syndication data feed item to associate the resource locator with an intervention service. Intervention processing is performed, including causing interaction with the host of the requested content such that the host content is caused to be displayed at a user location.
S12 TX FIR architecture
A FIR transmit architecture uses multiple driver divisions to allow signals with different delays to be summed into the output signal by the driver itself. The architecture includes a first multiplexer, a plurality of delay cells, a plurality of sign blocks, a switch block, a second multiplexer, and a plurality of drivers.
Efficiently update coefficients of an adaptive filter
An adaptive filter configured to filter an input signal comprises Fourier transforming unit configured to transform the input signal into a frequency domain signal upon the basis of the Fourier transform, weighting unit configured to weight at least a portion of the frequency domain signal with a filter coefficient of the dispersion filter in frequency domain to obtain a filtered signal in frequency domain, correlating unit configured to correlate the filtered signal in frequency domain to obtain a correlation value, and adaptation unit configured to adapt the filter coefficient upon the basis of the correlation value.
Efficient storage of data allowing for multiple level granularity retrieval
Data series are stored at multiple resolutions in a computer-readable data storage medium. In particular, time series data values of the data series are received with associated timestamps. Corresponding storage elements in the computer-readable data storage medium are identified based on the time stamps. Aggregate values are determined by summing the time series data values. The time series data values stored in the corresponding storage elements are replaced by the aggregate values. Combined data values of the aggregate values are stored in storage elements in the computer-readable storage medium at a first resolution and second resolution, where the second resolution is half of the first resolution.
Making and using abstract XML representations of data dictionary metadata
An XML representation of the metadata for objects in a database system. The XML representation is called SXML. The SXML representations of two objects that belong to the same class of objects may be compared to produce a difference representation that shows the differences between the objects. Database commands that will create or alter objects may be produced from the difference representation, as well as an XML representation of the database commands. In addition to being comparable, SXML representations have the characteristics that a given property of the metadata is expressed in only one way in the representation, that SXML does not describe properties that belong only to particular instances of the object described by the metadata, that SXML describes only properties that the user can specify when creating an object, and that SXML is easy for humans to read, understand, and write.
Integrated search engine devices that support LPM search operations using span prefix masks that encode key prefix length
A pipelined search engine supports a tree of search keys therein that utilizes span prefix masks to assist in longest prefix match (LPM) detection when the tree is searched. Each of a plurality of the span prefix masks encodes a prefix length of a search key to which the span prefix mask is associated and a value of another search key in the tree that is a prefix match to the search key to which the span prefix mask is associated.
Reconstruction of lists in a document
Some embodiments provide a method for analyzing a document that includes several primitive elements. The method identifies that a set of primitive elements include an implicit list in the document based on location and appearance of the set of primitive elements. The method defines the identified implicit list as an explicit list. The method stores the explicit list as a structure associated with the document.
Method and system for entitling a user device to receive content from data from an external source
An entitlement system and method of operating the same includes a file share storage and a file publisher that receives schedule data and generates a formatted file in a first format from the schedule data. The file publisher stores the formatted files in the file share storage. The entitlement system also includes an entitlement cache and a file processor communicating the formatted files from the file share storage to the entitlement cache. An authorization server receives an access request from a user device and accesses the formatted file. The authorization server compares a first content identifier from the formatted file to an authorized rights list for the user device and authorizes the user device to access the content in response to comparing.
Method and system for generating media recommendations in a distributed environment based on tagging play history information with location information
A computer-implemented method and system are provided for generating media recommendations in a media recommendation network. Aspects of the method and system include receiving by a server a plurality of play histories of media items from a plurality of users of devices, wherein at least a portion of the media items are tagged with corresponding time and location data indicating a time and location of play; receiving by the server a media recommendation request from a requester, including receiving seed information indicating a current location of the requester; using at least one of user preferences of the requester and the seed information to identify correlated users from which to search corresponding play histories from among the plurality of play histories; comparing the seed information to the corresponding play histories and generating a list of related media items contained therein; and returning the list of related media items to the requester.
Method and device for displaying message
A method and device for displaying messages including receiving messages, querying and acquiring a user message memory database corresponding to a sender user number according to the sender user number carried in the messages; combining the received messages according to a preset time strategy and the acquired user message memory database; and displaying the combined message. The amount of new messages displayed in a message receiving interface list can be increased, user's chat experience can be improved, and display screen utilization rate can be improved.
Method for searching objects in a database
The invention provides a method for searching objects in a database by means of an index data structure which associates object attribute values to collections of spatial elements—such as tiles of a quadtree or cuboids of an octtree—defined to partition a space, herein a predefined number of spatial elements being combinable to a next-level spatial element. The method comprising: searching the index data structure for a first input search pattern and, if the first input search pattern is associated to a first collection of spatial elements through the index data structure, including all spatial elements from the first collection into a first candidate set of spatial elements, wherein, if the number of spatial elements in the first candidate set exceeds a predetermined maximum, some or all of the spatial elements are combined to a reduced number of next-level spatial elements; searching the index data structure for a second input search pattern and, if the second input search pattern is associated to a second collection of spatial elements through the index data structure, including all spatial elements from the second collection into a second candidate set of spatial elements, wherein, if the number of spatial elements in the second candidate set exceeds a predetermined maximum, some or all of the spatial elements are combined to a reduced number of next-level spatial elements; forming, from of the first candidate set and the second candidate set, a combined candidate set of spatial elements; and searching, in the combined candidate set of spatial elements, for objects that match the first input search pattern and the input second search pattern to obtain a set of result objects.
Algorithmically choosing when to use branded content versus aggregated content
A method and apparatus for optimizing content on a topic page includes receiving a query for a topic at a topic page on a client and transmitting the query from the topic page on the client to a web application on a server. The web application includes algorithm to analyze the query to identify a plurality of content modules that match the query. The content modules are identified from anyone of a branded source or an un-branded source. One or more module performance indicators are computed for each of the identified content modules. An aggregate module performance indicator for each of the plurality of content modules is generated from the one or more computed module performance indicators. One or more content modules from the identified plurality of content modules are automatically selected for rendering on the topic page based on the aggregate module performance indicator associated with each of the identified content modules. The resulting topic page includes content modules from just the branded source, just the un-branded source or an aggregate of content modules from both branded source and un-branded source providing optimal content that is most relevant to the query.
Field extensibility for analytical reports
A system may include reception of an instruction to add an extension field to a node of a business object object model, identification of at least one multi-dimensional analytical view object model including a reference field referring to the node of the business object object model, determination of at least one report associated with the determined at least one multi-dimensional analytical view object model, reception of a selection of one of the at least one report, extension of the one of the at least one multi-dimensional analytical view object model associated with the report based on the extension field, and extension of the selected report based on the extension field.
Incorporating recency in network search using machine learning
In one embodiment, access a set of recency ranking data comprising one or more recency search queries and one or more recency search results, each of the recency search queries being recency-sensitive with respect to a particular time period and being associated with a query timestamp representing the time at which the recency search query is received at a search engine, each of the recency search results being generated by the search engine for one of the recency search queries and comprising one or more recency network resources. Construct a plurality of recency features from the set of recency ranking data. Train a first ranking model via machine learning using at least the recency features.
Semantically enriched search of services
A computer-implemented method for performing a semantically enriched search of services includes: receiving a search string that a user inputs for searching services in a repository; generating queries from the search string; searching a multi-document index using the generated queries, the multi-document index including, for each of the services, an index entry comprising documents interlinked with each other, each of the documents reflecting at least one aspect regarding the service; and presenting an outcome of the search to the user in response to receiving the search string.
Context transfer in search advertising
A computer-implemented method is disclosed for determining a type of landing page to which to transfer web searchers that enter a particular query, the method comprising: classifying a landing page as one of a plurality of landing page classes with a trained classifier of a computer based on textual content of the landing page; determining, by the computer, characteristics of one or more query to be associated with the landing page; and choosing, with the computer, whether to retain or to change classification of the landing page to be associated with the one or more query based on relative average conversion rates of advertisements on a plurality of manually-classified landing pages when associated with the characteristics of the one or more query.
Abstract query plan
A method and apparatus, and article of manufacture are provided to process an abstract query of a database abstraction constructed over an underlying physical data storage mechanism. The database may comprise a single data source, or a federated source spanning multiple systems. Embodiments of the invention process an abstract query by generating an intermediate representation of the abstract query. In one embodiment, the intermediate representation comprises an abstract query plan. An abstract query plan includes a combination of elements from the data abstraction model and elements relating to the underlying physical data storage mechanism. Once generated, a back-end component may easily traverse the abstract query plan to generate an SQL statement (or other resolved query) corresponding to the abstract query. Further, once constructed, the abstract query plan provides a platform for many different optimizations that may be selected by a user or by the runtime component inspecting the abstract query plan prior to creating the resolved query.
Query execution systems and methods
System, method and computer program product for processing a query are disclosed. Query processing includes partitioning the stored data into a plurality of partitions based on at least one vertex in the plurality of vertexes, storing at least another triple in the plurality of triples on the at least one node, assigning, based on the triple containing the at least one vertex, at least one partition in the plurality of partitions corresponding to the triple to at least one node in the plurality of nodes, and processing, based on the assigning, the query by processing the plurality of partitions.
Distributed search methods, architectures, systems, and software
Systems, methods, and software for providing a distributed search function for online delivery platforms used in law firms and other enterprises are described. For example, one aspect of the systems, methods and software provides a plurality of data sets. The data sets may comprise indices into other sets of data. At least one search engine is associated with each data set. A system receiving a search request determines which search engines are used to process the search request based on the data sets involved in the search request. The search request is then forwarded to the identified search engines.
Inverse search systems and methods
Inverse search systems and methods operate on identifiers of content items in a corpus such as the World Wide Web In an inverse search, the user submits a query that includes an identifier of a target content item in the corpus and receives information (metadata) about the target content item being returned to the user. Many types of metadata can be returned, including ratings or other metadata related to the target content item obtained from users, popularity data specific to the target content item, information about previously submitted forward search queries that led to the target content item being identified as a hit, and metadata extracted from the target content item.
Search engine and method with improved relevancy, scope, and timeliness
A search engine and a method achieve timeliness of documents returned in a search result by a relevancy feedback mechanism driven by the frequency in which a URL is returned in recent searches. The relevancy feedback mechanism includes one or more random processes which determine whether or not a cached or indexed web page associated with a URL in the search result should be refreshed. In addition, the random processes also determine whether or not hyperlinks in the cached or indexed web page should be followed to access related web pages. Accesses of web pages resulting from the operations of the random processes are used to update any document index maintained by the search engine. Relevancy scoring functions implemented in look-up tables are also disclosed. A more accurate relevancy scoring function is achieved using a lexicon based on anchortexts of extracted hyperlinks of web documents.
Structured test adherence management for manual data entry systems
A computer-implemented method is provided for managing manual entries of blood glucose measures for a patient in relation to a structured collection procedure managed by a portable computing device. The method includes: managing a structured collection procedure for a user of the computing device, where the structured collection procedure specifies one or more collection events for obtaining blood glucose measures for a patient; receiving a data entry for a blood glucose measure from the user of the computing device; evaluating the data entry in relation to the structured collection procedure using a membership rule set, where the membership rule set defines rules for associating data entries with structured collection procedures; and inputting the data entry into a logbook residing in a data store on the computing device. Depending upon the evaluation, the data entry may be input with or without an association to the structured collection procedure.
Method, apparatus and computer program product for providing improved data compression
An apparatus for providing improved data compression may include an encoder comprising a quantizer for encoding input data and a side model. The quantizer may be trained with respect to high priority data among the input data and may be configured to partially encode the input data by encoding the high priority data. The side model may be trained jointly with the training of the quantizer and is configured to model low priority data among the input data.
Backup simulation for backing up filesystems to a storage device
Embodiments are directed to methods and apparatus that backup filesystems to a storage device. A backup simulation is used to determine a number of agents to backup the filesystems.
Method and system for improving performance with single-instance-storage volumes by leveraging data locality
A method and system for improving performance with single-instance-storage volumes by leveraging data locality is provided. A client provides a set of fingerprints generated from data segments to be saved to a single-instance storage volume and receives the information on whether a data segment exists on the single-instance storage volume and where it is stored if a data segment exists. Based on its received information, the client determines if a number of non-sequential accesses of a computer-readable medium for the said set of segments from the single-instance-storage volume exceeds a predetermined threshold. If so, the client provides the whole set of data segments for storage within the single-instance storage volume regardless of whether or not the data segments are duplicate data segments. These sent data segments will be stored contiguously within the single-instance storage volume while the duplicates will be removed from their previous stored locations.
System and method for incrementally replicating investigative analysis data
A method of incrementally replicating investigative analysis data is disclosed along with a system for performing the same. The method and system provide the ability to break a data replication job into multiple “replication chunks” which can be exported and imported separately. By doing so, the method and system can efficiently replicate large numbers of data object changes over an unreliable data network.
Synchronization methods and systems
Synchronization architectures, methods, systems, and computer readable media are described. One exemplary embodiment includes a first software component configured to cause retrieval and storage of structured data for a first data class from a first store on a device, such as a first data processing system, and configured to synchronize structured data for the first data class in the first store with structured data of the first data class in a second store on a host, such as a second data processing system. The first software component is separate from an application software which provides a user interface to allow a user to access and edit the structured data. The first software component synchronizes the structured data through a second software component which interfaces with the host and the device and which controls an order of synchronizing and a plurality of data classes including the first data class.
Method for reorganizing or moving a database table
A computer system including instructions recorded on a non-transitory computer-readable storage medium and readable by at least one processor may include a table generator module, a table updater module, and a data replicator module. The table generator module may be configured to cause the at least one processor to generate a target table. The table updater module may be configured to cause the at least one processor to modify data in the target table synchronously with data being modified in a source table. The data replicator module may be configured to cause the at least one processor to replicate the data contained in the source table in the target table.
Systems and methods for remote deletion of contact information
An exemplary system for providing remote deletion of contact information includes a first device associated with a first user. The first device is configured to generate and send a delete request message to a second device. In some embodiments, the delete request message includes a request to delete contact information for the first user from the second device. The second device can be configured to receive the delete request message and delete the first user's contact information. A method for providing remote deletion of contact information includes a delete request message being generated at a first device, associated with a first user. The delete request message can include a request to delete contact information for the first user. The first device can send the delete request message to a second device. The delete request message can instruct the second device to delete the first user's contact information.
Controlled dispersion rates for transfer swarms
A method for data transfer in a data processing system, and corresponding system and machine-readable medium. One method includes receiving by the data processing system information relating to a data structure to be transferred, where the data structure includes a plurality of elements. Each element in the structure is linked to at least one other element in the structure. The method also includes selecting by the data processing system a group of the plurality of elements, the group including at most a predetermined maximum number of elements. The method further includes transferring by the data processing system the group of elements to a destination. The method also includes assigning by the data processing system the elements of the plurality of elements that are not in the group of elements to one or more substructures. At least one substructure is assigned two or more direct child nodes of transferred nodes. The method further includes recursively performing the steps of selecting, transferring and assigning concurrently on each of the substructures until all elements have been transferred.
Adaptive data model and warehouse palette
Systems, methods, and other embodiments associated with and\ adaptive data model and warehouse palette are provided. In one embodiment, a method includes providing a user interface for collecting item definition attributes from a user. A database structure is generated to store item data according to collected the item definition attributes. An extract, transform, and load (ETL) layer is generated to extract item data from user data, transform the extracted data for storing in the database structure, and load the transformed extracted data into the database structure.
Master data management in a data warehouse/data mart
A data warehouse incorporates processing for creating, managing, and otherwise maintaining master data. The data warehouse may communicate with a master data manager to obtain services for handling master data. A surrogate master data identifier may be defined by the data warehouse to reference the master data, thereby decoupling any modifications of the master data identifier that may be made by the master data manager. The data warehouse may export the master data to an application system, and conversely import master data from an application system.
Providing knowledge content to users
Systems, methods, and computer-storage media for generating and providing knowledge content to users utilizing a web architecture that integrates information across data silos through a common, flexible data storage schema, such as a star or snowflake schema, are provided. Data from a content graph, a user activity graph, a social graph, and temporal data as it relates to each of the content graph, the social graph and the user activity graph, is stored in a knowledge content database utilizing the star schema. In this way, data from each of these formerly disparate sources may be accessed from a common, extensible application platform utilizing ontologies and pivot table functionality, thus providing smarter, more comprehensive knowledge in response to received user queries.
Classification of digital content using aggregate scoring by a grid load balancer configured to assign content to different content analysis engines based on content identifications of a semantics processor
Aggregate scoring is used to help classify digital content such as content uploaded to multi-user websites (e.g., social networking websites). In one embodiment, specific categories are used that relate to a social implication of content. For example, text, images, audio or other data formats can provide communication perceived to fall into categories such as violent, abusive, rights management, pornographic or other types of communication. The categories are used to provide a raw score to items in various groupings of a site's content. Where items are related to other items such as by organizational, social, legal, data-driven, design methods, or by other principles or definitions, the related items' raw scores are aggregated to achieve a score for a particular grouping of items that reflects, at least in part, scores from two or more of the related items.
Method and system for automatically classifying and identifying vestibulo-ocular responses
Stabilizing the visual system for any sighted mobile system increases immunity of the mobile system's gaze and reduces information processing task complexity. Two human reflexes are the optokinetic reflex and vestibulo-ocular reflex (VOR). The VOR stabilizes retinal images during head movement by producing eye movements in the opposite direction. Improved analysis of the VOR in humans would improve the diagnosis/treatment of patients, provide improvements in visual prosthesis performance for patients, and also vision systems performance for mobile robotic systems. However, an important issue for prior art mathematical analysis techniques is the requirement to classify the nystagmus segments before applying any analysis techniques, wherein this classification should be preferably performed non-subjectively. Accordingly the inventors overcome these limitations by performing classification, i.e. segmentation of the data record into multiple modes (including possible artifacts or outliers), and identification of mode dynamics concurrently and objectively in a manner suitable for multi-input systems.
Generalized pattern recognition for fault diagnosis in machine condition monitoring
A generalized pattern recognition is used to identify faults in machine condition monitoring. Pattern clusters are identified in operating data. A classifier is trained using the pattern clusters in addition to annotated training data. The operating data is also used to cluster the signals in the operating data into signal clusters. Monitored data samples are then classified by evaluating confidence vectors that include substitutions of signals contained in the training data by signals in the same signal clusters as the signals contained in the training data.
Hacker-resistant balance monitoring
Methods of and systems for securely monitoring a balance of a payment account include storing, in a first database, ledger data and storing, in a second database, wallet data. Wallet data includes a wallet balance value for the payment account. When a transaction is initiated using the payment account, an access operation is performed on the wallet table. Illicit or improper modifications can be detected by deriving a ledger comparison value from the ledger data and comparing the derived ledger comparison value to a wallet comparison value from the wallet data.
License specific authorized domains
The enforcement of the distribution of content information is carried out in a way similar to that wherein the content rights are enforced. This is accomplished by means of making the description of the domain policy and configuration a functional part of the license under which content information is made available to a user.
Method and system to detect invalid and fraudulent impressions and clicks in web-based advertisement systems
This invention improves upon existing pay-per-click arrangements by periodically generating a code associated end users. This code, preferably in the form of a serial number, is compared to the end user of the website, such that by observing a metric like the number of clicks for a given period of time, be it a short time or a longer period, such as a day or a week, the system can automatically determine if certain clicks are illegitimate. This allows the pay-per-click company to more fairly invoice the merchants, thereby preventing fraudulent over use.
Program for resource security in a database management system
An inventive method is presented for resource security in a database management system having a plurality of resources, the method comprising creating a macro and a corresponding data section definition (DSECT) defining security for each resource, assembling all of the DSECTs into a load module, processing the load module to obtain source code, and assembling the source code, such that changing the source code of one resource modifies the defined security of the resource and adding new source code to the source code adds a new resource having security to the plurality of resources. The processing step can comprise loading the load module, reading a DSECT having a total number of resources, and, for each resource of the total number of resources, reading a next DSECT, finding the defined security in the next DSECT, and obtaining the source code associated with the defined security.
Robust payment settlements using distributed and potentially unreliable computer systems
Settlement transactions are processed on a distributed computer system. Settlement data describing a settlement request are received and stored in a settlement storage. The storage includes a request status field with a value describing the status of the settlement request. The settlement data are stored in a vendor file responsive to the value of the request status field. Data describing the vendor file are stored in a vendor file information storage. The vendor file information storage includes a file status field with a value describing the status of the vendor file. The vendor file is provided to a vendor for settlement processing responsive to the value of the file status field. The distributed computer system is able to detect and rectify errors in the distributed computer system by using the request status and file status fields, which allows the distributed computer system to be comprised of conventional computers.
Mobile product detecting system and method therefor
The invention relates to a system for detecting products, comprising a plurality of portable reading devices, wherein each customer can be assigned at least one portable reading device by means of which identification data about the products to be purchased by the respective customer in a sales room can be detected irrespective of location, and wherein the portable reading device has a control unit and a memory for buffering the identification data.
