Vertically mounted sample stage for microscopy and scanning probe microscope using the sample stage
A sample stage for microscopy includes a sample holder including a body in which a sample-mounting part and a seating part are provided on a bottom of the body and a grip part for a mounting unit is provided on a top of the body, a sample rack, on which the sample holder is mounted, including a supporter supporting the seating part of the sample holder, and an elastic element provided on the sample rack, providing the sample holder with a pressing force inclined with respect to a vertical direction and fastening the sample holder to the sample rack while the seating part is being supported by the supporter. The sample stage may be vertically mounted.
Consumption based digital content rental expiration
A mechanism is provided for consumption based digital content rental. Responsive to validating a request from a user to consume the digital content, one or more discrete units of a plurality of discrete units comprised by the digital content are made available to the user. A timer associated with a selected discrete unit is started that records an agreed-to consumption time for the selected discrete unit. The selected discrete unit is presented to the user and then a determination is made as to whether the tinier indicates that the agreed-to consumption time of the selected discrete unit has expired. When the agreed-to consumption time has expired, consumption of the selected discrete unit is ended white leaving each remaining discrete units in the plurality of discrete unit with its own agreed-to consumption time for the user to consume.
Rules-based data access systems and methods
Methods and systems for rules-based data access are described. In some embodiments, a request for access to customer data by a requesting entity is received; the data is categorized; the person's preferences with respect to allowing access to data are compiled; a requesting entity is determined; and the providing entity that collected each requested data item is determined. Data shareability rules are evaluated based on the policies that regulate the access of the customer data, the customer preferences, the requesting entity, and the providing entity; and the customer data is provided to the requesting entity according to the evaluation.
System and apparatus for transferring data between communication elements
A system and apparatus for transferring data between communication elements is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller element to receive data from a web server to update one or more entries of an identity module coupled to the controller element. The data can be retrieved by the web server from a second communication device. Additional embodiments are disclosed.
Use rules are included within tokenized data either before or after tokenization. The use rules can be appended to the data before or after tokenization, can be used to modify the data before or after tokenization, and can be used to select or generate token tables for use in tokenizing the data. The use rules limit how, where, and when the tokenized data can be used, who can use the tokenized data, and the like. In addition, data can be tokenized such that the tokenized data can be identified as tokenized based on the tokenized data failing a validation test. The data is tokenized using one or more token tables, and the validation test is applied to the tokenized data. If the tokenized data passes the validation test, the data is modified with formatting rules or re-tokenized with additional token tables until the tokenized data fails the validation test.
Enhanced security for accessing virtual memory
A disclosed method includes obtaining a physical address corresponding to a virtual address responsive to detecting a virtual address associated with a memory access instruction and, responsive to identifying a memory page associated with the physical address as a sensitive memory page, evaluating sensitive access information associated with the memory page. If the sensitive access information satisfies a sensitive access criteria, invoking a sensitive access handler to control execution of the memory access instruction.
Report generation system and method
A report generation system is provided. The system comprises at least one data generator that generates data, a data store that comprises the data, a computer system, and a reporting engine. The reporting engine receives a request to generate a report from a client device, applies a first pre-established filter to the data based on credentials associated with a user of the client device to isolate a subset of the data, and applies a second pre-established filter to the subset of the data based on the credentials associated with the user of the client device to isolate a report generation set of data. The reporting engine further generates the report using the report generation set of data from the data store based on user-defined criteria and pre-established default criteria and outputs the report to the client device.
Weighted security analysis
A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A graphical representation of a portion of a computer program is built, wherein the graphical representation includes a control flow edge. A potentially vulnerable data flow associated with the control flow edge is identified. A control flow weight is assigned to the control flow edge, based upon, at least in part, identifying the potentially vulnerable data flow. A security analysis is applied to the portion of the computer program based upon, at least in part, the control flow weight.
Verifying application security vulnerabilities
Verifying application security vulnerabilities includes receiving a source code to analyze, performing a static analysis using the received source code and generating a vulnerability call trace for the received source code. Responsive to a determination that all static analysis results are not validated, mock objects are generated using the vulnerability call trace and a unit test is created using the generated mock objects. The unit test is executed using the generated mock objects and responsive to a determination that an identified vulnerability was validated; a next static analysis result is selected. Responsive to a determination that all static analysis results are validated, results and computed unit tests are reported.
System, method, and computer program product for conditionally performing an action based on an attribute
A system, method, and computer program product are provided for conditionally performing an action based on an attribute. In use, at least one attribute associated with an object is determined. Additionally, an event associated with the object is identified. Further, at least one action is conditionally performed in association with the event, based on the at least one attribute.
Native code module security for arm 64-bit instruction set architectures
Methods, systems, and apparatuses, including computer programs, for safely executing a native code module for an ARM 64-bit instruction set. The native code module contains native code that is executed within a secure runtime environment that isolates the native code module from sensitive data and resources on the computing system. The native code module is validated by a validator prior to execution within the secure runtime environment to ensure that the native code module complies with a set of security constraints.
Network-based binary file extraction and analysis for malware detection
A system and method are disclosed for network-based file analysis for malware detection. Network content is received from a network tap. A binary packet is identified in the network content. A binary file, including the binary packet, is extracted from the network content. It is determined whether the extracted binary file is detected to be malware.
Login using QR code
Systems and methods are disclosed herein for a user to use a trusted device to provide sensitive information to an identity provider via QR (Quick Response) code for the identity provider to broker a website login or to collect information for the website. A user may securely transact with the website from unsecured devices by entering sensitive information into the trusted device. The identity provider may generate the QR code for display by the website on an unsecured device. A user running an application from the identity provider on the trusted device may scan the QR code to transmit the QR code to the identity provider. The identity provider may validate the QR code and may receive credential information to authenticate the user or may collect information for the website. Advantageously, the user may perform a safe login to the website from untrusted devices using the trusted device.
Accessory device authentication
Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.
Secure server architecture for web based data management
A double firewalled system is disclosed for protecting remote enterprise servers that provide communication services to telecommunication network customers from unauthorized third parties. A first router directs all connection requests to one or more secure web servers, which may utilize a load balancer to efficiently distribute the session connection load among a high number of authorized client users. On the network side of the web servers, a second router directs all connection requests to a dispatcher server, which routes application server calls to a proxy server for the application requested. A plurality of data security protocols are also employed. The protocols provide for an identification of the user, and an authentication of the user to ensure the user is who he/she claims to be and a determination of entitlements that the user may avail themselves of within the enterprise system.
Accessing storage nodes in an on-line media storage system
A method begins by a dispersed storage (DS) processing module receiving data objects from a plurality of authorized users and determining a system level storage efficiency preference for a data object. The method continues with the DS processing module selecting a set of storage nodes of an on-line media storage system based on the system level storage efficiency preference and determining dispersed storage error encoding parameters. The method continues with the DS processing module encoding the data object in accordance with the dispersed storage error encoding parameters to produce encoded data slices and generating system addressing information. The method continues with the DS processing module storing the encoded data slices in the set of storage nodes using the system addressing information and updating a user profile for the authorized user to include the system addressing information.
System and method for checking the authenticity of the identity of a person accessing data over a computer network
A data processing system (100) comprises: a database (4); a host computer (3) and a user computer (1) capable of communicating with each other over a network (2); wherein the user computer sends a data request message (RQ) to the host computer (3), the request message containing Data information (RD), Identity information (RI), and Authenticity information (A; VI), wherein the host computer (3) checks the authentication information and only sends the required data if the Identity information (RI) defines an authorized user and the authentication information (A; VI) authenticates the user identification information. The request message further contains secondary information (RT) and the host computer (3) calculates, from the secondary-information, a reliability value (R), compares the calculated reliability value with a predefined reliability threshold, and sends the required data only if the reliability value is at least as high as the reliability threshold.
A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access.
Providing multiple authentications to authenticate users with respect to a system and file systems offered through the system
Provided are a method, system, and computer program product for providing multiple authentications to authenticate users with respect to a system and file systems offered through the system. A request is received from a user to access a system, wherein the system provides access to a plurality of file systems. A first authentication of the user with respect to the system is performed. In response to success of the first authentication with respect to the system, a request by the user is received to access a selected one of the file systems. A second authentication is performed of the user with respect to the selected file system. The user is allowed access to the selected file system in response to success of the second authentication.
Managing permissions and capabilities of web applications and browser extensions based on install location
A computer-implemented method for managing permissions and capabilities for web applications and browser extensions includes receiving via a digital marketplace a request to provide a web application or a web browser extension to a computing device. Based on the request, the web application or the browser extension is provided to a web browser of the computing device. The method includes determining if the digital marketplace is a trusted location for the computing device based on a set of trust criteria, and including additional features of the web application or the browser extension if the digital marketplace is determined to be the trusted location.
Network based healthcare management system
A network based healthcare management system is provided. The system includes a plurality of client workstations and a plurality of healthspace service processors. The healthspace service processors access at least one database remotely disposed relative to the client workstations with the healthspace service processors providing access to predetermined healthspace resources. The system further includes a healthspace service interface unit operably coupled to the client workstations and healthspace service processors to selectively actuate at least one of the healthspace service processors responsive to the client workstations. The healthspace service interface unit including an efficiency module which adaptively maintains a plurality of parametric indicia with respect to optimum healthspace resource utilization.
System and method for identity consolidation
A method and apparatus for identity consolidation for a plurality of electronic identities is described. In one embodiment, the method includes receiving user identification data extracted from an electronic communication, the user identification data corresponding to an unknown identity of a sender of the electronic communication. The method further includes determining a known identity for the sender using the user identification data extracted from the electronic communication and associating the known identity with the unknown identity of the sender of the electronic communication. In one embodiment, an association between the known identity and the unknown identity is maintained to determine whether parties of subsequent information transfers are authorized to participate in the information transfers.
Method for extending the fragment mapping protocol to prevent malicious access to virtualized storage
Extensions to the Fragment Mapping Protocol are introduced which protect a disk array from malicious client access by exporting file system access information to the storage device. FMP requests received at the storage device can be authorized at a block granularity prior to completion, thereby limiting the exposure of the disk array to malicious clients. Client authorizations can be cached at the storage device to enable the permissions to be quickly extracted for subsequent client accesses to pre-authorized volumes.
Web service security cockpit
A first configuration object identifies attributes of a configuration of a first web service. Security setting data is identified defining a security setting rules for the computing system. The failure of the first attribute to satisfy at least one security setting rule is determined. A second configuration object is identified that identifies attributes of a configuration of a second web service. The failure of the second attribute to satisfy at least one security setting rule is determined. A service security cockpit is presented identifying that configurations of at least the first and second web services are unsecure, based at least in part on the determination that the first and second attributes fail to satisfy security setting rules. User input is received, through the cockpit, identifying a resolution action directed to resolve the first attribute failing to satisfy at least one security setting rule. The identified resolution action is then initiated.
Apparatus and method for managing voice communications
A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to receive a call request from a set top box that is remote from the server where the call request identifies a telephone number that is presented from video content presented by the set top box where the telephone number is detected based on a combination of image pattern recognition and speech recognition and where the telephone number is associated with a marketing entity, establish a voice communication with a first telephone device associated with the set top box, and establish the voice communication with a second telephone device associated with the telephone number and the marketing entity if the first telephone device accepts the voice communication. Other embodiments are disclosed.
Data presentation using a wireless home entertainment hub
A method for presenting data through a wireless home entertainment hub in a home entertainment system includes obtaining a registration for one or more source devices and for one or more sink devices. An indication is received at the wireless home entertainment hub that one of the source devices has become active. Data is received from the active source device. One or more sink devices are selected to receive the data from the active source device, and the data is transmitted to one or more of the sink devices.
Program guide navigation tools for media content access systems and methods
An exemplary system includes a media content processing subsystem configured to provide a program guide graphical user interface (“GUI”) to a display for presentation to a user, the program guide GUI including a portion of a program guide. The media content processing subsystem is further configured to provide at least one navigation tool to the display for presentation in the program guide GUI, the navigation tool including a plurality of selectable options for navigating the program guide. The media content processing subsystem is further configured to detect a user selection of one of the selectable options and initiate a navigation to a location in the program guide based on the selected option. In certain embodiments, the navigation tool includes at least one of a time-based navigation tool and a channel navigation tool.
Visually browsing videos
A method for enabling visual browsing of a plurality videos includes identifying a low frame rate version for each video from a plurality of videos using one or more computers, wherein the low frame rate version of each video from the plurality of videos is at a frame rate that provides a visually perceptible pause between successive visually distinct frames; and outputting information that defines a visual display, wherein the visual display presents a plurality of graphical representations each corresponding to a respective video from the plurality of videos, wherein each graphical representation from the plurality of graphical representations includes the low frame rate version of the respective video from the plurality of videos.
Method and system for utilizing multiple content delivery networks for distributing content
A system includes a content management system having a first set of business rules for a first content including a first target and a second set of business rules for a second content including a second target. The system also includes a workflow system that receives the first and second targets. The work flow system obtains first content with a first business rule identification and second content with a second business rule identification. The content management system associates the first content with the first set of business rules and associates the second content with the second set of business rules. A processing system processes the first content to form first processed content in response to the first business rules and processes the second content to form second processed content in response to the second business rules. A content repository stores the first and second processed content.
Broadcast receiver, broadcasting program selection method and storage medium thereof
A broadcast receiver including a storage unit for storing viewing history data of a user; a display unit for displaying broadcasting program recommendation information including at least one piece of broadcasting program path information; and a processor for collecting the viewing history data by using received Electronic Program Guide (EPG) data, storing the viewing history data in the storage unit, generating the at least one piece of broadcasting program path information based on the viewing history data, displaying the at least one piece of broadcasting program path information on the display unit, and selecting a broadcasting program based on the at least one piece of broadcasting program path information.
System and method for providing a messaging application program interface
A system and method for providing a message bus component or version thereof (referred to herein as an implementation), and a messaging application program interface, for use in an enterprise data center, middleware machine system, or similar environment that includes a plurality of processor nodes together with a high-performance communication fabric (or communication mechanism) such as InfiniBand. In accordance with an embodiment, the messaging application program interface enables features such as asynchronous messaging, low latency, and high data throughput, and supports the use of in-memory data grid, application server, and other middleware components.
Performance counter inheritance
A system for providing performance counter inheritance includes an operating system that receives a request of a first application to monitor performance of a second application, the request identifying an event to monitor during the execution of a task associated with the second application. The operating system causes a task counter corresponding to the event to be activated, and automatically activates a child task counter for each child task upon receiving a notification that execution of a corresponding child task is starting. Further, the operating system adds a value of each child task counter to a value of the task counter to determine a total counter value for the task, and provides the total counter value of the task to the first application.
System and method for selectively saving and restoring state of branch prediction logic through separate hypervisor-mode and guest-mode and/or user-mode instructions
A hypervisor and one or more programs, e.g., guest operating systems and/or user processes or applications hosted by the hypervisor to configured to selectively save and restore the state of branch prediction logic through separate hypervisor-mode and guest-mode and/or user-mode instructions. By doing so, different branch prediction strategies may be employed for different operating systems and user applications hosted thereby to provide finer grained optimization of the branch prediction logic.
Host-to-guest channel for guest device identification
A method and system for providing a descriptive name of a device in a virtual machine system. A computer system hosts a hypervisor, a management component and a guest. The hypervisor receives from the management component a descriptive name of a device available to the guest. The descriptive name defines at least one of the functionality of the device, the content of the device, or a user of the device. The hypervisor then passes the descriptive name to the guest via a host-to-guest channel, which is a shared storage location writable by the hypervisor and readable by the guest.
Self-management of virtual machines in cloud-based networks
A cloud management system can insert a self-management module in virtual machines. The self-management module can be configured to automatically perform management functions on the virtual machine in which it is inserted. The management functions can include activation, suspension, or termination of the virtual machine. The management functions can also include tracking and monitoring the virtual machine. The management functions can also include providing messages to the cloud management system regarding the status and usage of the virtual machine.
Program store for updating electronic devices
A method for downloading a first application to a target system through a host system consisting of downloading a first application adapted to run on a host system from a program store to a host system, and subsequently downloading a second application adapted to run on a target system from the host system to the target system. The first application and the second application enable the host system and the target system to exchange information.
Method and system for installing applications
A method for installing an application according to an exemplary embodiment downloads an application purchased by a client and installs the application in a terminal in an asynchronous manner. The method includes transmitting a request to download at least one application to the server, downloading an application from the server in response to the request to download at least one application and storing the downloaded application, and installing the stored application in the terminal in an order of completion of downloading of the application.
Incrementally updating a software appliance
An appliance support module can be configured to update and upgrade the software incrementally. To achieve this, the appliance support module can be configured to receive a request to update or upgrade a software appliance. The request can include the update or upgrade requested and information describing the software appliance to upgrade or update. Based on the request, the appliance support module can be configured to determine alterations to make to a original binary image of the software appliance to upgrade or update.
Error-code and exception-based function dispatch tables
A condition detected by a virtual routine may be treated by setting an error code or raising an exception, depending on circumstances. Enhanced vtable layouts promote availability of both error-ID-based and exception-based virtual routines, while maintaining compatibility. Compilers treat virtual routines based on their circumstances. One enhanced vtable includes error-ID-based routine pointers in a COM-layout-compatible portion and exception-based routine pointers in an extension. For a virtual routine not overridden by a derived class, a compiler generates a direct call. For an object instance of a specific type, the compiler generates a direct exception-based call for the object's routine. For a factory-sourced object's routine, the compiler generates a virtual exception-based call. When the virtual routine belongs to a component having an enhanced vtable, the compiler may generate a virtual call using the exception-based routine pointer. Code wrappers between COM and native format may also be used.
Differential static program analysis
Systems for program analysis include a high-level scanning tool configured to perform a high-level analysis on a program using a processor to generate one or more high-level findings; one or more low-level scanning tools, each configured to perform a low-level analysis on the program using a processor to generate a low-level finding; and a mapping module configured to map the one or more low-level findings to the high-level findings to generate a concise combination report that categorizes each finding according to the highest-level analysis that produces the finding.
Compiler optimized safety mechanism
An approach is provided in which a set of common instructions are each executed by at least two processor cores. Each of the processor cores queues values resulting from at least one of the common instructions (a critical section). The queued values are compared by a queued comparator. An exception is issued in response to the comparison revealing unequal values having been queued by the processor cores.
Automatic reverse engineering of input formats
Systems and methods for automatically reverse engineering an input data format using dynamic data flow analysis. Combining input data with a simulated execution of the binary program using the input data and analyzing the use of the data by the program to generate a BNL-like grammar representing the input data format. The input data can be application level protocols, network protocols or formatted files.
Statistical sampling of event monitoring triggers under overhead constraints
A method includes receiving a budget cost for monitoring a plurality of tracepoints that occur as a result of operation of a device. The method further includes organizing a plurality of tracepoints into buckets such that each of the buckets corresponds to a range of expected interarrival times, and all tracepoints in a bucket have an expected interarrival time that is within the range for that bucket. The method further includes assigning a trigger to a first plurality of the bucketed tracepoints to yield a plurality of triggered tracepoints, wherein the triggers are proportionally assigned such that a tracepoint having a low expected interarrival time is less likely to be assigned a trigger than an tracepoint having a associated expected interarrival time such that an expected cost of the triggered tracepoints does not exceed the budget cost. Additionally, the method includes monitoring tracepoint occurrence during a first period of operation.
Determining correctness conditions for use in static analysis
An embodiment comprising a method is associated with static analysis of a program, which detects violations of conditions of the program correctness specification. The method includes selectively encoding the program and adding one or more correctness conditions to the encoded program, wherein the added conditions comprise a set of assumptions that render the program correct with respect to one or more properties pertaining to detected violations. The set of assumptions are reported to a program user, together with a request to the user to verify the validity of each assumption of the set.
System and method for debugging computer program based on execution history
A system and method are provided for enhanced navigation along execution time and code space in a debugger to assist a user in remediating errors, streamlining, or reverse engineering a computer program and the source code thereof. Snapshots of system states are recorded, a causality tree of commands is constructed through execution of the program to be debugged, and an intelligent display of system states captured during runtime and indexed or cross-referenced by time are displayed to the user in an intelligent manner to aid the user with certain debugging tasks. Additionally, further features in assisting the user to locate a root cause of an error or unexpected value and remediate that cause are also provided.
Strategies for performing testing in a multi-user environment
A strategy is described in which multiple testing agents perform multiple respective tests in a multi-user environment. One such multi-user environment allows multiple clients to interact with remote applications that are executed on a server. According to one exemplary case, a central test management module coordinates the execution of the multiple tests by the testing agents. For instance, the test management module can prevent testing agents that make demands on a global state of the multi-user environment from interfering with other testing agents.
Synchronization of prospect information between software providers and resale partners
The present disclosure describes methods, systems, and computer program products for synchronizing opportunity information in a software-related sales environment. One method includes identifying, at a software configuration application, a first set of opportunity information from a software reseller and a second set of opportunity information from a software provider, where the first and second set of opportunity information associated with a prospective software customer. The method further includes integrating the first and second set of opportunity information into a combined set of opportunity information within the software configuration application and identifying at least one modification to the combined set of opportunity information. The method then provides the at least one identified modification to the combined set of opportunity information to the software reseller and the software provider to synchronize the first and second sets of opportunity information.
Generating persistent variables in a shell environment
A computing device executes one or more applications within a shell session, such as a Powershell session. The computing device may detect, within the shell session, a runtime exception that causes the shell session to prematurely terminate. The computer device serializes an object associated with the runtime exception prior to closure of the shell session. The computer device may also serialize other objects. Serializing the object includes identifying the object's type, identifying data associated with the object's type, identifying internal types of the object, and identifying data associated with each of the internal types, and generating a representation of the object that preserves the object's type, the data included in the object, and all internal types of the object.
Expression editor system
An expression editor system allows a user to build an expression specifying an action that may occur during execution of a target application. The expression editor system includes an expression editor tool used to create, manage, and store action point definitions that include an action point identifier that specifies an action point located in target application program code. The expression editor system determines from the action point definition a dataset that is in-context at the action point in the application program code, obtains data field selections from the dataset that is in-context at the action point in the application program code, graphically builds an expression, and an outcome that executes depending the expression, links the outcome and the expression to form an action point rule for the action point, and saves the action point rule in the database for execution when the application program code reaches the action point.
Digital asset delivery system and method
A computer system and method for software delivery that include articles of manufacture having two or more installed, functional software applications organized in a protoset, the protoset configured to enable creation of one or more subsets (also called reduced metasets) from the two or more installed, functional software applications, each of the one or more subsets configured to be operable with a predefined computer system independent of the protoset; and a protoset module configured to operate on the protoset to enable creation of the one or more subsets of the two or more installed, functional software applications, the module responsive to one or more requests for the creation of the one or more reduced metasets.
Communicating information in computing systems
A system is provided and includes a first computing device operable to execute an application, and a second computing device, remotely and continuously communicable with the first device, by which a non-distractive description of updated information of the application is automatically issuable to a user substantially immediately following an occurrence of the update, wherein a form of the non-distractive description is defined in accordance with an activity currently performed by the user.
System advisor for requirements gathering and analysis in web solutions
A method for generating website feature requirements includes receiving a screen capture image including a website. The screen capture image is matched to one or more known website features listed within a database of website features. A website features requirements specification is generated based on the results of the matching. One or more recommendations for modifying the website features requirements specification is automatically generated based on considerations of cost or complexity of implementation. The website features requirements specification is updated based on the one or more recommendations.
Methods and apparatus for data path cluster optimization
In one embodiment of the invention, a method of logic synthesis is disclosed. The method includes generating a plurality of design architecture alternatives for circuit logic of a data path cluster; saving the plurality of design architecture alternatives; and evaluating the plurality of design architecture alternatives in response to design constraints to select a preferred design architecture.
Semiconductor circuit design method, memory compiler and computer program product
A semiconductor circuit includes an array of repeating blocks, each of the blocks having a device, and at least one signal line connecting the devices of the blocks. A model of the semiconductor circuit is generated to include a functional area corresponding to at least one first block of the array, and a loading area corresponding to at least one second block of the array. In the functional area, parasitic parameters of the at least one signal line and the device of the at least one first block are extracted. In the loading area, parasitic parameters of the at least one signal line are extracted, but parasitic parameters of the device of the at least one second block are not extracted.
Some embodiments provide a method of monitoring the implementation of a user design in a configurable integrated circuit (IC). The method receives a user design for an IC and optimizes the user design to produce a second IC design. The optimization results in the elimination of circuit element(s). The method defines the second IC design for the configurable IC and generates output data for the eliminated circuit element(s) to allow for monitoring the user design.
Natively color-aware double patterning technology (DPT) compliant routing
A route technique includes: receiving an input specifying a plurality of semiconductor device components and their logical connections; determining route information pertaining to a plurality of routes that connect in one or more metal layers the semiconductor device components according to their logical connections, the determination being based at least in part on a plurality of predefined tracks associated with a metal layer; and outputting at least a portion of the route information. A first portion of the plurality of predefined tracks corresponds to a first color and a second portion of the plurality of predefined tracks corresponds to a second color.
Non-textual user input
A computing device receives a first user input at presence-sensitive display of the computing device, wherein the first user input corresponds to a portion of a desired non-textual object. The device displays a first graphical representation indicating the first user input at the touchscreen display, and determines a first non-textual object suggestion based upon at least the first user input. The device displays a second graphical representation indicating the first non-textual object suggestion, wherein the second graphical representation of the first non-textual object suggestion is displayed differently than the first graphical representation of the first user input, and detects an indication whether the first non-textual object suggestion corresponds to the desired non-textual object.
Method and device for enabling selection of an item from a plurality of items
The method of the invention enables selection of an item (21) from a plurality of items (21, 23, 25). The method comprises the steps of visually representing a selected item (21) and reproducing at least part of an audio segment representing the selected item (21). The method further comprises applying a visual spatial effect to the visual representation of the selected item (21) and applying a spatial audio effect corresponding to the visual spatial effect to the reproduction of the audio segment. The device of the invention comprises electronic circuitry which is operative to perform the method of the invention. The computer program product of the invention enables a programmable device to perform the method of the invention.
Method and apparatus for operating user interface and recording medium using the same
A method and an apparatus for operating a user interface, and a recording medium using the same are provided. First, a plurality of user interfaces is provided and one of them is displayed on a touch screen of a portable electronic device. Then, the touch screen is used for detecting a touch signal. When the touch signal is moved toward a first direction, the currently displayed user interface is switched to another one. When the touch signal is moved toward a second direction, an item of the currently displayed user interface is switched to another item. Accordingly, a more intuitive and convenient manner for operating the user interface is provided for the user.
Methods and systems for scrolling and pointing in user interfaces
Systems and methods according to the present invention address these needs and others by providing a structure for navigating in a GUI with a handheld device, e.g., a 3D pointing device, which incorporates buttons and a scroll wheel.
Method for copying images
An apparatus for copying image data between computer applications running under at least one operating system, the apparatus comprising: a selector, operable by a user, for selecting an object from a computer application, and an image data importer, associated with the selector, and configured to automatically import image data of the selected object into a predetermined target computer application, upon the selecting.
Automatic API generation to functional PSoC blocks
A method of generating an application programming interface (API) for an electronic circuit. A graphical user interface is displayed through which a user can initiate generation of the API. A component is selected from a plurality of components for placement in said electronic circuit. The component represents an implementable function in the electronic circuit. The component is configured using the graphical user interface. The data pertaining to the selected component and the configuration of the component is stored. The graphical user interface is utilized to access the stored data. The interface is initiated to invoke a processing of said data which causes a generation of the application programming interface. The application interface is for controlling the function of the component in said electronic circuit.
Supplementary calculation of numeric data in a web browser
An approach is provided in which a user selection is received with the selection being a number data elements with each of the selected data elements being displayed in a Web browser software application. A first set of functions that apply to the selected data elements is identified and the identified first set of functions is applied to the selected data elements. The result is a set of resulting values which are displayed a window that appears on the display screen. If the user has selected numeric data then numeric functions are applied to the data, however if the user has selected date-type data then date functions are applied to the data.
Systems and methods for selecting components for inclusion in portions of a displayable file
Systems and methods are provided for selecting components to include in portions of a displayable file. Selecting the components may include determining an order of the components for each portion of the displayable file. The components' order for a given portion may be based on a score for each component, where a component's score is based on an estimated value and standard error associated with the component. The component to include in each portion of the displayable file may be selected based at least in part on the determined component order for each portion and a predetermined priority of each portion.
Centralized media handling
A system is described that includes a media management application for automatically scanning messages in a message inbox and new messages that are sent from or received by the message inbox to identify content, such as pictures, songs, etc., for tagging each message based on content attributes, and for storing the messages and content in a “shoebox” relative to the content attributes.
Composition of customized presentations associated with a social media application
According to a general aspect, a method can include receiving a request, triggered via a consumer account, to access, using a social media application, a plurality of sharer content. The sharer content can be associated with a sharer account using the social media application. The method can include retrieving, in response to the request, a consumer value and a relationship value. The consumer value can represent an interaction with the social media application via the consumer account and the relationship value can characterize a relationship between a consumer identifier of the consumer account and a sharer identifier of the sharer account. The method can include selecting a subset of sharer content from the plurality of sharer content based on a combination of the consumer value and the relationship value, and can include defining a portion of a presentation customized for the consumer account using the selected subset of sharer content.
Method for securing an interface between a user and an application, corresponding system, terminal and computer program product
An interface securing method between a user and a non certified application running on an electronic device and providing at least one view to be rendered on a screen, and a view comprising or associated to at least one interface control component. The method implements, prior to rendering a view: analysis of the interface control components of the view, so as to detect at least one interface control component that could pose a security problem, called a suspicious component; and if at least one suspicious component is detected, restriction or invalidation of the functions of at least one input control component, distinct from the at least one suspicious component and able to allow the information to be provided by the user to the application.
Validator-driven architecture of an XML parsing and validating solution
A method for parsing a document in an Extensible Markup Language (XML) format includes identifying data via the XML format, defining a tag set including a plurality of tags, defining a tokenizer that produces one token at a time, parsing the XML document via a parser, validating the XML document via a validation engine, the validation engine driving the tokenizer, the validating being an integral part of the parsing, and permitting the validation engine to be written in a recursive-descent code-driven manner.
Hierarchical drag and drop structure editor for web sites
A method and apparatus for a structure editor implementing a “top-down” approach to designing a Web page. The user uses a “drag and drop” interface to add, delete, and move display elements to define the hierarchy of the site and to define the layout of each page in the site. The present invention automatically generates a layout for each page. This layout contains display elements that represent the links between pages of the site. The present invention automatically adds, removes, and deletes the appropriate links between the pages of the site as the user moves display elements. After the user has defined the hierarchy of the site and the layout of each page in the site, the user “publishes” the site. The publish function automatically generates HTML for each page of the site in accordance with the display elements of each page, yielding true WYSIWYG pages for the site.
System and method for adaptive check node approximation in LDPC decoding
A low-density parity check (LDPC) decoder is provided for decoding low-density parity check (LDPC) encoded data wherein an adaptive check node approximation is performed at the check node processor utilizing the smallest magnitude log-likelihood ratio (LLR) and the second smallest magnitude log-likelihood ratio (LLR) to adapt to the current conditions at the check node.
Receivers, circuits, and methods to improve GNSS time-to-fix and other performances
An electronic circuit (2250) for a satellite receiver (100, 2200). The electronic circuit (2250) includes a correlator circuit (2310) operable to supply a data signal including ephemeris data and a subsequent satellite time datum, and a data processor (2370, 2380) operable to infer satellite time TS from as few as one of the ephemeris data prior to the satellite time datum. Other circuits, devices, receivers, systems, processes of operation and processes of manufacture are also disclosed.
System and methods for storing data encoded with error information in a storage medium
System and methods for storing data encoded with error information in a storage medium are provided. A binary data and an encoded binary error signals are received. The encoded binary error signal includes information that represents occurrence of errors in the binary data signal. The binary data and encoded binary error signals are encoded to generate a binary codeword signal. Bits of the binary codeword signal that represent coding information and the binary data signal are extracted. The extracted bits of the binary codeword signal are stored in a first storage medium. The binary packed data signal is retrieved from the first storage device and decoded to recover the binary data signal and a syndrome. Error information corresponding to the encoded binary error signal may be determined based on the syndrome.
System and method to correct errors in data read from a source supplying streaming data
A system including a read module and a processor. The read module is configured to read data from a source supplying streaming data and to correct errors in a first portion of the data using a first error-correcting module. The first error-correcting module is unable to correct errors in a second portion of the data. The processor is configured to correct errors in the second portion of the data using a second error-correcting module. An error-correction scheme applied by the second error-correcting module is different from the error-correction scheme applied by the first error-correcting module.
A decoding method for decoding information content in at least one data packet, which is transmitted from a sender to a receiver via a data link. The information is represented by a bit sequence, which is transformed into a transmittable redundancy version. The information is initially transmitted for a first time in a first data packet from the sender to the receiver. The information is represented by a first redundancy version, which is self-decodable. An incorrect receipt is confirmed by sending a confirmation from the receiver to the sender. The information is retransmitted at least a second time in a second data packet from the sender to the receiver upon receipt of the confirmation, wherein, for representation of the information, a second redundancy version is used, the selection of which is performed in dependence on a coding parameter, describing whether the redundancy version is self-decodable or not.
Tap controller having TMS, TCK, enable inputs and control outputs
An integrated circuit can have plural core circuits, each having a test access port that is defined in IEEE standard 1149.1. Access to and control of these ports is though a test linking module. The test access ports on an integrated circuit can be arranged in a hierarchy with one test linking module controlling access to plural secondary test linking modules and test access ports. Each secondary test linking module in turn can also control access to tertiary test linking modules and test access ports. The test linking modules can also be used for emulation.
Removing scan channel limitation on semiconductor devices
A method to perform component testing by supplying test patterns to a serial input pin coupled to an IEEE 1149.6 boundary-scan cell that is associated with an IEEE 1149.6 test receiver. The test receiver is configured to operate in a scan test mode. The output from the test receiver circuit is coupled to a logic block to be scan tested. The output from the logic block is coupled to a serial output pin on the integrated circuit during scan test mode. High performance integrated circuits can use SerDes pins in a scan test mode to be scan tested without impacting mission critical signals.
Multimedia-aware quality-of-service and error correction provisioning
Methods and apparatus for associating each data packet in a media stream with logic corresponding to a particular quality-of-service (QoS) and/or error correction requirement. In an exemplary embodiment, each packet in the media stream is assigned a frame tag which designates a particular quality-of-service and/or error correction scheme for the corresponding packet. At least a portion of each packet is encoded according to the packet's designated quality-of-service as indicated by the frame tag. A receiver accesses the frame tags from within the transmitted media stream in order to determine the appropriate means for processing or decoding the encoded portion of each packet. In this manner, each packet within the media stream can have its own quality-of-service and/or error correction requirements and processing, thereby enhancing link efficiency and better enforcing QoS policy across the system.
Method and apparatus for operating system event notification mechanism using file system interface
A method and structure for OS event notification, including a central processing unit (CPU) and a memory including instructions for an event notification mechanism for monitoring operating system events in an operating system (OS) being executed by the CPU. The OS includes a kernel having a plurality of kernel subcomponents that provide services to one or more applications executing in the OS in a user mode, using system calls to the kernel. The OS event notification mechanism is capable of monitoring events within the kernel, at a level below the user mode level. The OS event notification mechanism includes Application Program Interfaces (APIs) that are standard for the OS.
Method and apparatus for filtering trace information
In a processing system comprising a plurality of data processors at an integrated circuit die, each data processor has a local debug module. In response to acquiring data trace information based upon a corresponding local filtering criteria, the local debug modules transmit their data trace information to a global resource from each of the local debug modules for further filtering by a common filtering criteria.
Test data generation
Systems and methods for test data generation are described. In one implementation, the method includes receiving seed data having one or more characteristics. Further, the method includes obtaining a selection criterion indicating a selected portion of the seed data to be transformed. Based on the selection criterion, the seed data is transformed for at least a plurality of iterations to generate test data. The test data comprise a plurality of data sets including a primary data set generated in a first iteration and a secondary data set generated in each subsequent iteration. The primary data set includes transformed data corresponding to the selected portion of the seed data and non-transformed data corresponding to a remaining portion of the seed data and each secondary data set includes transformed data corresponding to the selected portion of the seed data.
Reliable unit testing through cached mocking
During execution of a unit test, receiving from the unit test a first request referencing a mock object. An instance of the mock object and initial cached mock object data is returned to the test unit, wherein the initial cached mock object data includes first data for a real object represented by the mock object. Second data for the real object represented by the mock object is collected. The second data for the real object is compared to the initial cached mock object data. Responsive to determining that at least one aspect of the second data for the real object does not correspond to the initial cached mock object data, the cached mock object data is updated with the second data for the real object. An indication can be provided to the unit test that the initial cached mock object data returned to the unit test is unreliable.
System and method of replicating virtual machines for live migration between data centers
A method of replicating tiered data includes copying a volume from a first tiered storage array of a primary processing site to a second tiered storage array of a failover processing site, wherein the volume is tiered with a first tiered organization in both the first and second tiered storage arrays, directing from a first storage controller of the primary processing site that a second storage controller of the failover processing site stop tiering the volume on the second tiered storage array, changing the first tiered organization of the volume in the first tiered storage array to a second tiered organization, and changing the first tiered organization of the volume in the second tiered storage array to the second tiered organization.
Method for backing up user information and apparatus in standby service node for backing up user information
A method and apparatus for backing up user information are disclosed. The method includes: establishing a plurality of selection switch protocol groups between a same port of a standby service node and ports of a plurality of main service nodes respectively; the standby service node regularly receiving user information of access users from the ports of the plurality of main service nodes, and storing the user information to a main control unit of the standby service node; keeping a detection relation between the same port of the standby service node and the ports of the plurality of main service nodes; the standby service node sending to an interface unit of the standby service node the user information of the access user of that port stored in the main control unit, and according to the selection switch protocol, switching the same port of the standby service node to be main.
Systems and methods for facilitating substantially continuous availability of multi-tier applications within computer clusters
A computer-implemented method may include (1) identifying at least one computer cluster configured to (a) facilitate substantially continuous availability of at least one multi-tier application that includes a plurality of discrete architectural layers and (b) provide a plurality of virtual machines configured to execute the discrete architectural layers within the multi-tier application, (2) detecting a failure that prevents at least one node within the computer cluster from providing at least one virtual machine configured to execute at least one discrete architectural layer within the multi-tier application, (3) identifying a different node capable of providing the virtual machine within the computer cluster, and then (4) directing the different node within the computer cluster to provide the virtual machine in order to facilitate substantially continuous availability of all of the discrete architectural layers within the multi-tier application despite the detected failure. Various other systems, methods, and computer-readable media are also disclosed.
Failover of interrelated services on multiple devices
A device may include a network interface for communicating with a failover device, a memory for instructions, and a processor for executing the instructions. The processor may execute the instructions to communicate with the failover device, via the network interface, to fail over the device to the failover device in a cluster by pushing a process on the device to the failover device when a first failover event occurs. The failover device is configured to fail over the device to the failover device by pulling the process on the device on the second device when a second failover event occurs. The device is in the cluster.
System and method of file locking in a network file system federated namespace
A method, system and apparatus of a file locking within a network file system federated namespace is disclosed. In one embodiment, a method includes accessing a target file in a storage medium over a network through an intermediate proxy server using a processor. The storage medium may be any one storage medium of a group of storage mediums on the network forming a data sharing cluster. In addition, the method includes locking the target file in the storage medium through a lock protocol to enable an access to modify the target file to at most one user at any given time, via the intermediate proxy server.
System and method for reducing crosstalk in on-chip networks using a contraflow interconnect and offset repeaters
A data connector includes two different sets of wires that transport data between components of a computer system. A first set of wires transports data from a first component to a second component. A second set of wires transports data from the second component to the first component. The first set of wires is interlaced with the second set of wires so that each wire in the data connector transports data in the opposite direction of one or more neighboring wires.
Overclocking module, a computer system and a method for overclocking
An overclocking module, a computer system and a method for overclocking are provided. The method is used to overclock the computer system. The overclocking module of the invention includes a timer, a monitoring unit and a control unit. The timer starts to count when the computer system is booted. The monitoring unit monitors whether the computer system performs a boot-up procedure within a period of time. The control unit adjusts an operating frequency of the computer system to overclock the computer system automatically according to the monitoring result of the monitoring unit.
Port power switch based lead compensation
A port power switch (PPS) may be used for lead compensation in systems where power is provided to a connected device by a switch-mode power supply (SMPS). The PPS may be designed to co-operate with the SMPS, providing a mechanism for the feedback reference point of the SMPS to be automatically switched, in the event of system fault or some other condition that might result in the PPS entering an “OFF’ operating mode, from the application point of load (POL) to the voltage input pin of the PPS without loss of power path continuity. The switching mechanism and the PPS may be manufactured to reside on the same integrated circuit. The PPS may include a control block that generates a control signal to couple the feedback port of the SMPS to the POL under normal operation, and to the voltage input port of the PPS during a fault condition.
Semiconductor device, radio communication terminal using same, and clock frequency control method
A semiconductor device 1 includes a clock generation circuit 15 that changes a frequency of an output clock signal according to a control signal div, an arithmetic circuit (e.g., CPU0) that operates according to the clock signal, a storage circuit (e.g., IC0) that is activated according to access from the arithmetic circuit CPU0, a memory access detection unit 12 that detects a number of accesses from the arithmetic circuit CPU0 to the storage circuit IC0, and when the number of accesses increases, outputs a request signal (e.g., psreq1), and a clock control circuit 14 that generates the control signal div for lowering the frequency of the clock signal according to the request signal psreq1.
Supply voltage generator for a display timing controller with current reuse
A semiconductor IC including a supply voltage generator, one or more first circuit blocks, and one or more second circuit blocks. The supply voltage generator is configured to generate a first supply voltage and a second supply voltage based on an external supply voltage, and to provide the first supply voltage to a first power bus and the second supply voltage to a second power bus. The first circuit blocks are connected between the first power bus and the second power bus, and the second circuit blocks are connected between the second power bus and ground.
Content distribution and aggregation
In an example, a method for secure publication of content is described. The method may include encrypting content with a media key. The method may also include providing the encrypted content to a client device associated with a private key and a public key. The private key may be stored at the client device. The method may also include encrypting the media key with the public key. The method may also include providing the encrypted media key to the client device.
The disclosure relates generally to mobile device applications, and more particularly, to a privacy system for a mobile device application. In one embodiment, a computer-implemented method of sending and receiving encrypted messages between users within an associated group of users is provided. The method includes: receiving a first message from a first user within the group of users, wherein the first message includes proprietary information; encrypting the first message into ciphertext; transforming the ciphertext into a second message, wherein the second message includes quotidian information; and sending the second message to a second user within the group of users. Once the second user receives the second message, the second user will assay the second message to be an encryption of an unknown first message. The second message is received from the second user, and is decrypted into the first message, which is displayed to the second user.
Techniques for ensuring authentication and integrity of communications
Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.
Secure transmission with error correcting code
The invention concerns a method and a system for encoding digital data (DATA) represented by source symbols, with an error correcting code generating parity symbols from, for each parity symbol, a plurality of source symbols and at least one parity symbol of preceding rank, including at least encrypting once (54) at least one first value (P1) into several encrypted values and integrating at least one combination (P1,j) of said encrypted values to compute (55) at least one part (P2 . . . Pn−k) of said parity symbols.
Secure message handling on a mobile device
Systems, methods, and software for providing digital security to a child message transmitted from a mobile device to a messaging server, where the mobile device typically does not transmit the parent message with the child message to the messaging server. Whether to apply digital security, such as encryption or a digital signature, or both, is determined, and if the mobile device does not include a complete copy of a parent message for insertion into the child message, the mobile device selectively downloads the parent message from the messaging server prior to the computation of a digital signature or prior to encryption. The systems and methods may also provide a check of the child message size, when the child message includes inserted parent content, to ensure that the child message does not exceed any prescribed limits on message size.