This specification describes technologies relating to content presentation. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of sending one or more redeemable content items to a user, each content item being configured for redemption at a physical retail location; receiving a request from the user to redeem a content item of the one or more content items at a particular physical retail location; validating, using one or more processor, the content item for redemption; if the content item is valid for redemption, notifying a corresponding retailer of the content item redemption to be applied to a pending retail transaction; and logging the redemption. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products.
Visual workflow process notation and layout
In a method of a technology for visual workflow process notation and layout, a workflow process graphical user interface is generated. A plurality of activity nodes is arranged along a workflow path, with each activity node representing a work activity. The activity nodes are arranged on the workflow path in representation of an order of performance of work activities within the process of performing work. A material flow path is arranged adjacent to the workflow path. The material flow path is representative of a flow of a material through the work activities associated with the plurality of activity nodes. A resource allocation node is disposed adjacent to a portion of the material flow path and one of said activity nodes. The resource allocation node represents a resource utilized in performing a work activity, represented by the adjacent activity node, upon a material represented by the portion of the material flow path.
Method and system for online user feedback on websites and software
A system for collecting and analyzing structured user feedback on websites, the system including website user structured feedback form generation functionality operative to generate structured feedback forms for providing website user feedback on website user interaction with a website-based process and website user feedback analyzing functionality operative to automatically collect and analyze website user feedback entered in the structured feedback forms and to provide at least one analysis report based on feedback from a multiplicity of website users.
System and method for voice authentication over a computer network
Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, transmitting an authentication request to an authentication server, which compares the speech sample to a previously established speech profile associated with the user, receiving a response from the authentication server, and providing access to the restricted access resource based on the response.
Voice interactive service system and method for providing different speech-based services
A voice interactive service system provides different speech-based services to a plurality of users. Using a communication terminal, the services are accessed via a telecommunication network through service-specific connectivity ports. The system comprises processing cores which have different configurations of speech processing resources for performing different services. For performing a requested service, a connection module establishes a connection between the respective connectivity port and a processing core having a configuration of speech processing resources suitable for performing the requested service. Because of the service-specific resourcing of cores, there is no need for requesting and allocating processing resources from external resource servers. Moreover, the port-dedicated resourcing of the cores ensures that a successful access to a connectivity port leads to a successful provision of the requested service.
Using speech recognition results based on an unstructured language model in a mobile communication facility application
A method and system for entering information into a software application resident on a mobile communication facility is provided. The method and system may include recording speech presented by a user using a mobile communication facility resident capture facility, transmitting the recording through a wireless communication facility to a speech recognition facility, transmitting information relating to the software application to the speech recognition facility, generating results utilizing the speech recognition facility using an unstructured language model based at least in part on the information relating to the software application and the recording, transmitting the results to the mobile communications facility, loading the results into the software application and simultaneously displaying the results as a set of words and as a set of application results based on those words.
Prosody generation using syllable-centered polynomial representation of pitch contours
The present invention discloses a parametrical representation of prosody based on polynomial expansion coefficients of the pitch contour near the center of each syllable. The said syllable pitch expansion coefficients are generated from a recorded speech database, read from a number of sentences by a reference speaker. By correlating the stress level and context information of each syllable in the text with the polynomial expansion coefficients of the corresponding spoken syllable, a correlation database is formed. To generate prosody for an input text, stress level and context information of each syllable in the text is identified. The prosody is generated by using the said correlation database to find the best set of pitch parameters for each syllable. By adding to global pitch contours and using interpolation formulas, complete pitch contour for the input text is generated. Duration and intensity profile are generated using a similar procedure.
Systems and methods for text-to-speech synthesis using spoken example
Systems and methods for speech synthesis and, in particular, text-to-speech systems and methods for converting a text input to a synthetic waveform by processing prosodic and phonetic content of a spoken example of the text input to accurately mimic the input speech style and pronunciation. Systems and methods provide an interface to a TTS system to allow a user to input a text string and a spoken utterance of the text string, extract prosodic parameters from the spoken input, and process the prosodic parameters to derive corresponding markup for the text input to enable a more natural sounding synthesized speech.
System and method for delivering targeted advertisements and tracking advertisement interactions in voice recognition contexts
The system and method described herein may use various natural language models to deliver targeted advertisements and track advertisement interactions in voice recognition contexts. In particular, in response to an input device receiving an utterance, a conversational language processor may select and deliver one or more advertisements targeted to a user that spoke the utterance based on cognitive models associated with the user, various users having similar characteristics to the user, an environment in which the user spoke the utterance, or other criteria. Further, subsequent interaction with the targeted advertisements may be tracked to build and refine the cognitive models and thereby enhance the information used to deliver targeted advertisements in response to subsequent utterances.
Displaying text and direction of an utterance combined with an image of a sound source
An information processing device includes a display data creating unit configured to create display data including characters representing the content of an utterance based on a sound and a symbol surrounding the characters and indicating a first direction, and an image combining unit configured to determine the position of the display data based on a display position of an image representing a sound source of the utterance, and to combine the display data and the image of the sound source so that an orientation in which the sound is radiated is matched with the first direction.
Method and device for the objective evaluation of the voice quality of a speech signal taking into account the classification of the background noise contained in the signal
A method and device are provided for the objective evaluation of voice quality of a speech signal. The device includes: a module for extracting a background noise signal, referred to as a noise signal, from the speech signal; a module for calculating the audio parameters of the noise signal; a module for classifying the background noise contained in the noise signal on the basis of the calculated audio parameters, according to a predefined set of background noise classes; and a module for evaluating the voice quality of the speech signal on the basis of at least the resulting classification relative to the background noise in the speech signal.
Speech recognition system to evaluate speech signals, method thereof, and storage medium storing the program for speech recognition to evaluate speech signals
A purpose is to suppress recognition process delay generated due to load in signal processing. Included is a speech input means 10 that inputs a speech signal, an output evaluation means 20 that evaluates whether or not the speech signal input by the speech input means 10 is the speech signal in a sound section, which is a speech section assuming that a speaker is speaking, and outputs the speech signal as a speech signal to be processed only when evaluated as the speech signal in the sound section, a signal processing means 30 that performs signal processing to the speech signal, which is output by the output evaluation means 20 as the speech signal to be processed, and a speech recognition processing means 40 that performs a speech recognition process to the speech signal which is signal-processed by the signal processing means 30.
System and method of dictation for a speech recognition command system
In embodiments of the present invention, a system and computer-implemented method for enabling dictation may include parsing standard reports in order to identify a plurality of logical phrases in the report used for discrete sections and descriptions. In the report method, the phrases may be parsed and identifier words throughout the report may be compared to eliminate ambiguities. The method may then involve constructing text macros that follow the parsed text, thereby enabling the user to speak the identifiers to indicate full, formatted text. Finally, the report method may involve constructing a mnemonic document so both beginner and experienced users can easily read the identifiers out loud to produce a report. The result of the method is an intuitive, notes-style way to use speech commands to quickly produce a standard, formatted report.
Trust scoring for language translation systems
Systems and methods for generating trust scores for translations are described herein. According to some embodiments, methods for generating a trust score for a translation may include establishing a trust score for at least a portion of a first translation of a source text translated by a trusted translation system, the trust score representing an accuracy level for the first translation, comparing the first translation of the source text generated by the trusted translation system to a second translation of the source text generated by an untrusted translation system, and determining a trust score for the second translation based upon the comparison.
Machine translation split between front end and back end processors
A method of translation includes uploading a source text portion to a back end processor. The back end processor identifies a subset of translation knowledge associated with the source text portion. The back end processor downloads the subset to a front end processor. A translation engine runs on the front end processor. The translation engine generates a translation of the source text portion as a function of the subset.
Systems and methods for modeling and triggering safety barriers
Modeling and triggering safety barriers. At least some of the illustrative embodiments are a non-transitory machine-readable storage medium includes executable instructions that, when executed, cause one or more processors to model, using one or more models, safety barriers in one or more drilling rigs based on drilling rig safety barrier data. The processors are further caused to identify, based on the one or more models, a first impending invalidation of a first safety barrier. The processors are further caused to initialize, triggered solely by the instructions, a second safety barrier based on the impending invalidation.
Determining dipper geometry
Determining dipper geometry. A method of determining dipper geometry includes obtaining a first set of data associated with an industrial machine for a first orientation of the industrial machine, and obtaining a second set of data associated with the industrial machine for a second orientation of the industrial machine. The first set of data includes at least one of a first length associated with a hoist rope and a first angle associated with the hoist rope, and the second set of data includes at least one of a second length associated with the hoist rope and a second angle associated with the hoist rope. The value of the physical characteristic of the dipper is then determined based on the first set of data and the second set of data.
Bridge fault removal apparatus, bridge fault removal method, and computer readable medium comprising computer program code for removing bridge fault
A bridge fault removal apparatus includes a bridge fault extraction unit configured to extract a bridge fault from layout information of a semiconductor integrated circuit, a test pattern generator configured to generate the test pattern aiming at the bridge fault extracted by the bridge fault extraction unit, a logical value information calculator configured to calculate logical value information of all the signals in the semiconductor integrated circuit by applying the test pattern generated by the test pattern generator to logical connection information of the semiconductor integrated circuit, and a bridge fault remover configured to select an exchange signal candidate for an undetected bridge fault signal corresponding to the test pattern based on the logical value information calculated by the logical value information calculator.
Device and method for testing APD measuring device
To accurately test the operating state of the APD measuring device. A test device 40 includes a test signal generator 41 that generates a test signal corresponding to the center frequency of a signal to be measured and a control unit 42 that variably controls the amplitude level of a test signal in the dynamic range of an APD measuring device 1 at random, in order to test the operating state of the APD measuring device 1.
Predictive and internet-based sampler control
Described is a system for remotely monitoring water quality at one or more locations via a web-enabled application. Embodiments of the present invention provide remote water sampler control with integrated predictive sampling. In some embodiments, the present invention provides a web-hosted application that allows for remote user control of one or more water samplers in combination with predictive sampling.
Reliability calculation for Substation Automation systems
A method and device automatically extract, to a maximum extent, reliability-relevant information from a Substation Configuration Description (SCD) file describing an electric power transmission or distribution substation. The information in the SCD file is used to identify the physical topology of a communication network of a Substation Automation (SA) system, and all dataflow relating to a given SA functionality or Logical Node (LN). An LN reliability measure for the latter is calculated, involving reliability indications specific to each element or device participating in the dataflow. A number of LN reliability measures are consolidated to produce an overall reliability for the SA system architecture or communication network topology. The method and tool minimize the engineering effort required to perform a reliability calculation, and thus allow comparing the reliability of different SA architectures with minimal effort and intervention of a reliability engineer.
Method for determining a condition indicator of an apparatus
A method for determining a condition indicator of an apparatus includes providing an apparatus configured to measure at least two different technical parameters. A respective parameter value is determined for each of the at least two different technical parameters of the apparatus using at least one sensor configured to determine a respective parameter value for each of the at least two different technical parameters. A respective deviation value is determined for each of the parameter values with respect to an associated respective parameter reference value for each of the technical parameters. A respective deviation relevance value is determined from each of the deviation values using a respective parameter-specific deviation relevance function for each of the parameter values, the parameter-specific deviation relevance functions being different from each other. Using an indicator function, a condition indicator is calculated from the determined deviation relevance values. An overall condition of the apparatus is determined using the condition indicator.
Rotation sensing method and system
A sensing system and method. A coded wheel is configured to generate a signal that varies with rotation of the coded wheel. A sensor is configured to sense the varying signal and output a corresponding signal. A correction module is configured to receive the signal output by the sensor and compare the received signal to a stored signal and detect a defect in the coded wheel in response to the comparison.
Implantable tissue perfusion sensing system and method
A medical device for sensing cardiac events that includes a plurality of light sources capable of emitting light at a plurality of wavelengths, and a detector to detect the emitted light. A processor determines a plurality of light measurements in response to the emitted light detected by the detector, updates, for each of the plurality of wavelengths, a first normalization coefficient and a second normalization coefficient in response to the detected emitted light, and adjusts the determined plurality of light measurements in response to the first normalization coefficient and the second normalization coefficient.
Systems, methods, and software for providing wayfinding orientation and wayfinding data to blind travelers
To support the independence and mobility of blind pedestrians, the present inventors devised, among other things, free systems, methods, and software for providing narrative blind-ready wayfinding information. One exemplary system receives user input identifying a starting landmark and ending landmark in a particular selected geographic region, such as a city, university campus, government building, shopping mall, or airport. The system then searches a database for the corresponding narrative wayfinding instructions, and outputs them in the form of text or audio to guide a blind pedestrian from the starting landmark to the ending landmark. In the exemplary system, blind users select the geographic region as well as the starting and ending landmark from a voice-driven telephonic menu system and receive audible wayfinding instruction via mobile telephone, in some embodiments, the system also provides access to voice-driven restaurant menus.
Method for validating inland barrier crossing in a digital map
A method for detecting inland barrier (16, 16′) crossings (24, 26, 30) using speed layers from community input probe traces in combination with a digital map. Inland barrier crossing specifications are detected and/or validated using information about the speed of probes that actually cross the barrier (16, 16′). A bridge (26) across the inland barrier (16) is inferred if the velocity average for barrier crossing probe traces is greater than an established threshold value. Conversely, a ferry (24) is inferred if the average velocity for barrier crossing probe traces is less than the established threshold value. When there is a prominent gap in the data for the barrier crossing probe traces, a tunnel (30) is inferred.
Mobile terminal, system and method
One aspect of the present invention relates to a mobile terminal having an autonomous navigation function, including an anchor management unit configured to acquire a directional change point, set the acquired directional change point as an anchor point and store the anchor point, wherein the directional change point is assumed for a user to change direction on a route from a departure point to a destination point of the user of the mobile terminal on map information, a measurement unit configured to detect movement of the mobile terminal and provide sensor information indicative of the movement, a position calculation unit configured to calculate a current position of the mobile terminal based on the sensor information, a rotation detection unit configured to detect rotation of the user based on the sensor information and determine a rotation point associated with the detected rotation and a current position correction unit configured to determine an anchor point corresponding to the determined rotation point from the anchor points stored in the anchor management unit and correct the current position of the mobile terminal with a position of the determined anchor point.
Hearing device providing spoken information on the surroundings
A navigation system includes a hearing device configured to be head worn and having loudspeakers for emission of sound towards ears of a user; a GPS unit for determining a geographical position of the system; a sound generator connected for outputting audio signals to the loudspeakers; and a processor configured for selecting Points-Of-Interest in a vicinity of the system, and controlling the sound generator to output the audio signals that represents spoken information on the selected Points-Of-Interest in sequence.
Calibrated hardware sensors for estimating real-world distances
In some embodiments, methods and systems are provided for assisting a user in determining a real-world distance. Hardware-based sensors (e.g., present in a mobile electronic device) may allow for a fast low-power determination of distances. In one embodiment, one or more telemetry-related sensors may be incorporated into a device. For example, data detected by a frequently-calibrated integrated accelerometer may be used to determine a tilt of the device. A device height may be estimated based on empirical data or based on a time difference between a signal (e.g., a sonar signal) emitted towards the ground and a corresponding detected signal. A triangulation technique may use the estimated tilt and height to estimate other real-world distances (e.g., from the device to an endpoint or between endpoints).
Fuel efficiency ranking method for vehicle driver and system therefor
Disclosed is a technique for ranking a driver's fuel efficiency among other drivers based on various variables associated with the environment in which the vehicle is being driven. More particularly, the present invention, selects, as a category, one or more factors affecting fuel efficiency, and, as one or more, variables another one or more. Vehicle data is then collected by a communications device which is associated with a particular trip. Next an average of the fuel efficiencies and an average of the variables for the trip are calculated accordingly the selected one more categories. The fuel efficiency of the trip corresponding to a same category for every coordinate point of the variable is then statistically processed to calculate the average of the fuel efficiency and the standard deviation of the fuel efficiency and regularized (processed as a GAP calculation) to determine the ranking of a vehicle driver.
Method and system for reducing turbo lag in an engine
A method and control module for controlling an engine includes a requested torque module that generates a requested torque and a turbo boost level module that determines a desired boost level based on the driver requested torque. The control module further includes a pulse determination module that determines a primary fuel injection pulsewidth and a secondary fuel injection pulsewidth based on the driver requested torque and the desired boost level and controls a first injection into the cylinder with the primary fuel injection pulsewidth and a second injection into the cylinder with the secondary fuel injection pulsewidth.
Method for the control and regulation of an internal combustion engine
Disclosed is a method for the control and regulation of an internal combustion engine (1), comprising an independent common rail system on the A-side and an independent common rail system on the B-side. During normal operation, the rail pressure (pCR(A), pCR(B)) is controlled in each common rail system via a low pressure-side suction throttle (4A, 4B) as the first pressure-adjusting element in a rail pressure control loop and, at the same time, the rail pressure (pCR(A), pCR(B)) is subjected to a rail pressure disturbance variable via a high pressure-side pressure control valve (11A, 11B) as a second pressure-adjusting element, by means of which a pressure control valve volume flow is redirected via the high pressure-side pressure control valve (11A, 11B) from the rail (6A, 6B) into a fuel tank (2). The method is characterized in that a first emergency operation is implemented for the common rail system in question when a defective rail pressure sensor (8A, 8B) and a non-defective pressure control valve (11A, 11B) have been detected in said common rail system, while a second emergency operation is implemented for the common rail system in question when a defective rail pressure sensor (8A, 8B) and simultaneously a defective pressure control valve (11A, 11B) have been detected in said common rail system, and wherein the normal operation is implemented for the other, non-defective common rail system.
Cruise control method
A method of controlling an engine in a motor vehicle includes opening a throttle to an increased angle when conditions for fuel cut cycling are met. More specifically, when cruise control is on, the motor vehicle is moving downhill, and the current speed drops below a target speed, the engine control unit may choose to increase the angle of the throttle while maintaining fuel cut. Under other interrupting events, the engine control unit may choose to resume fueling control or reduce the throttle angle.
Apparatus and method for controlling a vehicle
In vehicle running control that, at the time of controlling driving force, determines whether an operating speed that is a speed at which a driver operates an accelerator operator (10) is higher than or equal to a threshold and that changes details of control over the driving force on the basis of a result of the determination, the threshold is set on the basis of operation information, other than the operating speed of the accelerator operator (10), within information related to operation of the accelerator operator (10). In the vehicle running control, at the time of controlling the driving force, details of control over the driving force are changed on the basis of the operating speed that is the speed at which the driver operates the accelerator operator (10) and a stroke amount that is an operation amount of the accelerator operator (10) when the driver has operated the accelerator operator (10).
Oil pressure control device of automatic transmission
An oil pressure control device includes: line pressure adjusting means for adjusting the line pressure; line pressure switching means for switching, in two stages, the line pressure adjusted by the line pressure adjusting means; a linear solenoid valve that adjusts a required oil pressure for engaging frictional engagement elements with one another by engagement force, which is required thereby, by adjusting a pressure of hydraulic oil with the line pressure; and control means for controlling a value of a current supplied to the linear solenoid valve. The control means performs control to differentiate the value of the current, which is supplied to the linear solenoid valve in order to adjust (obtain) the same required oil pressure, in response to the line pressure switched by the line pressure switching means.
Power-assisted bicycle with a gear shift smoothening function
A power-assisted bicycle includes a bicycle body with a power assistance provider and a derailleur, a microcomputer, a gear-shift control driver, and sensors. When the microcomputer decides to perform gear shifting, it controls the power assistance provider to provide an assistant power output and the gear-shift control driver to drive the derailleur to shift gears properly subject to a before-shifting time period, an in-shifting time period and an after-shifting time period. Further, the microcomputer controls the power assistance provider to change the current assistant power to a predetermined low assistant power during the before-shifting time period, or to maintain the predetermined low assistant power during the in-shifting time period, or to change the assistant power output to a level higher than the current assistant power and then to return to the said current assistant power after the end of the after-shifting time period.
Bicycles with electronic shifting systems and methods
Electronic shifting systems, mechanisms and methods of using the systems to operate a bicycle that allows front and rear gear changer mechanisms to be controlled with only two switches. The switches can be arranged so that each hand is only required to operate one switch to shift the bicycle.
System implementing parallel lift for range of angles
A hydraulic system is disclosed. The hydraulic system may have a pump, a lift actuator, a lift valve arrangement, a tilt actuator, a tilt valve arrangement, and a tilt angle sensor configured to generate a first signal. The hydraulic system may further have at least one operator interface device movable to generate a second signal indicative of a desired lift velocity and a third signal indicative of desired tilt velocity, and a controller. The controller may be configured to command the lift valve arrangement to meter pressurized fluid based on the second signal, command the tilt valve arrangement to meter pressurized fluid based on the third signal and, when the first signal indicates that the actual tilt angle has entered a specified range of tilt angles during lifting, command the tilt valve arrangement to meter pressurized fluid based on the second signal as the actual tilt angle remains within the specified range.