Systems and methods for managing certificates
Systems and methods for managing certificates are described. A system comprises modules to receive requests related to a digital certificate, receive responses related to authorization of the digital certificate related to the requests, and store the requests and responses. A system comprises modules to communicate audit requests, receive responses related to the audit requests, and store the responses. A system comprises modules configured to communicate audit requests related to different certificate authorization entities, receive responses related to the audit requests, and store the responses. Other embodiments are described.
Electronic computing device and a reboot method executable by same
A media data playback device comprises first and second nonvolatile memories. The first nonvolatile memory stores a boot loader and a kernel of an operating system in a compressed format. The second nonvolatile memory serves as a main memory of the device. A processor executes the boot loader to load the kernel from the first nonvolatile memory to the second nonvolatile memory in response to a boot command. When receiving an interrupt representing a shutdown command, the processor determines whether to clear the second nonvolatile memory in response to the shutdown command before actually shutting down the device.
Apparatus and method for booting in computer device with built-in communication module
An apparatus and method control booting in a mobile device with a built-in communication module to prevent a service user from using the mobile device for other purposes and to prevent the service user from subscribing to another service provider. A method includes determining, during a booting operation, whether the communication module is mounted with a USIM. A forced booting termination message is displayed if the communication module is not mounted with the USIM. And power supply is interrupted after a predetermined time from displaying the forced booting termination message.
System and method for selectively managing a branch target address cache of a multiple-stage predictor
A multiple stage branch prediction system including a branch target address cache (BTAC) and a branch predictor circuit is disclosed. The BTAC is configured to store a BTAC entry. The branch predictor circuit is configured to store state information. The branch predictor circuit utilizes the state information to predict the direction of a branch instruction and to manage the BTAC entry based on the stored state information in response to actual resolution of the branch instruction.
Method for controlling BMC having customized SDR
A Baseboard Management Controller (BMC) controlling method includes the steps of dividing a memory of a BMC into an original region and customized region, in which the original region includes at least one original sensor data record (SDR) and original platform event filter (PEF) corresponding to each other; providing an instruction set to at least one external system, in which the external system manages at least one customized SDR and customized PEF corresponding to each other in the customized region through the instruction set; polling the original SDR in the original region and the customized SDR in the customized region; determining whether values of the SDRs obtained through polling conform to a plurality of critical values individually corresponding to the SDRs; and obtaining a processing policy according to the corresponding PEF when at least one value of the SDR does not conform to the corresponding critical value.
Implementing pseudo content access memory
A pseudo CAM (PCAM) can be implemented using SRAM to minimize latency associated with a traditional CAM. On receiving a key at a memory controller that executes operations on the PCAM, a hash value of the received key can be calculated. Based on the hash value of the received key, one of a plurality of memory sub-trees comprising a subset of memory locations, that is associated with the received key can be identified. A binary search can be executed on the subset of memory locations that constitute the identified memory sub-tree to identify a memory location at which a data entry comprising the received key is stored. The data entry comprising the received key and corresponding content can then either be retrieved or deleted. Alternatively, a binary search can be executed to identify the memory location where a new data entry comprising the received key should be stored.
System and method for storing multiple copies of data in a high speed memory system
A system and method for providing high-speed memory operations is disclosed. The technique uses virtualization of memory space to map a virtual address space to a larger physical address space wherein no memory bank conflicts will occur. The larger physical address space is used to prevent memory bank conflicts from occurring by storing a second encoded copy of data in a multi-port XOR memory bank.
Distributed storage resource scheduler and load balancer
Distributed storage resources having multiple storage units are managed based on data collected from online monitoring of workloads on the storage units and performance characteristics of the storage units. The collected data is sampled at discrete time intervals over a time period of interest, such as a congested time period. Normalized load metrics are computed for each storage unit based on time-correlated sums of the workloads running on the storage unit over the time period of interest and the performance characteristic of the storage unit. Workloads that are migration candidates and storage units that are migration destinations are determined from a representative value of the computed normalized load metrics, which may be the 90th percentile value or a weighted sum of two or more different percentile values.
De-duplication in a virtualized storage environment
In one example, a method for de-duplicating redundant data in a virtualized storage environment includes, in response to receipt of a write request that includes write data and a virtual memory address of the write data, mapping the virtual memory address to a physical memory address within a pooled storage capacity that includes a virtualization of a plurality of storage devices. Next, a determination is made that a second block of data included in the write data of the write request is identical to a first block of data that is stored in the pooled storage capacity. Finally, a pointer, rather than the second block of data, is stored in the pooled storage capacity at the physical memory address. The pointer points to the first block of data.
Storage management in a virtual environment
A method, computer program product, and system for managing storage space in a virtualized computing environment. The method includes a computer determining, by one or more computer processors, that a virtual computer system has reached a threshold level of minimum available storage space. The storage space of the computer system is searched for an inactive snapshot file. When the inactive snapshot file is located, the inactive snapshot file is moved to a secondary storage.
Backing up an image in a computing system
Methods, apparatus, and products for backing up an image in a computing system that includes computer memory, including: receiving, by a backup image manager, an image for one or more computing devices within the computing system; identifying, by the backup image manager, available protected computer memory within the computing system, wherein the available protected computer memory within the computing system is restricted from alteration by a user of the computing system; slicing, by the backup image manager, the image into a plurality of image slices; and storing, by the backup image manger, one or more of the image slices in the available protected computer memory.
Performing data storage optimizations across multiple data storage systems
Described are techniques for performing data storage optimizations. A data storage optimizer on a first data storage system connected to a set of other data storage systems receives performance classification information. The first data storage system includes a first set of storage devices of a first performance classification. The set of other data storage systems includes a second set of storage devices of a second performance classification different from the first performance classification. A write operation is received from the host to write first data to a target address of a virtually provisioned device. It is determined that physical storage is not currently allocated for the target address of the virtually provisioned device. A first portion of physical storage is allocated for storing the first data. The first portion of physical storage is included in a storage device of the second set having the second performance classification.
Disk access quality of service
Providing quality of service levels to a plurality of sources that perform access requests to a disk resource includes providing a disk resource queue containing access requests for the disk resource, providing a source queue for each of the sources containing access requests generated by a corresponding one of the sources, determining if a new access request from a particular source is urgent according to a specified number of I/O operations per second for the particular source and a time since a previous access request from the particular source, adding the new access request to the disk resource queue if the new access request is urgent, and adding the new access request the source queue of the particular source if the new access request is not urgent and the length of the disk resource queue is greater than a predetermined queue depth value.
Storage system and storage control method
A storage system is provided with storage devices that are basis of a pool and a primary volume and a controller that is coupled to the plurality of storage devices and a host computer and that is provided with a cache region. In a case that a write request specifies a secondary volume storing a snapshot of a primary volume the write data is stored in a first cache sub region of the cache region and a response to the write request is transmitted to the host computer. In the case in which a page in the pool is unallocated to a virtual region of a write destination of the write data, a page is allocated to the virtual region, and write data is stored in the first cache sub region into the allocated page.
Snoop filter and non-inclusive shared cache memory
A data processing apparatus 2 includes a plurality of transaction sources 8, 10 each including a local cache memory. A shared cache memory 16 stores cache lines of data together with shared cache tag values. Snoop filter circuitry 14 stores snoop filter tag values tracking which cache lines of data are stored within the local cache memories. When a transaction is received for a target cache line of data, then the snoop filter circuitry 14 compares the target tag value with the snoop filter tag values and the shared cache circuitry 16 compares the target tag value with the shared cache tag values. The shared cache circuitry 16 operates in a default non-inclusive mode. The shared cache memory 16 and the snoop filter 14 accordingly behave non-inclusively in respect of data storage within the shared cache memory 16, but inclusively in respect of tag storage given the combined action of the snoop filter tag values and the shared cache tag values. Tag maintenance operations moving tag values between the snoop filter circuitry 14 and the shared cache memory 16 are performed atomically. The snoop filter circuitry 14 and the shared cache memory 16 compare operations are performed using interlocked parallel pipelines.
Apparatus system and method for providing raw data in a level-two cache
Aspects of the present disclosure disclose systems and methods for managing a level-two persistent cache. In various aspects, a solid-state drive is employed as a level-two cache to expand the capacity of existing caches. Any data stored in the level-two cache may be stored in a particular version or format of data known as “raw” data, in contrast to storing the data in a “cooked” version, as is typically stored in a level-one cache.
Managing caching of extents of tracks in a first cache, second cache and storage
Provided are a computer program product, system, and method for managing caching of extents of tracks in a first cache, second cache and storage device. A determination is made of an eligible track in a first cache eligible for demotion to a second cache, wherein the tracks are stored in extents configured in a storage device, wherein each extent is comprised of a plurality of tracks. A determination is made of an extent including the eligible track and whether second cache caching for the determined extent is enabled or disabled. The eligible track is demoted from the first cache to the second cache in response to determining that the second cache caching for the determined extent is enabled. Selection is made not to demote the eligible track in response to determining that the second cache caching for the determined extent is disabled.
Managing caching of extents of tracks in a first cache, second cache and storage
Provided are a computer program product, system, and method for managing caching of extents of tracks in a first cache, second cache and storage device. A determination is made of an eligible track in a first cache eligible for demotion to a second cache, wherein the tracks are stored in extents configured in a storage device, wherein each extent is comprised of a plurality of tracks. A determination is made of an extent including the eligible track and whether second cache caching for the determined extent is enabled or disabled. The eligible track is demoted from the first cache to the second cache in response to determining that the second cache caching for the determined extent is enabled. Selection is made not to demote the eligible track in response to determining that the second cache caching for the determined extent is disabled.
Policy based storage of object fragments in a multi-tiered storage system
Some embodiments are directed to an object addressable storage (OAS) system that stores a plurality of objects, a method for use in an OAS system and at least one non-transitory computer readable storage medium encoded with instruction that, when performed by a computer perform a method for use in an OAS system. Each object may include a plurality of fragments. A tiered storage environment comprising a plurality of storage tiers may be used. A policy for performing a storage operation a fragment of a stored object using the OAS system may be generated. Generating the policy may include receiving a user input. The input may include a first parameter specifying metadata criteria for metadata of the fragment. The input may also include a second parameter specifying a capability of a target storage tier. Information specifying an association between these two parameters is stored in a data structure.
Processing device with independently activatable working memory bank and methods
A data processing device is provided that includes an array of working memory banks and an associated processing engine. The working memory bank array is configured with at least one independently activatable memory bank. A dirty data counter (DDC) is associated with the independently activatable memory bank and is configured to reflect a count of dirty data migrated from the independently activatable memory bank upon selective deactivation of the independently activatable memory bank. The DDC is configured to selectively decrement the count of dirty data upon the reactivation of the independently activatable memory bank in connection with a transient state. In the transient state, each dirty data access by the processing engine to the reactivated memory bank is also conducted with respect to another memory bank of the array. Upon a condition that dirty data is found in the other memory bank, the count of dirty data is decremented.
Conditional write processing for a cache structure of a coupling facility
A method for managing a cache structure of a coupling facility includes receiving a conditional write command from a computing system and determining whether data associated with the conditional write command is part of a working set of data of the cache structure. If the data associated with the conditional write command is part of the working set of data of the cache structure the conditional write command is processed as an unconditional write command. If the data associated with the conditional write command is not part of the working set of data of the cache structure a conditional write failure notification is transmitted to the computing system.
Pruning a filemark cache used to cache filemark metadata for virtual tapes
A method of an aspect includes determining to prune a filemark cache. The filemark cache has entries that each store filemark metadata for a different corresponding filemark of a plurality of open virtual tape files. The method also includes pruning the filemark cache by removing a portion of the entries of the filemark cache. Other methods, apparatus, and articles are also disclosed.
Audio digital signal processor
A microprocessor includes a memory interface to obtain data envelopes of a first length, and control logic to implement an instruction to load an initial data envelope of a stream of data values into a buffer, each data value having a second length shorter than the first length, the stream of data values being disposed across successive data envelopes at the memory interface. Another instruction merges current contents of the buffer and the memory interface such that each invocation loads one of the data values into a first register, and moves at least a remainder of the current contents of the memory interface into the buffer for use in a successive invocation. Another instruction loads a reversed representation of a set of data values obtained via the memory interface into a second register. Another instruction implements an FIR computation including a SIMD operation involving multiple data values of the stream and the reversed representation.
System and method of communicating command data in a master-slave environment
A method includes, in a data storage device including a non-volatile memory, performing receiving, from a host device in a master-slave configuration with the data storage device, a first notification corresponding to a first read command. The method also includes storing, based on the first notification, a first entry in a notification queue. The first entry corresponds to the first read command. The method further includes storing first data corresponding to a second command at a location of the non-volatile memory. The location corresponds to an address to be read upon execution of the first read command. The second command is associated with an operation to be performed by the host device. The method includes, after storing the second data, setting an indicator corresponding to the first entry. The set indicator conveys that the data storage device is ready to execute the first read command.
Compute engine in a smart SSD exploiting locality of data
An embodiment of the invention includes a storage subsystem having a storage central processing unit (SCPU) operable to receive and send a command to a host, the command requiring data computation, a compute engine coupled to the SCPU, and a bank of memory devices coupled to the SCPU and the compute engine and configured to store data required by the commands, wherein the SCPU or the compute engine are operable to perform computation of the data.
Promotion of partial data segments in flash cache
For efficient track destage in secondary storage in a more effective manner, for temporal bits employed with sequential bits for controlling the timing for destaging the track in a primary storage, the temporal bits and sequential bits are transferred from the primary storage to the secondary storage. The temporal bits are allowed to age on the secondary storage.
Memory unit outputting a required time for a rewrite and method for controlling CPU
A memory includes a storage element which stores the number of times of application of a rewrite voltage pulse into a memory array, and a required-time output unit which outputs data representing a required time for a rewrite operation based on the number of times of application stored in the storage element.
Drive assisted system checkpointing via system restore points
Systems and methods of managing computing system restore points may include an apparatus having logic to receive a command to start a restore point for a solid state drive (SSD). The logic may also conduct a context drop of an indirection table from a volatile memory of the SSD to a non-volatile memory of the SSD in response to the command to start the restore point.
Network filtering in a virtualized environment
A physical host executes a hypervisor or virtual machine monitor (VMM) that instantiates at least one virtual machine (VM) and a virtual input/output server (VIOS). The VIOS determines by reference to a policy data structure a disposition of a packet of network communication with the VM, where the disposition includes one of dropping the packet and forwarding the packet. Thereafter, the determined disposition is applied to a subsequent packet in a same packet flow as the packet.
Method and system for integrating database memory management in virtual machines
Memory of a database management system (DBMS) that is running in a virtual machine is managed using techniques that integrate DBMS memory management with virtual machine memory management. Because of the integration, the effectiveness of DBMS memory management is preserved even though the physical memory allocated to the virtual machine may change during runtime as a result of varying memory demands of other applications, e.g., instances of other virtual machines, running on the same host computer as the virtual machine.
Storage allocation based on data set size
An approach to allocating storage that has track managed storage and cylinder managed storage. The approach involves receiving a request to allocate a data set for new data and determining if the size of the new data exceeds a breakpoint value. The size of the new data may be determined by allocating a buffer data set that is the size of the breakpoint value, and writing the new data to the buffer data set. If the new data only partially fills the buffer data set, then the size of the new data is smaller than the breakpoint value. If the new data overfills the buffer data set, then the size of the new data set is larger than the breakpoint value. New data that is larger than the breakpoint value is automatically stored in cylinder managed storage, while new data that is smaller than the breakpoint value is automatically stored in track managed storage.
Network card detecting circuit
A detecting circuit includes a network interface, a switch, a baseboard management controller (BMC) having first and second signal pins, and a detecting unit. The first and second signal pins receive low level signals when the network line is disconnected from the network interface. The first signal pin receives a high level signal and the second signal pin receives a low level signal when the network line is connected to the network interface but the network card is malfunctioning. The first and second signal pins receive high level signals when the network line is connected to the network interface and the network card works normally.
Wireless adapter for a measurement device
A wireless adapter for a measurement device is provided. The wireless adapter includes a first universal serial bus (USB) port to couplably receive data from the measurement device. The wireless adapter includes a battery to power the measurement device via the first USB port. the wireless adapter includes a wireless module to wirelessly transmit the received data to an external computing device after processing by the wireless adapter.
Multi-computers network sharing system having plug-and-play interfaces
The present invention relates to a multi-computers network sharing system having plug-and-play interfaces, comprising: an ethernet physical unit, a media accessing and controlling unit, a flow control unit, a plug-and-play interface transforming module, and a plurality of plug-and-play interfaces. In the multi-computers network sharing system of the present invention, when one of the external electronic devices is connected to any one of the plug-and-play interfaces, the flow control unit transmits the ethernet signal accessed by the first media accessing and controlling unit to the plug-and-play interface transforming module, therefore the plug-and-play interface transforming module transforms the ethernet signal to a plug-and-play interface signal and next transmits the plug-and-play interface signal to the electronic device connected with the plug-and-play interface, such that the electronic device can connect to the Internet without using any network cables or wi-fi devices.
Electronic device and data control method thereof
An electronic device and data control method are provided. The electronic device includes a connector which is connected to an external storage medium storing media data therein; an identification unit which identifies a storage identifier (ID) of the external storage medium connected to the connector; and a controller which performs a media function corresponding to the media data stored in the external storage medium whose storage ID is identified by the identification unit.
Skin-dependent device components
Additional components or functionality can be provided for a computing device by coupling the device with one or more device skins. Each device skin can include one or more components that can be utilized by the computing device, such that a user of the computing device can obtain desired functionality by selecting an appropriate skin. The components of the skin can be powered by the computing device, such as through wired or wireless power coupling. The computing device can determine an appropriate control scheme for the skin when the skin is coupled with the device, enabling a user to utilize the various components of the skin as if those components were part of the computing device.
Connection of more than three playback devices to HDMI CEC link
A method of operating HDMI ports. An HDMI port controller assigns virtual addresses when the maximum number of HDMI CEC addresses is exceeded and CEC logical addresses are duplicated with only one HDMI port corresponding to device having a CEC logical address having its port enabled at any given time. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.
Routing messages over a network of interconnected devices of a networked control system
The invention relates to routing messages over a network of interconnected devices of a networked control system, particularly to routing messages for individually controlling devices of a networked control system such as light sources of a lighting system. A basic idea of the invention is to determine a routing path for a message from a sender device to a destination device through the grid of interconnected devices of a networked control system, and to change the routing path, when a faulty device is contained in the routing path, in order to route the message around the faulty device, instead of determining an entirely new routing path. Thus, an efficient routing of a message over a network of interconnected device may be provided. An embodiment of the invention provides a method for routing messages over a network of interconnected devices (10, 12, 14, 16, 18) of a networked control system (20), wherein the devices are arranged in an approximately rectangular grid and each device (10) is adapted for routing messages, which were received from directly neighbored devices (12, 14, 16, 18) in the grid, to directly neighbored devices (12, 14, 16, 18) in the grid, wherein the routing comprises the acts of determining a routing path for a message from a sender device to a destination device through the grid (S10), routing the message from the sender device to the destination device along the determined routing path through the grid (S12), and changing the routing path according to a predetermined routing rule for routing the message around a faulty device contained in the determined routing path (S14).
Method and apparatus for signaling presentation description updates in HTTP streaming
A method comprises updating, by an apparatus, a media presentation description file, associated with media content streamed to one or more client devices using hypertext transfer protocol; and embedding, within one or more media segments of the media content, an indication of the update of the media presentation description file. At least one of the one or more media segments is provided, upon a request, to at least one of the one or more client devices.
Method and system for authorization and access control delegation in an on demand grid environment
The method of the invention provides for dynamic on-demand delegation of control and access in a grid computing environment comprising granting authority of a grid node to a first moderator by a superauthority; admitting the first moderator to the grid node; modifying the access control list of the grid node by the first moderator; inviting other entities listed on the access control list to access the grid node; and issuing a unique authorization certificate to each of the other entities, wherein the first moderator controls the inviting of the other entities without contact with or accessing to the superauthority for certification.
Managing mid-dialog session initiation protocol (SIP) messages
Processing mid-dialog SIP messages by receiving a mid-dialog SIP message from a SIP user agent client, creating a new SIP session, associating the new SIP session with the mid-dialog SIP message, identifying an application that is associated with the mid-dialog SIP message, providing to the application the mid-dialog SIP message in the context of the new SIP session, receiving an acknowledgement from the application that the application will accept the mid-dialog SIP message, and responsive to receiving the acknowledgement, providing to the application the mid-dialog SIP message in the context of the new SIP session.
Method and apparatus for utilizing advertisements to provide information regarding connection setup
A method, apparatus and computer program product are provided for reducing the time required for connection setup including, but not limited to, the time required for connection setup for devices discovered utilizing a low energy technology. In the context of a method performed by a slave device to be discovered, an advertisement may be generated including an indication of a capability to perform a predefined type of connection setup for initiating wireless communications. The method also causes the advertisement to be transmitted and receives a response to the advertisement from another device including one or more parameters relating to the predefined type of connection setup. The method also supports the connection setup with the another device in accordance with the one or more parameters. Corresponding apparatus and computer program products as employed by both master and slave devices are also provided.
Personal area network of devices and applications
A device receives, by using a first communication technique, a message from a first user device. The device identifies a profile associated with the first user device or a user of the first user device. The device further identifies, in the profile, a relevant rule, based on the message, and a second user device that is designated as a primary user device of the user associated with the profile. By using a second communication technique, the device transmits a request for instructions to the second user device based on the relevant rule, and receives the instructions from the second user device. The instructions specify a third user device selected by the user. The device generates a command based on the relevant rule. The device transmits, by using a third communication technique, the command to the third user device.
Network adaptor configured for connection establishment offload
Coupling circuitry (such as an intelligent network adaptor) couples a network to a host. The host is executing an operating system and is configured for transfer of data between the host and at least one peer via the network using at least one stateful connection to a peer according to a connection-oriented protocol. Indications of attempts to establish stateful connections with a host are received. The coupling circuitry processes each of the received indications by attempting to establish a stateful connection to a peer indicated by that connection establishment attempt indication such that, for a genuine attempt by a peer to establish a stateful connection with the host, the coupling circuitry interoperates with the peer to perform establishment-phase protocol processing of the attempted stateful connection. For each of the established stateful connections, the coupling circuitry operates to cause a state of that established stateful connection to be provided from the coupling circuitry to the host, wherein the operating system of the host handles data transfer phase protocol processing of that established stateful connection.