Seat apparatus for vehicle
A seat apparatus for a vehicle, includes a main support control means for moving a side support portion inwardly and outwardly by means of a driving portion depending on a road shape, a support control means for operating the side support portion on the basis of an electronic map data before the vehicle reaches a curve starting point, a distance calculating means for calculating distance between an intersection and the curve starting point on the basis of the electronic map data, the intersection and the curve starting point, a determining means for determining whether or not control of the support control means is executed on the basis of the calculated distance and electronic map data accuracy, a means for executing the control of the support control means on the basis of determination of the determining means, and a means for refraining the control of the support control means.
Checking method implemented by a steering system regulating function
Checking method implemented by a function that automatically checks a steering system (1) of a motor vehicle comprising a steering wheel (4) to operate a powered system (20) that turns the wheels (10) under certain specific conditions of operation of this vehicle, this checking method calculating a reference steering wheel angle (Av cons) to provide torque control of the power system (20), characterized in that it additionally calculates a steering wheel rate of turn reference (Av cons) which is saturated at a predefined value (Avp target).
Steering wheel input device having gesture recognition and angle compensation capabilities
A steering wheel input device is mounted on a vehicle steering wheel and includes a pointer detection device detecting a pointer event on a pointer detection surface, any movement or breaking of the pointer event, and the speed, velocity, and acceleration of the pointer event, and outputs a corresponding pointer detection signal. The steering wheel input device also includes a rotation angle sensor and a processor. The rotation angle sensor takes measurements related to an angle of rotation of the steering wheel and outputs a corresponding rotation detection signal. The processor determines the angle of rotation of the steering wheel using the rotation detection signal, determines which gesture that the pointer detection signal corresponds to using the pointer detection signal and the angle of rotation of the steering wheel, and outputs a command corresponding to the gesture. The command can serve as input to control vehicular systems.
Driver assistance system for a vehicle
A driver assistance system for a vehicle includes a display screen disposed within an interior cabin of the vehicle and a camera disposed at the vehicle and having a rearward field of view. The display screen displays video information captured by the camera for assisting the driver during a reversing maneuver. When the vehicle is not executing a reversing maneuver, the information display screen is operable to display information wirelessly communicated to the vehicle from a remote communication system. The information from the remote communication system may include traffic information or traffic related information, such as traffic flow, congestion, stalled vehicle or accident information, alternate routes for the vehicle, and/or traffic information derived from sensors or signs positioned along the road that the vehicle is traveling or on other roads near or associated with that road. The remote communication system may include a highway/road management monitoring system.
Methods, devices, and mediums associated with managing vehicle maintenance activities
A method, device, and/or medium associated with managing vehicle maintenance activities may include monitoring data associated with an operating condition of a particular vehicle and updating historic operational data associated with the particular vehicle based on the data associated with the operating condition of the particular vehicle. The updated historic operational data may be updated with a predetermined maintenance standard associated with a substantially similar type of vehicle and a maintenance recommendation may be generated based, at least in part, on a result of the comparing.
Method of providing directions to a vehicle service facility
A method of providing directions to a vehicle service facility includes generating a vehicle service alert that includes vehicle operating data, sending the vehicle service alert to a vehicle telematics service subscriber, offering the vehicle telematics service subscriber a choice of one or more vehicle service facilities for responding to the vehicle service alert, and if the vehicle owner chooses a vehicle service facility, providing turn-by-turn directions to the chosen vehicle service facility.
Estimating multi-vehicle motion characteristics by finding stable reference points
A computing device may identify an object in an environment of a vehicle and receive a first three-dimensional (3D) point cloud depicting a first view of the object. The computing device may determine a reference point on the object in the first 3D point cloud, and receive a second 3D point cloud depicting a second view of the object. The computing device may determine a transformation between the first view and the second view, and estimate a projection of the reference point from the first view relative to the second view based on the transformation so as to trace the reference point from the first view to the second view. The computing device may determine one or more motion characteristics of the object based on the projection of the reference point.
Automated systems, devices, and methods for transporting and supporting patients
Systems, devices, and methods are described for moving a patient to and from various locations, care units, etc., within a care facility. For example a transport and support vehicle includes a body structure including a plurality of rotatable members operable to frictionally interface the vehicle to a travel path and to move the vehicle along the travel path, and a surface structured and dimensioned to support an individual subject. A transport and support vehicle can include, for example, an imager operably coupled to one or more of a power source, a steering assembly, one or more of the plurality of rotatable members, etc., and having one or more modules operable to control the power source, steering assembly, one or more of the plurality of rotatable members, etc., so as to maintain an authorized operator in the image zone.
An electric vehicle includes a slip ratio estimator that estimates a slip ratio based on rotational frequencies of respective driven and drive wheels. The vehicle also includes a disturbance observer that determines an estimate of a torque attributable to external force. The vehicle also includes an estimator that may estimate an entire torque to the drive wheel, based on a motor torque command value and the estimate of torque. The vehicle also includes an estimator that estimates a coefficient of friction between a road surface and a tire, based on the entire torque and the slip ratio. The vehicle also includes a determiner that determines a maximum acceptable torque Tmax, based on the coefficient of friction and a vertical load component. Torque limitation is performed such that the motor torque command value does not exceed the maximum acceptable torque Tmax.
Thin safe vehicle whose solar array can supply its power needs
This device is an ultra-thin vehicle where no more than twenty five percent of its solar array extends beyond the vehicle when it is being driven and the solar array is undeployed. However, this same solar array will cover an area at least twice as large as the vehicle and approximately the same size as a parking space when the array is fully deployed. This solar array is also designed to make it possible to easily orient it towards the sun during the majority of time when it is parked. Hence, solar power can be the primary source of power for a typical driver due to the lowered power needs of this tapered ultra thin vehicle.
Drive force output apparatus for vehicle
An engine shaft of an engine, rotatable shafts of two motor generators and a drive force output shaft are interconnected with each other through a drive force transmission arrangement. When a torque of one of the motor generators is limited, an ECU computes a torque correction amount of the other one of the motor generators in a manner that limits at least one of a change in a torque of the engine shaft, a change in a torque of the drive force output shaft and a change in an output of a battery based on a torque limit amount of the one of the motor generators and corrects the torque of the other one of the motor generators with the computed torque correction amount.
System and method for assisting in the decking of an aircraft
The present invention relates to a system and a method for assisting in the decking of an aircraft on a platform, more particularly on a mobile platform comprising a decking surface, said aircraft comprising a signal transmitter, the system comprising means for determining flight commands to be executed by the aircraft, said means being at least fed by locating means of the aircraft and by means of predicting movements of the platform, the locating means comprising at least two passive sensors, spaced apart, fixed in proximity to the decking surface and able to receive the signals transmitted by the aircraft. The invention applies notably to the decking of rotary wing craft and autonomous aircraft on ships.
Simplified flight control system including a declutchable friction device
The present invention relates to a friction device (11) for maintaining a control member (2, 8) in a determined position. The device comprises a contact part (16) movable between a declutched stable position and a clutched stable position, and vice versa. The clutched stable position corresponds to a position in which the contact part (16) bears against the control member (2, 8) in such a manner as to establish a determined friction force. An electromechanical drive means moves the contact part (16) between the two stable positions. The device includes remote control means for activating and deactivating the drive means.
Vehicle and method for advising driver of same
A method for advising a driver of a vehicle may include monitoring driver torque requests, establishing categories of driver behavior based on a history of driver torque requests and associated rates of change thereof, categorizing current driver behavior into one of the established categories based on current driver torque requests and associated rates of change thereof, and initiating an alert for the driver if the categorization is of a particular type.
Energy storage and power management system
A system to manage the storage of energy to, and the release of energy from, an energy storage system with such energy being generated from one or more renewable sources of energy, traditional sources of energy or the electric grid, or a combination of any or all of these sources, resulting in a reduction of the power demand from the electric grid of a user of the system and/or of the high consumption charges during peak usage times of a user of the system.
Energy decision management system
An energy decision management system manages, controls, or manipulates data to monitor, measure, or control one or more energy systems. The EDMS includes at least three modules or systems working together to manage the information needed for a user to render decisions as to which energy system to operate, in which the desire is to minimize costs. The EDMS includes a budget/forecast module, a scheduling module, and a performance module. The budget module creates a strategic energy decision plan to run various energy systems. The scheduling module creates an operational schedule to determine which energy system is best to operate based on predetermined criteria. The performance module produces management reports to quantify operational issues and successes.
Motor velocity control apparatus and method
A motor velocity control apparatus and method in which the velocity of a motor to drive a joint of a robot is controlled. The method includes generating a velocity profile of the motor based on velocity profile generation data received from a user; judging whether one velocity section selected from velocity sections divided from the generated velocity profile corresponds to a high velocity region, where the high velocity region corresponds to an acceleration compensation section in which an acceleration section transitions to a constant velocity section; estimating an acceleration corresponding to the current velocity of the motor, upon judging that the velocity section corresponds to the high velocity region, the acceleration corresponding to the current velocity is estimated using an acceleration-velocity graph in the acceleration compensation section or a deceleration compensation section; compensating for the velocity profile using the estimated acceleration; and driving the motor using the compensated velocity profile.
Robot controller and robot system
A robot controller includes an input unit that receives operation instruction information, a database that stores grasp pattern information, and a processing unit that performs control processing based on information from the input unit and information from the database, and the input unit receives first to N-th operation instructions as operation instruction information, the processing unit loads i-th grasp pattern information that enables execution of the i-th operation instruction and j-th grasp pattern information that enables execution of the j-th operation instruction as the next operation instruction to the i-th operation instruction from the database, and performs control processing based on the i-th grasp pattern information and the j-th grasp pattern information.
Reinforcement learning apparatus, control apparatus, and reinforcement learning method
It is possible to perform robot motor learning in a quick and stable manner using a reinforcement learning apparatus including: a first-type environment parameter obtaining unit that obtains a value of one or more first-type environment parameters; a control parameter value calculation unit that calculates a value of one or more control parameters maximizing a reward by using the value of the one or more first-type environment parameters; a control parameter value output unit that outputs the value of the one or more control parameters to the control object; a second-type environment parameter obtaining unit that obtains a value of one or more second-type environment parameters; a virtual external force calculation unit that calculates the virtual external force by using the value of the one or more second-type environment parameters; and a virtual external force output unit that outputs the virtual external force to the control object.
Satisfying a request for a physical import/export slot with a slot that is not a physical import/export slot
A request for a physical import/export (I/E) slot is satisfied using a tape library slot that is not a physical I/E slot. According to one embodiment, the request for the physical I/E slot, that is associated with the tape library, is received. A different slot, which is not any of the physical I/E slots associated with the tape library, is used to satisfy the request.
Machine for assembling vehicles and methods of assembling vehicles
A machine for use in assembling a vehicle is described herein. The vehicle includes at least a first component and a second component adapted to be coupled to the first component to form a component assembly. The machine includes at least one component tooling apparatus that is configured to selectively adjust an orientation of the second component with respect to the first component. A control system is coupled to the at least one component tooling apparatus. The control system includes a processor that is configured to receive a unique vehicle identifier associated with the component assembly, and determine a design orientation of the second component with respect to the first component based at least in part on the received unique vehicle identifier.
System for providing audio recordings
Disclosed systems provide audio recordings from digital television provider networks. Audio recordings are streamed to a customer premises equipment device of a user and, in response to user input, an identifier for the audio recording is transmitted to a music provider. A copy of the audio recording is delivered to a user designated device.
Nerve cuff with pocket for leadless stimulator
An extravascular nerve cuff that is configured to hold a leadless, integral, implantable microstimulator. The nerve cuff may include a cuff body having a pocket or pouch for removably receiving the implantable device within. The nerve cuff can be secured around the nerve such that the electrodes of the device are stably positioned relative to the nerve. Furthermore, the nerve cuff drives the majority of the current from the stimulation device into the nerve, while shielding surrounding tissues from unwanted stimulation.
Multi-durometer reinforced suture sleeve
A suture anchor for securing a therapy delivery element in a desired location within a living body using a suture material. The suture anchor includes an inner sleeve with a primary lumen sized to receive the therapy delivery element. The inner sleeve includes a compliant material having a first durometer. An anchor body extends around at least a portion of the inner sleeve and includes a portion of the primary lumen. The anchor body includes a compliant material having a second durometer less than the first durometer. At least one exterior suture groove is located on the anchor body to receive the suture material. The exterior suture groove extends substantially to the inner sleeve so the suture material engages directly with the inner sleeve.
Systems, methods, and devices using stretchable or flexible electronics for medical applications
System, devices and methods are presented that integrate stretchable or flexible circuitry, including arrays of active devices for enhanced sensing, diagnostic, and therapeutic capabilities. The invention enables conformal sensing contact with tissues of interest, such as the inner wall of a lumen, a nerve bundle, or the surface of the heart. Such direct, conformal contact increases accuracy of measurement and delivery of therapy.
Self-affixing external charging system for an implantable medical device
An external charging system for charging or powering an implantable medical device is disclosed which is self-affixing to the patient without the need for a holding device. The charging system can comprise two modules attached to opposite ends of a flexible member. The flexible member is bendable, and when bent will firmly hold its position on the patient. The two modules can comprise a coil module containing a charging coil, and an electronics module including a user interface and the necessary electronics for activating the charging coil to produce a magnetic charging field. Wires can couple the charging coil in the coil module to the electronics in the electronics modules. The entire assembly can be encased in a water proof sleeve having a high-friction surface, which protects the charging system and helps the charging system to adhere to the patient.
Visualizing tissue activated by electrical stimulation
A visualization of an area or volume of tissue activated during stimulation according to a set of stimulation parameters is generated. The area or volume of activation is modeled based on a non-uniform grid of model neurons. Select portions of the grid have the model neurons more closely spaced, resulting in finer resolution graphical representation, while less closely spaced model neurons in other portions of the grid may avoid additional computation time.
Apparatus and methods for percutaneous cochlear implantation
A method and apparatus of percutaneous cochlear implantation (PCI). In one embodiment, the method includes the steps of (a) implanting a plurality of anchor members in a skull of a patient surrounding an ear of the patient, (b) attaching a docking frame to the plurality of anchor members, wherein the docking frame has a docking platform and a plurality of fiducial members, (c) acquiring a computed-tomography (CT) image of an area of the patient's head including the ear and the plurality of fiducial members, (d) determining a centroid of each of the plurality of fiducial members and a trajectory for a PCI according to the CT image, (e) configuring a parallel robot by a computer processor according to the CT image such that a top platform of the parallel robot is aligned with the trajectory with respect to the centroids of the plurality of fiducial members, (f) attaching the configured parallel robot to the docking frame, and (g) performing the PCI using one or more surgical tools received by the top platform of the parallel robot.
Method and apparatus for cochlear implant surgery
A system for cochlear implant surgery includes a reference device having at least a portion adapted to be arranged at a fixed position relative to a cochlea of a patient to provide a reference position, an image acquisition and processing system adapted to acquire an image of at least a portion of the cochlea relative to the reference position and to provide an implant plan based at least partially on the acquired image, and an implant system adapted for implanting a cochlear lead array using the reference position and the implant plan.
Selective high frequency spinal cord modulation for inhibiting pain with reduced side effects, and associated systems and methods
Selective high-frequency spinal cord modulation for inhibiting pain with reduced side effects and associated systems and methods are disclosed. In particular embodiments, high-frequency modulation in the range of from about 1.5 KHz to about 50 KHz may be applied to the patient's spinal cord region to address low back pain without creating unwanted sensory and/or motor side effects. In other embodiments, modulation in accordance with similar parameters can be applied to other spinal or peripheral locations to address other indications.
Implantable neurostimulator with integral hermetic electronic enclosure, circuit substrate, monolithic feed-through, lead assembly and anchoring mechanism
An implantable medical device is provided for the suppression or prevention of pain, movement disorders, epilepsy, cerebrovascular diseases, autoimmune diseases, sleep disorders, autonomic disorders, abnormal metabolic states, disorders of the muscular system, and neuropsychiatric disorders in a patient. The implantable medical device can be a neurostimulator configured to be implanted on or near a cranial nerve to treat headache or other neurological disorders. One aspect of the implantable medical device is that it includes an electronics enclosure, a substrate integral to the electronics enclosure, and a monolithic feed-through integral to the electronics enclosure and the substrate. In some embodiments, the implantable medical device can include a fixation apparatus for attaching the device to a patient.
Electrical brain stimulation in gamma band
This disclosure describes techniques for delivering electrical stimulation to the brain of a patient at a frequency greater than a selected frequency. The techniques may reestablish gamma frequency band activity within the brain of a patient, and thus improve the patient's movements and cognitive states. In one example, the disclosure is directed to a method that includes selecting a frequency within a gamma frequency band and delivering electrical stimulation at a frequency greater than the selected frequency.
System for stimulating a hypoglossal nerve for controlling the position of a patient's tongue
A system for controlling a position of a patient's tongue includes attaching at least one electrode to the patient's Hypoglossal nerve and applying an electric signal through the electrode to at least one targeted motor efferent located within the Hypoglossal nerve to stimulate at least one muscle of the tongue. The system may also include the use of more than one contact to target more than one motor efferent and stimulating more than one muscle. The stimulation load to maintain the position of the tongue may be shared by each muscle. The position of the patient's tongue may be controlled in order to prevent obstructive sleep apnea.
Sintered electrical bushings
One aspect relates to an electrical bushing for an implantable device including an electrically insulating base body and at least one electrically conductive bushing body that is embedded in at least one bushing opening that extends through the base body. The base body is produced from a sintered ceramic material, characterized in that the at least one bushing body is made of a sintered cermet material or a sintered metallic material. The base body and the at least one bushing body comprise a firmly bonded sintered connection.
MRI operation modes for implantable medical devices
One embodiment of the present invention relates to an implantable medical device (“IMD”) that can be programmed from one operational mode to another operational mode when in the presence of electro-magnetic interference (“EMI”). In accordance with this particular embodiment, the IMD includes a communication interface for receiving communication signals from an external device, such as a command to switch the IMD from a first operation mode to a second operation mode. The IMD further includes a processor in electrical communication with the communication interface, which is operable to switch or reprogram the IMD from the first operation mode to the second operation mode upon receiving a command to do so. In addition, the IMD includes a timer operable to measure a time period from when the processor switches the IMD to the second operation mode. In accordance with this aspect of the invention, the processor is in electrical communication with the timer, and is further operable to switch the IMD from the second operation mode back to the first operation mode when the measured time period reaches a predetermined time period.
AV delay features
An atrial event and a ventricular event can be received, and an atrioventricular (AV) delay can be provided using information about the atrial and ventricular events. The AV delay can be increased after a first condition is satisfied to allow a heart to regain intrinsic control of ventricular activation, and changed after a second condition is satisfied to allow the heart to remain in intrinsic control of ventricular activation.
Ventricular heart stimulator
The invention relates to an implantable ventricular heart stimulator (10), comprising an at least partially electrically conductive housing (12), an electrode line terminal for connection of a ventricular defibrillation electrode line (20) and a terminal for a defibrillation electrode (26). According to the invention, the heart stimulator has a far-field electrocardiogram detection unit (70) which has a first input connected to the terminal for the ventricular defibrillation electrode and has a second input connected to the electrically conductive housing and designed or configured to generate a far-field electrocardiogram on the basis of the electric potentials applied to the two inputs during operation. The inventive heart stimulator also has a far-field electrocardiogram evaluation unit (72) which is connected to the far-field electrocardiogram detection unit and is designed to detect signal features characteristic of atrial depolarizations in a far-field electrocardiogram generated by the far-field electrocardiogram detection unit.
Apparatus and method for stimulation of biological tissue
An apparatus for generating focused currents in biological tissue is provided. The apparatus comprises an electric source capable of generating an electric field across a region of tissue and means for altering the permittivity of the tissue relative to the electric field, whereby a displacement current is generated. The means for altering the permittivity may be a chemical source, optical source, mechanical source, thermal source, or electromagnetic source.
Impedance devices for obtaining conductance measurements within luminal organs
Impedance devices for obtaining conductance measurements within luminal organs. In at least one embodiment of an impedance device of the present disclosure, the device, comprises an elongated body and an detector positioned upon the elongated body, the detector comprising at least five electrodes and configured to obtain one or more conductance measurements generated using a first arrangement of four of the at least five electrodes and further configured to obtain one or more fluid velocity measurements using a second arrangement of four of the at least five electrodes when the elongated body is positioned within a fluid environment of a mammalian luminal organ, wherein the first arrangement is different from the second arrangement.
A small wearable recall device is provided to capture images triggered by a combination of a detection of a capture condition (e.g., changes in motion, temperature or light level) followed by a relatively stable period, as detected by an accelerometer. By triggering on the combination of a detected capture condition followed by a detected stability condition, a clearer image of the environment of an interesting event is expected to be captured. The small size of the recall device makes it possible to integrate it into common portable consumer products, such as MP3 players, purses, clothing, hats, backpacks, necklaces, collars, and other human-wearable products.
A watch or other type of portable electronic console that employs a number of different functions in order to improve its usability. The watch may, for example, allow a user to connect the watch to one or more remote electronic devices, such as an electronic performance sensor or MP3 player. The watch then displays information related to the connected electronic devices. Still further, the watch may allow a user to control the operation of one or more connected remote electronic devices. Thus, if the watch is connected to a remote speed/distance monitor employing a calibration variable, then the watch may allow the user to adjust the calibration variable.
Method and apparatus for motility contrast imaging
A system for motility contrast imaging a biological target within tissue comprising a CCD array; an illumination source for generating an incoming beam; a first beam splitter for receiving the incoming beam and producing an object beam and a reference beam; a second beam splitter for illuminating a multitude of biological targets with the object beam and for directing backscattered object beams towards the CCD array; a computer-controlled delay stage for zero-path-matching the reference beam to the backscattered object beams; a reference beam that intersects the backscattered object beams at an angle to produce a series of interference fringes that modulate Fourier-domain information; and a computer for receiving a time series of Fourier-domain information. The interference fringes between the backscattered object beam and the reference beam are recorded by the CCD array and passed to the computer which constructs a digital hologram at successive times.
Tissue-stabilization device and method for medical procedures
A method and apparatus for designing and fabricating a pantomesh. The pantomesh includes a plurality of pantomesh elements each including a pairs of links connected to one another by a revolute joint at points between their ends. Each of a plurality of the pantomesh elements is connected using spherical joints to a plurality of neighboring pantomesh elements, wherein a first line that extends along one side of a first pantomesh element forms a first variable angle with a second line that extends along an opposite side of the first pantomesh element. In some embodiments, at least some of the pantomesh elements of the pantomesh are not isosceles trapezoidal elements. In some embodiments, the pantomesh is used to compress breast tissue during an MRI procedure. In some embodiments, the pantomesh is connected to one or more actuators that facilitate remote control of the amount of compression provided.
System and method for measuring magnetocardiogram of small animal
A system and method for measuring a magnetocardiogram (MCG) in order to measure a weak magnetic field generated from the heart of a small animal such as a laboratory rat are provided. The system includes a case, a SQUID sensor located and fixed inside the case to detect magnetism, a platform arranged near the SQUID sensor inside the case, the small animal being placed on the platform, a linear station to which the platform is fixed to move a location of the platform, and a control unit configured to control operations of the SQUID sensor and the linear station and measure the MCG of the small animal using intensities of the magnetism detected by the SQUID sensor.
Nerve monitoring device
A nerve monitoring device, including a cannula, a sensor for monitoring a nerve, and an optional support element, can be inserted into an anatomic space. The cannula, sensor and/or support element can automatically conform to and match the geometry of the anatomic space, which can enhance desired contact between the sensor and anatomic features, such as muscles, nerves or tissue in the space in an atraumatic manner. The sensor, cannula and/or support element can include one or more strips or other elements that convert from a retracted mode to an expanded mode in which the strips or elements expand, enlarge or otherwise move to match the geometry of the space and place the sensors in precise monitoring proximity relative to the target muscles, nerves or tissues. An exemplary application of the device is in the field of laryngeal monitoring, however, the device is well suited for other applications.
High aspect ratio microelectrode arrays enabled to have customizable lengths and methods of making the same
A method of fabricating an array of micro electrodes enabled to have customizable lengths. A substantially criss-cross pattern of channels on a top surface of the work-piece substrate (10) is formed using electrical discharge machining to form a plurality of shaped columns (20) having tapered profiles. The shaped columns have a tapering profile which extends at least 50% of the length of the columns. The plurality of shaped columns is etched to sharpen the tapered tips into needle tips forming the array of microelectrodes.
Optical stimulus probe with reflecting surface
An optical stimulation probe has a probe body inserted into a subject, an electrode formed on the probe body and collecting a response signal from the subject, a light irradiator attached to the probe body and irradiating an optical signal and a reflecting surface formed on the probe body on the path of the optical signal. The reflecting surface changes the course of the optical signal irradiated from the light irradiator to the direction where the electrode faces by reflecting the optical signal. The electrode may be formed on a side portion of the probe body such that it faces a direction perpendicular to a length direction of the probe body, and the optical signal reflected by the reflecting surface may travel along a direction perpendicular to the length direction of the probe body, such that the direction where the electrode faces and the direction along which the reflected optical signal travels are parallel to each other.
Assembly methods for medical electrical leads
A method for making a medical electrical lead electrode assembly includes the steps of: forming an insulative carrier from an insulative material; coupling at least one conductive component to the carrier by inserting a pre-formed tab of the conductive component through the carrier, from a first side thereof to a second side thereof, so that the conductive component is secured to the carrier with the tab extending along a surface of the second side of the carrier and an inward facing surface of an electrode portion of the conductive component being disposed against a surface of the first side of the carrier; coupling an elongate flexible conductor to the tab of the component; and forming an insulative layer over the second side of the carrier, the tab and the conductor electrically coupled to the tab.
Superconducting coil, rotating device, and superconducting coil manufacturing method
A superconducting coil and a rotating device, the performances of which are improved, and a superconducting coil manufacturing method are provided. A superconducting coil 10 is a saddle-shaped superconducting coil formed by winding a superconducting wire so as to form a race-track-like shape. The superconducting coil includes a curved portion 10b and a straight portion 10a connected to the curved portion 10b. In the curved portion 10b, an upper edge 10c is positioned closer to an inner peripheral side than a lower edge 10d is, and in the straight portion 10a, the upper edge 10c is positioned closer to an outer peripheral side than the lower edge 10d is.
Method for operating a wireless radio network and a network
For allowing a particularly economic operation of a network with a high degree of energy conservation a method for operating a wireless radio network, especially a radio access network, is claimed, wherein the wireless radio network includes a core network, a number of base stations and at least one mobile host for wireless communication via at least one base station, wherein the method is characterized in that an association of powered on and powered off base stations within definable base station partitions will be arranged in a coordinated manner, thereby maintaining a minimum number or the smallest possible number of powered on base stations being necessary for accommodating a current traffic demand. Further, a network is claimed, preferably for carrying out the above mentioned method.
Orchestrated group communication
Orchestrated group communication may facilitate communication with a group of contacts. A user may define a group of contacts reachable via different communication mechanisms. A communication framework may determine an appropriate method for communicating the information to each member of a group. The user may not know how the communication framework is communicating with each group member. A user may specify preferred communication mechanisms or a particular order of communication mechanisms for communicating with particular contacts. Orchestrated group communication may also provide a user interface allowing a user to request communication with every member of a contact group via a single user interface action. A user desiring to communicate with a group may drag a document, or other file, and drop it onto an icon for the group and a group communication framework may communicate that document to each member of the group.
System and method for assessing noise floor data using radio blocking performance
An electronic device includes communications circuitry configured to communicate with an assistance server. The electronic device transmits a spectrum access request to the assistance server and receives, in response, an available channel list ranked by respective aggregate noise floor metric values from the assistance server. The aggregate noise floor metric value for each channel in the ranked channel list is determined by the server to account for a location of the electronic device, noise from radio frequency devices, and an adjacent channel blocking profile of the communications circuitry.
Systems, methods, and computer program products for automatic mapping between parlay-X short messaging service message element XML encoding and native SMPP protocol data coding scheme
Systems, methods, and computer program products are for mapping an extensible markup language (XML) encoding declarations to a short message peer-to-peer (SMPP) data coding scheme (DCS) for a mobile-terminated (MT) short messaging service (SMS). An exemplary method includes receiving a message from a short message entity (SME) for delivery to a mobile device. The message includes a payload with at least one character encoded in accordance with a first character encoding scheme. The exemplary method further includes receiving from the SME a second encoding scheme for the message, implementing a mapping table to map the first character encoding scheme to the second character encoding scheme, and performing an encoding transformation of the message from the first character encoding to the second character encoding scheme yielding a modified message comprising the payload of the message encoded in the second character encoding scheme as specified by the SME.
Techniques for unified messaging
Techniques involving unified messaging and other functionality are described. In one or more implementations, the techniques describe receiving a message at a web service from a messaging client and identifying a communication device that includes telephone functionality and is configured to format the message as a short messaging service (SMS) message. The SMS message may be identified by a phone number associated with the communication device. The message may then be sent to the communication device for automatic transmission of the SMS message by the communication device over a phone network.
Method for carrying out mobile communication by marking image objects, and mobile unit and communications device
A method carries out mobile communication between a mobile unit and a communications device, which exchange voice messages using a telecommunications protocol. During the method, at least one image can be generated by the mobile unit. In the event that at least one image is generated by the mobile unit, at least this image is transmitted to the communications device. On the part of the communications device, an image object is selected based on the transmitted image, and a position of this image object is determined. The determined position is transmitted by the communications device to the mobile unit, and the mobile unit marks at least one of the images in such a manner that, starting from at least one of the images, which is taken as a basis for the selection of the image object, and from the position, a location of the selected image object is specified for at least one image to be marked and a marking object is superimposed upon at least one of the images at the position.
Sensor networks based on wireless devices
Techniques for using wireless devices to implement sensor networks are described. For cognitive radio, a wireless device obtains measurements for a first system (e.g., a broadcast system) with which the wireless device is not in communication. The wireless device sends the measurements and associated location information and/or timestamps via a second system (e.g., a cellular system). A server receives measurements from a number of wireless devices and determines the coverage of the first system based on the measurements. For other applications, a wireless device obtains sensor information from at least one sensor at the wireless device and sends the sensor information and associated location information and/or timestamps via a wireless system. A server receives the sensor information and associated information from a number of wireless devices, aggregates the sensor information, and constructs a map. The wireless device may develop a user profile based on the sensor information and associated information.
Asynchronous triggering of mobile station location estimation
A system and method are disclosed for triggering location estimation of mobile stations in a geographic region of interest. The disclosed system includes a list of International Mobile Subscriber Identities (“IMSI”) used to track which mobile stations are to have location estimates generated, a database of Network Measurement Reports (“NMR”) used for generating the location estimates, and a location engine. The system operates as a group of concurrently executing processes that i) process IMSIs and NMRs that are extracted by and received from probes that monitor communication links; ii) generate location estimates of mobile stations in the region of interest, based on a sequential indexing of the IMSI list; iii) maintain the freshness of the NMR database; and iv) maintain the freshness of the IMSI list. These processes operate such that the triggering of the location estimations occurs asynchronously with respect to the detection of information on the communication links.
Position determination processes using signals' multipath parameters
Methods and apparatuses for determining a position of a mobile satellite positioning system (SPS) receiver which is coupled to a communication receiver or transceiver. In one exemplary method, a change in a communication signal received by the communication receiver is determined. A parameter, based on the change, is determined, and SPS signals from SPS satellites are processed according to the parameter. According to further details of this method, the change involves the fluctuation of the level of the communication signal and the parameter is a motion information which specifies a frequency range for searching for SPS signals in the process of acquiring the SPS signals from SPS satellites. In an alternative embodiment the change in the communication signal is a change in the transmitted signal in response to power control commands. Apparatuses, such as a mobile communication system which includes an SPS receiver and a communication receiver, are also described.
Method and apparatus for location identification
Method and apparatus to analyze and present location information in an easy-to-digest manner are disclosed. In one embodiment, each piece of location information can include a piece of location-designating information and a piece of location-related information. Location-designating information is primarily for identifying location. Location-related information is information related to location-designating information. The location-designating information and the location-related information can be supplied by a mobile device. With location-related information, each piece of location-designating information can be more accurately transformed into a label to help identify a location. All of the location-designating information pertaining to a given area can be consolidated into one piece of location-designating information related to the label, unless a piece of location-related information changes by more than a preset value. To better present location information in an easy-to-digest manner, location information can be compared to standards. Presentation can be on a display with respect to a reference location.
Using signal-generated location information to identify and list available devices
A wireless detecting device may be operable to receive one or more signals from a corresponding one or more wireless devices within range of the wireless detecting device. A list of the corresponding one or more wireless devices within range of the wireless detecting device may be displayed on the wireless detecting device. Based on the received one or more signals from the corresponding one or more wireless devices, distance, range or geographic location of the one or more wireless devices, relative to the wireless detecting device may be indicated on the wireless detecting device.
Method and apparatus for increasing accuracy of wireless based real-time location system (RTLS) devices
A method and system for increasing accuracy of wireless based Real-Time Location System (RTLS) devices is disclosed. The method comprising determining whether a mobile device is in a dampening state and determining a wireless dampening factor if the mobile device is in the dampening state. The dampening factor is applied to a plurality of wireless signal strength readings to correct inaccurate readings caused by the dampened state. The system comprises a sensor module for determining whether a mobile device is in a dampening state, and a dampening factor calculator for determining a dampening factor, when the mobile device is in the dampening state.
Notification adjustment for computing devices
A system and a method are disclosed for adjusting a notification mechanism within a computing device. In one embodiment, the method includes receiving a global positioning system signal corresponding to latitude and longitude positional values, calculating a current location of the computing device in response to the received global positioning system signal, determining whether the calculated current location is associated with a configuration identifying adjustment, and adjusting a notification setting on the device accordingly. In another embodiment, the system includes identifying a particular time, determining whether a notification setting to the device is needed, and if so, adjusting the notification setting for the device accordingly.
Resolving ambiguity with respect to locationing and classification of wireless transmitters
Techniques are provided for distinguishing between different signal sources where multiple sensor devices receive RF energy in an area such that some sensors may receive the signals from the same source device. One technique involves using a received signal strength (RSS)-based positioning technique to distinguish between sources. Another technique involves building a pseudo-MAC identifier from received transmissions of a device in order to distinguish transmissions from that device with respect to other devices. Still another technique involves synchronizing the sensor devices and examining the resulting waveform data at each of the sensor devices to determine if they match sufficiently to indicate that they are from the same source device.
Methods and systems for content processing
Many of the detailed technologies are useful in enabling a smart phone to respond to a user's environment, e.g., so it can serve as an intuitive hearing and seeing device. A few of the detailed arrangements involve using radio base station SDR equipment (e.g., at a cell tower) to perform image recognition operations for phones; forecasting service needs from remote processors, and reserving such capacity in advance of use; delegating a remote execution task to a service provider chosen in a competitive process, such as by a reverse auction; using nearby processors, e.g., in an automobile, another phone, or set-top box, for remote execution tasks; phones with separable camera and/or illumination components; phone camera illumination using different colors of light; using search tree methods with image frames captured at different focuses; using a phone's microprojector to aid in object identification; correcting lens aberrations by texture mapping captured imagery onto a corrective polygon surface using a phone GPU; etc. A great variety of other features and arrangements are also detailed.
Timing adjustment for synchronous operation in a wireless network
Techniques for adjusting transmit timing of base stations and user equipments (UEs) in a wireless network are described. In one operating scenario, a femto base station communicates with a femto UE, and a macro base station communicates with a macro UE located within the coverage of the femto base station. In an aspect, the transmit timing of the femto base station may be delayed relative to the transmit timing of the macro base station, e.g., to time align downlink signals from the femto and macro base stations at the femto and macro UEs. In another aspect, the transmit timing of the femto UE may be advanced relative to the transmit timing of femto base station by an amount larger than twice the propagation delay between the femto UE and the femto base station, e.g., to time align uplink signals from the femto and macro UEs at the femto base station.
Method, apparatus and system for optimizing and updating tracking area
The present invention relates to the field of mobile communication technologies, and discloses a method, an apparatus, and a system for optimizing a tracking area, and a method, an apparatus, and a system for updating a tracking area. The method for optimizing a tracking area includes the following steps: an Operation, Administration and Maintenance entity obtains an optimization threshold, and performs a tracking area optimization according to the optimization threshold. With the present invention, the Operation, Administration and Maintenance entity can optimize the tracking area automatically.
Virtual groups for femto-cell hand-in
Techniques, apparatuses, and systems for handling femto-cell hand-in requests can include operating a macro-cell base station to provide wireless service to wireless devices in a geographical coverage area; receiving, from a wireless device, a message indicative of the wireless device's reception of a base station radio signal, the message including a base station identifier; controlling multiple femto-cell base stations that are assigned to the base station identifier to communicate with the wireless device and to report a reception of a radio signal from the wireless device; and transferring the wireless device from the macro-cell base station to a femto-cell base station of the multiple femto-cell base stations that reports a reception of the radio signal from the wireless device. The multiple femto-cell base stations can provide wireless service in different nonadjacent portions of the geographical coverage area.
Active hang-in for multi-FEMTO deployments
A method for enabling an active hand-in from a macro base station network to a femtocell network includes servicing an active hand-in of a mobile entity from a macro base station to a femtocell network, using a first femtocell of the femtocell network. The active hand-in includes a hard handoff of the mobile entity from the macro base station with soft handoff of the mobile entity enabled between the first femtocell and one or more neighboring femtocells in the femtocell network. The hard handoff with soft handoff enabled may be implemented using novel procedures implemented by one or more entities of a wireless communications network including the femtocells and macro base station.
Service connection apparatus and method in portable terminal
A call connection method and apparatus are disclosed. When a service is released in a portable terminal that supports different communication modes due to a network problem, the call connection method and apparatus reconnects the service to another network. The call connection method includes performing a first service through a first network, analyzing, when the connected first service is released, the cause of disconnection, acquiring, when the cause of disconnection is a problem in the first network, connection information, and attempting to connect a second service through a second network based on the connection information.
Methods and system for performing handover in a wireless communication system
A method and system for performing handover in a third generation (3G) long term evolution (LTE) system are disclosed. A source evolved Node-B (eNode-B) makes a handover decision based on measurements and sends a handover request to a target eNode-B. The target eNode-B sends a handover response to the source eNode-B indicating that a handover should commence. The source eNode-B then sends a handover command to a wireless transmit/receive unit (WTRU). The handover command includes at least one of reconfiguration information, information regarding timing adjustment, relative timing difference between the source eNode-B and the target eNode-B, information regarding an initial scheduling procedure at the target eNode-B, and measurement information for the target eNode-B. The WTRU then accesses the target eNode-B and exchanges layer 1/2 signaling to perform downlink synchronization, timing adjustment, and uplink and downlink resource assignment based on information included in the handover command.
Method and apparatus for measuring cells in the presence of interference
Methods and apparatuses are provided that include determining measurement values for base stations based on signal measurements obtained over resources protected from interference by neighboring cells. The protected resources can be determined based on at least one of detecting at least a bimodal disparity in signal measurements received over the resources, receiving an indication of the protected resources, determining the resources as used for transmitting paging signals, determining the resources from a previous resource assignment, and/or the like. Thus, where a device is measuring cells for idle-mode reselection, such measurement of protected resources can provide for a more accurate measurement of characteristics of signals received from the base station.
Mobile telephone VOIP/cellular seamless roaming switching controller
A nomadic server and a related system provides seamless roaming for a mobile communication device between different types of wireless networks, such as WiFi and cellular networks for voice, data and video communication. Use of the nomadic server enables a combination of WiFi and cellular networks for providing access to cellular phones and make use of the VOIP networks for switching the calls wherever possible. The nomadic server is a telephone communication processing and switching server that will “hold” the present, in-progress telephone communications without dropping, while roaming without losing the present, in-progress communication. For example, a telephone communication can be seamlessly switching between VOIP and cellular telephone networks using the nomadic server. Nomadic server resources interface with the VOIP and cellular network switches to provide the hand-off between networks. This approach enables switching of telephone communications over a VOIP network wherever possible either through WiFi or through cellular networks.
Enhanced techniques for using core based nodes for state transfer
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.
Fielded device failure tracking and response
A fault remediation system for fielded wireless mobile devices addresses field failure data collection, consolidation of field failure data, and an information services platform so that the players in a wireless/mobile broadcast/broadband application/service value chain to respond to field failure problems in a consistent and automated manner from wireless/mobile devices over wireless multicast and or wireless broadband networks. An elegant and extremely flexible mechanism enables the failure data collection from a targeted set of wireless/mobile devices. In addition, sophisticated mechanisms identify targeted set of devices that should participate in field failure data collection based on user specified operational requirements (e.g., selected OEM, device configuration type, subscribers to a specific wireless broadband serve, failure occurrence certain time limits, etc.). The fault data logging on the mobile device is vertically integrated to allow diagnosis and assignment to a responsible party for fixing, testing, and release with subsequent certification and deployment.
Mobile application traffic optimization
Systems and methods for mobile application traffic optimization are disclosed. In one aspect, embodiments of the present disclosure include a distributed proxy and cache system, including, a local proxy on a mobile device for intercepting a data request made via a mobile device, and a proxy server coupled to the mobile device and a content server to which the data request is directed. In one embodiment, the local proxy can forward the data request to the proxy server for transmission to the content server for a response to the data request. In addition, the proxy server sends the data request to the content server independent of activities on the local proxy and notifies the local proxy when changed or different content on the content server is detected for the data request. One embodiment of the distributed proxy and cache system further includes a cache shared between the local proxy and the proxy server and the component on the local proxy and is queried for a locally stored response to the data request prior to the data request being forwarded on to the proxy server.