Saving program execution state
Techniques are described for managing distributed execution of programs. In at least some situations, the techniques include decomposing or otherwise separating the execution of a program into multiple distinct execution jobs that may each be executed on a distinct computing node, such as in a parallel manner with each execution job using a distinct subset of input data for the program. In addition, the techniques may include temporarily terminating and later resuming execution of at least some execution jobs, such as by persistently storing an intermediate state of the partial execution of an execution job, and later retrieving and using the stored intermediate state to resume execution of the execution job from the intermediate state. Furthermore, the techniques may be used in conjunction with a distributed program execution service that executes multiple programs on behalf of multiple customers or other users of the service.
Control circuit and method for allocating orthogonal sequences
A method for allocating orthogonal sequences to user equipment devices, UEs, of a group sharing a channel of a telecommunication system is disclosed. The method comprises determining which UE of the group having largest transmission resource assigned for a physical uplink shared channel, PUSCH; determining a first orthogonal sequence of the UE of the group having largest transmission resource assigned; determining a second sequence that equals a quadrature phase offset of the first orthogonal sequence; reserving said second sequence when allocating sequences to remaining UEs of the group by avoiding the second sequence as long as there are other orthogonal sequences available. A control circuitry for a network node is also disclosed.
Resource launch from application within application container
A remote resource application that is associated with an application container in a manner that the application container restricts the remote resource application from directly accessing at least a file system of the computing system. The remote resource application provides a visualization for each of multiple remote resources. The user may launch the remote resource by selecting the corresponding visualization. Some of the remote resources are accessed by launching from the remote resource application itself in the context of the application container. Others of the remote resources are launched outside of the application container. The remote desktop application may operate securely within the application container, and still serve as an integrated location from which a user can access remote resources, regardless of whether the remote resource is launched from internal or external to the application container.
Smartlink system and method
Multiple applications may be targeted via key/value data associated with a resource identified by a primary Uniform Resource Locator (“URL”). By parsing the key/value data, an alternative application for accessing the resource may be identified. When the alternative application is installed on a device, the alternative application may be invoked to access the resource.
Systems and methods for managing preferred client connectivity to servers via multi-core system
The present application is directed towards systems and methods for providing a cookie by an intermediary device comprising a plurality of packet processing engines executing on a corresponding plurality of cores, the cookie identifying a session of a user that was redirected responsive to a service exceeding a response time limit. The cookie may be generated with identifiers based off a name of a virtual server managing a service of a server, and a name of a policy associated with the virtual server. Each packet processing engine of the plurality of packet processing engines may interpret cookies generated by other packet processing engines due to the name of the virtual server and name of the policy, and may provide preferred client connectivity based on cookies included in requests for access to a service.
Network visualization system and method of using same
A network visualization system is provided. The network visualization system may include a monitoring server that discovers devices in a client network, and a client application including a discovery controller and a rendering unit. The discovery controller may receive a list of discovered devices that were discovered by he monitoring server, and the rendering unit may render the discovered devices using DirectX.
Recommendations based on usage and resource consumption data
An electronic device may generate use related information and resource consumption related information corresponding to each of used applications used in the electronic device. The use related information and the resource consumption related information may then be transmitted to a remote applications manager, which may analyze the information to generate, based on the analysis, specially tailored application recommendations. The application recommendations may list one or more other applications, newly available or offered, which may be recommended for download to and/or use in the electronic device. The analysis of the use and the resource consumption information may comprise ranking the used applications, such as based on use patterns and/or resource consumption, and/or classification of the used applications, such as based on application type. Generating the application recommendations may comprise correlating used applications, based on classification and/or ranking, with similar applications that may be recommended.
Event management for hosted applications
At a server system, event data is received that was sent over a network to the server system. The event data reflects one or more application events generated by at least one hosted application. The hosted application is executed on one or more servers and being accessible by a user over a network using a user client device. The event data is stored at the server system. A request to view information regarding events generated by the hosted application is received at the server system and from an administrator client device over a network. The stored event data is received. At the administrator client device and based on the retrieved event data, a display of information regarding application events is generated by the hosted application.
Systems and methods for retrieving customer premise equipment data
A method includes receiving a trigger event at a customer premise equipment management system from a service provider system. The trigger event includes a request for retrieval of customer premise equipment data from at least one customer premise equipment device. The method includes issuing, from the customer premise equipment management system, a customer premise equipment data request to the at least one customer premise equipment device in response to receiving the trigger event. Each customer premise equipment data request includes a customer premise equipment access certificate to gain access to particular customer premise equipment data. The method also includes receiving, at the customer premise equipment management system, the requested customer premise equipment data.
Method and system for collecting and managing network data
Some embodiments include a method and/or a system for collecting and managing network data. Other embodiments of related methods and systems are disclosed.
Distributed data revocation using data commands
A policy proxy intercepts a data stream between a data server and a user or other device, identifies the user device, and identifies a policy in an integrated policy server applicable to the user device based on the identity of the user device. The policy proxy may identify one or more of the policy elements based on the user device, and translate the policy elements into actions involving the data stream between the data server and the user device so as to implement at least one aspect of the identified policy. The actions can comprise permitting normal exchange of data between the data server and the user device, preventing communication between the data server and the user device, or modifying the data stream between the data server and the user device.
Method and apparatus for real-time collection of information about application level activity and other user information on a mobile data network
Method and apparatus for real-time collection of information about application level activity and other user information on a mobile data network. A collector device communicates with a router in a mobile data network so that the collector can obtain substantially all of the data coming from the router in real-time and correlate the data to specific users. The collector device comprises a user identity subsystem, filter, and data transfer subsystem. The user identity subsystem inspects the data for source IP addresses and correlates them to corresponding mobile phone numbers. The filter then inspects the collected data and retains only application-level data. Lastly, the data transfer subsystem transfers the filtered data to a data reporting and analysis system.
Automated product knowledge catalog
A product catalog is associated with a rules service allowing administrators to conduct examinations of a computer system's health. Rules services establish a set of rules to be run against a particular computer system and thereafter invoke a rules engine. The rules service accesses a product catalog to supply product reference data regarding each component of interest in the computer system. The product reference data supplies to the rules service structure and characteristics of the component's telemetry data as well as factors to consider with regard to component interaction. Once supplied with the product reference and input data the rules service conducts the analysis. When reference data is not available or fails to match parsed input data, a search is conducted to identify and retrieve reference data matching the structure and characteristics of the parsed input data. Upon finding a match the product catalog is updated with the new information.
Methods, systems, and products for evaluating electronic data and electronic forms
Methods, systems, and products are disclosed for evaluating electronic data. A quality of the data is measured. A predefined numeric value is determined that is associated with a gravity of an error in the data. The numeric value associated with the error is reported.
Increasing availability of stateful applications
Methods, systems, and computer-readable media for facilitating coordination between a fabric controller of a cloud-computing network and a service application running in the cloud-computing network are provided. Initially, an update domain (UD) that includes role instance(s) of the service application is selected, where the service application represents a stateful application is targeted for receiving a tenant job executed thereon. The process of coordination involves preparing the UD for execution of the tenant job, disabling the role instance(s) of the UD to an offline condition, allowing the tenant job to execute, and restoring the role instance(s) to an online condition upon completing execution of the tenant job. Preparing the UD includes notifying a management role established within the service application of the fabric controller's intent to execute the tenant job and receiving a management-role response communicating a presence of replications of internal state(s) of the role instance(s) affected by the tenant job.
Method, system, and device for realizing registration mechanism of IP multimedia subsystem
The present invention provides a method, a device, and a system for realizing a registration mechanism of an IP multimedia subsystem. In the above method, a S-CSCF obtains a private user identity and a public user identity of CS UE and characteristic information of a MSC Server from a received request message, wherein the request message includes a registration request or a de-registration request; and then matches the obtained private user identity, public user identity, and characteristic information with existing registration binding relationships. If the match is successful, an operation indicated by said request message is performed on the successfully matched registration binding relationship. Based on the solution proposed in the present invention, the logic of the registration service can be ensured to be normal.
Management system and computer system management method
A system management apparatus for managing a computer system receives plug-in distribution data from a plug-in distribution apparatus. The plug-in distribution data comprises plug-in definition information and template definition information. The system management apparatus uses the plug-in definition information to acquire information from the management target apparatus, and determines whether or not to issue an alert based on the template definition information. The distribution of the plug-in and the template at the same time means that the user can avoid confusion regarding the threshold setting.
Hybrid distributed and cloud backup architecture
The claimed subject matter provides a system and/or a method that facilitates integration of a distributed backup environment and a online backup environment. A super peer device can be designated from a set of peer devices. The super peer can distribute backup data amongst the set of peer devices based upon availability and storage capacity of the peer devices. In addition, the super peer can transfer portions of backup data from the set of peers to an online backup service.
Multi-media file emulation device
An emulation device is used to stream media content from a digital media server to a digital media renderer. The emulation system receives a pulse code modulation data stream from the digital media server via a network interface, and stores the data in a buffer. The emulation system is attachable to the digital media renderer, and is recognized as a storage device containing an emulated media file. When the digital media renderer plays the emulated media file, the emulation device reads the PCM data from the buffer to use as sound or video data of the emulated media file.
Fantasy open platform environment
A fantasy server application may comprise a platform generator component to generate a resource document with a host segment arranged to present a host resource document and a guest segment arranged to present a guest resource document, a host manager component to send a request to generate the host resource document with fantasy content from a fantasy content database to a host server program, receive a response with the host resource document, and add the host resource document to the host segment, and a guest manager component to generate a guest reference for use by a client device, the guest reference arranged to refer the client device to a guest server program arranged to generate the guest resource document with fantasy content from the fantasy content database, and add the guest reference to the guest server program to the guest segment. Other embodiments are described and claimed.
Media system with social awareness
The insertion of content into media streams is provided. A media stream is monitored by a media server computer, the monitored media stream having at least one marker designating an associated insertion position within the media stream. A marker is selected to insert personalized social-awareness based content into the media stream. Social awareness information associated with a target of the monitored media stream is identified. The social awareness information is utilized to select personalized social-awareness based content. The personalized social-awareness based content is inserted into the monitored media stream at the corresponding insertion position associated with the selected marker to transform the media stream.
Interactive server side components
Server side internet applications are created by placing interactive server side components (ISSC's) on internet pages. ISSC's encapsulate dynamic page functions including processing of user responses on the server and thus can be reused, which drastically reduces programming effort. The ISSC technique remembers information (in form of an ISSC object) about each ISSC during dynamic page generation on the server. Then, it generates HTML code in a way such that the ISSC event is sent to the server using a conventional HTTP GET or POST request. On the server, the event is then passed to the corresponding ISSC object. All components work without disturbing each other, even when nested or combined. A browser based editor can also be used to place ISSC's on pages and to modify their properties. During dynamic page generation, scripts and handles are embedded into the page that permit editing of the page itself.
System and method for atomic file transfer operations over connectionless network protocols
A system for atomic file transfer operations over connectionless network protocols includes a processor and a memory coupled to the processor. The memory contains program instructions executable by the processor to implement an operating system including a system call interface for sending one or more data files to another system over a network via a connectionless network protocol. In response to an invocation of the system call by an application, the operating system is configured to send the one or more data files to the other system over the network without the application copying contents of the data files into application address space.
Electronic message content and header restrictive recipient handling system and method
An electronic messaging system and method with reduced traceability. Separate displays are provided at a recipient user device for separately displaying via the user device header information of an electronic message and message content including a media component. The display of the header information does not display the media component and the display of the message content does not display a username associated with the header information. The message content including the media component are automatically deleted after being displayed such that after the display of the message content is terminated from view, the message content including the media component is no longer available to a recipient user.
Establishment of a conference
An apparatus, method, computer readable medium, and system are provided for associating content with a conference. A viewer of content may elect to partake in a conference and may select one or more options associated with the conference. The viewer may be authenticated and billed based on the viewer's participation in the conference. The viewer may be assigned to a conference group based on a location of the viewer and/or the viewer's selections of conference options. A lookup may be performed to determine conference parameters, comprising one or more of a terminal identifier associated with the viewer, a conference code identifier and a participant code. A conference setup message may be transmitted to one or more of a switch and a customer premise equipment device (CPE) based on the conference parameters.
Recommending groups to join in a social networking system
Based on information associated with users, a social networking system recommends one or more groups for a target user to join or to create. Characteristics of the target user, characteristics of users connected to the target user, characteristics of candidate groups in the social networking system may be used to identify groups for recommendation. The social networking system may provide questions to the target user and recommend a group to the target user based on received answers to the questions. For example, the answers to the provided question identify one or more characteristics of the target user, which are used to select a group for recommendation. Additionally, the social networking system may recommend additional users for the target user to add or invite to a group based on characteristics of the target user, the additional users, and/or the group.
Systems and methods for message personalization
Systems and methods for building personalized messages to one or more recipients. In one aspect, one or more personalized messages are created from one or more templates and one or more token lists. The templates include global tokens and local tokens. The token lists contain fields in the templates and corresponding token values. For each respective target recipient, a personalized message is generated by identifying and storing global tokens and corresponding global token values in a global cache, and identifying and storing local tokens and corresponding local token values in a local cache. The personalized messages are then created using the templates and substituting tokens with token values stored in the global and local cache. The personalized messages are then distributed to the corresponding target recipients.
Optimizing program requests over a wide area network
In various embodiments, data processing apparatus, software, or machine-implemented methods can optimize NFSv3 asynchronous write requests or MSRPC calls that traverse a wide area network, for example, by receiving, from a client, a first request directed to a server across a wide area network; determining whether a related second request has been received previously; when a related second request has been received previously, sending, to the client, a first reply to the second request and forwarding the first request to the server, and otherwise forwarding the first request to the server without sending any reply to the client for the first request. Sending local replies from a WAN optimizer induces the client to send continuous requests, improving throughput, but at least one client request remains unreplied to, and one server error reply is always reported to the client, facilitating correct error processing at the client.
Stationery for electronic messaging
Stationery templates for electronic messages are provided in an electronic messaging system. For one embodiment, a user can select from a list of categories and within each category is a set of one or more stationery templates from which a user can choose. The user may edit the stationery template. The user can also create custom stationery and share it with other users. Upon selection or creation of a stationery template, the user is presented with a formatted electronic message and can add, remove, or edit text content or replace media content. Alternatively, a stationery template can be changed or added to the electronic message after the user has begun composing and editing the text content. The content and format of the text and media components are carried over into the new template. When the message is sent, it is saved and transmitted in a format such that it can be rendered to look the same at the receiving machine.
System, method, and computer program for interfacing assets of an entity with a social media service
A system, method, and computer program product are provided for interfacing assets of an entity with a social media service. In use, an entity containing one or more assets is identified. Additionally, a social media service is identified. Further, the one or more assets of the entity are interfaced with the social media service, such that actions performed with respect to the one or more assets of the entity are associated with the social media service, and actions performed with respect to the social media service are associated with the one or more assets of the entity.
Cooperative network for mobile internet access
A method and system for connecting mobile users to the Internet using cooperative interconnection. A node consists of a network element that has two connections methodologies—typically a node will have a radio link and a wired link to the Internet. To obtain a connection, a member of the service located themselves in proximity to a network node which is commonly provided by another member and the cooperative tunneling agent requests a secure link. All members of the service agree to give connection to the Internet upon request from another member.
Portable terminal, message notification method, and message notification program
Address information stored as a transmission destination is effectively used. A mobile phone includes a position detection portion (S02) for obtaining current positional information, an EEPROM for storing address data in which positional information indicating a position and address information indicating a transmission destination are associated with each other, an extraction portion (S03) for extracting address information stored in association with the positional information located within a prescribed range from the current positional information detected by the position detection portion, and a message transmission portion (S08) for transmitting a fixed message to the transmission destination indicated by at least one address information extracted by the extraction portion.
Apparatus and method for providing instant messaging and presence service in mobile communication system
An apparatus and a method for automatically accessing a relevant group when determining that message inform information is transmitted from the relevant group in order to determine that the message is generated from the relevant group without accessing the relevant group are provided. The apparatus includes a group service server and a mobile terminal. The group service server generates message inform information informing of presence of a message which a user, registered in a relevant group, desires to transfer to all users registered in the relevant group when transmitting a group message. When determining reception of the message inform information informing of presence of a message which the user registered in the relevant group desires to transfer to all of the users registered in the relevant group, the mobile terminal accesses the group which has transmitted the message, receives, and stores the relevant group message.
Blog integration in a collaborative system
A method, system and apparatus for an integrated blog in a collaborative environment. In this regard, the collaborative environment can include a named collaborative space and one or more collaborative components disposed in the named collaborative space. For instance, the collaborative components can include a discussion forum, a persistent chat, a shared calendar and a shared document library, to name a few. Importantly, a blogging application can be disposed in the named collaborative space as one of the collaborative components. To that end, the blogging application can be coupled to a collaborative blog internal to the collaborative environment.
Method, apparatus and system for media position control
An apparatus, system, method, server, and client are provided for media position control. A client sends to a player a request for setting up a streaming session, and the streaming session is set up between the player and a server. A communication channel is set up between the client and the server. An interfacing message is defined and communicated between the client and the server over the communications channel that indicates a read position in a media. A continuous stream is created in the server in accordance with the read position.
Parallel computation of a remainder by division of a sequence of bytes
A remainder by division of a sequence of bytes interpreted as a first number by a second number is calculated. A first remainder by division associated with a first subset of the sequence of bytes is calculated with a first processor. A second remainder by division associated with a second subset of the sequence of bytes is calculated with a second processor. The calculating of the second remainder by division may occur at least partially during the calculating of the first remainder by division. A third remainder by division is calculated based on the calculating of the first remainder by division and the calculating of the second remainder by division.
Independent data access in a segmented file system
A first file server for use with a distributed-file system includes a processor configured to determine that an incoming file system communication is associated with a first portion of the distributed-file system associated with a second file server, send a first authorization request to the second file server to request authorization to directly access the first portion of the distributed-file system, analyze a first authorization response from the second file server to determine at least one storage location associated with the first portion of the distributed-file system, determine that an incoming second authorization request received from a third file server is associated with a second portion of the distributed-file system associated with the first file server, obtain data indicative of the second portion of the distributed-file system, and send a second authorization response that includes the data.
Sequential semantic representations for media curation
Generating a sequential semantic representation and a resulting content item sequence or presentation is disclosed. A set of nodes and paths among the nodes are determined. Each node includes a corresponding a set of criteria. The paths define a relationship among the plurality of nodes. Transitional operators that define additional criteria for the nodes, are associated with the paths. Content items that include characteristics that are determined to match the corresponding set of criteria for at least one of the nodes are retrieved.
Efficient garbage collection in a compressed journal file
A map corresponding to data blocks with overwritten compressed journal entries is configured. Weighted conditions for each of the overwritten compressed journal entries are calculated. The weighted conditions are arranged in the map from lowest to highest. One of the weighted conditions includes a biasing variable towards selecting data blocks having free space at an end of at least one associated record.
Apparatus, system, and method for data block usage information synchronization for a non-volatile storage volume
An apparatus, system, and method are disclosed for data block usage information synchronization for a non-volatile storage volume. The method includes referencing first data block usage information for data blocks of a non-volatile storage volume managed by a storage manager. The first data block usage information is maintained by the storage manager. The method also includes synchronizing second data block usage information managed by a storage controller with the first data block usage information maintained by the storage manager. The storage manager maintains the first data block usage information separate from second data block usage information managed by the storage controller.
Data context selection in business analytics reports
A method for changing data context in a business analytics report is described herein. In one embodiment, such a method includes providing a business analytics report, wherein the report contains data and current metadata categories describing the data. The method enables selection of a current metadata category directly on the business analytics report. The method displays a metadata hierarchy associated with the current metadata category. This metadata hierarchy may include the current metadata category as well as related metadata categories arranged in a tree-like structure. The method further enables selection of a related metadata category from the metadata hierarchy to apply to the business analytics report. The method automatically updates the business analytics report with the metadata category and populates the report with the associated data. A corresponding computer program product and apparatus are also disclosed.
Identifying relevant data for pages in a social networking system
Embodiments of the invention improve the ability of a social networking system to determine which types of data—hereinafter referred to as “fields”—are relevant to which types of user pages. Specifically, a social networking system assigns page types to different user pages, and likewise stores information on different types of fields. By analyzing the relationships of different pages and fields, the social networking system determines which types of fields are particularly well-suited for inclusion on different types of pages. Using the learned information about page types and field types, the social networking system can better aid page administrators in specifying data to add to their pages. For example, the social networking system can recommend to administrators the addition of certain types of fields or automatically add the fields. Further, the social networking system can specialize a search for social networking system data to field types.
Method and system for the management of professional services project information
A method and system are provided for the transfer and/or aggregation of data and, in particular, integrating data used in managing a professional services practice. The invention preferably transfers and/or aggregates data relating to the identity of clients and matters for whom professional services are being rendered with data relating to the work which data may be maintained in inconsistent, proprietary formats, comprising one or more of the following types of information: accounting; budgeting; docketing; time and billing; work product; word processing; records; project management; and/or other information relating to the professional services. The system of the present invention preferably comprises data storage and data processing means adapted to use the data in substantially portable and/or application-independent format, and/or and transfer or aggregate data between common, and/or proprietary data formats.
Identifying and reporting differences in network activity data files
A method of identifying differences between activity data files includes determining a difference between the activity data files. Causal analysis may be performed to identify a cause of the difference. The difference and/or the cause of the difference may be rendered based on a rendering template. Tier pairs between the activity data files may be matched and a user may be queried to confirm the tier pair match. Statistical and/or protocol differences between each of the activity files may be presented. Transactions between each of the activity data files may be matched including comparing the content files in each of the activity data files that account for the transactions. Client side differences between each of the activity data files may be identified. A categorization may be assigned to each of the determined differences. Determined differences may be excluded from the rendering.