Method for configuring a radio terminal through a radio communication network, related network and computer program product therefor
A method for configuring a re-configurable radio terminal through a communication network operating according to a communication system, wherein the radio terminal is configured for exchanging information with at least one node of the communication network by using the communicating system. The method is characterized by the steps of associating with the one node of the communication network a server entity configured for using a protocol layer of the communication system and including a set of operating software modules for configuring the radio terminal with at least one set of elements of protocol stack suitable to reconfigure the radio terminal; associating with the radio terminal a client entity configured for using a respective protocol layer corresponding to the protocol layer of the server entity, establishing an over-the-air connection between the radio terminal and the server entity by using the protocol layer, and downloading at least one module of the set of operating software modules from the server to the radio terminal configuring at least in part the radio terminal.
Communication link termination indication signal method and apparatus
Upon detecting at a two-way communication device that a communication link has been terminated, the two-way communication device can provide a unique corresponding signal (such as a unique audible signal) to indicate such termination. Pursuant to one approach, a plurality of such unique signals are available and a specific one of the available signals is selected for use in a given circumstance using a selection criteria of choice.
Apparatus and method for managing application in wireless terminal
Provided is an apparatus and method for managing an application in a wireless terminal, in which data of an application is managed and displayed according to an input type of a password for unlocking the wireless terminal, wherein the apparatus includes a memory for storing a plurality of passwords and a controller for classifying and managing data of each of a plurality of applications according to a password type.
Methods and apparatus to discover spectrum usage of mobile carriers
Methods and apparatus are disclosed for discovering spectrum usage of mobile carriers. An example method includes extracting channel information from a plurality of messages transmitted to mobile devices over a wireless communications radio spectrum, identifying a mobile carrier based on the channel information, associating the channel information with a network parameter of the mobile carrier, and determining a channel usage characteristic associated with mobile carrier based on the channel information and the network parameter.
Method and apparatus for configuring a mobile device to provide emergency notification
An approach for configuring a mobile device to enable accident detection and notification functionality for use within a vehicle is described. An emergency notification platform receives position information and acceleration information associated with a mobile device. The emergency notification platform applies a rule to the position information and the acceleration information to determine an alert condition. A notification message is then generated for presentation on the mobile device based on the application of the rule, wherein the notification message specifies information relating to the alert condition.
Narrowband interference detector
The present invention discloses a narrow band interference detector for a receiver of a communication system. The narrow band interference detector includes a numerically-controlled oscillator (NCO), for generating an oscillating signal according to a time-variable frequency; a mixer, for mixing an input signal with the oscillating signal, to generate a mixed signal; a phase lock loop (PLL), for locking the mixed signal during a detection period according to the time-variable frequency; a first switch, for controlling a connection between the NCO and the PLL according to a desirable narrow band interference signal type of the at least one narrow band interference signal; and a narrow band determination unit, for determining at least one narrow band interference signal according to a low frequency component of the mixed signal, the time-variable frequency and the desirable narrow band interference signal type of the at least one narrow band interference signal.
Signal based gain control
In a signal-based gain control scheme, one or more gain levels used for processing signals are selected based on characteristics of previously received signals. For example, different gain levels may be used to receive sets of signals whereupon certain characteristics of the received sets of signals are determined. One or more gain levels are then selected based on these characteristics whereby another signal is processed based on the selected gain level(s). In some aspects, the signal-based gain control scheme may be employed to facilitate two-way ranging operations between two devices. For example, leading edge detection may involve determining a characteristic of a received signal, determining a threshold based on the characteristic, and identifying a leading edge associated with the received signal based on the threshold. In some aspects, the signal-based gain control scheme may be employed in an ultra-low power pulse-based communication system (e.g., in ultra-wideband communication devices).
Antenna adjustment circuit, antenna adjustment method, and communication unit
An antenna adjustment circuit includes: a drive section that inputs an alternating drive signal to a variable capacitance connected to an antenna; and a control section that sets a capacitance value of the variable capacitance, based on a phase of an output signal derived from the variable capacitance.
Systems and methods for silencing wireless devices
Embodiments provide systems and methods to optimize the time when to receive transmissions from dissimilar wireless networks, and hence, improve the overall network throughput and avoid access point transmission rate fall-back mechanism having an avalanche effect during coexistence of dissimilar wireless network technologies. A receiver comprises at least two dissimilar network technology subsystems and is able to receive transmissions from dissimilar wireless network technology subsystems during a predetermined reception window.
Beamforming by sector sweeping
A first plurality of training data units are transmitted via a plurality of antennas of a first station as part of a first transmit beamforming training procedure. Subsequently, a second plurality of training data units are received via the plurality of antennas as part of second transmit beamforming procedure while the first station applies a single receive antenna configuration. The second plurality of training data units includes an information element that specifies a feedback from a second station, the feedback including an identifier corresponding to one of the training data units in the first plurality of data units. The first station transmits a feedback message to the second station, that includes (i) one or more indicators of one or more training data units selected from the second plurality of training data units, and (ii) a request to perform a subsequent beamforming training procedure.
Frequency tunable transmit/receive (Tx/Rx) antenna switch
A frequency tunable transmit/receive (Tx/Rx) antenna switch uses a tuned PIN diode RF switch topology (e.g. shunt, series or series-shunt). Frequency tunability may be provided for either a transmit or a receive port (or both) that is tuned by a quarter-wavelength transmission line. The quarter-wavelength (λc/4) line establishes a passband centered about a center frequency fc. An electronically tunable LC tank circuit adds capacitance to the switch impedance to shift the center frequency fc to lower frequencies and progressively narrow the passband with the addition of more capacitance. Transceiver units provided with frequency tunable Tx/Rx antenna switches can, for example, be used in a Master/Slave network in which multiple units communicate with each other or in an autonomous network in which each of the multiple units operate independently.
Monitoring system for a doppler transceiver
The invention relates to a method for monitoring the integrity of a Doppler transceiver, where a Doppler transceiver comprises a transmitter unit, a receiver unit and a mixer unit, where a signal is transmitted from the transmitter characterized in that the transmitted signal is at least partially coupled into a modulation unit, where the coupled signal is modulated according to certain parameters, and the modulated signal is transmitted to the receiver unit. The invention also relates to a Doppler transceiver comprising a transmitter unit and a receiver unit having at least one antenna (34, 54, 66, 74, 90, 96) and a mixer unit (38, 64), characterized in that it also comprises a modulation unit (48, 70, 86, 106) which is electrically disconnected to the antenna (34, 54, 66, 74, 90, 96).
Systems, methods, and devices for electronic spectrum management for identifying signal-emitting devices
Systems, methods, and apparatus are provided for device sensing in white space, by identifying, classifying and cataloging sources of signal emission based on radio frequency measurements. In an embodiment, signal emission devices are analyzed by automatically detecting signals, analyzing signals, comparing signal data to historical and reference data, and creating corresponding unique signal profiles. The detected, analyzed and compared data may be presented to a user.
Frequency control in a frequency shifting repeater
Aspects of a method and system for frequency control in a frequency shifting repeater are provided. In this regard, a reference frequency may be divided to generate a first pair of local oscillator (LO) signals, the first pair of LO signals may be divided to generate a second pair of LO signals. The two pairs of LO signals may be utilized to frequency shift a received signal for repeating the signal on a different frequency. The frequency shifted signal may be generated by down-converting the received signal utilizing the first pair of LO signals, up-converting the down-converted signal utilizing the second pair of LO signals, and combining the resulting up-converted signals. The reference frequency may be divided by a first scaling factor to generate the first pair of LO signal which, in turn, may be divided by a second scaling factor to generate the second pair of LO signals.
Method and device for evaluating influence of electromagnetic waves of base station on human body
The present invention relates to a method for reducing an average time period adopted at the time of evaluating an effect of electromagnetic fields of a mobile communication base station near the mobile communication base station on a human body and measurement is performed for 6 minutes at a predetermined measurement point for acquiring a whole body average by comparing a site measurement result targeting multiple base stations and uncertainty by repetitive measurement and when a 6-minute average value and an average value for a reduced time period which is shorter than 6 minutes are compared with each other, a standard deviation is equal to or lower than a predetermined level, e.g., 0.4 dB, it is sufficient even by the measurement for the reduced time period which is shorter than 6 minutes.
Information exchange via bluetooth service discovery protocol service records
Methods and apparatuses for Bluetooth communications are disclosed. In one example, data is exchanged between Bluetooth devices utilizing Service Discovery Protocol service records.
Link adaptation method and apparatus in wireless LAN system
A link adaptation method performed by a station (STA) in a wireless local area network (LAN) system supporting multi-user multiple-input multiple-output (MU-MIMO) is provided. The method includes: receiving a modulation and coding scheme (MCS) request, a steered sounding physical layer convergence procedure (PLOP) protocol data unit (PPDU) which is beam-formed to the STA, and a MIMO indicator including MU-MIMO-related information from an access point (AP); and transmitting feedback information including an MCS acquired from the steered sounding PPDU and the MU-MIMO-related information to the AP in response to the MCS request.
Application of system information changes by relays
Teachings herein include a base station and a relay node for propagating system information changes from the base station to the relay node. Upon receiving changes from the base station, the relay node advantageously determines whether to apply the changes immediately or to defer application until a set time period. The relay node then applies the changes at a time in accordance with that determination. In some embodiments, the relay node employs deferred application for fundamental changes (those changes that would fatally disrupt ongoing communications if applied before the set time period), but employs immediate application for non-fundamental changes in order to minimize relay node complexity. Regardless, the relay node may make the determination based on preconfigured rules, or on control indicators received from the base station. Correspondingly, the base station may generate the control indicators to explicitly direct the relay node to employ immediate application or deferred application.
Media device with enhanced data retrieval feature
A personal media device including a broadcast receiver that receives broadcast media and broadcast media data from a broadcast source where the broadcast media data includes a media identifier associated with the broadcast media. The media device also includes a data transceiver that sends a retrieval request to a media server for enhanced media data where the retrieval request includes the media identifier and receives the enhanced media data via a wireless data channel. The media device further includes a processor that performs a media device operation in response to the received enhanced media data.
Foil transferring apparatus and image forming system using the same
A second thermal transfer portion of upstream side transfers a foil image, to be not printed, from the foil sheet on a waste sheet, conveyed from an image forming apparatus, on which a desired negative toner image is transferred. The foil image, to be printed, remains on the transferred foil sheet. The waste sheet is ejected out of a foil transferring apparatus. A printing sheet of paper on which the desired positive toner image is transferred is conveyed from the image forming apparatus to a first thermal transfer portion of downstream side to meet time when the foil sheet on which the foil image, to be printed, remains reaches the first thermal transfer portion. The first thermal transfer portion transfers the foil image, to be printed, from the foil sheet on the conveyed printing sheet of paper on which the desired positive toner image is transferred.
Image processing apparatus, image processing method, and computer-readable medium
An image processing apparatus includes a mode determination unit for determining a print mode, a fixing temperature acquisition unit for acquiring fixing temperature information corresponding to the print mode determined by the mode determination unit, an image adjustment means for, after the fixing temperature information is acquired by the fixing temperature acquisition unit, accepting an instruction of an adjustment value for image data and performing image adjustment corresponding to the adjustment value for the image data, and a control unit for controlling a fixing temperature of a fixing device in accordance with the fixing temperature information acquired by the fixing temperature acquisition unit before and after the image adjustment is performed by the image adjustment unit.
Thermal fixing device having sealing member
A thermal fixing device includes a tubular member, an internal thermal fixing assembly, and an external thermal fixing member. The internal fixing assembly is positioned in an internal space of the tubular member and includes a frame, a thread member threadingly engaged with the frame, a fixed assembly fixed to the frame by the thread member, and a sealing member covering one of a boundary between an end portion of the thread member and the frame and a boundary between the end portion and the fixed assembly. The external thermal fixing member is positioned outside of the tubular member for nipping the tubular member in cooperation with the internal thermal fixing assembly.
A fuser unit, which heat-fixes a developer image transferred on a recording sheet while moving the recording sheet in a predetermined direction, the fuser unit comprising: a cylindrical member having flexibility; a heat generation member that is arranged at an inside of the cylindrical member and generates radiation heat; a nip member that slidingly contacts an inner periphery of the cylindrical member; a reflection plate that contacts the nip member, is configured to cover the heat generation member and reflects the radiation heat toward the nip member, and a backup member that forms a nip region by nipping the cylindrical member between the nip member and the backup member, wherein the nip member and the reflection plate intermittently contact each other in an axial direction of the cylindrical member within an image forming width.
Image forming apparatus, toner supply mechanism, and method of mounting and dismounting a toner cartridge
An image forming apparatus includes a toner cartridge, a toner supply unit, and a developing device. The toner cartridge includes a toner discharge port configured to discharge stored toner, and a shutter configured to open and close the toner discharge port. The toner supply unit includes an engagement unit configured to engage with the shutter of the toner cartridge, a toner supply port configured to communicate with the toner discharge port and to receive the toner supplied from the toner discharge port when the shutter is open, an opening member configured to open the shutter and an elastic member configured to cause the opening member to move following the shutter by being in contact with the shutter until at least the engagement between the engagement unit and the shutter is released during dismounting of the toner cartridge from the image forming apparatus.
Electrophotographic apparatus and process cartridge
An electrophotographic apparatus and a process cartridge include an electrophotographic photosensitive member; a developing unit; and a cleaning unit, wherein depressed portions separated from each other and satisfying conditions below are formed in the surface of the electrophotographic photosensitive member at a density of 10 or more per unit area of 1 cm2: a depth of the depressed portions is defined as Rdv[μm], a minor-axis diameter of the depressed portions is defined as Lpc[μm], a major-axis diameter of the depressed portions is defined as Rpc[μm], and an angle formed between a direction of a major-axis of each of the depressed portions and a direction of movement of the surface of the electrophotographic photosensitive member is defined as θ[°]. 5[°]≦θ[°]≦85[°] 0.3×P[μm]≦Rdv[μm]≦0.5×P[μm] 1.1×P[μm]≦Lpc[μm]≦1.5×P[μm] 50/Sin θ[μm]≦Rpc[μm]≦1500[μm]
Fixing device including an engagement-disengagement unit and image forming apparatus equipped with the fixing device
A fixing device comprises a rotatable fixing member to heat a side of a recording medium bearing an unfixed image; a heat source to heat the rotatable fixing member; a rotatable pressing member disposed opposite the fixing member to press against an outer side of the fixing member; a housing to accommodate the fixing member and the pressing member; a conveyance path defined internally within the fixing device to convey a recording medium therethrough and between the fixing member and the pressing member, and a shutter actuator to move the shutter to open and close the conveyance path. The housing holds the shutter and the shutter actuator.
Configuration of an image forming device for accessing an image forming unit
An image forming device including a casing having a front wall formed with a first opening and an upper wall continuous to the front wall and formed with a second opening. The first and second openings together form a single opening. The device further includes a door for covering the single opening, a belt unit, and a guide member. The belt unit includes first and second rollers, and a conveyer belt. The drawer is configured to accommodate a plurality of cartridges. The guide member is configured to movably guide the drawer. The first roller is disposed nearer to the single opening than the second roller to the single opening. In a state where the door is opened and the drawer is inside the casing, one of the plurality of cartridges closest to the door is detachably attachable to the drawer through the single opening.
Image forming apparatus
An intake fan (62) is provided on a side surface of an exposure device (40) provided below a plurality of image formation portions (20) far from a fixing unit (30), and a ventilation path (70) is formed on a side surface of the exposure device (40) on a back side, and outside air sucked by the intake fan (62) into a body of an apparatus is fed through the ventilation path (70) to the back side of the image formation portion (20K) closest to the fixing unit (30). The air flows through a space between a division plate (80) and the image formation portions (20) toward a discharge fan (61), and the image formation portions (20) are air-cooled sequentially from the image formation portion (20K). Thus, it is possible to effectively air-cool the image formation portions without increasing the size of the apparatus.
Fixing device, fixing device control method, and image forming apparatus
A fixing device includes a rotatable fuser member, a rotatable pressure member, a heater, a rotary driver, a thermometer, and a controller. The rotatable fuser member is subjected to heating. The rotatable pressure member is disposed opposite the fuser member. The heater heats the fuser member. The rotary driver imparts torque to at least one of the fuser and pressure members. The fuser member and the pressure member are pressed against each other to form a fixing nip therebetween. The thermometer is disposed external to the fixing nip to detect a temperature outside the fixing nip. The controller is operatively connected with the thermometer to control an amount of heat applied to the recording medium through the fixing nip according to the detected temperature, so that the recording medium exhibits a substantially constant post-fixing temperature downstream from the fixing nip.
Fixing device for locally heating a fixing member and image forming apparatus incorporating the fixing device
A fixing apparatus includes a fixing member that fixes a toner image onto a recording medium, a first heater that locally heats the fixing member by providing heat only to a portion of the fixing member corresponding to the toner image, and a pressing member that presses a recording medium against the fixing member. A second heater is provided to heat the pressing member.
Image forming apparatus
An image forming apparatus includes a main body, a sheet stack unit, an endless intermediate transfer member, a first transfer member for transferring a toner image onto the sheets conveyed from the sheet stack unit, at a nip formed between the intermediate transfer member and the first transfer member, and a second transfer member. In addition, a first voltage applying device applies a voltage to the first transfer member, a second voltage applying device applies a voltage having an opposite polarity to the second transfer member, and a controller controls the first and second voltage applying devices. In a timing when a leading edge of a first sheet reaches the nip, a trailing edge of the first sheet contacts a second sheet conveyed on the sheet stack unit, and wherein a period in which the controller causes the first voltage applying device and the second voltage applying device to apply the voltages to the first transfer member and the second transfer member, respectively, is at least from a time when secondary transfer onto the first sheet is started to a time when the trailing edge of the first sheet stops sliding on the second sheet stacked on the sheet stack portion.
Image forming apparatus
The image forming apparatus detects a color deviation amount in a timing when a developing roller separates from or contacts a photosensitive drum to set a difference in peripheral velocities between the photosensitive drum and an intermediate transfer belt or a transfer material conveying belt based on the color deviation amount and information about the use degree of the intermediate transfer belt.
Image forming device capable of preventing erroneous attachment of cartridge
An image forming device includes: a main casing; a support member; cartridges; and cover members. The support member is movable between an accommodated position within the main casing and a pulled-out position outside the main casing, the support member being formed with cartridge accommodating sections. Each cartridge is accommodated in the corresponding cartridge accommodating section so as to be detachable from the corresponding cartridge accommodating section when the support member is located at the pulled-out position, the cartridges being of different types. Each cover member is movable between an opening posture and a closing posture. The cover members are provided in correspondence with the cartridge accommodating sections, respectively. Each cover member is provided with a preventing unit that prevents any cartridges of types different from a type corresponding to the corresponding cartridge accommodating section from being accommodated into the corresponding cartridge accommodating section.
Cycle slip reduction in coherent optical communications
Carrier phase estimation techniques are provided for processing a received optical signal having a carrier modulated according to a modulation scheme. First and second carrier phase estimation operations are performed on a digital signal derived from an optical carrier obtained from the received optical signal using coherent optical reception. The first carrier phase estimation operation tracks relatively fast phase variations of the optical carrier of the received optical signal to produce a first carrier phase estimation and the second carrier phase estimation operation tracks relatively slow phase variations of the optical carrier of the received optical signal to produce a second carrier phase estimation. A difference between the first and second carrier phase estimations is computed. Occurrence of a cycle slip is determined when the difference is greater than a threshold. A correction is applied to the first carrier phase estimation when the low pass filtered difference exceeds the threshold.
Information transmission system, information sending device, information receiving device, information transmission method, information sending method, information receiving method and program product
An information transmission system is constituted by: an information sending device including a light emitting section that emits light in a plurality of colors, a modulating section that modulates information to be transmitted into signals composed of changes in color, and a light emission control section that controls the light emitting section to emit light while changing color temporally based on the signals generated by the modulating section; and a receiving device including a camera that captures an image having color, and a control and communication section that detects a temporal color change of the light emitting section emitting light by light emission control by the information transmitting device, from images consecutively captured by the camera, decodes the detected color change into information, and outputs the generated information to a display section.
Optical transceiver device
An optical transceiver device includes a transmitter, a first and a second optical circulators and a receiver. The transmitter transmits a light signal uploaded with an electrical signal. The first and second optical circulators each include three ports. The second port of the second optical circulator is configured for transmitting the light signal circulated via the first and second ports of the first optical circulator and the first port of the second optical circulator, and the third port of the second optical circulator is configured for receiving an incoming light signal. The receiver receives the incoming light signal circulated back via the first port of the second optical circulator, and the second and third ports of the first optical circulator and converts the incoming light signal to be an electrical signal.
Optical communication device, method and system
Exemplary optical communication devices are described which, in certain embodiments, derive power optically from and communicate optically to a reading device. The communication devices may also receive data from modulated light from the reading device to achieve a bi-directional optical communication link between the self-powered optical communication device and the reading device. In some embodiments, the communication device is powered by ambient light, such as sunlight, captures data from a sensor, and communicates the stored data some time later to a reading device. In some embodiments, the communication device is powered locally and communicates through air, optical fiber, or other medium with another communication device.
LED light broad band over power line communication system
An LED light and communication system is in communication with a broadband over power line communications system. The LED light and communication system includes at least one optical transceiver. The optical transceiver includes a light support having a plurality of light emitting diodes and at least one photodetector attached thereto, and a processor. The processor is in communication with the light emitting diodes and the at least one photodetector. The processor is constructed and arranged to generate a communication signal.