Minimizing computer resource usage when converting data types of a table column
Online conversion procedures avoid the need to generate a copy of an entire table in order to convert the data type of a column in the table. To convert a table's column to a new data type, a replacement column is created in the table, the replacement column having the new data type. A background process dedicated to converting the column translates values in the column of the old data type to the new data type and stores the converted values in the replacement column. In addition, as transactions of users are applied to rows in the table, the value in the column of the old data type in the rows is converted and stored in the replacement column. Once the background process completes, the replacement column is used in lieu of the converted column.
Framework for dynamically generating tuple and page classes
Techniques for reducing the memory used for processing events received in a data stream are provided. This may be achieved by reducing the memory required for storing tuples. A method for processing a data stream includes receiving a tuple and determining a tuple specification that defines a layout of the tuple. The layout identifies one or more data types that are included in the tuple. A tuple class corresponding to the tuple specification may be determined. A tuple object based on the tuple class is instantiated, and during runtime of the processing system. The tuple object is stored in a memory.
User interface features to manage a large number of files and their application to management of a large number of test scripts
Improved user interface features to manage a large number of files and their application to management of a large number of test scripts. Various features related to selection of files of interest, locating files matching (or not containing) search strings potentially of several lines, highlighting the occurrences of desired strings in the content of a file, finding and replacing strings of interest potentially of several lines, are disclosed.
Migration of data from a legacy system
A method and system for translating data to be migrated from an older legacy database to a newer recipient database. A translation table in the older legacy database is updated. The translation table defines recipient data elements in the newer recipient database based upon metadata of the older legacy database. The metadata of the older legacy database describes legacy data fields in the older legacy database. The older legacy database utilizes a first operating system. The newer recipient database utilizes a second operating system that differs from the first operating system. Legacy data elements in the older legacy database are translated to correspond to the recipient data elements in the newer recipient database by utilizing the updated translation table. The legacy data elements translated in the older legacy database are used to migrate the legacy data elements translated from the older legacy database to the newer recipient database.
Systems and methods for searching for analog notations and annotations
Systems and methods are provided for searching for analog data, including hand writing, facial expressions and voice data. With respect to analog writing, a device records and stores analog writing, including time, pressure and position as a writing tool moves on a touch screen device. A search term that includes time, pressure and position data, is received. The search term is compared with the time, pressure and position stored on the device. If they are similar, then the stored analog writing is displayed. In other example embodiments, facial expressions and voice data can be used as search terms to respectively search for stored facial expressions and voice data.
Medical image importer and method
Provided are a medical information importer and method for importing medical information into a network-accessible database. The medical information importer includes a housing includes with an external stand-alone form factor, the housing including an interface for receiving a portable computer-readable medium storing medical information. An information reading component is provided for reading the medical information from the portable computer-readable medium when operatively connected to the interface. A computer-readable memory in communication with the information reading component stores, at least temporarily, the medical information read by the reading component under the direction of a controller. And a network interface connects the medical information importer to a communication network without a local connection between the medical information importer and a computer terminal including a display device for viewing the medical information.
Apparatus for and method of handling data analysis
A method and apparatus for handling data analysis. The apparatus includes an editing device which adds user-specified one of a plurality of operation units to a user-specified layer in a data analysis in response to a user operation, each of the operation units performing a predetermined processing on an associated data source, a connecting device which connects at least one user-specified operation unit in the data analysis to an analysis path in response to a user operation, and a user interface. The user interface receives the user operations and displays the data analysis by representing layers in the data analysis, operation units in the layers and connections on the analysis path in a visual manner.
System and method for accessing and posting nodes of network and generating and updating information of connections between and among nodes of network
A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module.
A method, device and system for acquiring information related to annotations and the content of a document. Annotations are isolated from document content and are associated with portions of the content of the document. Annotations and content are used as a basis for a semantic search of a corpus of other documents. From the corpus, related information is extracted and presented or made available along side of or with the original content and annotations of the document. Each version of a document is stored and made accessible. Any of the versions of a document, with or without a current set of annotations, may be distributed to others for further review and annotation. Annotations are protected and associated with a level of privilege or rights. Annotations are trackable over time and location and are associated with a particular annotator.
Social discovery and ranking of pages
In one embodiment, a social-networking system accesses a social graph with a plurality of user nodes and a plurality of location nodes, receives a search query with location parameters, identifies a set of location nodes based on the search query, and determines a value for each location nodes in the set based on the edges connected to the location nodes in the social graph.
Text suggestions for images
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving image data corresponding to an image, processing the image data to identify one or more features within the image, generating one or more keywords based on each of the one or more features, transmitting the one or more keywords to a computing device for displaying a list of the one or more keywords to a user, receiving text, the text comprising at least one keyword of the one or more keywords, that at least one keyword having been selected by the user from the list, and transmitting the image and the text for display, the text being associated with the image.
Social static ranking for search
In one embodiment, one or more computing devices assign each of a plurality of nodes of a graph of a social-networking system to one of a plurality of search indices. Each search index corresponds to a node type, and each node assigned to a search index is of the node type that the search index corresponds to. For each search index, the one or more computing devices determine a value for each node assigned to the search index based at least in part on edges connected to the node in the graph and rank the nodes assigned to the search index based at least in part on their values. The one or more computing devices provide the search indices for storage to facilitate responding to queries encompassing objects represented by the nodes assigned to the search indices.
Conceptual tagging with conceptual message matching system and method
A conceptual tagging and message matching system and method are provided. In one example, the system and method generate web pages or third party web pages with pieces of content combined with the message.
System and method for identifying a location of interest to be named by a user
A mobile communication device for identifying a location to be named comprising a position locator component configured to determine a location of a user and a communication interface component configured to provide the location for use in determining user-specific location information including at least one of a number of times and an amount of time the user is present at or near the location. The location naming component is configured to receive an identification of the location as a location of interest. The location naming component is configured to provide a prompt for naming the location of interest for presentation by a graphical user interface component. The location naming component is configured to receive name information for naming the location. The graphical user interface component is configured to present the name information for the location of interest on the mobile communication device.
Method and system for dynamic web display
A system and method for transacting retrieval of inventory data, such as real estate property listing(s), over an information network and dynamically transmitting the listing(s), in near or real time, to one or more subwindows of a web browser window. The listings contain customized rendering instructions that are encoded into an inventory data string and sent to an ad server that renders the listings in the subwindow according to the customized rendering instructions.
Optimizing media player memory during rendering
Optimizing operation of a media player during rendering of media files. The invention includes authoring software to create a data structure and to populate the created data structure with obtained metadata. The invention also includes rendering software to retrieve the metadata from the data structure and to identify media files to render. In one embodiment, the invention is operable as part of a compressed media format having a set of small files containing metadata, menus, and playlists in a compiled binary format designed for playback on feature-rich personal computer media players as well as low cost media players.
Using geographical location to determine element and area information to provide to a computing device
A database has a plurality of elements, where each element is associated with a location and at least one set of different attribute values, wherein each set includes a timestamp when the attribute values in the set were determined. A determination is made of a reference geographical location, an element having a geographical location within a geographical region including the referenced geographical location, a most recent set of the attribute values for the element having a most recent timestamp, a previous set of attribute values for the determined element comprising the set of attribute values having a previous timestamp prior to the most recent timestamp, and whether a condition with respect to at least one of the most recent set of attribute values and the previous set of attribute values of the determined element is satisfied.
Systems and methods for semantic overlay for a searchable space
The embodiments of the present invention provide a novel way of searching and interacting with content available via a network, such as the Internet, and the World Wide Web. In some embodiments, systems and methods provide a semantically-oriented structure for organizing and accessing content items. The semantic organization can be derived by leveraging user interactions with the content items. The systems and methods leverage the semantics of the content items to help the user find content items that are consistent with the purpose of the user's search. In addition, the embodiments provide a novel navigation paradigm of search results and content items so that the user can more intuitively and more efficiently get information form an information space.
Query execution systems and methods
System, method, and computer program product for processing data are disclosed. The method includes receiving a query for processing of data, wherein the data is stored in a table in a plurality of tables, wherein the table is stored on at least one node within the database system, determining an attribute of the table and another table in the plurality of tables, partitioning one of the table and the another table in the plurality of tables using the determined attribute into a plurality of partitions, and performing a join of at least two partitions of the table and the another table using the determined attribute. The join is performed on a single node in the database system.
System for determining and displaying legal-practice trends and identifying corporate legal needs
The present inventor devised systems, methods, interfaces, and software that can facilitate generation and presentation of legal trend data based on legal documents, such as caselaw documents or court docket documents.
Generating containers for electronic records based on configureable parameters
Embodiments of the invention may provide an approach for managing electronic records in a content management system. The content management system may use a container structure to create, edit, and manage electronic records in a coordinated way. The container structure may include a master container and a plurality of sub-containers. An associated method generally may include receiving a request comprising a record and one or more properties associated with the record; determining, from the one or more properties associated with the record, a date; based on the date of the record, associating the record with a sub-container of the container structure; and managing disposition of the sub-container based on an associated policy.
Object loss reporting in a data storage system
In response to receiving a request from a client to store an object, a key-durable storage system may assign the object to a volume in its data store, generate a key for the object (e.g., an opaque identifier that encodes information for locating the object in the data store), store the object on one disk in the assigned volume, store the key redundantly in the assigned volume (e.g., using a replication or erasure coding technique), and may return the key to the client. To retrieve the object, the client may send a request including the key, and the system may return the object to the client. If a disk fails, the system may determine which objects were lost, and may return the corresponding keys to the appropriate clients in a notification. The system may be used to back up a more expensive object-redundant storage system.
Automated computing appliance cloning or migration
A system and method for automatically cloning or migrating a computing appliance while maintaining its operational state. A configuration bundle that includes configuration data, software revision level and a list of system updates is used to recover or duplicate a device's operation state. The system and method can also be utilized to migrate a computing appliance between different operating system while maintaining or replicating the previous operational state.
Storing electronic content with time-varying properties
Systems and methods for controlling document storage and tracking model dynamic attributes of a document in a time-varying manner, and enable reconstruction of a document's state at any point in time. The time-varying model identifies dynamic components of documents, where dynamic components include time-varying properties that changes over time. A set of validity parameters are associated with each state of a document (the state of a document corresponds to a new version of the document that results from changes to the document), and the set of validity parameters define a validity period for the state. Instead of archiving each new version of the document that corresponds to each new state of the document, the document is archived in storage by archiving information of the states along with the set of validity parameters corresponding to each state.
Utilizing metadata to optimize efficiency for archiving emails
A method, a computer program product and a system are provided for archiving emails, where the email system includes at least one user mailbox configured to receive and store emails within the user mailbox and send emails from the user mailbox. User-specific metadata corresponding with emails received and sent by each user mailbox is collected. The collected user-specific metadata is analyzed to provide a predictive indication when and which emails will be archived for each user mailbox, and emails are archived for user mailboxes based upon the predictive indication for each user mailbox.
Metadata management for fixed content distributed data storage
An archival storage cluster of symmetric nodes includes a metadata management system that organizes metadata objects. Each metadata object may have a unique name, and metadata objects are organized into regions. A region is selected by hashing one or more object attributes and extracting a given number of bits of the resulting hash value. The number of bits may be controlled by a configuration parameter. Each region is stored redundantly. A region comprises a set of region copies. In particular, there is one authoritative copy of the region, and zero or more backup copies. The number of backup copies may be controlled by a configuration parameter. Region copies are distributed across the nodes of the cluster to balance the number of authoritative region copies per node, and the number of total region copies per node. Backup region copies are maintained synchronized to their associated authoritative region copy.
Systems and methods for performing replication copy storage operations
A system and method are provided for performing storage operations relating to a first secondary copy of electronic data. A storage policy or storage preferences may dictate that a replication copy should be used in storage operations performed to a particular client, sub-client, data, media or other item. Based on the storage policy, when a new client, sub-client, data, media or other item is received, a media agent determines whether there is a replication copy of the item. In the absence of a replication copy, one may be created. The replication copy may be provided by a third party application, or created by the client or a storage management system component. Information regarding the replication copy and its corresponding first secondary copy may be stored in a database. To optimize use of system resources, storage operations relating to the first secondary copy may be performed using the replication copy instead of the first secondary copy.
Techniques for establishing a file system that exposes a virtual file system for backup operations
Techniques for establishing a files system that exposes a virtual file system for backup operations are presented. Changes to files of a file system are maintained separately or collected and presented as a VFS. The VFS is then used to perform backup operations. Moreover, the files identified in the VFS can be customized based on search parameters, criterion, and/or criteria supplied by a user or supplied as parameters to backup and VFS mount operations.
Snapshots in distributed storage systems
Embodiments include methods, apparatus, and systems for snapshots in distributed storage systems. One method of software execution includes using a version tree to determine what data blocks are shared between various storage nodes in the version tree in order to create a clone or a snapshot of a storage volume in a distributed storage system that uses quorum-based replication.
System and method of performing snapshot isolation in distributed databases
A system and method of performing snapshot isolation in distributed databases. Each node stores local snapshot information that enforces snapshot isolation for that node. The method includes partially processing a distributed transaction by a first node, receiving a global commit identifier from a coordinator, and continuing to process the distributed transaction, by the first node and a second node, in accordance with the global commit identifier.
Metadata tagging of moving and still image content
A method and apparatus for tagging image content with rich metadata is provided. The metadata is generated from keyword descriptions of image content spoken by human taggers while viewing the content. Voice recognition software is employed to identify the key keywords in an audio stream and the resultant metadata is associated in a synchronous manner with the relevant image content. A control console allows the human tagger to rapidly navigate onscreen menus and select different taglines for providing multilevel metadata tagging of the image content. An integrated system provides for the storage of tagged digital image content, with near immediate access to tagged raw footage for viewing and editing, and for easy searching and accessing of finalized footage. A method of serving the tagged content is also provide, which allows the content to be streamed over the web at an acceptable image resolution while maintaining the associated metatags.
Managing changes in a relationship management system
A relationship management system stores multiple versions of contact information for a particular contact by storing the contact information that is available to all of the users of system that know a particular contact in a firm collection and by storing information about the particular contact that is available to a limited number of users that know the particular contact in one or more user collections. When changes are made to the user collection for a particular contact, the system detects the change, and based upon a number of administrative rules determines whether the change should be contributed to the firm collection. The system may automatically make the corresponding changes to each of the contact files within the firm collection or may recommend to the user whether the change should be promoted, allowing the users to accept or reject the recommendation. Preferably, each user will be provided with a default number of days to accept or reject the recommendation, after which the system may promote the contact information automatically.
System and method for providing instance information data of an instance
A method and system for providing instance information data of at least one instance. The method has the steps of generating a semantic representation of the instance on the basis of at least one instance data source, providing a semantic representation of a domain on the basis of at least one structured domain data source, performing an integration of the semantic instance and domain representations to provide an integrated semantic representation and deriving automatically instance information data from the provided integrated semantic representation. The method and system allow to provide efficiently instance information data of a wide range of instances with technical entities and persons, in a particular patients in different domains such as radiology or anatomy.
Method of identification and devices thereof
Portable wireless devices are ubiquitous in modern society and many of these have integral sensors such as accelerometers, microphones, and Global Positioning Systems (GPS) that can collect data. This creates potential for intelligent applications to recognize the user, or aspects of the user and take appropriate action. According to embodiments of the invention there are presented techniques for representing such time series data which reduce the memory and computational complexity of performing the analysis and classifying the results. The techniques exploit time-delay embedding is to reconstruct the state and dynamics of an unknown dynamical system, Geometric Template Matching to build nonparametric classifiers, and algorithms to address the problem of selecting segments of data from which to build the time-delay models for classification problems.
Methods and systems for performing email management customizations in a multi-tenant database system
An email object is provided in a multi-tenant database system that can be related to multiple people (e.g., contact, lead, user) or any object represented for storage in the multi-tenant database system via sharing relationships. The email object follows a sharing model such that an email inherits the sharing model or attributes of a parent record specified via sharing relationships. In various aspects, a sharing model provides users with a true value of a multi-tenant database system as users are more informed about communications concerning people or other objects represented for storage in the multi-tenant database system.
Wireless payment with a portable device
A portable device receives an account information request signal from a merchant machine. The portable device transmits a response message to the merchant machine. The response message comprises the account information for a purchase. The portable device transmits a first message to an account server. The first message comprises a request to get information comprising the purchase amount. The portable device receives a second message comprising the information from the account server. The portable device sends the purchase amount to a display.
Information processing apparatus, image processing apparatus, control method, and computer readable storage medium
An image processing apparatus includes a decision unit configured to determine whether or not print image data includes copy-forgery-inhibited-pattern image data. Based on a decision result of the decision unit regarding whether or not the print image data includes the copy-forgery-inhibited-pattern image data, a processing unit of the image processing apparatus is configured to determine whether first compression processing is to be performed or second compression processing is to be performed and apply the decided compression processing to the print image data.
Municipal bond tracking and evaluation system
The present invention relates to a web-application that gathers raw data and meta data, matches debt related data with corresponding meta data, marks the debt data so that the resulting data stream can be used to create various analytical reports on variable rate securities for Users.
Mattress system and method
A mattress system and method according to which a custom mattress is built according to customer-specific parameters. In several exemplary embodiments, the custom mattress includes one or more removable core cartridges and/or one or more removable topper cartridges.
System and method for automated preparation of quotes and proposals
A system includes a proposal engine configured to present quotes and/or proposals to customers at a network site.
Method and system for anonymous measurement of online advertisement using offline sales
Anonymous measurement of online advertising using offline sales is disclosed. The measurement uses anonymized online ad exposure data and anonymized offline sales, or conversion data, to measure effectiveness of online advertisement. The anonymized exposure and conversion data are matched using tokens from each data set; each token corresponds to a user and is generated from personally identifiable information of the user that is anonymized to preserve the user's privacy. The anonymized exposure and conversion data is aggregated using the tokens to map records in the data sets for a given user. Users' ad exposure and sales history is used, anonymously, to gauge ad effectiveness of a corresponding ad campaign. The effectiveness measure, or measures, can further be used to configure another ad campaign.
Executing a business process by a standard business process engine
Executing a business process can include providing a context data object including a payload data structure for storing a payload data and automatically splitting an annotated context data object into one or more utility data objects. Responsive to creating a second utility data object, a pre-processing task can be injected into the business process, the pre-processing task using a copy of a first mapping to read data from the predefined data structure instance and to store the read data as payload data in the payload data structure of the first utility data object. Responsive to creating a third utility object, a post-processing task can be injected into the business process. The post-processing task can use a copy of the second mapping to write the payload data of the first utility data object to elements of a predefined data structure instance.
Non-spatial speech detection system and method of using same
A non-spatial speech detection system includes a plurality of microphones whose output is supplied to a fixed beamformer. An adaptive beamformer is used for receiving the output of the plurality of microphones and one or more processors are used for processing an output from the fixed beamformer and identifying speech from noise though the use of an algorithm utilizing a covariance matrix.
Automatic conversation system and conversation scenario editing device
A conversation scenario editor generates/edits a conversation scenario for an automatic conversation system. The system includes a conversation device and a conversation server. The conversation device generates an input sentence through speech recognition of an utterance by a user. The conversation server determines the reply sentence based on the conversation scenario when a reply sentence to the input sentence is requested from the conversation device. The editor includes a language model generator for generating a language model to be used for the speech recognition based on the conversation scenario. According to the editor, a non-expert can generate the language model to provide an adequate conversation based on the speech recognition.
Method for processing medical reports
A method for processing medical reports includes applying natural language processing methods to perform an initial segmentation of at least parts of textual contents of each medical report into information units, thereby identifying information units, such as text fragments, sentences or text passages, within the medical reports. The information units are classified into at least one context class to determine their appropriate context classes for a particular situation or application. The context classifications are created using a grammar, e.g., a context-free grammar, and can then be used for automatically assigning each information unit to an appropriate context meta-information. The medical report may be annotated by assigning the information units to context meta-information determined by the context class, and the context meta-information may be used by other applications, e.g., dedicated mechanisms for clinical data integration, how to efficiently handle the available information units within medical reports.
Method and apparatus for frame-based analysis of search results
A frame represents a concept with a set of roles and a set of linguistic rules. If a linguistic rule is satisfied, by a unit of natural language discourse (UNLD), the frame is invoked and a frame instance produced. A frame instance specifies how the UNLD, with particular values drawn from the UNLD, fulfills the roles of the frame. A frame-based search, of target content, can produce a search result comprised of records and corresponding frame instances. The values of such frame instances can be presented to the user as a role-value oriented search result. Multiple values of a role-value oriented search result, sufficiently similar in meaning, can be merged. Merged values can be represented, in a role-value oriented search result, by a single value. Selection of a value, of a role-value oriented search result, can cause the records, for which the value occurs in the corresponding instance, to be displayed to the user.
Dynamic generation of auto-suggest dictionary for natural language translation
The present technology dynamically generates auto-suggest dictionary data from translation data stored in memory at a server. The auto-suggest dictionary data may be transmitted to a remote device by the server for use in language translation. The auto-suggest dictionary data may be transferred as part of a package which includes content to be translated, translation meta-data, and various other data. The auto-suggest dictionary data may be generated at a first computing device, periodically or in response to an event, from translation data stored in memory. The auto-suggest dictionary may be transferred to a remote device along with content to be translated and other data, as part of a package, for use in translation of the content at the remote device.
Computer-assisted natural language translation
A computer implemented method of translating source material in a source natural language into a target natural language includes receiving a first data input which is a first part of a sub-segment of a translation of the source material from the source natural language into the target natural language, identifying a selectable target text sub-segment in the target natural language associated with the received first data input, and outputting the selectable target text sub-segment. The selectable target text sub-segment is extracted from a corpus of previously translated text segment pairs, each text segment pair having a source text segment in the source natural language and a corresponding translated text segment in the target natural language.
System and method for examining concurrent system states
A computer-implemented process, computer program product, and apparatus for examining concurrent system state space models. A system has concurrent events to create a modeled system. A minimal chain decomposition of the modeled system is created to identify a set of chains. All chains in the set of chains are extended, and a first set of paths is generated, wherein the first set of paths is a minimal set of paths covering all states of the modeled system. The first set of paths is explored. It is optionally determined whether all transitions have been covered. Responsive to a determination that all transitions have not been covered, remaining paths are explored by traversing a graph induced by the modeled system using a depth-first strategy.