Method and system for scheduling uplink message based on gigabit-capable passive optical network (GPON)
The present invention discloses a method and a system for scheduling an uplink message based on a Gigabit-capable Passive Optical Network (GPON). The method includes the following steps of: configuring a private managed entity for an 802.1p entity, and defining a mapping relationship between a priority queue and a priority of an uplink message in the private managed entity (S100); the 802.1p entity scheduling an uplink message from an optical network unit, mapping the uplink message to a corresponding GEM PORT, and creating a corresponding priority queue according to the mapping relationship between the priority queue and the priority of the uplink message defined in the private managed entity (S101). In the present invention, the uplink messages mapped to the GEM PORTs in the GPON system can be flexibly scheduled under the N:M bridge-mapping service model of the GPON system, and it is a beneficial extension to the existing mode for scheduling an uplink message based on the GPON system.
Dynamic hitless resizing in optical transport networks
The invention relates to techniques for controlling a dynamic hitless resizing in data transport networks. According to a method aspect of the invention, a network connection comprises M tributary slots defined in a payload area of a higher order transport scheme of the data transport network and the method comprises the steps of receiving a connection resize control signal at each of the nodes along the path of the network connection; adding at each node along the path in response to the connection resize control signal a second set of N tributary slots to the first set of the M tributary slots, such that the network connection comprises M+N tributary slots; and increasing, after M+N tributary slots are available for the network connection at each node along the path, a transport data rate of the network connection.
Optical packet switching system, optical packet switching device, and optical packet transmitter device
An optical packet switching device is provided with: a first input unit and a second input unit for receiving optical packet signals having destination information and information of a wavelength in use; an optical switch unit for routing the optical packet signals; a branching unit for branching the received optical packet signals; an analyzer unit for analyzing the header of the branched optical packet signals so as to detect the destination information and the information of the wavelength in use; and an output competition determination unit for checking for temporal competition of the optical packet signals based on the destination information and for determining whether the optical packet signals should be transmitted or discarded based on the information of the wavelength in use when there is competition.
Weighted waveforms for improved jam code effectiveness
Various embodiments of the present invention relate to weighted waveforms for improved jam code effectiveness. In various examples, weighted waveforms for improved jam code effectiveness may be implemented in the context of systems, methods, computer program products and/or algorithms.
Wavelength multiplexing optical transmission system, transmitter, and receiver
When a failure occurs in operational transmission multiplexing transponders 6-1 to 6-N, a wavelength multiplexing optical transmission system carries out selection switching control on N×1 optical switches 5-1 to 5-m and (N+1)×N optical switches 11-1 to 11-m to transmit a wavelength-multiplexed light signal by using reserve transmission and reception multiplexing transponders 6-R and 10-R, thereby sidestepping the failure.
Camera window assembly for electronic device
An electronic device may have a housing. A camera window assembly may be mounted in a hole within the housing. The housing may be formed from a structure such as a planar glass member. The hole in which the camera window assembly is formed may be circular. A mating circular trim member in the camera window assembly may be mounted in the hole. A flange structure on the trim member may help retain the trim member within the housing. A shelf portion of the trim member may receive a ring of adhesive. The camera window assembly may have a clear disk-shaped lens with planar opposing front and rear surfaces that is mounted on the shelf portion using the adhesive. An elastomeric ring may be compressed between sidewall portions of the trim member and the lens to help retain the lens within the camera window assembly.
Imaging apparatus with display and image display apparatus
A digital camera is provided with a vertically long camera body having an approximately rectangular solid shape. An LCD panel provided in a rear surface of the camera body is arranged such that longitudinal directions of the display screen and the camera body correspond to each other. The digital camera is operated through a touch panel provided in a lower portion of the display screen. In a taking mode, an image is displayed in a small size on an upper portion of the display screen. In reproducing, the camera body is rotated sideways by 90 degree. In a reproducing mode, display posture of the image is also rotated by 90 degree, and the image is displayed in a large size on the entire display screen.
3-D image pickup apparatus
A 3-D image pickup apparatus includes a lens portion that includes a lens system; and an adjustment ring portion that includes plural coaxially rotatable rings. Each ring adjusts a respective one of plural optical parameters of the lens system.
Photographic apparatus and method
A photographic flash attachment apparatus. The apparatus includes a sleeve configured to be fixed to a photographic flash, a ring configured to engage with the sleeve, and one or more attachment mechanisms coupled with the ring adapted to receive one or more photographic attachment elements. Upon attachment of one or more photographic attachment elements to the ring via the one or more attachment mechanisms, rotation of the ring provides rotation of the one or more photographic attachment elements relative to the photographic flash.
Randomly accessible visual information recording medium and recording method, and reproducing device and reproducing method
Access point pictures designated as randomly accessible positions are I pictures or P pictures. Information indicating the decoding sequence (I1, P1, B1, B2, B3, B4, P2, . . . ) of pictures functioning as access points and attribute information (picture_type) indicating whether a picture functions as an access point or is necessary for decoding of the access point following a given access point are recorded on the video information recording medium. Random access is possible even if the GOP interval is lengthened.
Image processing apparatus, processing method, and recording medium
The present invention comprises an input part for inputting image data, a receiving part for receiving production information relating to production transmitted from another apparatus, a recording part for recording the production information received by the receiving part and image data input by the input part, a detection part for detecting a recording position on a recording medium at an editing point of image data recorded by the recording part, and a transmission part for transmitting information of the recording position detected by the detection part, whereby identification information for identifying image data and voice data is recorded in a recording medium or a recording device, this relieving a burden on a photographer and an editor and facilitating extraction of image data and voice data.
Device and method for preventing unauthorized reproduction of content
A device for reproducing a content having at least one reproduction start time predetermined, includes: a non-real time receiver for receiving a content in non-real time; a scheduler for scheduling reception of a content whose delivery method is non-real time delivery by the non-real time receiver based on a current time and a reproduction start time of the content; a content storage section for storing at least one content received by the non-real time receiver; and a reproduction controller for inhibiting reproduction of a content stored in the content storage section before the reproduction start time of the content.
Apparatus and method for decoding data for providing browsable slide show, and data storage medium therefor
A decoding apparatus and method for producing a browsable slide show and a data storage medium therefor. The decoding apparatus having a mainstream decoder, which decodes mainstream packet data including image data to be reproduced in a browsable slide show; a sub-audio decoder, which decodes sub-audio packet data including audio data attached to the image data; a mainstream system time clock (STC) counter, which provides an STC sequence for controlling the decoding time of the mainstream packet data to the mainstream decoder; and a sub-audio STC counter, which provides an STC sequence for controlling the decoding time of the sub-audio packet data to the sub-audio decoder. Accordingly, it is possible to seamlessly reproduce sub-audio data even when a user selects a forward or reverse play in the middle of reproducing still image data with the sub-audio data attached thereto in a browsable slide show.
Creation of video bookmarks via scripted interactivity in advanced digital television
According to one embodiment of the invention, a method for creating and/or altering a video bookmark is described. The method comprises an operation of processing a request from a downloaded scripted object to create a video bookmark. The video bookmark may be information that is used for performing an action involving additional information related to the video content being played at a time of the request. Thereafter, the video bookmark is created based on the request.
Protection cap assembly for protecting optical fiber connector assembly
The disclosure relates to a protection cap assembly for protecting an optical fiber connector assembly. The optical fiber connector assembly includes a first shell and a second shell. The first shell includes a number of first lenses and the second shell includes a number of second lenses. The protection cap assembly includes a first protection cap and a second protection cap. The first protection cap is configured to sleeve over the first shell to enclose the first lenses. The second protection cap is configured to sleeve over the second shell to enclose the second lenses.
Integrated distribution enabling access apparatus
An apparatus with a housing with a splitter compartment and a splicer compartment, a multiple fiber adapter attached to a wall of the housing, a multiple fiber connector connected to the multiple fiber adapter, an optical splitter in the splitter compartment of the housing, an input fiber optically connected to the optical splitter, and a plurality of output fibers optically connected to the optical splitter and the multiple fiber connector.
Connector carrier for an optical fibre joint enclosure
An optical fiber joint enclosure includes a plurality of carriers for supporting a plurality of optical fiber connectors. At least one carrier is rotatable or pivotable between a first position and a second position, independent of an adjacent carrier. The first position is an in-use orientation of an optical fiber connector and the second position provides improved access to an end face of the optical fiber connector. The carrier itself includes a hub portion, engaging an adjacent hub portion of an adjacent carrier, an arm portion attached to the hub portion, the arm portion supporting the optical fiber connector, and a release member preventing the hub portion from rotating unless the release member is activated. A method includes inspecting, testing or cleaning an end face of the optical fiber connector in situ.
Splice enclosure arrangement for fiber optic cables
An optical fiber cable includes a first cable segment; a second cable segment; and a splice enclosure. The first cable segment can have a different configuration than the second cable segment. The splice enclosure is coupled to the strength member and strength component of the first cable segment and the second cable segment. One example splice enclosure includes a first enclosure member and a second enclosure member. The strength component can be glued to one end of the splice enclosure and the strength member can be clamped or otherwise retained by another end of the splice enclosure.
Integrated planar polymer waveguide for low-loss, low-crosstalk optical signal routing
The present invention provides a planar waveguide. In one embodiment, the planar waveguide includes first and third layers formed above a substrate and adjacent each other. The first and third layers are formed of a first material having a first index of refraction. The planar waveguide also includes a second layer formed between the first and third layers of a second material having a second index of refraction that is larger than the first index of refraction. The planar waveguide further includes a plurality of organo-functional siloxane based resin or polymer waveguides formed in the second layer. Each organo-functional siloxane based resin or polymer waveguide has an input on one edge of the second layer and an output on one edge of the second layer so that the input and output are on different line-of-sight paths. The plurality of organo-functional siloxane based resin or polymer waveguides is formed such that intersections of the plurality of organo-functional siloxane based resin or polymer waveguides occur at approximately right angles.
Dual-index optical pump stripper assembly
A light stripper assembly for dissipating a residual optical pump power carried by a pump light propagating in an optical fiber component is provided. The optical fiber component includes a pump cladding surrounded by an outer cladding, the outer cladding being removed from the optical fiber component along a lengthwise segment thereof. The light stripper assembly includes a pump stripper disposed about the lengthwise segment and a heat-dissipation packaging structure thermally contacting the pump stripper. The pump stripper includes an input guiding region and a stripping region having refractive indices lower and higher than the refractive index at the outermost periphery of the pump cladding, respectively, so that the pump light is at least partially guided inside the pump cladding along the input guiding region and stripped from the pump cladding along the stripping region. The heat-dissipation packaging structure absorbs and dissipates the residual power stripped by the stripping region.
Optical hybrid circuit, optical receiver, optical transceiver, and light receiving method
An optical hybrid circuit includes an MMI coupler including input channels provided at positions symmetrical first output channels, and second output channels, to convert multilevel modulation signal into first and second optical signals each having an in-phase relationship; first optical coupler coupled to one of the first and the second output channels, and having a branching ratio of 85:15 or 15:85, to convert the first optical signals into third optical signals having a 45- or 135-degree phase relationship; second optical coupler coupled to the other of the first and the second output channels, and having a same branching ratio as that of the first optical coupler, to convert the second optical signals into fourth optical signals having a 135- or 45-degree phase relationship; and a phase controlling region provided on at least one of one of the first output channels and one of the second output channels.
Small diameter radiation sensor cable
A duplex plastic optical fiber may be used to create a dual detector system, which allows for the detection of two distinct areas of radiation in a single sensor cable device. A fiber cap holds a scintillating fiber and slides over an exposed portion of an optical fiber adjacent to an end of the optical fiber to create a concentric connection for a radiation sensor cable used in medical radiation therapy.
System and method for storing and retrieving tiled image data
System for storing and retrieving tiled image data. System and method store a record in an image file for each tile at a zoom level, create a lookup table for the record, store a null value in the lookup table when there are no tile records at the row and the column of the lookup table, omit a row from the lookup table when there are no tile records in the table row, create an index file having a null value for each omitted rows, and retrieve an address for a specific tile by seeking the row associated with the record in the index file, reading a value, positioning the lookup table according to the index value if the value is non-null, seeking the column associated with the record, reading an address associated with the record, and retrieving the tile associated with the record at the address.
Operating a device to capture high dynamic range images
Some embodiments provide a method of operating a device to capture an image of a high dynamic range (HDR) scene. Upon the device entering an HDR mode, the method captures and stores multiple images at a first image exposure level. Upon receiving a command to capture the HDR scene, the method captures a first image at a second image exposure level. The method selects a second image from the captured plurality of images. The method composites the first and second images to produce a composite image that captures the HDR scene. In some embodiments, the method captures multiple images at multiple different exposure levels.
Method and apparatus for content adaptive sharpness enhancement
A method and apparatus are provided for adaptive sharpness enhancement of image data. In on embodiment, a method for sharpness enhancement includes receiving image data for a first frame, performing linear sharpening enhancement of the image data, performing non-linear sharpening enhancement of the image data, and generating blending parameters based on the image data. The blending parameters may be generated based upon image data of the first frame, linear sharpened image data for the first frame, and non-linear sharpened image data for the first frame. The method may further include blending the image data of the first frame, the linear sharpened image data, and the non-linear sharpened image data based upon the blending parameters.
Automatic image capture
A method of automatically capturing images with precision uses an intelligent mobile device having a camera loaded with an appropriate image capture application. When a user initializes the application, the camera starts taking images of the object. Each image is qualified to determine whether it is in focus and entirely within the field of view of the camera. Two or more qualified images are captured and stored for subsequent processing. The qualified images are aligned with each other by an appropriate perspective transformation so they each fill a common frame. Averaging of the aligned images reduces noise and a sharpening filter enhances edges, which produces a sharper image. The processed image is then converted into a two-level, black and white image, which may be presented to the user for approval prior to submission via wireless or WiFi to a remote location.
System and method for image denoising optimizing object curvature
A method for removing noise from an image includes receiving image data including a plurality of pixels. A graph including a plurality of nodes and a plurality of edges interconnecting the nodes is formulated. Each pixel of the image data is represented as a node of the graph and each edge of the graph is assigned a weight based on a penalty function applied to the nodes connected by the edge where the penalty function is less when a value of a given pixel of the plurality of pixels is between or equal to the values of two neighboring pixels than when the value of the given pixel is either greater than or less than the values of both of the two neighboring pixels. A total penalty of the graph is minimized. A denoised image is provided based on the total penalty-minimized graph.
Method and apparatus for encoding images and method and apparatus for decoding images
An apparatus for decoding an image includes an encoding information extractor which extracts split information indicating whether to split a coding unit of an upper depth into coding units of deeper depths and skip information indicating whether a prediction mode of a current coding unit is a skip mode, from image data and a decoding unit which determines a split structure of a maximum coding unit, according to the split information so that the maximum coding unit is hierarchically split as a depth increases and determines whether the prediction mode of the current coding unit is the skip mode according to the skip information.
Method, apparatus, and computer program product for compression and decompression of an image dataset
A method for compression and/or decompression of bio-medical images such as DNA sequencing images is provided. The method comprises regeneration of a complete image using multiple distribution functions generated on the fly. The compression ratio achieved is in the order of 10 to 20 times, and is near lossless with respect to the clinically relevant information; which makes it well suited for these DNA sequencing images.
Image processing device and method
The present invention relates to an image processing device and method enabling noise removal to be performed according to images and bit rates.A low-pass filter setting unit 93 sets, from filter coefficients stored in a built-in filter coefficient memory 94, a filter coefficient corresponding to intra prediction mode information and a quantization parameter. A neighboring image setting unit 81 uses the filter coefficient set by the low-pass filter setting unit 93 to subject neighboring pixel values of a current block from frame memory 72 to filtering processing. A prediction image generating unit 82 performs intra prediction using the neighboring pixel values subjected to filtering processing, from the neighboring image setting unit 81, and generates a prediction image. The present invention can be applied to an image encoding device which encodes with the H.264/AVC format, for example.
Memory reduction device of stereoscopic image display for compensating crosstalk
A memory reduction device of a stereoscopic image display includes a compression unit configured to receive first to fourth input data belonging to Gn and comprised of K1 bit, respectively, align the first to fourth input data in order of a data size to generate first to fourth alignment data, generate first to fourth compression data groups including first and second compression data having K2 bits smaller than K1 bits and third compression data having K3 bits smaller than K2 bits based on the first to fourth alignment data, derive an outlier from the first to fourth input data by using a deviation between the first to fourth alignment data, select any one of the first to fourth compression data groups, as the compressed Gn−1 according to the presence or absence of the outlier and an outlier derivation position.
For an image editing application, a tool in a graphical user interface (GUI) for making images appear grainy like older photographs is provided. The graininess effects tool blends a background grain image with a subject image. The visibility of graininess in the resulting final grainy image is controlled by the brightness in the subject image itself. The blending of the background grain image and the subject image includes (i) removing positive bias from the background grain image, (ii) performing multiplicative blending by multiplying the bias-removed background image with the subject image, and (iii) performing additive blending by adding the subject image with a weighted result of the multiplicative blending.
Method and system for presenting similar photos based on homographies
Methods, systems, and articles of manufacture for presenting similar images are disclosed. A method for presenting similar images on a display device is disclosed. The method includes displaying a first image on the display device; determining one or more homographic relationships between the first image and a plurality of images; identifying, using the determined one or more homographic relationships, at least one image having a scene and a perspective which are similar to that of the first image; and displaying the identified image. Corresponding system and computer readable media embodiments are also disclosed.
System and method for data identification and extraction of forms
A system and method are provided to identify and extract data from data forms by identifying data containment locations on the form, classifying the data containment locations to identify data containment locations of interest, and performing a match between recognition results and a predefined set of known labels or data formats to classify and return a data containment label, coordinates and the recognition value of interest.
Pattern shape determining method, pattern shape verifying method, and pattern correcting method
According to the pattern shape determining method of the embodiment, a first reference position of a pattern shape is set on a first pattern and a second reference position of a pattern shape is set on a second pattern. Moreover, an allowable dimensional difference between the first pattern and the second pattern is set to a value corresponding to a distance from the first reference position. Then, it is determined whether the second pattern has a pattern shape identical with the first pattern, based on whether a dimensional difference between the first pattern and the second pattern is within a range of an allowable dimensional difference set at a position at which the dimensional difference is calculated.
Method for marking graphical elements and method for detecting said marking in a graphical element
Method for marking graphical elements comprising the steps of selecting at least three coherent edge portions (6) of a graphical element (1), wherein the relative orientation of the coherent edge portions (6) is constant and/or smoothly varies along their entire length, the coherent edge portions (6) comprising at least two reference edge portions (66) and one edge portion to mark (67); defining a family of smooth and non-intersecting curves (65), said curves (65) intersecting all of the coherent edge portions (66, 67); shifting the edge portion to mark (67) along the curves (65) relative to the reference edge portions (66); and method for detecting a marking in a graphical element, comprising the steps of locating an encoding area (7) in a digital image of a graphical element (1); retrieving at least two reference edge portions (66) and at least one modified edge portion (68) of the encoding area (7) in the digital image; and determining the relative position of the modified edge portion (68) relative to the reference edge portions (66).
Computing device and method of determining border points for measuring images of objects
In a method of determining border points for measuring an image of an object using a computing device, grayscale values of pixel points in an image being measured are acquired, and definition values of the pixel points are computed according to the grayscale values. A line which intersects with the image being measured is constructed, and the definition values of the pixel point values in the lines are obtained. A location range of a border point of the image being measured is determined according to the definition values of the pixel point values in the line, and the border point is selected from the location range. A border line of the image being measured is fitted using the border points.
Face detection method and apparatus
Image fragments are formed in regions corresponding to circles searched from an input image. In a cascade of homogeneous classifiers, each classifier classifies input vectors corresponding to the image fragments into a face type and a non-face type. This procedure is performed on all images included in an image pyramid and the coordinates of a face detected based on the results of the procedures on all images.
Image processing apparatus configured to perform image processing for plural images and control method thereof
A writing unit writes first and second divided images on a frame memory. A reading unit adds an end portion included in the second divided image to the first divided image and reads the result as a first read image from the frame memory. Also, the read unit reads the second divided image as a second read image from the frame memory. An image processing unit performs image processing for the first and second read images read from the frame memory. A cutting unit cuts a second sub-end portion from the first read image after the image processing and outputs the result, and cuts a first sub-end portion from the second read image after the image processing and outputs the result.
Image processing apparatus and image processing method
An image processing apparatus for performing a white balance correction for RAW data obtained by an image capturing unit, includes a storage, operable to store a RAW file to which the RAW data and developed data obtained by performing a development processing to the RAW data are attached, and a corrector, operable to perform the white balance correction for the RAW data based on the developed data stored in the storage.