Method of generating a hex-dominant mesh of a faulted underground medium
A method having application for petroleum exploration or geological storage of generating a mesh of a faulted underground medium, comprising generating a hex-dominant mesh from faults and horizons in a form of a 3D triangulated surfaces. Each 3D triangulated surface is converted to a 2D triangulated surface onto which the faults are projected by an isometric unfolding technique. A regular two-dimensional grid pattern is generated for each 2D triangulated surface. The faults are accounted for by deforming quadrilaterals of the grid pattern intersected by projected faults. The deformed regular grid pattern is then converted to a 3D gridded surface and each quadrilateral which is crossed by a fault is converted into two triangles at a level of a diagonal. Finally, after iterating for all the 3D triangulated surfaces, the mesh is generated by creating links between the nodes of neighboring three-dimensional gridded surfaces with respect to the faults.
Generating inviscid and viscous fluid-flow simulations over a surface using a fluid-flow mesh
Fluid-flow simulation over a computer-generated surface is generated using inviscid and viscous simulations. A fluid-flow mesh of fluid cells is obtained. At least one inviscid fluid property for the fluid cells is determined using an inviscid fluid simulation that does not simulate fluid viscous effects. A set of intersecting fluid cells that intersects the surface are identified. A surface mesh polygon of the surface mesh is identified for each intersecting fluid cell. At least one boundary-layer fluid property for each identified surface mesh polygon is determined using the at least one inviscid fluid property of the corresponding intersecting fluid cell and a boundary-layer simulation that simulates fluid viscous effects.
Method for recording pulse signals
A method for recording pulse signals which allows the reconstruction of a time reference. The time of every pulse signal event can be determined by counting sampling result bits preceding the respective sampling result bit using the known sampling frequency. For this purpose, every period of the sampling frequency is associated with a bit representing the respective sampling result and the sampling result bits are stored one by one and per channel in data blocks. The sampling frequency is preferably higher than a pixel clock, a sampling result bit associated with a flank of the pixel clock being marked. The pixel clock can thus be synchronized with the individual events exactly per sampling period. The invention further relates to the field of fluorescence correlation spectroscopy using confocal microscopes or laser scanning microscopes.
Steam trap monitoring
An apparatus and method for monitoring the status of a steam trap include a device for sensing a process condition of the steam trap and a device for processing the sensed condition. The apparatus can include a processor positioned on a steam trap. The connection of the monitoring device to the steam trap can be to the trap itself or to an adjacent pipe or other apparatus.
Alignment detection device
An alignment device provides position information for an antenna coupled to an extendable tower. The alignment device can provide position data including pitch data, roll data, and azimuth data. The position data can be collected at multiple times, and reported to a remote computing device. The position data can be reported as the raw measured data, a delta between two sets of position data, or other data. The alignment device may be solar powered and include a transceiver client for communicating with a remote computing device via a transceiver server.
Fitness monitoring device with altimeter and gesture recognition
Biometric monitoring devices, including various technologies that may be implemented in such devices, are discussed herein. Additionally, techniques for utilizing altimeters in biometric monitoring devices are provided. Such techniques may, in some implementations, involve recalibrating a biometric monitoring device altimeter based on location data; using altimeter data as an aid to gesture recognition; and/or using altimeter data to manage an airplane mode of a biometric monitoring device.
Circuit and method for measuring voltage
A testing circuit in an integrated circuit indirectly measures a voltage at a node of other circuitry in the integrated circuit. The testing circuit includes a transistor having a control electrode, a first conducting electrode coupled to a first pad, a second conducting electrode coupled to a terminal of a power supply, and one or more switches for selectively coupling the control electrode to one of the node and a second pad. A method includes determining a relationship between drain current and gate voltage of the transistor when the control electrode is coupled to the second pad. A voltage at the node is determined by relating the current through the first conducting electrode of the transistor when control electrode is coupled to the node.
Energy storage based countermeasure for a delayed voltage recovery
The disclosed system includes a metering device for monitoring electrical power grid conditions, a controller for determining if the metering device is detecting a condition on an electrical grid that is indicative of a delayed voltage recovery event, and a communication device for communicating with one or more remotely located bi-directional power source modules connected to the electrical power grid, wherein the controller is programmed to send a notification via the communication device to the one or more remotely located bi-directional power source modules if the controller detects a condition indicative of delayed voltage recovery event. In some embodiments, the metering device includes a grid metering device. In some embodiments, the metering device measures power factor, and a change in the voltage and ratio of VARs to Watts.
Apparatus for analysing an interior energy system
A system for analyzing an interior energy system including: at least one detachable sensor arranged to monitor a portion of the interior energy system; and an apparatus including a processor configured to receive data of a first parameter of the interior energy system from the at least one detachable sensor and determine a second parameter of the interior energy which is inferred on the basis of the received data of the first parameter; and determine a characteristic of the interior energy system from the determined second parameter. The system may provide analysis of the interior energy system and recommend improvements.
Shock sensing system and method
A compact shock sensing system and method that employ a light sheet generator that can be used either as a solo aerodynamic shock detector or in a combination with a scanning mode shock sensor is disclosed. This shock sensing system and method can be used to detect and track unstable and travelling shocks in high speed aerodynamic flows, such as those found in supersonic inlets.
Method and system for golf ball fitting analysis
The present invention provides golf ball recommendations correlating to a golfer's swing parameters determined by comparing the flight characteristics of a golf ball driven by the golfer with a database of flight characteristics of golf balls associated with particular swing parameters. The swing parameters in the database may be correlated with golf ball flight characteristics determined using empirical tests.
Method of hepatocellular carcinoma classification and prognosis
Methodology for the in vitro classification and/or prognosis of hepatocellular carcinoma (HCC) from a HCC sample is based on the determination of the expression profile of particular gene combinations. For example, in one embodiment, a method comprises measuring the expression level in an HCC sample of at least 8 genes selected from the group consisting of: RAB1A, REG3A, NRAS, RAMP3, MERTK, PIR, EPHA1, LAMA3, G0S2, HN1, PAK2, AFP, CYP2C9, CDH2, HAMP, SAE1, ADH6, DCN, FLJ10159, ALDH1L1, IGF1, LECT2, SLC38A1, SPARCL1, CTNNA2, GLUL, LEF1, MATN2, MME, PFN2, SPINT2, TBX3, and FGFR2; b) calculating 6 subgroup distances from the expression profile; and c) classifying the HCC tumor in the subgroup for which the subgroup distance is the lowest, wherein the 6 subgroups G1, G2, G3, G4, G5, and G6 are defined by the presence (+) or absence (−) of their clinical and genetic features.
System and method for production reservoir and well management using continuous chemical measurement
A system performs methods for well and reservoir management for optimized production of fluids in a reservoir. The system includes a knowledge engine configured to receive a plurality of field inputs, process and analyze the field inputs, and provide a plurality of outputs for presentation to an operator. The system also includes a user data interface configured to display the plurality of data outputs. The plurality of field inputs comprises chemical sensing data and at least one of: temperature, pressure, flow rate and concentration of production components from one or more individual wells located within the reservoir, seismic surveys of the reservoir, permeability, geochemistry and lithology of rock formations, and geographic information system (GIS) data associated with the reservoir.
Arrangement and method for identifying people
A method for identifying people involves breathing respired air into a collector unit, trapping condensate from the respired air in the collector unit, introduction of the condensate by a same introduction to a DNA sensor unit, analysis of the condensate after a cell disruption, comparison of the result the data from a databank and output of the comparison result with analysis of the identity of a person.
Driving assistance system for vehicle
An object is to prevent a driving assistance system for a vehicle from causing a collision of the driver's own vehicle with a solid object by performing driving assistance. To achieve the object, when a solid object that can be an obstacle exists in the course of the driver's own vehicle, the driving assistance system for a vehicle according to the present invention determines a plurality of primary paths along which the driver's own vehicle can travel by changing the momentum thereof, designates an avoidance line along which the solid object can be avoided from among the primary paths, and changes the momentum of the driver's own vehicle in such a way that the driver's own vehicle travels along the selected avoidance line. If the plurality of primary lines do not include an avoidance line, the driving assistance system sets a divergent point in the middle of the primary paths and determines a plurality of secondary paths along which the driver's own vehicle can travel by changing the momentum of the driver's own vehicle at the diverging point. Then, the driving assistance system selects an avoidance line from among the plurality of secondary paths.
Fuel system blockage detection and blockage location identification systems and methods
A system for a vehicle includes a first pressure module and a blockage indication module. The first pressure module receives a signal from a pressure sensor that measures pressure within a fuel vapor purge system. The first pressure module generates a first pressure based on the signal at a first time and generates a second pressure based on the signal at a second time. The second time is after the first time. The blockage indication module indicates whether a blockage is present in the fuel vapor purge system between the pressure sensor and a fuel tank based on a difference between the first and second pressures.
Engine response adjustment
Methods and systems are provided for adjusting an engine output delivered in response to an operator pedal actuation based at least on a grade of vehicle travel. During uphill travel, in the presence of headwinds, and/or in the presence of a vehicle payload, the output may be increased while during downhill travel or in the presence of tailwinds, the output may be decreased. In this way, driver fatigue during travel over varying elevations, varying ambient conditions, and varying loads can be reduced.
Fuel supply system for internal combustion engine
An engine includes a normal fuel tank, fuel gas tank, an in-tank injection valve and a fuel gas supply valve. During operation of the engine, in a state where the fuel gas supply valve is closed, a fuel is injected into the fuel gas tank through the in-tank injection valve to generate a fuel gas by vaporizing the fuel. The fuel gas is stored in the fuel gas tank and is maintained in the gas phase due to the natural decompression even after the engine is stopped. To start the engine, the fuel gas supply valve is opened to supply the fuel gas in the fuel gas tank to a surge tank. Thus, compared with the case where the fuel gas is generated at the start of the engine, the fuel gas can be quickly supplied into the cylinder, so that the ability to start the engine is improved.
Reduced take-off field length using variable nozzle
A turbofan engine control system and method includes a core nacelle housing (12), a compressor and a turbine. A turbofan is arranged upstream from the core nacelle and is surrounded by a fan nacelle (34). A bypass flow path (39) is arranged downstream from the turbofan between the core and fan nacelles. The bypass flow path includes a nozzle exit area (40). A controller (50) detects at least one of a take-off condition and a landing condition. The controller changes effectively the nozzle exit area to achieve a thrust vector in response to the take-off and landing conditions.
Method for determining the speed of a vehicle and vehicle
A subject matter of the application relates to a method for determining a speed of a vehicle. In one embodiment, the method includes ascertaining a first value of a distance traveled by the vehicle within a time interval on the basis of data ascertained by at least one first revolution sensor of a first tire of the vehicle and a second revolution sensor of a second tire of the vehicle; ascertaining a second value of a distance traveled by the vehicle within a time interval on the basis of data ascertained by a position-determining device; and comparing the ascertained first value and the ascertained second value. If a deviation between the ascertained first value and the ascertained second value exceeds a predetermined threshold value, the method includes classifying a speed determined on the basis of the ascertained second value.
Optimal fusion of electric park brake and hydraulic brake sub-system functions to control vehicle direction
A method, for controlling direction of a vehicle as desired in connection with operation of an autonomous driving maneuver using selectively, independently and/or in combination, multiple electrical park brakes (EPBs) and multiple hydraulic brakes (HBs). The method includes determining a total brake force needed for redirecting the vehicle in a pre-determined manner, and determining whether an applicable EPB can provide the total brake force needed. The method further includes providing, if it is determined that the applicable EPB can provide the total brake force needed, a brake command instructing the applicable EPB to apply the total brake force. The method also includes determining, if it is determined that the EPB is alone insufficient, an optimal fusion of the EPBs and the HBs, including two front and two rear HBs, two rear EPBs, and in some embodiments, also two front EPBs.
Vehicle brake pressure controller
In one embodiment, a vehicle brake pressure controller includes: a sensor and a control section. The sensor detects a dynamic characteristic quantity of a vehicle, and outputs it as first information. The control section includes: an input section configured to receive the first information; a conversion processing section configured to convert the first information into second information having a standardized format; and a correction processing section configured to correct the second information into third information, depending on the vehicle. Hence, the control section performs a brake pressure control based on the third information.
System for controlling a work machine
A system and a method for controlling a work machine. A plurality of sensor arrangements provide a respective output value. A data transmission network connects the sensor arrangements to a processor unit. The processor unit is operated to convert output values from the sensor arrangement into a standard data format on the basis of formatting data associated with the sensor arrangements and to amalgamate them to form a combined measured value. It is proposed that the processor unit be able to operate to obtain the formatting data via the transmission network.
Multi-function vehicle-rollover judgment system and automatic anti-rollover device
This invention public a multi-functional rollover judgment system and automatic anti-rollover device which are all belong to vehicle area. The mentioned system at least includes two displacement sensors and ECU which is connected with mentioned sensors correspondingly, and the output device (connected with ECU). The mentioned displacement sensor is distributed by a group of two, and at least one group mentioned displacement sensor is set between the frame and axle symmetrically. The mentioned device includes multi-functional judgment system and its connected actuator, and the mentioned actuator at least includes left actuator and right actuator which are symmetrically set on the frame. Both of the mentioned left actuator and right actuator include a telescopic shaft and the return wheel which is set on the outside of telescopic shaft. The invention can prevent the rollover accident from happening in any condition and have wide application range & high accuracy.
Techniques are described for visualizing a roadway transition along an ascertained route course for a navigation device. In an implementation, the navigation device may include a display and a data processing device to identify a roadway transition from a first road onto a second road along an ascertained route course and present navigation information in a first and second operating mode. The second operating mode may include roadway transition visualization generated by dynamically superpositioning a first visualization layer, which may include road characteristics and location information, and a second visualization layer, which may include the ascertained route course along the identified roadway transition.
Vehicle tyre checking system
Apparatus (4; 5) for checking the inflation pressure of a tire (3) of a vehicle (2) while the tire is being moved over the apparatus in a direction of travel (A). The apparatus comprises a base (7), a platform (8) which is mounted over the base, a first load sensor system (9) arranged between the platform and the base, and a second load sensor system (12) mounted on an upper surface of the platform and comprising a linear array of high resolution sensors (13, 25) extending across the platform. A data processing unit (6) processes data obtained by sampling the outputs of the first and second sensor system and provides an indication of the inflation pressure of the tire. The data obtained by sampling the output of the first sensor system may be used to determine the total load borne by the platform, and/or the direction of travel of the tire over the platform, and/or the speed of travel of the tire over the platform and/or the tracking angle of the vehicle tire. The data may also be used to determine a time interval during which data from the second sensor system is to be used to provide a representative sensor load value.
Vibration analyzer for vehicle diagnostics
A vibration analyzer with an integrated sensor and method are provided to sense a vibration in a component of a vehicle. The vibration analyzer includes a three-axis accelerometer, a controller, a connector, a wireless interface and a battery. The vibration analyzer receives vibration data and vehicle data and packages them together and transmits the packaged data to a remove device such as a scan tool. The vibration analyzer can be networked with the remote device or with another vibration analyzer.
Torque distribution apparatus, torque distribution method, torque distribution value generation method, and program
A torque distribution apparatus acquires an instructed torque input and a motor efficiency map for motors; detects vehicular speed and drive wheel rotational speed; calculates based on the detected speeds, a relational expression of drive wheel slip rate and a friction coefficient; creates based on the relational expression, a performance curve expression indicating relations between torque and the drive wheel rotational speed, superimposes the performance curve expression on the motor efficiency map, creates an efficiency variation expression indicating for each vehicular speed, the torque and efficiency values of the motor efficiency map, and calculates a torque that optimizes efficiency from the efficiency variation expression; calculates based on the instructed torque and the torque optimizing efficiency, a torque distribution value for each motor; and controls torque distribution to each motor, within a range of the slip rate being 0 to 0.2 and based on the torque distribution values.
Vehicle control system
A vehicle control apparatus includes an electric motor, a source power supply circuit, an electric motor controller, a brake device, a brake controller, a stall determination device, a temperature detector, and a backward-rolling detector. The backward-rolling detector is configured to detect whether a vehicle is rolling backward. If rolling backward of the vehicle is detected by the backward-rolling detector while a brake torque instruction value is being generated, the brake torque instruction value is corrected so that the vehicle stops rolling backward.
Data communication system and method
A communication system for a vehicle consist may include a control module that interfaces with router transceiver units coupled to a cable bus, and can communicate network data between vehicles having a transceiver unit over a cable bus.
Back-up and redundancy of modules in locomotive distributed control systems
The present disclosure is directed to a distributed control system for a locomotive. The distributed system may include a network, a plurality of electronic modules and a plurality of control elements distributed within the locomotive. Each of the electronic modules is communicatively coupled to the network in a standardized scalable architecture. Each of the electronic modules may be programmatically reconfigurable to implement distributed control of the locomotive. A first electronic module and a second electronic module of the plurality of electronic modules may be communicatively connected to one of the plurality of control elements via separate communication paths. The first electronic module may be configured to control the control element, and the second electronic module may be configured to control the control element when the first electronic module enters into a failure condition.
Braking control system and method
A control system and method of the anti-skid computers of an aircraft are provided. The control system comprises two IMA computers, comprising each one an Avionics Computer Control Device, an Avionics Computer Monitoring Device and at least one dual data acquisition means and at least one dual processing means. Each Avionics Computer Control Device and each Avionics Computer Monitoring Device are connected to the anti-skid computers of both sides.
Electrical load management system and method
A load management system provides an interface between a power input and several switched power outputs and un-switched power outputs. A controller groups the switched power outputs into one or more load groups based on a switched current limit determined for the system and the measured currents of the electrical loads. The load groups are defined so that the sum of electrical load currents in each load group does not exceed the switched current limit. The controller also activates one or more switches to apply electrical power to the load groups according to a power sequence. A method for distributing electrical power to electrical loads using load groups is also provided.
Robot control method and robot
A robot control method includes gripping a work with a hand unit; transferring the work to the vicinity of a plane; dropping the work to the plane by reducing the grip force of the hand unit, and aligning the work with the plane; and re-gripping the work, which is aligned with the plane, again with the hand unit.
Method and system for hand presence detection in a minimally invasive surgical system
In a minimally invasive surgical system, a hand tracking system tracks a location of a sensor element mounted on part of a human hand. A system control parameter is generated based on the location of the part of the human hand. Operation of the minimally invasive surgical system is controlled using the system control parameter. Thus, the minimally invasive surgical system includes a hand tracking system. The hand tracking system tracks a location of part of a human hand. A controller coupled to the hand tracking system converts the location to a system control parameter, and injects into the minimally invasive surgical system a command based on the system control parameter.
Life management circuit, an electronic system and a machine-implemented method for managing usage rates of multiple electronic components
A life management circuit for managing usage rates of a plurality of electronic components includes a storage unit for storing usage information corresponding to each electronic component, a receiving unit, a determining unit and a control unit. Upon receipt of an activation command passed on thereto via the receiving unit, the control unit selects for activation, with reference to the usage information of the electronic components stored in the storage unit, at least one electronic component, the usage information corresponding to which reveals a usage rate that is comparatively lower among the electronic components, controls the determining unit to keep track of the duration of time that the selected at least one electronic component remains activated in response to the activation command, and updates the usage information corresponding to each of the selected at least one electronic component with reference to the duration of time tracked therefor.
An electrode cuff includes a first elongate portion and a second elongate portion. The first elongate portion is configured to removably contact a length of a nerve while the second elongate portion extends outwardly at an angle relative to a first side edge of the first elongate portion to at least partially wrap about the nerve. The electrode cuff includes a first series of electrodes that is spaced apart longitudinally along the first elongate portion. A width of the second elongate portion is sized to fit between adjacent branches extending from a nerve.
Multi-durometer reinforced suture sleeve
Suture anchors for securing therapy delivery elements, such as stimulation leads or catheters, within a living body. The suture anchor includes an inner sleeve constructed with an inner layer of a softer, more pliable material that easily conforms to the therapy delivery element to reduce slippage and an outer layer constructed from a harder, stiffer durometer material that protects the therapy delivery elements from damage due to over-tightening the tie down sutures. A suture material located in the suture groove is tensioned to apply a radial compressive force. The reinforcing structure spreads the radial compressive force along a greater surface area of the therapy delivery element.
Implant assist apparatus for acoustically enabled implantable medical device
Devices, systems and methods for delivering and positioning an implantable medical device and for evaluating an acoustic communication link are disclosed. An illustrative system includes a catheter adapted to contain an implantable device with a biosensor and an acoustic transducer configured to transmit an acoustic signal, and an implant assist device in acoustic communication with the implantable device via an acoustic communication link. The implant assist device includes an acoustic transducer adapted to receive the acoustic signal transmitted by the implantable medical device, and control/processing circuitry configured to evaluate a performance of the acoustic link.
Spinal cord stimulation to treat pain
A system and method for treating pain without paresthesia by spinal cord stimulation. In one embodiment, a method comprises storing one or more operating parameters for a high frequency stimulus having a plurality of pulses, wherein the high frequency stimulus comprises at least respective pairs of pulses that have an inter-pulse separation within a range of 0.1 milliseconds to 10 milliseconds; and applying generated electrical pulses of the high frequency stimulus to the patient through a set of one or more electrodes of an electrical lead implanted within epidural space of the patient to treat the chronic pain of the patient without causing paresthesia in the patient.
Differential neurostimulation therapy driven by physiological therapy
An implantable neurostimulator system adapted to provide therapy for various neurological disorders is capable of varying therapy delivery strategies based on the context, physiological or otherwise, into which the therapy is to be delivered. Responsive and scheduled therapies can be varied depending on various sensor measurements, calculations, inferences, and device states (including elapsed times and times of day) to deliver an appropriate course of therapy under the circumstances.
Neurostimulation system for selectively estimating volume of activation and providing therapy
An external control device, neurostimulation system, and method of programming a neurostimulator. A volume of tissue activation for each of a first one or more candidate stimulation parameter sets is simulated without conveying electrical stimulation energy into the tissue. One of the first candidate stimulation parameter set(s) is selected based on each simulated volume of tissue activation. Electrical stimulation energy is conveyed into the tissue in accordance with a second one or more candidate stimulation parameter sets, wherein the initial one of the second candidate stimulation parameter set(s) is the selected one of the first candidate stimulation parameter set(s). One of the second candidate stimulation parameter set(s) is selected based on a therapeutic efficacy of the electrical stimulation energy conveyed into the tissue. The neurostimulator is programmed with the selected one of the second candidate stimulation parameter set(s).
Methods and apparatus for treating anaphylaxis using electrical modulation
Methods and devices for treating anaphylaxis, anaphylactic shock, bronchial constriction, and/or asthma include providing an electrical impulse to a selected region of the vagus nerve of a patient suffering from anaphylaxis to block and/or modulate nerve signals that would regulate the function of, for example, myocardial tissue, vasodilation/constriction and/or pulmonary tissue.
Feedback systems and methods to enhance obstructive and other obesity treatments, optionally using multiple sensors
Feedback systems and methods enhance obstructive and other obesity treatments by presenting feedback regarding patients' actual eating. An ingestion restricting implant body can be deployed along the gastrointestinal tract. In some embodiments, ingestion alters the implant body, which, in turn, generates signals. The generated signals can be used to inhibit unhealthy ingestion by the patient. In other embodiments, the implant body can be altered by signals so as to selectable change the restriction imposed on the gastrointestinal tract, optionally in response to ingestion events, an eating schedule, or the like. The implant body may comprise a gastric band. Sensor signals may be processed to identify ingestion and/or characterize ingestion material, and the results may be displayed on a screen for a patient or coach to view.
Low insertion force electrical connector for implantable medical devices
A low-insertion force electrical connector for implantable medical devices includes a housing with a pair of opposing sidewalls each with center openings oriented generally concentrically around a center axis. An inner coil is located in a recess with a coil axis generally co-linear with the center axis of the center openings. The inner coil includes an outer diameter less than a recess diameter, and an inner diameter greater than a center opening diameter. An outer coil is threaded onto the inner coil. The outer coil has an outer diameter less than the recess diameter, and an inner diameter less than the center opening diameter. The outer coil is radially expanded within the recess in response to engagement with contact rings on the implantable medical device, such that the outer diameter of the outer coil is at least equal to the recess diameter.
Hub for implantable medical leads
A hub (200) includes a first lead receptacle having a plurality of contacts (280) for electrically coupling a lead to an implantable electrical device. The hub further contains a second lead receptacle having a plurality of contacts for electrically coupling a lead to the implantable electrical device. At least one of the plurality of contacts of the first receptacle is a contact of the second receptacle. Such a configuration may allow for the overall size of the hub to be reduced relative to a hub where each discrete contact of the hub corresponds to a discrete contact or electrical channel of the implantable electrical device.
Systems, devices and methods for monitoring efficiency of pacing
Various systems, methods, devices and arrangements are implemented for use in pacing of the heart. One implementation is directed to methods and systems for determining a pacing location in the right ventricle of a heart and near the His bundle. A pacing signal is delivered to the location in the right ventricle. The pacing signal produces a capture of a left ventricle. Properties of the capture are monitored. Results of the monitored capture are used to assess the effectiveness of the delivered pacing signal as a function of heart function. The heart function can be, for example, at least one of a QRS width, fractionation and a timing of electrical stimulation of a late activation site of a left ventricle relative to the QRS.
Bioelectrical impedance measuring apparatus
A bioelectrical impedance measuring apparatus may include an impedance measuring unit configured to provide an inspection current based on a predetermined current to a living body, and obtain an inspection voltage corresponding to an impedance of the living body, an amplification unit configured to amplify the inspection voltage with reference to a correction voltage, an AD converter configured to AD-convert an output of the amplification unit, and a control unit configured to control the inspection current and the correction voltage based on an AD-converted result of the AD converter such that the output of the amplification unit is within an input dynamic range of the AD converter, and calculate an impedance average of the living body and an impedance variation of the living body based on the predetermined current, the correction voltage and the AD-converted result.
Trackable diagnostic scope apparatus and methods of use
A surgical procedure is provided. The procedure acquires a plurality of points on or near a bone abnormality and registers them with a surgical navigation system. The navigation system uses the acquired points to make an implant having a surface adapted to contact the bone, and particularly an implant having a portion whose shape substantially matches that of the bone abnormality.
Catheter locator apparatus and method of use
This disclosure relates to a method of catheter and radiating coil location in a human body and in particular to the determination over time of the location of the tip of a catheter as it is inserted and during its use in the body. In particular when a radiating coil is used in conjunction with a catheter, a coil locating device can be used to determine the distance the coil is from the device and hence its depth in the body of a patient. To assist a clinician using the coil-locating device, a display is provided that shows both a reference image of a part or portion of a body (non-subject body) and an image of the coil located on the display with reference to the reference image. This is achieved by locating the coil-locating device on or over a predetermined landmark on the patient's body.
A non-invasive sensor has a contact membrane (6,16) and a cover membrane (2,12), the cover membrane being adapted for extension of a body surface to project the contact membrane against a body surface beneath it. The contact membrane will normally be attached to the cover membrane around its periphery such that at least one of the membranes forms a convex outer surface, and a spacing material (8,20) can be interposed between the membranes to achieve this object. The cover membrane may extend over a support element (10), with the contact membrane overlaying and spaced from the other face of the support element by spacing material.
Intravascular electrodes and anchoring devices for transvascular stimulation
An intravascular electrode device for use in neuromodulation includes an anchor expandable from a radially compressed position to a radially expanded position. A lead extends from the anchor and has at least one conductor extending through it. A flex circuit is coupled to the anchor and comprises a flexible insulative substrate, a plurality of electrodes carried by the substrate, and a plurality of conductive traces carried by the substrate, each trace electrically coupled to an electrode and a conductor. Expansion of the anchor within a blood vessel biases the electrodes into contact with the surrounding blood vessel wall. An exemplary anchor includes a first portion having expansion forces sufficient to bias the electrodes against the vessel wall for mapping and chronic stimulation, and a second portion having greater radial expansion forces sufficient to chronically engage the vessel wall once an optimal electrode location has been selected.
A mobile terminal including a case having a curved back side between first and second end portions such that when the mobile terminal is placed on a flat surface, a portion of the curved back side touches the flat surface and the first and second end portions are raised above the flat surface; a display unit arranged on a front side of the case; a sensor configured to detect a moving or tilting of the mobile terminal; and a controller configured to perform a designated function in accordance with the moving or tilting of the mobile terminal.
Multi-mode methods and devices utlizing battery power level for selection of the modes
Disclosed are a methods and devices in a battery-powered multimode wireless communication device (102) that operates pursuant to first and second communication protocols in idle and active modes. The battery power level is monitored and may drop to a predetermined threshold while operating pursuant to the first communication protocol. The device switches from the first wireless communication protocol so that the device is operating in accordance with the second communication protocol in the event that the battery power level has dropped to the predetermined threshold while operating pursuant to the first communication protocol in idle mode or in active mode.
Voice switching for voice communication on computers
A voice communication end device performs quality checks to determine whether acoustic echo cancellation would be ineffective, such as due to noise or clock drift or discontinuities between incoming and outgoing voice channels. In the case where echo cancellation would prove ineffective, the device falls back on a tri-state voice switching operation that includes a bi-direction state in which both channels are on in full duplex operation, which provides a smoother transition switching between active channels. The tri-state voice switching supports both voluntary transitions where the active user voluntarily stops to yield the active channel, and forced transitions where the active user is forcedly interrupted by the other user speaking more loudly.
Mobile terminal device
A cellular phone includes a first display, a second display, and a CPU. The cellular phone is configured to be switchable between a first state in which the first display, out of the first display and the second display, is exposed to the outside and a second state in which both of the displays are exposed to the outside. When an application is operated and shown on the first display in the first state, the CPU sets another application associated with the application in an operational state.
Base station arrangements using a plurality of antenna elements with different polarizations
Base station arrangement (100) adapted to receive signals from a user station; adapted to be connected to or comprises a plurality of antenna elements (1, 1, 2, 2, . . . 4,) with antenna ports (11, . . . 11) and a signal processing unit (20). The base station (21) also comprises a signal pre-processing functional unit (30) to collect channel correlation information. It is adapted to establish if there is one or more distinguishing characteristics comprising different correlation properties of different configuration properties associated with the antenna elements. Antenna elements are then assigned to different groups based on said configuration properties, and the channel correlation information is used to generate weighting information which is applied to antenna ports connected to antenna elements to control the antenna ports connected to antenna elements to control the antenna element transmit power individually or groupwise.
Providing enhanced security for wireless telecommunications devices
A method and system for use in providing enhanced security for wireless telecommunications devices is disclosed. In at least one embodiment, the method and system may use a sensor of a wireless telecommunications device to help derive physical context data associated with the wireless telecommunications device. The physical context data can be used to determine whether the wireless telecommunications device has been moved in a gesture that is consistent with a use of the wireless telecommunications device for a specific purpose.
Power control in a wireless communication system
In a wireless communications system, a serving base station performs outer and closed power control for an overhead channel and a traffic channel for data, either of which can carry an acknowledgement (Ack) channel and Channel Quality Indicator (CQI) channel on an uplink from User Equipment (UE). In an exemplary aspect, data packet communication is implemented in 3GPP LTE Rel. 8 wherein the uplink has a Single Carrier Frequency Division Multiplex (SC-FDM) uplink waveform. The UE performs open loop power control by a determining transmit power spectral density value by using received energy per symbol for a reference signal.
Wireless communication system, wireless communication method, and base station device
In a cellular wireless communication system with plural antenna base stations, signals have been basically transmitted using two antennas among plural antennas, and thus power has been concentrated in specific antennas. The present invention controls the transmission power of each antenna so as not to increase the transmission power of specific antennas by effectively using plural antennas and frequency bands. A frequency band is divided into plural sub-bands, and antennas used for transmission are spread to the sub-bands. In each sub-band, power is not allocated to an antenna that is not used for transmission. As a result, the transmission power of each antenna can be balanced, and power can be prevented from being concentrated in specific antennas.
Processing of uplink data in a communications system
A communications system where data blocks from a communications device are received at least in a serving site over a wireless interface. The serving site typically checks whether data blocks have been correctly received and sends acknowledgement information to the communications device accordingly. An assisting site may also receive the data blocks and send information indicating whether data blocks have been correctly received in the assisting site. In this case, the serving site may request erroneously received information from the assisting site. Alternatively, the assisting site may send information indicating erroneous reception of data blocks in response to noticing a data block sent by the communications device. As a further alternative, the assisting site may be synchronized with the data blocks sent by the communications device and send quality information relating to the wireless interface between the communications device and the assisting site to the serving site.
Apparatus and method for allocating resources to nodes in a communication system using an update of iteration resource weights
An apparatus for allocating resources to nodes in a communication system comprises an iteration controller (10) for performing an iterative processing, the iteration controller being configured for using (11) iteration resource weights to obtain a resources allocation result for an iteration step, and for updating (12) the iteration resource weights to obtain updated iteration resource weights for a further iteration step using a weighted combination of the resources allocation results for the iteration step and for at least one earlier iteration step.
Efficient acquisition of system information in mobile communication terminals
A method includes attempting to receive at a mobile communication terminal paging messages, which are transmitted from a base station. A likelihood that the mobile communication terminal has missed one or more of the paging messages is estimated. In response to finding that the estimated likelihood exceeds a likelihood threshold, an ascertainment is made at the mobile communication terminal whether at least one parameter of operation of the base station has changed by decoding at least part of a downlink message, other than the paging messages, that is transmitted by the base station.
System and method for geo-positioning guidance with respect to a land tract boundary
A system and method provides for the real-time geo-position monitoring of a handheld device and the continual calculation of its relational position with respect to the boundary of a tract of land in which the device is situated. The invention utilizes existing geo-positioning systems within mobile devices and a software application to compare the position of the device, and thereby its user, with the boundary of a track of land having its geo-position attributes uploaded into or accessed by the device. Audible and visual cues are presented to a user to allow them to know their current position relative to a land tract's boundary or predefined buffer zone adjacent to the tract's boundary. The system accommodates the access and uploading of geo-position information of a tract of land and the recordation of movements with respect to the boundaries of the tract of land in a remote database.
Location determination using fingerprint data
Methods, program products, and systems for using a location fingerprint database to determine a location of a mobile device are described. A mobile device can use location fingerprint data received from a server to determine a location of the mobile device at the venue. The mobile device can obtain, from a sensor of the mobile device, a vector of sensor readings, each sensor reading can measure an environment variable, e.g., a signal received by the sensor from a signal source. The mobile device can perform a statistical match between the vector and the location fingerprint data. The mobile device can then estimate a current location of the mobile device based on the statistical match.
Method and apparatus for determining the position of a base station in a cellular communication network
Techniques for performing positioning in a cellular network are described. In one design, a first base station (e.g., a home base station) determines its position based on position information for at least one user equipment (UE) within radio coverage of the first base station and a second base station. The first base station sends at least one position request for the at least one UE to the second base station, receives position information for the at least one UE from the second base station, and determines a position estimate for itself based on the position information. In another design, the second base station receives a position request for the first base station, obtains position information for at least one UE, determines a position estimate for the first base station based on the position information, and sends the position estimate to the first base station.
Opportunistic data connectivity
A method of controlling a vehicle telematics unit includes placing the vehicle telematics unit in a data mode while camped on a base station that does not use a simultaneous voice and data (SVD) cellular standard; sensing an amount of time that has passed since the vehicle telematics unit last received a request for data while in the data mode; comparing the sensed amount of time with a predetermined threshold using the vehicle telematics unit; and commanding the vehicle telematics unit to maintain the data mode and also to enter a voice mode when the sensed amount of time exceeds the predetermined threshold.
Method and device for configuring downlink scheduling information
A method and apparatus for configuring downlink scheduling information are used to control times of blind detection in multi-carrier system. The method includes that: a downlink carrier set and an uplink carrier set are allocated to a terminal which sends a service request; according to the bandwidth information of each carrier of the system, obtained terminal type information, currently received channel quality information fed back from the terminal, transmission modes which are allocated to each member carrier in the downlink carrier set and the uplink carrier set and determined carrier scheduling modes of the terminal, at least one member carrier in the downlink carrier set is selected as a member carrier of Physical Downlink Control Channel (PDCCH) activation carrier set; the times of PDCCH blind detection can not exceed the each sub frame maximum blind detection times supported by the terminal in the terminal type information, wherein the PDCCH blind detection is used for uplink and downlink scheduling, and the PDCCH activation carrier set is used to be provided for the terminal to perform the PDCCH blind detection.
Key separation method and device
A key separation method and device are provided in the embodiments of the present invention. The key separation method includes: when a User Equipment hands over from a source node to a target node, or when the User Equipment moves from the source node to the target node in idle state, determining whether or not the source node is a Home NodeB; and if the source node is a Home NodeB, triggering an Authentication and Key Agreement procedure according to the operator's policy, to update Ciphering Key and Integrity Key. By performing Authentication and Key Agreement procedure, the method and device of the embodiments separate key of the source node from the key of the target node.
Cellular communication system comprising macro and micro cells
A method of routing call signalling to a destination address from a first cellular mobile communications network comprising a plurality of cells to one of a plurality of smaller cells collectively identified in said first mobile communications network by a single virtual cell identifier. The method involves receiving call signalling for a call in a first routing domain associated with said first mobile communications network, and then determining in said first routing domain from said destination address a forwarding address for said call signalling, wherein said forwarding address comprises said virtual cell identifier, forwarding said call signalling to a network gateway node associated with said virtual cell identifier in said first routing domain, said gateway node being further arranged to participate in a different routing domain by identifying, using said different routing domain, the identity of one of said smaller cells associated with said destination address; and finally, routing the call signalling to said destination address.
Method and apparatus for providing communication offloading to unlicensed bands
An apparatus for providing network assisted local communication offloading to unlicensed bands may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured, with the processor, to cause the apparatus to perform at least receiving, via signaling associated with licensed band resources, information indicative of unlicensed band resources available in a particular area, and providing resource availability data, via signaling associated with the licensed band resources, to one or more devices within the particular area. The resource availability data may enable unlicensed band resource usage by at least one of the one or more devices. A corresponding method and computer program product are also provided.
Method in which a mobile station receives information on a peripheral legacy base station in a legacy support mode
The present invention relates to a broadband wireless access system, and more particularly, to a method and an apparatus for acquiring system information in a mobile communication system in which a legacy system and an advanced system coexist. A method of receiving system information on a peripheral base station in a mobile communication system includes receiving a second message containing time information for receiving, through a second region of a serving base station, a first message broadcasted through a first region of the serving base station and receiving the first message through the first region of the serving base station using the time information, the first message containing system information on neighbor legacy base stations and/or on the first region of neighbor advanced base stations which operate in a mixed mode.
Multimode terminal and method for relaying mobile communication using the same
Disclosed are a multimode terminal that may simultaneously enhance utilization of a device and efficiency of a network by enabling a mobile terminal supporting a plurality of communication schemes to additionally support a relay function, and a method of relaying communication using the multimode terminal. A communication relay method of a multimode terminal according to an exemplary embodiment of the present disclosure includes: searching, by a base station, for terminals that support a plurality of communication schemes; selecting, by the base station from among the searched terminals, a relay terminal that satisfies a predetermined condition for performing a multimode relay function; requesting, by the base station, the relay terminal to perform the multimode relay function; and relaying, by the relay terminal in response to the request of the base station, communication between the base station and a target terminal.
Method and apparatus for data communication
A method and apparatus for data communication. The method includes determining that a first nested network, is available to a plurality of user terminals, the first terminal providing a data interface to a first primary network. The method further includes determining that traffic on the first primary network can be reduced by moving one or more user terminals of the plurality of user terminals from the first primary network to the nested network. The one or more user terminals are then directed to move to the nested network.
Handover between mobile networks
When a mobile station MS1 determines during communication through a first network (1), that a second network (7) is available that offers better operational parameters for the communication, the mobile station sends a handover announcement (S 5.3) to the first network to offer it an opportunity to improve the operational parameters for the communication through the first network. The first network (1) may in response offer updated operational parameters (S5.6) with a view to encouraging the communication to continue through the first network. A decision (S5.7) whether to make a handover to the second network can then be made by comparing the updated operational parameters for the first network with the operational parameters for the second network.
Apparatus and method for high priority search on RRC state change
A user equipment is provided comprising: 1) transceiver circuitry configured to operate in cells associated with at least one radio access technology (RAT) network; and 2) a controller configured to perform neighbor cell searches. The controller is further configured to determine when the user equipment enters a first RRC state from a second RRC state. In response to the determination, the controller determines a time period since a most recent search of neighbor cells was performed. The first RRC state is one of at least: CELL_PCH, URA_PCH and IDLE. The second RRC state is one of at least CELL_FACH and CELL_DCH.
Base station device, terminal device, receiver-side base station device, and wireless communication method
When installing a femto base station device 1b, failure that may occur in wireless communication is suppressed. The femto base station device 1b includes an RF unit 4 which transmits broadcast information or paging information to a femto terminal device 2b communicating with the femto base station device 1b, and an information storage unit 31 which adds and stores, in the broadcast information or the paging information, location information that relates to the location of the femto base station device 1b and is used by another wireless communication device to suppress interference.
Macro user equipment initiated evolved inter-cell interference coordination mechanism through private femtocells
In one embodiment, a wireless base station, receives a random access preamble from a wireless device that is not authorized to utilize the wireless base station; completes a random access procedure with the wireless device; receives an interference stress message from the wireless device, the interference stress message indicating that the wireless device suffers interference from the wireless base station; and reduces interference for the wireless device.
System and method for signaling gateway
Systems and methods for a gateway that couples two or more networks are provided. The gateway allows mobile stations with subscriptions in one network to roam and operate in another network. The networks that can be coupled by the gateway include CDMA-based networks, GSM-based networks, iDEN-based network and WiMAX-based networks.
Mesh network based automated upload of content to aircraft
The Automated Content Upload System networks a plurality of aircraft together when they are parked at the gates of an airport. Communications among the aircraft are guided by a Content Manager, resident at or near the airport, which maintains data representative of InFlight Entertainment Content presently stored on each aircraft and the list of scheduled InFlight Entertainment Content available on each aircraft. The Content Manager guides the exchange of InFlight Entertainment Content among the aircraft, as well as from the Content Manager to the aircraft, to automatically distribute InFlight Entertainment Content to the aircraft efficiently and timely. This process includes the ability to multicast data from the Content Manager to multiple aircraft in a single transmission, obtaining content delivery efficiency, populating multiple aircraft via a single transmission from the Content Manager. Furthermore, the Content Manager can supplement this process via transmissions to the aircraft in flight over the Air-To-Ground link.
Methods and arrangements for direct mode communication
A method in a first user equipment (UE 1) connectable to a second user equipment (UE 2) via a communication network or via a direct radio communication link, of using a direct radio communication link for communication between the UEs is initiated when one of the UEs receives probe signaling information comprising a first probe token via the communication network. The UEs exchange probe signaling messages including a second and/or the first probe token at least partly according to the probe signaling information, such that one of the UEs can compare the probe tokens, generate a probing report and provide the probing report to the communication network, or to the opposite UE for evaluation in case of a successful comparison and such that a direct radio communication link can be used for communication with UE 2 in response to receiving instructions to use the second direct radio communication link from the entity by which the probing report was evaluated.
Small cell network self-synchronization
A system, method, and apparatus to facilitate the synchronization of oscillators between members of a Heterogeneous Network (HetNet) to form a self-synchronizing network (SSN). The network members are configured to broadcast information indicative of the reliability of their oscillator. Network members attempt to look for reliable sources such as those originating from a macrocell base station or GPS. If such a source is found, the member cell updates it clock accuracy confidence level number (CACL) to indicate this. Network members also share information regarding the frequency offsets between one another. Every cell member then applies a weighted average function to determine how to update its own oscillator and CACL value accordingly. Cell members can also update their functionality, such as RF power level, in response to varying degrees of CACL values. This operation results in a convergence of all cell members to the most accurate oscillator offset value.