Method and system for determining colour from an image
Embodiments of the invention relate to the determination of the color of a color sample from an image of the color sample. In one embodiment a color sample capture card is provided having printed thereon color samples of known color (for example, XYZ tri-stimulus values). An image of the test color sample is then captured using domestically available equipment, such as a consumer digital camera or camera-equipped mobile telephone, the image also containing the color sample capture card. In one embodiment the image is then transmitted to a remote color determination service for color sample color determination. Regression analysis is then performed using the RGB color samples in the image and known XYZ colors thereof to characterize the color capture response of the image capture device. Having characterized the image capture device the XYZ color of the unknown color sample can be determined from the RGB color thereof in the image. Knowing the XYZ color, the color can then be matched to a palette of paint colors, to determine a paint color to match the unknown color.
Image data processing device, image forming apparatus, and recording medium
An image data processing device processes structured image data including background image data representing a background image, foreground image data representing a foreground image indicating a color and a gross shape, and mask data representing a mask image specifying a prescribed area of the foreground image to be overlaid on the background image. The image data processing device lightens a shade of the background image by applying background color lightening processing to the background data, and lightens a shade of the foreground image less than the shade of the background image by applying foreground color lightening processing to the foreground data.
Image processing apparatus and profile generation method
When a grid point that is the object to be mapped is present in a first division region a color of which has lightness equal to or higher than the lightness at the maximum chroma point in the color gamut and has chroma higher than the chroma at that point, the intersection of a straight line connecting the grid point to the maximum chroma point and an achromatic axis is calculated and a point having lightness equal to or higher than the lightness of the intersection is set as the focal color. Then, the intersection of a straight line connecting the object grid point to the focal color and the boundary of color gamut is set as an output color for the grid point. The output colors are prevented from being separated into color on the high and on the low lightness sides with respect to the maximum chroma point.
Automated machine-learning classification using feature scaling
Provided are systems, methods and techniques for machine-learning classification. In one representative embodiment, an item having values for a plurality of different features in a feature set is obtained, together with scores for the different features. The score for a given feature is a measure of prediction ability for that feature and was calculated as a function of a plurality of different occurrence metrics of the feature. The values for the features are scaled according to the scores for the features, and the item is classified by inputting the adjusted feature set values for the item into a previously trained classifier.
Image and data segmentation
Approaches to segmentation or detection of objects and their boundaries in images (or other data sets) do not rely on machine learning approaches that aim to minimize pixel-level agreement between a computer and a human. Optimizing such pixel-level agreement does not, in general, provide the best possible result if boundary detection is a means to the ultimate goal of image segmentation, rather than an end in itself. In some examples, end-to-end learning of image segmentation specifically targets boundary errors with topological consequences, but otherwise does not require the computer to “slavishly” imitate human placement of boundaries. In some examples, this is accomplished by modifying a standard learning procedure such that human boundary tracings are allowed to change during learning, except at locations critical to preserving topology.
Method for 3D object identification and pose detection using phase congruency and fractal analysis
Method for identifying objects within a three-dimensional point cloud data set. The method includes a fractal analysis (108) on a data set where the data set is comprised of data points (404) having positions distributed in three-dimensions. The fractal analysis facilitates identification of one or more object classes. The object class specifies a category of physical object. A phase congruency analysis (112) is then performed on the data set based on the object class identified by the fractal analysis. The phase congruency analysis is advantageously performed on an interpolated, noise reduced version of the data set (which can be obtained prior to performing the phase congruency analysis). Upon completion of the phase congruency analysis, a further object identifying step is performed based on the phase congruency analysis.
Three dimensional model method based on combination of ground based images and images taken from above
A three dimensional model method based on combination of ground based images and images taken from above. An existing 3D model based on images taken from above is matched with images taken from ground level. All images including information about position and attitudes of the camera when the images from ground level and the images taken from above were taken and direction of each pixel. The method offers an automatically carried out imaging solving or at least mitigating occlusion problems.
Image processing apparatus, image processing method, and program
Provided is an image processing apparatus including an image input unit configured to receive at least one of a first left eye image and a first right eye image photographed from different viewpoints and applicable to stereoscopic vision, and a stereoscopic image generation processing unit configured to receive one of the first left eye image and the first right eye image and generate a second left eye image and a second right eye image applicable to the stereoscopic vision through an image conversion process. Among the first left eye image and the first right eye image input to the image input unit and the second left eye image and the second right eye image generated by the stereoscopic image generation processing unit, two images are output as images to be applied to the stereoscopic vision.
Image processing apparatus and method
An image processing apparatus is provided. A silhouette extractor may extract a silhouette image of a target object from an input depth image. A first calculator may determine a location of at least one limb of the target object and a location of at least one joint connecting the at least one limb by applying a rectangle fitting algorithm with respect to the silhouette image.
System and method for inspecting a wafer
A method for inspecting a wafer. The method comprises a training process for creating reference images. The training process comprises capturing a number of images of a first wafer of unknown quality, each of the number of images of the first wafer being captured at a predetermined contrast illumination and each of the number of images of the first wafer comprising a plurality of pixels. The training process also comprises determining a plurality of reference intensities for each of the plurality of pixels of each of the number of images of the first wafer, calculating a plurality of statistical parameters for the plurality of reference intensities of each of the plurality of pixels of each of the number of images of the first wafer, and selecting a plurality of reference images from the plurality of images of the first wafer based on the calculated plurality of statistical parameters. The method for inspecting the wafer further comprises capturing an image of a second wafer, the second wafer being of an unknown quality, selecting a first reference image from the plurality of reference images, and comparing the captured image of the second wafer with the first reference image to thereby determine at least one of presence and type of defect on the second wafer.
Mask pattern and correcting method thereof
A mask pattern and a correcting method thereof are provided. The correcting method includes the following steps. An original pattern having a first original contour and a second original contour is provided. The first original contour has a first original corner. The second original contour has a second original corner, which is near the first original corner. The first and second original corners are cut to form a cut pattern. An optical proximity correction (OPC) process is applied to the cut pattern to form the mask pattern.
System and method for automatically measuring the dimensions of and identifying the type of exterior siding
Methods, systems, and computer readable media are disclosed for determining a pixel-to-length ratio between a number of pixels disposed over a predetermined length of a reference object within an image of a siding sample and the predetermined length of the reference object. A first and second distance between respective first and second pairs of points within the image corresponding to respective first and second length measurements of the siding sample are determined, as well as a first and second number of pixels disposed between the first and second pair of points, respectively. Furthermore, the method, system, and computer readable medium disclose determining the first length measurement based on the pixel-to-length ratio and the first number of pixels, determining the second length measurement based on the pixel-to-length ratio and the second number of pixels, and identifying a siding product associated with the first and second length measurements.
Method of, and apparatus and computer software for, implementing image analysis protocols
A computer-based method for the development of an image analysis protocol for analyzing image data, the image data containing images including image objects, in particular biological image objects such as biological cells. The image analysis protocol, once developed, is operable in an image analysis software system to report on one or more measurements conducted on selected ones of the image objects. The development process includes defining target identification settings to identify at least two different target sets of image objects, defining target identification settings to identify at least two different target sets of image objects, and defining one or more measurements to be performed using said pair-wise linking relationship(s).
Systems and methods for X-ray imaging
An energy-sensitive system includes one or more processors configured to determine spectral attenuation curves for a first basis material and a second basis material, respectively. The one or more processors are configured to substitute a k-edge feature in the determined spectral attenuation curves with an approximation of the determined spectral attenuation curves lacking the k-edge feature. The one or more processors are also configured to construct a material decomposition model based on one of the determined or approximated first and second spectral attenuation curves. The one or more processors are additionally configured to decompose X-ray projection data into basis material projection data comprising first and second line integrals based, at least in part, on the model.
Emission computed tomography for guidance of sampling and therapeutic delivery
Treatment for a variety of diseases often requires guidance for the delivery of either a drug or radiation to the disease site. Positron Emission Tomography (PET) can provide three dimensional positioning of the location of positron emitting radioisotopes that can mark a disease site. However, the inversion of the raw emission projection data into a 3D volume is computationally intensive, and this results in a low update or frame rate. In order to be useful in either guiding a surgeon, or some other automated feedback approach, the update/frame rate must be of sufficient speed that the user can effectively control the process. This approach provides a substantial improvement to the frame rate by taking advantage of iterative reconstruction methodologies to shortcut the reconstruction process.
Alignment of positron emission tomographs by virtual tomographs
Positron emission tomography, possibly in combination with computed tomography, allows in addition to medical diagnostic imaging the quantitative determination of various parameters. Quantitative measurements using tomographs exhibit a severe and unavoidable dependency on the imaging properties of the respective tomograph, which makes quantitative assessment of the results difficult. This relates particularly to multicentric medical studies, which obligatorily require quantitative comparability of the data measured by the participating centers. The methods claimed herein include the definition of a virtual tomograph with defined imaging properties. The claimed methods also cover determination of the imaging properties of different tomographs on the basis of suitable reference measurements and possibly by using a calibration phantom. Based on the definition of the virtual tomograph and the determination of the imaging properties of different tomographs, the methods according to the invention then allow conversion and subsequently standardized and quantitatively comparable representation of the image data recorded by the different tomographs or systems as if all measurements were acquired equally by the virtual system. The method according to the invention therefore supports the quantitative evaluation of image data in multicentric studies.
Method and system for plaque characterization
A method of quantifying plaques imaged by cardiac computed tomography angiography (“CCTA”) scan data. Calcified and non-calcified component thresholds are determined based at least in part on attenuation values of a pool of blood in the CCTA scan data. An epicardial fat threshold is determined and used to classify epicardial fat in the CCTA scan data. A portion of CCTA scan data positioned between a detected outer boundary of the coronary artery and a portion classified as lumen is classified as arterial wall. NCP and CP seeds are identified in the arterial wall portion. Portions of the CCTA scan data continuous with a NCP seed and having attenuation values greater than an artery wall value and less than the NCP threshold are classified as NCP, and portions of the CCTA scan data continuous with the CP seed and having attenuation values greater than the CP threshold are classified as CP.
Interpolation free fan-to-parallel beam re-binning
A fan-to-parallel beam re-binner includes a time deflection determiner that determines time deflections for a plurality of integration periods for different detector pixels of an imaging system, a data shifter that shifts fan beam data acquired for the integration periods by the system by time offsets corresponding to the time deflections; and a data re-sorter that parallelizes the data.
Fingerprint authentication device and computer readable medium
A fingerprint authentication device includes: a fingerprint acquisition section that acquires fingerprint image data; a fingerprint image correction processing section that corrects a pixel value by using a correction coefficient for making a first pixel value of the brightest pixel in a group of pixels at which an integrated value of a number of pixels at a dark portion side in a histogram becomes a predetermined proportion with respect to an integrated value of a number of all pixels, be a brighter second pixel value; a spectral data generation section that generates a spectral data matrix including directions of ridges of a fingerprint and a frequency of the fingerprint; a registered spectral data matrix archive section that archives a registered spectral data matrix; a fingerprint verification section that verifies the spectral data matrix and the registered spectral data matrix; and an authentication results output section that outputs results of authentication.
Motion analysis through geometry correction and warping
An object in a hot atmosphere with a temperature greater than 400 F in a gas turbine moves in a 3D space. The movement may include a vibrational movement. The movement includes a rotational movement about an axis and a translational movement along the axis. Images of the object are recorded with a camera, which may be a high-speed camera. The object is provided with a pattern that is tracked in images. Warpings of sub-patches in a reference image of the object are determined to form standard format warped areas. The warpings are applied piece-wise to areas in following images to create corrected images. Standard tracking such as SSD tracking is applied to the piece-wise corrected images to determine a movement of the object. The image correction and object tracking are performed by a processor.
Real time eye tracking for human computer interaction
A gaze direction determining system and method is provided. A two-camera system may detect the face from a fixed, wide-angle camera, estimates a rough location for the eye region using an eye detector based on topographic features, and directs another active pan-tilt-zoom camera to focus in on this eye region. A eye gaze estimation approach employs point-of-regard (PoG) tracking on a large viewing screen. To allow for greater head pose freedom, a calibration approach is provided to find the 3D eyeball location, eyeball radius, and fovea position. Both the iris center and iris contour points are mapped to the eyeball sphere (creating a 3D iris disk) to get the optical axis; then the fovea rotated accordingly and the final, visual axis gaze direction computed.
Scene determination and prediction
A system and method for scene determination is disclosed. The system comprises a communication interface, an object detector, a temporal pattern module and a scene determination module. The communication interface receives a video including at least one frame. The at least one frame includes information describing a scene. The object detector detects a presence of an object in the at least one frame and generates at least one detection result based at least in part on the detection. The temporal pattern module generates a temporal pattern associated with the object based at least in part on the at least one detection result. The scene determination module determines a type of the scene based at least in part on the temporal pattern.
Robust video stabilization
Methods and apparatus for robust video stabilization. A video stabilization technique applies a feature tracking technique to an input video sequence to generate feature trajectories. The technique applies a video partitioning technique to segment the input video sequence into factorization windows and transition windows. The technique smoothes the trajectories in each of the windows, in sequence. For factorization windows, a subspace-based optimization technique may be used. For transition windows, a direct track optimization technique that uses a similarity motion model may be used. The technique then determines and applies warping models to the frames in the video sequence. In at least some embodiments, the warping models may include a content-preserving warping model, a homography model, a similarity transform model, and a whole-frame translation model. The warped frames may then be cropped according to a cropping technique.
Visual tracking system and method thereof
The present invention provides a visual tracking system and its method comprising: a sensor unit, for capturing monitored scenes continuously; an image processor unit, for detecting when a target enters into a monitored scene, and extracting its characteristics to establish at least one model, and calculating the matching scores of the models; a hybrid tracking algorithm unit, for combining the matching scores to produce optimal matching results; a visual probability data association filter, for receiving the optimal matching results to eliminate the interference and output a tracking signal; an active moving platform, for driving the platform according to the tracking signal to situate the target at the center of the image. Therefore, the visual tracking system of the present invention can help a security camera system to record the target in details and maximize the visual information of the intruding target.
Imaged image data processing apparatus, viewing information creating apparatus, viewing information creating system, imaged image data processing method and viewing information creating method
An imaged image data processing apparatus includes obtaining means for obtaining imaged image data, which is imaged by an imaging section that images the sight of a user, extracting means for extracting identification data for identifying a viewed program from the imaged image data obtained by the obtaining means, and transmitting means for transmitting the identification data extracted by the extracting means to an external viewing information creating apparatus.
Method and device for early non-invasive diagnosis of fruit tree disease
The present invention relates to a non-invasive early diagnostic method and device that allows an early diagnosis of Marssonina blotch disease, which infects apple tree leaves, before the occurrence of lesions to enable early prevention of apple Marssonina blotch disease. The method and device of the present invention comprise the following steps: irradiating a broadband light source on an apple tree leaf undergoing diagnosis by means of optical coherence tomography; detecting interference signals from light reflected from the apple tree leaf undergoing diagnosis and light reflected from a reference arm; signal processing the interference signals, which have been detected through optical coherence tomography by means of a signal processing unit; obtaining digital tomographic image data on the apple tree leaf undergoing diagnosis; analyzing the digital tomographic image by means of a diagnostic unit; and observing the boundary of at least two tissues, wherein the apple tree leaf undergoing diagnosis is considered to be healthy and uninfected with Marssonina blotch disease if the boundary between at least two tissues is clearly defined, and wherein the apple tree leaf undergoing diagnosis is considered to be infected with Marssonina blotch disease if the boundary between at least two tissues is not clearly defined.
A loudspeaker is disclosed, comprising a driven body and a suspension for providing a restoring force to the driven body, the suspension having a cup geometry wherein its attachment point on the fixed portion of the loudspeaker is displaced along the axis of motion relative to its attachment point on the driven body and comprising a first concentric region that is extendible to allow reciprocating axial movement of the driven body, a second concentric region which extends transversely from the first region toward one of the attachment points, and a circumferential member affixed to the suspension at a location between the first and second concentric regions, the circumferential member being relatively stiff compared to the material forming the first and second concentric regions.
Portable electronic device
A portable electronic device includes a cabinet and a speaker. The cabinet has a rear portion, a side wall connected to the rear portion, and an acoustic hole disposed on the side wall. The speaker is disposed in the cabinet, and has a loudspeaker membrane extending along a plane located between the acoustic hole and the rear portion. Thus, the sound quality of the portable electronic device is improved, and the thickness thereof is decreased.
Included are a loudspeaker unit for generating sound waves, a sound conduit tube connected to the loudspeaker unit, and an ear tip connected to the sound conduit tube and having a shape having at least one opening. The sound conduit tube has a shape having: a sound hole having a first opening through which the sound waves generated by the loudspeaker unit enter, and a second opening from which the sound waves are released and to which the ear tip is connected; and a vent hole formed independently of the sound hole, and having a third opening through which a portion of the sound waves released from the second opening enters and a fourth opening from which the portion of the sound waves is released. The second opening of the sound hole and the third opening of the vent hole are connected to an identical opening of the ear tip.
Hearing aid with mechanical sound generating means for function selection
A hearing aid (1) comprises a housing, two microphones (3, 4), signal processing means provided with user selectable settings, and a receiver. The housing is provided with mechanical sound generating means (5, 11). The sound generating means is capable of providing a specific sound when manipulated by a hearing aid user. The sound generating means is arranged such that the two signals (25), obtained from the specific sound being recorded by the two different microphones (3, 4) will have a negative correlation, making said specific sound identifiable by said signal processing means. The signal processing means are arranged for selecting a specific setting dependent on one or more sounds generated by the sound generating means (5, 11). The invention further provides a method for selecting a setting of a hearing aid.
An object of the present invention is to provide a loudspeaker device which has a high moisture resistance and can further widens an audio range of low-frequency range sounds. To achieve the above object, a closed box loudspeaker device of the present invention includes a loudspeaker unit which is attached to an opening in a box and activated carbon fiber which is provided in the box to adsorb gas. The activated carbon fiber has plural pores, which are exposed on a surface of the activated carbon fiber and have a diameter of 2.0 nm or less, and a volume of the pores having the diameter of 2.0 nm or less occupies 60% or more of a volume of the entire pores, so that the loudspeaker device which simultaneously achieves both an enhancement of the moisture resistance and the widening of the audio range of the low-frequency range sounds can be provided.
Display with wave generators
In one embodiment, a kit for making a display includes a first medium, a support element, and first and second wave generators. The first medium is foldable according to scoring to form a display with a cavity. The element is attachable or attached to a back surface of the folded first medium, to be positioned at least partially within the cavity. The first wave generator is attachable or attached to the back surface, to receive signals from a signal generator and produce mechanical waves that cause the first medium to vibrate and generate audible acoustic waves within a first frequency range. The second wave generator is attachable or attached to the element, to receive signals from the signal generator and produce mechanical waves that cause the element to vibrate and generate audible acoustic waves within a second frequency range, different from the first frequency range.
Semi-permanent hearing aid
A semi-permanent hearing device is adapted to be inserted completely into the ear canal of a user. The semi-permanent hearing device comprises a first part and a second part each of which comprises at least one of the following electrical components: a microphone, a sound processing unit, a receiver and a battery. The first part and the second part are detachably connected to each other. In an alternative aspect of the invention, a hearing device comprises a microphone and a wax filter arrangement arranged to cover at least one audio canal through which sound propagates from a position outside the hearing aid and into the microphone. The wax filter arrangement comprises a wax filter and the wax filter arrangement is adapted to allow different parts of the wax filter to cover the at least one audio canal at different points in time.
System for establishing a conversation group among a number of hearing aids
A system for establishing within a communication network a conversation group between a number of hearing aids (1, 2; 3, 4, 5) used by different users, comprises a number of hearing aids (1, 2, 3, 4, 5) adapted for wireless communication, means for detecting hearing aids (1, 2, 3, 4, 5) available for participation in the communication network, means for selecting hearing aids for participation (1, 2, 3, 4, 5) in said network, and a shared wireless communication unit (10) adapted for transmitting to and from the hearing aids (1, 2; 3, 4, 5) participating in said communication network. The invention further provides a method for establishing a conversation group.
Hearing aid with integrated flexible display and touch sensor
A user interface incorporated onto a hearing aid includes flexible hybrid component integrating a touch sensor into a bendable display. The touch sensor, such as a capacitive sensor, includes one or more sensor elements allowing a user to control operation of the hearing aid by touching. The bendable display presents information related to the operation of the hearing aid to the user.
High directivity boundary microphone
A high directivity boundary microphone (10) is disclosed, build up of a normal unidirectional microphone element (12) with cardioid-directivity behavior. The microphone element (12) is placed on a holder plate (14), with a membrane (16) of the microphone element (12) facing a plane (18) where a holder (20), comprising the holder plate (14) and a holder feet (22), is placed upon. The holder (20) ensures that the microphone element (12) is aligned at an angle (24) of preferably 35° respective to the plane (18). In this position, the microphone element (12) can detect direct sound (26) in a defined speech area (28A, 28B) as well as delayed sound (30) that is reflected at the plane (18) beneath the microphone element (12). Outside the defined speech area (28A, 28B) the sensitivity is strongly reduced.
Method, medium, and system decoding compressed multi-channel signals into 2-channel binaural signals
A decoding method, medium, and system decoding an input compressed multi-channel signal, as a mono or stereo signal, into 2-channel binaural signals. Channel signals making up the multi-channel signals may be reconstructed from the input compressed signal in the quadrature mirror filter (QMF) domain, and head related transfer functions (HRTFs) for localizing channel signals in the frequency domain, represented as values in the time domain, may be transformed into spatial parameters in the QMF domain. Accordingly, channel signals may be localized in the QMF domain in directions corresponding to the channels, thereby decoding the input compressed signal as 2-channel binaural signals.
Portable device that performs an action in response to magnitude of force, method of operating the portable device, and computer program
A portable device having a user input consisting of a single touch sensitive area is disclosed. The user input is arranged to output a signal responsive to force applied to the touch sensitive area. The device further has a controller arranged to discriminate one of a plurality of levels of said signal for provision of a corresponding control signal. The control signal can be used for controlling operation of the portable device. A method of operating the portable device, and a computer program for implementing the method are also disclosed.
A hands-free conversation vehicular apparatus coupling with a communication terminal includes: a communication device; a sound output device; a sound input device inputting a transmission speech sound; a vehicle information acquisition device; a first sound extraction device setting a first direction for a directionality of the sound input device, and extracting a first sound along the first direction; a sound recognition device; a second sound extraction device specifying a second direction for the transmission speech sound recognized by the sound recognition device, and extracting a second sound along the second direction; a sound quality comparison unit comparing a sound quality of the first and second sounds; a changeover device for selecting one of the first and second sounds as the transmission speed sound; and a control device for allowing the changeover device to perform a changeover when a determination condition is fulfilled.
Variable noise masking during periods of substantial silence
Methods and systems for masking audio noise are disclosed. One apparatus includes a silence detector configured to detect a period of substantial silence in an audio signal; a masking noise source operably coupled to the silence detector, the masking noise source configured to generate a noise signal in response to the silence detector detecting the period of substantial silence; and at least one combining device operably coupled to the masking noise source, the at least one combining device configured to contribute to combining the audio signal and the noise signal. A method includes detecting a period of substantial silence in an audio signal; and combining masking noise with the audio signal during the period of substantial silence.
A sound generator is provided capable of generating vehicle sound that will be produced when a specific sound element is changed out of a plurality of sound elements arising from the operation of a plurality of components mounted on a vehicle. A sound generator 1 includes: existent sound acquisition means 2 that acquires sound pressure data of vehicle sound produced from a vehicle; existent component-based sound calculation means 4 that calculates existent component-based sound caused by an existent component out of the vehicle sound; existent component-based sound cancel means 3 that calculates existent component canceled sound obtained by canceling the existent component-based sound from the vehicle sound; new component-based sound calculation means 5 that calculates new component-based sound caused by changing of the existent component-based sound; synthesized sound generation means 6 that synthesizes the existent component canceled sound and the new component-based sound to generate a sound pressure waveform of synthesized vehicle sound; and synthesized sound production means 7 that produces sound based on the sound pressure waveform of the synthesized vehicle sound.
Device, system and method for measurement of media consumption in digital media terminals
A device, system and method for enabling the measuring of audiences to media consumed through the use of digital media terminals. An example disclosed herein includes a loop-back device that allows the production/extraction of content identification information from media items rendered by a digital media terminal that can be seamlessly and homogenously implemented in a wide variety of media distribution platforms and devices, including Internet and mobile networks.
Implantable medical device
An implantable device having an impact side likely to receive forces applied to the device is disclosed, the device comprising: a hermetically-sealed container including, a chassis having secure thereto at least one functional component, a first shell hermetically connected to the chassis to form a hermetic enclosure in which the at least one functional component is located, at least on feedthrough disposed in one or more of either the chassis and the first shell, configured to permit at least one input/output line to infiltrate the hermetic enclosure; and a second shell connected to the container so as to be spaced from and adjacent to the container to define the impact side of the device and to form with the container a non-hermetic enclosure.
One-time recovery credentials for encrypted data access
A key recovery request for a device is received at a key recovery service and a particular one-time recovery credential in a sequence of multiple one-time recovery credentials is identified. In the sequence of multiple one-time recovery credentials, previous one-time recovery credentials in the sequence are indeterminable given subsequent one-time recovery credentials in the sequence. A recovery key associated with the device is also identified. The particular one-time recovery credential in the sequence is generated based on the recovery key, and is returned in response to the key recovery request. The particular one-time recovery credential can then be used by the device to decrypt encrypted data stored on a storage media of the device.
Secure peer-to-peer distribution of an updatable keyring
A distributed peer-to-peer document archive system provides version-control, security, access control, linking among stored documents and remote access to documents usually associated with centralized storage systems while still providing the simplicity, personalization and robustness to network outages associated with personal and peer-to-peer storage systems. A “keyring” is an encrypted repository that allows a user to recover and access a user's entire digital archive with a single master key. After the key is created, it does not need to be updated, and can be stored in a safe, safety-deposit box or other secure location. In the event the user's computer is stolen or destroyed, the user need only install the system on a new machine and import the master key. The system will then use that key to browse nearby servers to find and decrypt all files necessary to recreate the full digital archive in its most recent state.
Managing user access in a communications network
A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The method comprises receiving from a home network a first session key and a temporary identifier allocated to the user for the duration of a communication session. The identifier is mapped to the first session key, and the mapped identifier and key are stored at the node. A second session key is derived from the first session key and the second session key is sent to an access network, and the identifier sent to a user terminal. When the user subsequently moves to a second access network, the node receives the identifier from the user terminal. The node then retrieves the first session key mapped to the received identifier, derives a third session key and sends the third session key to the second access network.
System and method for enabling a host device to securely connect to a peripheral device
Systems and methods to enable a new host device to wirelessly connect to a peripheral device without having to execute a secure pairing process. The method includes storing encryption and connection information for the peripheral device along with information identifying the peripheral device at a server. The new host device is then provided with the information identifying the peripheral device. The new host then uses the information identifying the peripheral device to obtain the encryption and connection information from the server. The new host can then use the encryption and connection information to connect and communicate with the peripheral device. The methods and systems described herein may be used, for example, to loan a peripheral device to the new host device, or to transfer the peripheral device to the new host device.
Fuzzy protection of visual content
A method and system for encoding visual information are described. An image is divided in to n number of patterns. Each pattern is mapped on a matrix i.e positioned on X and Y-axis. The patterns are then arranged in a different and new shape for e.g. a rectangle, to that of the original shape of the image but having the same number of patterns or same area. The patterns of pixels are then relocated in the new shape and a matrix is again mapped for the new arrangement of patterns. A key is then generated comprising the information of the encrypted and earlier image. In order to decrypt the encrypted visual content or the encrypted image, the player reads the key or encrypted visual content and decrypts the encrypted visual content or image by means of the information provided by the key.
Fuse attestation to secure the provisioning of secret keys during integrated circuit manufacturing
Embodiments of an invention for fuse attestation to secure the provisioning of secret keys during integrated circuit manufacturing are disclosed. In one embodiment, an apparatus includes a storage location, a physically unclonable function (PUF) circuit, a PUF key generator, an encryption unit, and a plurality of fuses. The storage location is to store a configuration fuse value. The PUF circuit is to provide a PUF value. The PUF key generator is to generate a PUF key based on the PUF value. The encryption unit is to encrypt the configuration fuse value using the PUF key. The PUF key and the configuration fuse value are to be provided to a key server. The key server is to determine that the configuration fuse value indicates that the apparatus is a production component, and, in response, provide a fuse key to be stored in the plurality of fuses.
Authentication of data streams
The present document relates to techniques for authentication of data streams. Specifically, the present document relates to the insertion of identifiers into a data stream, such as a Dolby Pulse, AAC or HE AAC bitstream, and the authentication and verification of the data stream based on such identifiers. A method and system for encoding a data stream comprising a plurality of data frames is described. The method comprises the step of generating a cryptographic value of a number N of successive data frames and configuration information, wherein the configuration information comprises information for rendering the data stream. The method then inserts the cryptographic value into the data stream subsequent to the N successive data frames.
Feedback impedance control for driving a signal
A system for driving a first signal onto a wireline includes a driver and feedback circuitry. The driver drives a deterministic signal onto the wireline with an unknown impedance load. The feedback circuitry measures a quality of the output signal from the wireline and modifies a signal strength of the first signal based on the quality of the output signal. The driver then drives the first signal onto the wireline with the modified signal strength.
Dynamic customer satisfaction routing
Embodiments of the present invention provide a robust customer service environment employing “Key Performance Indicators” (KPIs), which represent both customer interaction experiences and also the overall efficacy of agent performance on an interaction-by-interaction basis. A KPI can be any metric for measuring a category of information related to a call center interaction, e.g., customer satisfaction or agent ability/performance. Input from customer experiences is catalogued and linked to one or more KPIs. Key performance indicators are associated with a key performance indicator template, which is linked with a project comprising routing rules, triggers, and specific actions that are driven as a result of the key performance indicator template. The project may be a phone/IVR project, Web CallBack project, email project, or a Chat project. Execution of the key performance indicator template triggers pre-, during, and/or post-call, -chat, -CallBack, or -email input from a call center user.
Techniques for bypassing call screening in a call messaging system
Techniques for bypassing call screening in a call messaging system. In one embodiment, for example, a method performed by one or more computing devices comprises: receiving an incoming call from a device of a caller; determining whether a bypass condition exists for the incoming call; and in response to determining that the bypass condition exists, causing the incoming call to be connected to a device of a callee without performing a call screening action of a call screening rule that, based at least in part on one or more conditions of the call screening rule, applies to the incoming call.
Method for carrying out an audio conference, audio conference device, and method for switching between encoders
A method and an audio conference device for carrying out an audio conference are disclosed, whereby classification information associated with a respective audio date flow is recorded for supplied audio data flows. According to a result of an evaluation of the classification information, the audio data flows are associated with at least three groups which are homogeneous with regard to the results. The individual audio data flows are processed uniformly in each group in terms of the signals thereof, and said audio data flows processed in this way are superimposed in order to form audio conference data flows to be transmitted to the communication terminals.
Parental notification of prohibited activities
Methods, systems, and products notify parents of child activities. A child's device stores rules that prohibit certain activities. When the child's device attempts a prohibited activity, a message is sent to a notification address associated with the parent. The message, for example, may be sent to the parent's cell phone. The instant message describes the prohibited activity.
Method and apparatus for providing virtual messaging
A method and apparatus of providing virtual messaging is provided. The method comprises examining status information associated with a plurality of servers for notifying call recipients of messages using at least one messaging protocol, wherein each of the plurality of servers operates independently, identifying an available server of the plurality of servers, based on the status information, for handling a message and directing an incoming call to the available server, wherein the available server stores the message until communication of the message to at least one call recipient, wherein the available server communicates at least one notification message associated with the message to at least one telephone number of the at least one call recipient, wherein the at least one notification message comprises a telephone number associated with the call origination device and a message link number for communicating with the available server.
Providing of presence information to a telephony services system
In support of an interactive telephony services system, a presence gateway provides presence information regarding availability of a called party to communicate using an instant communications client.
Systems and methods for presenting end to end calls and associated information
Systems and methods that, among other things, analyze and monitor the performance of a call center including performance of the interactive voice response (IVR) systems, call center agents, and other components of the call center. The systems and methods record characteristics of the call such as the audio data, and analyze that record to identify the events and the actions that take place during the call. A call center administrator may also identify a set of metrics, such as the number of dropped calls that occur during a day that may be monitored by the systems described herein. The data collected about these events and the resulting metrics may be stored in a database and provided to a call center administrator through a user interface that allows the administrator to browse through the collected metric and recorded call data and directly review relevant portions of a call.
Extended efficient usage of emergency services keys
An emergency services key (e.g., ESQK or ESRK) is guaranteed to be available from a limited size ESQK pool. A plurality of ESQKs are grouped into a pool of emergency service keys “ESQK Pool ID”, each including anywhere from 1 to N number of ESQKs. Each ESQK preferably has a “Timestamp”, information relating to the specific emergency E911 call (“Call Data ID”), a guard timer, and an optional hold timer. The ESQK having a Call Data ID=“NULL”, and having the oldest Timestamp, is chosen for selection. If no such ESQK has both Call Data ID=NULL and the oldest Timestamp is found, then the ESQK with merely the oldest Timestamp is selected. The timestamp is reset to a current time plus a guard timer, or hold timer if desired.
Shift register and row-scan driving circuit
The present invention discloses a shift register and a row-scan driving circuit including the same, the shift register comprising a first thin film transistor, a second thin film transistor used as an evaluating transistor, a third thin film transistor, a fourth thin film transistor used as a resetting transistor, a first capacitor and a reset voltage controlling unit, wherein the reset voltage controlling unit is used to control the gate voltage of the fourth thin film transistor, so that the gate voltage of the fourth thin film transistor is pulled down to a low level corresponding to a voltage input from a low voltage signal input when a signal input from a first clock signal input is at low level, a signal input from a second clock signal input is at high level and a signal input from a signal input is at high level.
Fuel rods having irradiation target end pieces
Example embodiments are directed to a fuel rod having end pieces on either end containing irradiation targets. Example embodiment end pieces may contain materials that may be converted to desired isotopes when exposed to neutron flux encountered at the end piece position. Example embodiment end pieces may be fabricated from the materials or may otherwise house the materials. Example embodiment end pieces may mate with a variety of full-length and/or part-length fuel rods and may function as upper and/or lower end plugs, mating the fuel rods to upper and/or lower tie plates.
Reverse conical lower end plug for an annular nuclear fuel rod
A lower end plug for an annular nuclear fuel rod includes a support with a great slenderness ratio, a coolant inflow part with an inner inflow space and a plurality of inflow holes in a wall thereof so as to interact with the inflow space, coupled to a lower end of the annular nuclear fuel rod at an upper end thereof, and extending from an upper end of the support in a reverse conical shape such that the inflow space interact with an inner channel of the annular nuclear fuel rod, and a coupler extending from a lower end of the support and coupled with a handing tool of the annular nuclear fuel rod. Thus, although a bottoming phenomenon of the annular nuclear fuel rod occurs, the coolant can be supplied to the inner channel of the annular nuclear fuel rod through the inflow holes of the lower end plug.
Reducing settling time in phase-locked loops
A circuit may include a phase detector configured to generate a phase error signal based on a feedback signal and an oscillator configured to generate an output signal. The feedback signal may be based on the output signal. The circuit may also include a determination unit configured to measure a phase of the feedback signal based on the phase error signal when an output of the phase detector and an input of the oscillator are communicatively decoupled. The circuit may also include an adjustment unit configured to subtract the measured phase of the feedback signal from an intermediate signal upon which the output signal is based when the output of the phase detector and the input of the oscillator are communicatively coupled.
Method and device for iterative blind wideband sampling
Devices and methods for iteratively sampling a wideband signal in order to recover one or more narrowband signals are disclosed. In one aspect, a wideband signal is received and the signal is sampled using a sampling device, which includes an amplifier with an initial gain level, to produce a plurality of sampled signals. A first set of narrowband signals may be recovered from the plurality of sampled signals. Then, the wideband signal is re-sampled to produce a second plurality of sampled signals. The re-sampling includes increasing the gain of the amplifier to a second level and suppressing a component of the wideband signal. A second set of narrowband signals may then be recovered from the second set of sampled signals.
Device for broadband reception by autotransposition and application to the detection and characterization of radioelectric emissions
A device is provided for use of an antennal base formed of two antennas which pick up the emissions present and produce two radioelectric signals S1 and S2. These two signals are used to produce at least one intermediate-frequency signal Fl by demodulation of one of the two signals by the other (autotransposition). The demodulation is carried out by firstly transposing one of the signals, S1 for example, around a given frequency F1, the signal S2 being preserved around its initial central frequency F0. Thus, whatever the central frequency F0 of the emission picked up by the antennas, the demodulation produces a signal of central frequency F1, thereafter demodulated into a given intermediate frequency Fl by a local oscillator of constant frequency F2=F1+Fl. The device is applied to the production of a device for detecting emissions and for characterizing the emissions picked up.
System and method for detecting burst noise during quadrature amplitude modulation communications
A system and method for detecting burst noise during quadrature amplitude modulation (QAM) communications are provided. A QAM signal is acquired at a receiver in communication with a network. The QAM signal is demodulated at the receiver to identify a plurality of symbols. Amplitudes for each of the plurality of symbols are determined, and are compared to a predetermined threshold. For each amplitude that is greater than the predetermined threshold, information is recorded at the receiver relating to a burst noise event. The magnitude of the burst noise can be determined by measuring a difference between a received constellation point and a perimeter constellation point closest to the received constellation point. The information about the burst noise event can be transmitted to an error correction module for reducing future burst noise in the network. Equalizer coefficients and tracking loop performance can be adjusted/enhanced using the burst noise information.
Estimating signal to interference ratio in a wireless communications receiver
A method and corresponding system for generating an estimate of at least one of a signal power, a noise power and a signal to interference ratio for signal samples received via first and second wireless channels, the signal samples corresponding to pilot symbols transmitted in respective different structures via the first and second wireless channels. The method comprises: calculating first and second variables, each variable being a sequence of values computed from the received signal samples and the pilot symbols for each respective first and second wireless channel; generating first and second channel estimates from the first and second variables; combining the first and second channel estimates to generate a combined channel estimate; and generating at least one of the signal power, noise power and SIR using the combined channel estimate.
Digital signal processing apparatus with a delay memory having a plurality of memory cells and process for using same
A digital signal processing (DSP) apparatus can be used to process a serial stream of digital signal samples of a plurality of “n” number of different signals. The DSP apparatus can include a DSP module configured to perform a DSP algorithm on digital signal samples of the signals. The DSP apparatus can have a delay memory with an “n” number of memory cells that each corresponding to one of the signals. The delay memory can also have a digital signal sample input connected to said initial input of said DSP module, a signal-number-in input, a signal-number-out input, and a digital signal sample output connected to said delay input of said DSP module. The delay memory can be configured to store a digital signal sample at the digital signal sample input in a memory cells identified by a signal identifier at said signal-number-in input. The delay memory can also be configured to output at the digital signal sample output a digital signal sample stored in a memory cells identified by a signal identifier at the signal-number-out input.
Dynamic optimization of carrier recovery performance for communication systems
Apparatuses, systems, and methods are directed to maintaining optimal carrier tracking performance in view of operating conditions that prevail. Such configurations employ a phase lock loop that configured to generate an estimated phase error value, a variance module configured to calculate a phase noise variance based on the estimated phase error value, and a loop control bandwidth module that calculates a loop bandwidth value based on a detected lower phase noise variance, generates modified loop filter values in accordance with the calculated loop bandwidth value, and updates the phase lock loop with the modified loop filter values. During subsequent iterations, the modified loop filter values are incrementally adjusted along a particular direction until the phase noise variance increases at which point the modified loop filter values are incrementally adjusted in an opposite direction to converge on an optimal loop bandwidth value.
Digital broadcasting transmission/reception system having improved receiving performance and signal processing method thereof
A digital broadcasting transmission/reception system having improved receiving performance and signal processing method thereof. A digital broadcasting transmitter according to the present invention includes a data pre-processor which processed robust data and generates robust data packet of predetermined format, a TS stream generator which combines robust data packet with a normal data packet to generate a TS stream of a predetermined format, a randomizer which randomizes the TS stream output from the TS stream generator, a convolution encoder which performs convolution encoding with respect to the robust data of the data output from the randomizer, and a RS encoder which performs RS encoding with respect to the data output from the convolution g encoder. Accordingly, digital broadcasting receiving performance can be improved in a poor multipath channel, while maintaining compatibility with existing transmission/reception system.
Low-loss, broad band, LC I/Q phase shifter
Some embodiments relate to a phase shifter that includes an I/Q phase shifter and at least one LC balun. Compared to conventional phase shifters, phase shifter has primarily only LC components, thereby limiting losses relative to conventional solutions. In one embodiment, for example, a phase shifter shows a large bandwidth at 77 GHz center frequency (e.g., 1 dB amplitude error bandwidth is approximately 40 GHz; 1° phase error bandwidth is about 16.5 GHz). The inductors included in phase shifter, in contrast to the quarter wave transmission lines used in conventional phase shifters, reduces chip area compared with conventional solutions. In some embodiments, an emitter follower helps to provide a relatively constant output that is largely independent of temperature, input power, VCC, manufacturing variation, and so on.
Transmission method, transmitter, and receiver for multi antenna wireless communication system
A transmitter includes first generator to generate pilot source signal by modulating pilot sequence, second generator to generate data source signal with time length longer than that of pilot source signal by modulating data sequence, first cyclic shifter to perform cyclic shift of first shift amount to pilot source signal to generate first pilot signal, second cyclic shifter to performs cyclic shift of second shift amount to data source signal to generate first data signal, third cyclic shifter to perform cyclic shift of third shift amount to pilot source signal to generate second pilot signal, fourth cyclic shifter to perform cyclic shift of fourth shift amount to data source signal to generate second data signal, first transmit antenna to transmit first pilot signal and first data signal, and second transmit antenna to transmit second pilot signal and second data signal.