System and method for running mobile devices in the cloud
Systems and methods comprise a network in which a mobile device is configured as an input/output interface for a user such that actual processing, storage and network interfaces are performed or provided by a remote server.
Bridge line appearance for location-aware mobile devices
A vPBX server manages calls in a bridged line appearance (BLA) group. A BLA group can include extensions for location-aware mobile devices. The vPBX server contains location based forwarding rules that can be applied together with BLA redirection rules in managing incoming calls. A single extension can appear as a user interface element (e.g., an icon or button) on multiple mobile devices. Using the user interface element, a primary user can view a secondary user's status, including the secondary user's location information. The vPBX server allows the primary user to redirect the incoming calls to devices in accordance with the forwarding rules and the redirection rules.
Inconspicuous mode for mobile devices
A communication device is configured to switch from a normal mode of operation to an inconspicuous mode of operation in which a reduced set of information is presented on a home screen of a display of the device in comparison to a set of information presented on the home screen in the normal mode of operation. In addition, other display properties such as contrast and brightness may be adjusted to make them less conspicuous. The home screen in the inconspicuous mode of operation is less obtrusive or conspicuous to individuals than in the normal mode of operation. The device may enter the inconspicuous mode upon user request or by detecting at least one environmental condition using a sensor available to the mobile communication device. The environmental condition may be anything that the device can detect or sense in its surrounding environment such as ambient light or sound. The device may return to the normal mode of operation by user request or when the environmental condition is no longer present.
Location based system to deliver targeted content messages to mobile devices
Disclosed is a system to implement a method to deliver a targeted content message to a mobile device base on the location of the mobile device. The system may identify a set of businesses within a coverage area of a femtocell base station to produce gathered information. The system may receive a request for a call establishment indicator from the mobile device through the femtocell base station. Targeted content messages may be identified as a function of the gathered information. Moreover, the targeted content message then may be sent to the mobile device as part of the call establishment indicator.
Voice based addressing of voice messages
A system for transmitting voice messages from a caller location to a receiver location using a plurality of computers each coupled to another through a network such as the Internet. The system also has a plurality of handheld portable recording-delivery devices which are coupled to the network. Each handheld portable recording-delivery device can convert voice input into digital data for transmission through the network. Destination information for the digital data being transmitted is generated using speech recognition of voice input.
Mobile electronic communication device with lights to indicate received messages
A mobile electronic communication device includes a processor unit, a transceiver, a keypad and a light unit. Each key of the keypad is associated with a contact of a contact list. The light unit can perform light functions to notify a user of the reception and/or status of messages received via the transceiver. The light functions include providing an indication of the age of a received message that was sent by a contact in the contacts list. The age of the message is indicated by a modulation of the illuminating light. In one embodiment, the age of a message is indicated as one of a set of predetermined age ranges, with each age range being represented by a unique color.
Accessing subscribed content with a mobile computing device
A mobile computing device has a radio frequency transceiver and a processing circuit. The radio frequency transceiver is configured to communicate over a wireless network with a remote server. The processing circuit is configured to receive subscribed content from the remote server. The processing circuit is configured to determine a status of at least one local system resource and to determine whether to proceed with accessing the subscribed content based on the status.
System to assist a mobile device subscriber to perform self-diagnosis of the mobile device
The instant invention is a process for a Self-Care system that allows mobile device subscribers to manage their own devices without making a trip or a phone call to the customer care center. Subscribers can view service issues and repair and update settings, check the status of their devices, and manage device security minimizing customer service calls. Dynamic workflow navigates the subscriber to easily find a solution to their problem which will substantially reduce frequent calls to customer care. Dynamic menus avoid the unnecessary information that the subscriber might enter about the device and leads the subscriber towards the path of solving the issue. The system is scalable to include diagnostics tools as part of self-care and customer care, where the subscribers can benefit from these tools to reset their device to a normal state.
Systems and methods for providing anonymous messaging
An exemplary messaging anonymity system (MAS) for providing anonymous messaging between a mobile device and a third-party service provider via a communications network can include a processor, a network interface, and a memory. The memory can be configured to store instructions that, when executed, perform the steps of an exemplary method. The exemplary method can include receiving a mobile-originated (MO) message from a mobile device, the MO message being destined for a third-party service provider, determining to provision an anonymous subscriber identification (ASI) to be used in lieu of a subscriber address associated with the mobile device, provisioning the ASI, and sending the MO message to the third-party service provider, wherein the ASI is presented to the third-party service provider as an originating subscriber address.
Technique for monitoring a call
A technique for monitoring a call associated with a connection established via a Media Gateway node (MGW) is described. The Media Gateway node (MGW) is controlled by a Media Gateway Controller node (MGC). The Media Gateway node (MGW) and the Media Gateway Controller node (MGC) belong to a layered network (LN). A method implementation of this technique comprises the steps of detecting a loss of communication between the Media Gateway Controller node (MGC) and the Media Gateway node (MGW) and logging the loss of communication together with a time stamp of the detected communication loss to be used for determining a charging time of the call.
A base station for use in a mobile telephony network includes an antenna arrangement coupled to a transceiver arrangement for producing a plurality of beams. A method of testing the base station comprises detecting at the transceiver arrangement the signal strengths of a test signal received via the beams; comparing and/or correlating the said signal strengths detected at the transceiver arrangement; and using the results of the comparisons and/or correlations to determine the configuration of the antenna arrangement and transceiver arrangement and/or to detect faults. The comparison of average signal strengths can be used to detect cabling faults, and beam errors. The correlation of un-averaged signal strengths can be used to determine which beams have the same polarization. Beam pointing directions and the allocation of antennas to sectors can be determined by monitoring handovers of mobiles moving between cells. Frequencies may be allocated to sectors according to a frequency re-use scheme.
Transmitter with peak-tracking PAPR reduction and method therefor
A transmitter (20) includes a peak reduction section (30), a predistorter (98), and an amplifying section (102) biased by a variable bias signal generator (118). The peak reduction section (30) is controlled by a signal magnitude threshold (36) that defines maximum magnitudes for local peaks (32) of a reduced-peak communication signal (38). The bias signal generator (118) is controlled by a bias control signal (110). Both the signal magnitude threshold (36) and the bias control signal (110) are derived from a common reduced bandwidth (50) peak-tracking signal (42). The peak-tracking signal (42) is derived from an inflated-peak communication signal (26). The predistorter (98) applies distortion to the reduced-peak communication signal (38) that is configured, at least in part, by the bias control signal (110).
Systems and methods for integrating cellular and location detection functionality using a single crystal oscillator
Embodiments of the present disclosure use shared oscillator for cellular communications and location detection in a communication device. The communications device estimates a frequency offset of one of its subsystems. The communications device determines a frequency offset that results from drifting of this shared oscillator, typically caused by aging and/or changes in temperature, voltage, humidity, pressure, and/or vibration to provide some examples, from the frequency offset this subsystem. The communications device provides various compensation parameters to its various subsystems to compensate for the frequency offset that results from drifting of the oscillator.
Radio apparatus, and method and program for controlling spatial path
A PDMA terminal (1000) establishes communication by forming a plurality of spatial paths to another single radio apparatus. A plurality of antennas constituting an array antenna are divided into a plurality of subarrays corresponding to the plurality of spatial paths respectively. An adaptive array processing unit (USP) can perform an adaptive array processing for each of the plurality of subarrays. A memory (MMU) stores in advance information on the number of antennas associated with the number of spatial paths that can be formed by the array antenna. A control unit (CNP) controls a processing to transmit possible multiplicity information to another radio apparatus at a prescribed timing.
Systems and methods for closed-loop and open-loop wireless communications
The present invention relates to user equipment (UE) having at least two transmit antennas that are capable of transmitting RF signals to a base station, which selects either an open-loop mode or a closed-loop mode depending on how the RF signals from the UE are changing. In the closed-loop mode, the base station periodically evaluates the RF signals from the UE and selects which of the UE's transmit antennas are to be used. This information is then sent to the UE. If the base station determines that the RF signals from the UE are changing too rapidly for effective control, then the base station selects the open-loop mode, such that the UE selects which of the UE's transmit antennas are to be used.
Mobile phone as a one-way recorded transmitter over a cellular network
Agencies oftentimes desire to monitor personnel in the field during the course of their duties. To provide flexible monitoring capabilities to agencies, a common mobile device such as a mobile phone is converted for use as a radio-based listening system to collect and transmit audio data. Phone features and accessories are leveraged to collect additional data for transmission. Collected data is streamed or otherwise transmitted to monitoring devices at the agency or in the field for operational oversight and recordation.
Method and wireless apparatus for performing a minimization drive test
Provided is a method for executing a minimization drive test (MDT) carried out by a terminal in a wireless communication system. The method comprises: receiving a logged measurement setting; logging an MDT measurement and a measurement result on the basis of the logged measurement setting; and reporting the whole or a part of the logged measurement result to a network. The logged measurement setting includes logging termination time information for indicating the termination time of the MDT measurement or the measurement result logging, wherein the MDT measurement and the measurement result is logged by the time indicated by the logging termination time information.
Method and apparatus for forming a beam
A device for forming a beam of an antenna array, the device including: an antenna array having a plurality of spatially distributed elements; a processor for selectively switching said elements between first and second states wherein, in said first state, said elements are configured to receive an incoming signal; and a receiver operatively associated with said antenna array and said processor for generating a reference signal, mixing said incoming signal with a modified reference signal to generate a mixed signal and summing the mixed signal over a predetermined period to generate an accumulated signal, wherein said reference signal is modified prior to being mixed with said received signal such that said accumulated signal is indicative of the direction and magnitude of the beam of the antenna array.
Weighting factor adjustment in adaptive antenna arrays
A method of forming an adaptive antenna array includes calculating intra-unit phase relationships between antenna elements of a plurality of access units and measuring inter-unit phase relationships between the access units. An indication of a desired coverage area collectively produced by the plurality of access units is received. A set of weighting factors is determined. Each weighting factor is associated with an individual antenna element in the plurality of access units and the set of weighting factors provide the desired coverage pattern. Phase lock between the plurality of access units is maintained to control the desired coverage pattern.
Method and apparatus for performing arbitration among a plurality of driver circuits in a communication device
Systems, methods, and other embodiments associated with performing arbitration among a plurality of driver circuits in a communication device are described. According to one embodiment, an apparatus includes a first source configured to transmit first packets and a second source configured to transmit second packets. The arbiter logic is configured to input a thermal management mode that is selected based, at least in part, on a thermal consequence of simultaneous transmission of packets from the first source and the second source. The arbiter logic is configured to select either i) the first packets, ii) the second packets, or iii) both the first packets and the second packets for transmission based, at least in part, on the thermal management mode input by the arbiter logic.
NFC device with PLL controlled active load modulation
A wireless communication device for communicating in the near-field via active load modulation. The device including an antenna configured to receive a magnetic field, a recovery device configured to recover a clock from the magnetic field, and a multiplexer configured to receive the recovered clock and a reference clock, and to output one of the recovered clock and the reference clock based on a current operational state of the wireless communication device, The wireless communication device further including a shunt regulator configured to produce the active load modulation by modulating an impedance of the wireless communication device, a phase-locked loop (PLL) configured to receive one of the recovered clock and the reference clock and to utilize the received clock to control the active load modulation, and a driver configured to contribute to the active load modulation by adjusting an amplitude of a voltage across the antenna.
Print control apparatus, printing system, and print control method
A print control apparatus includes a generating unit that generates clear-toner plane data based on gloss-control plane data, which contains a gloss control value for specifying a type of a surface effect being a visual or a tactile effect applied to the recording medium and for specifying a region to which the surface effect is applied in the recording medium, and clear plane data, which contains a density value for specifying a transparent image other than the surface effect; and an outputting unit that outputs the clear-toner plane data. When a region where the gloss control value is specified in the gloss-control plane data and a region where the density value is specified in the clear plane data overlap each other, the generating unit sets a value of the clear-toner plane data to the gloss control value or the density value, based on a predetermined condition.
Transfer device and image forming apparatus
A transfer device comprises a freely rotatable transferring member contacting an image bearing member to form a transfer nip therebetween; a transfer bias applying member to apply a first bias created by superimposing an alternating current component on a direct current component to the transferring member to transfer a toner image borne on the image bearing member to a recording medium in the transfer nip; and an applicator to apply a protective agent to a surface of the transferring member.
Belt for an image forming apparatus, and image forming apparatus
To provide a belt for an image forming apparatus, which contains: a base layer; an elastic layer; and spherical particles, wherein the belt for an image forming apparatus is provided across a plurality of rollers of the image forming apparatus to rotate, wherein the belt for an image forming apparatus has a laminate structure where at least the base layer and the elastic layer are provided in this order, wherein the spherical particles are partially embedded in an exposed surface of the elastic layer, and wherein, relative to a width direction of the belt for an image forming apparatus, a thickness of an edge portion of the belt for an image forming apparatus is 50% to 95% of a thickness of a center portion of the belt for an image forming apparatus, and an edge curling amount of the belt is 4 mm or less.
Cast-in belt timing patch
A cast-in reflective timing patch for a belt such as an intermediate transfer belt of a printing device. The timing patch is formed during manufacturing of the belt. As such, the presence, quality, location, and alignment of the timing patch is fixed and inspection and monitoring of the timing patch is no longer required.
Drawing-in device and image forming apparatus
A drawing-in device configured to draw and position a sheet feeding cassette functioning as a unit into a predetermined position of an apparatus main body includes an engage-target tip. The engage-target tip is pressed in the mounting direction of the unit, thus the engage-target tip retreats from a locking position, where a latching pin is locked so as not to disengage, to a retreat position, where the latching pin can engage with the engage-target portion.
Image recording apparatus
An image recording apparatus includes: a first housing comprising a recording portion and a first control device; a second housing comprising a second control device and supported by the first housing to be rotationally movable between a close position and a distant position by rotationally moving about a first axis extending in a first direction; a first cable and a second cable electrically connecting the first control device to the second control device; and a holder having a supported portion and holding the first cable and the second cable. In the first housing, at least a part of the holder extends in a second direction and the holder holds the first cable and the second cable such that the first cable and the second cable extend in the second direction and are respectively disposed at positions different from each other in the first direction and in a third direction.
Stay and guide configurations for a fuser unit
A fuser unit, which heat-fixes a developer image on a recording sheet, the fuser unit including: a cylindrical member having flexibility; a heat generation member; a nip member; a stay; a first frame; a second frame, and a wiring, wherein the first frame is provided with a pair of openings through which both axial end sides of the stay are exposed, wherein the second frame is configured to cover a central portion of the wiring, which is positioned at an inward side more than the pair of openings in the axial direction, wherein both axial sides of the second frame are provided with pressing protrusions that directly press the stay through the openings, and wherein both axial sides of the second frame are provided with third frames that cover a part of the wiring arranged at both axial end sides of the first frame.
Image forming apparatus, bias power supply device, and bias power supply method to control start and stop of supply of transfer electric field to transfer roller
An image forming apparatus includes an image carrier, a charging unit, an exposure unit, a developing unit, and a transfer unit. The transfer unit includes a transfer bias power supply and transfers a developed image onto a transfer body. The transfer bias power supply includes a first power supply unit that generates a non-transfer electric field, a second power supply unit that generates a transfer electric field, a first switching controller, and a second switching controller. The first switching controller controls start of supply of the transfer electric field in accordance with a first time constant when switching from the non-transfer electric field to the transfer electric field is performed. The second switching controller controls stop of supply of the transfer electric field in accordance with a second time constant when switching from the transfer electric field to the non-transfer electric field is performed.
Image forming apparatus
An image forming apparatus includes a main assembly, a rotatable unit, a first gear, provided in one of the rotatable unit and the main assembly, including a gear portion at an arcuate portion having a center substantially aligned with a rotation center of the rotatable unit, and a second gear, provided rotatably in another one of the rotatable unit and the main assembly, engageable with the first gear in a first rotation region of the rotatable unit. In addition, a third gear is provided at a position different from the second gear with respect to a circumferential direction of the arcuate portion and is engageable with the first gear when the rotatable unit is rotated in a second rotation region thereof. A damper mechanism imparts rotational resistance to the second and third gears when each of the second and third gears is rotated.
Image forming apparatus with selective utilization of AC voltage source
An image-forming apparatus includes a first image-forming portion; a second image-forming portion; an executing portion for executing an operation in a first mode in which an image is formed on a recording material by the first and second image-forming portions or a second mode in which an image is formed by the second image-forming portion; an AC-voltage source; a first DC-voltage source; a second DC-voltage source; and a controller for controlling the first and second DC-voltage sources and the AC-voltage source. In the first mode, application of the AC voltage by the AC-voltage source and the DC voltages by the first and second DC-voltage sources are performed, and in the second mode, application of the DC voltage by the second DC-voltage source is performed, and application of the AC voltage by the AC-voltage source and the DC voltage by the first DC-voltage source are stopped.
Development apparatus and image forming apparatus using the same
A development apparatus and an image forming apparatus wherein optical high-precision detection of the toner amount of a toner layer formed on a toner carrying member is ensured even when the great amount of the toner is deposited on the toner carrying member by transferring all or a part of the toner on the surface of the toner carrying member onto a detecting roller, and wherein stable images are provided at all times.
Methods and devices for transmitting/obtaining information by visible light signal
The present invention discloses methods and devices for transmitting/obtaining information by visible light signal. The method for transmitting information by visible light signal from a light source comprising: modulating, on the basis of the information to be transmitted, a driving signal of the light source to obtain a modulated driving signal for driving the light source to emit visible light signal having its level changed between a peak level and a bottom level with varied frequencies at different time points; and emitting the visible light signal having its level changed between a peak level and a bottom level with varied frequencies at different time points on the basis of the modulated driving signal, so as to transmit information corresponding to the varied numbers of bright or dark stripes shown in one or more images obtained from the visible light signal at one or more time points, which numbers are corresponding to the varied frequencies.
Transmission method, reception method, transmitter apparatus, and receiver device
A polarization state of a transmission signal can be changed at a high speed based on a symbol-rate By switching a first switch, a second switch, and a third switch with time, one of an X-polarized wave_I-signal as a Y-polarized wave_I-signal, a signal caused by performing logical inversion for an X-polarized wave_I-signal, an X-polarized wave_Q-signal and a signal caused by logical inversion for an X-polarized wave_Q-signal is input to a second modulator. Further, by switching the first switch, the second switch and the third switch with time, the second modulator is input one of the X-polarized wave_I-signal as the Y-polarized wave_Q-signal, the X-polarized wave_I-signal, the signal caused by performing logical inversion for the X-polarized wave_I-signal, the X-polarized wave_Q-signal and the signal caused by performing logical inversion for the X-polarized wave_Q-signal. Thereby, a polarization state of a transmission signal can be changed at high speed based on a symbol-rate speed.
Phase shifter and photonic controlled beam former for phased array antennas
A beam forming antenna device emitting a predetermined free space energy pattern, the device including: an optical signal source having predetermined wavelength characteristics; an optical modulator for modulating predetermined wavelengths of the optical signal source to produce a modulated signal source including frequency sideband components; a dispersion element for spreading and projecting the modulated signal source in a wavelength dependant manner onto a relative phase manipulation element; a relative phase manipulation element manipulating the relative phase of the modulated signal source in a predetermined manner, said phase manipulation element further amplitude modulating predetermined wavelengths of said modulated signal source and outputting a predetermined groupings of wavelengths on a series of output ports; optical to electrical conversion means converting the amplitude of the optical signal on said output ports to a corresponding electrical signal; and a series of irradiating antenna elements connected to each corresponding electrical signal for radiating a corresponding free space signal to substantially produce said predetermined free space energy pattern.
Image pickup apparatus
An image pickup apparatus comprising: a lens apparatus having: an image pickup optical system including a focus lens unit and a zoom lens unit; a zoom state detector; and a controller; a camera apparatus having: a light receiving unit; and an image display unit; an AF frame operation unit; and a distance measuring unit installed with a parallax with respect to an optical axis of the image pickup optical system, in which the controller is configured to: select, from among measured distances obtained by the distance measuring unit, a measured distance obtained in an angle of field of the AF frame, based on a position of the zoom lens unit detected by the zoom state detector and a position of the AF frame set in the display; and perform the focusing by driving the focus lens unit based on the selected measured distance.
Randomly accessible visual information recording medium and recording method, and reproducing device and reproducing method
Access point pictures designated as randomly accessible positions are I pictures or P pictures. Information indicating the decoding sequence (I1, P1, B1, B2, B3, B4, P2, . . . ) of pictures functioning as access points and attribute information (picture_type) indicating whether a picture functions as an access point or is necessary for decoding of the access point following a given access point are recorded on the video information recording medium. Random access is possible even if the GOP interval is lengthened.
Telecommunications cable inlet device
An inlet device is described herein for inserting a telecommunication cable into a telecommunications enclosure. The inlet device includes a housing, a retainer clip attached to the housing and a compression member. The housing can include a compressible portion at the second end of the housing. The retainer clip can secure the inlet device in a close fitting port of a telecommunication enclosure.
Fiber structure and a method for discriminating high order modes in the fiber structure
The invention relates to a fiber structure (700), which has one or more refractive index disturbances (750, 760) outside a fiber core (710) for discriminating one or more high order modes in the fiber structure. The invention also relates to a method for discriminating one or more high order modes, an arrangement having the high order modes discriminating fiber structure, and a device having the high order mode discriminating fiber structure.
Apparatus for use in optoelectronics having a sandwiched lens
According to an example, an apparatus for use in optoelectronics includes a bottom transparent layer, a top transparent layer having a top surface, a lens sandwiched between the bottom transparent layer and the top transparent layer, and a first alignment element attached to the top surface of the top transparent layer, wherein the first alignment element is offset with respect to the lens and is to mate with a mating alignment element on an optical transmission medium.
Optical beam switch
An optical beam switch includes at least one input optical wave guide, multiple output optical wave guides and an optical switching element for selectively switching a light beam guided in the at least one input optical wave guide to one of the output optical wave guides, in which the switching element is between the at least one input optical waveguide and the multiple output optical waveguides. The optical switching element includes a beam propagation element and an optical focusing system, where the beam propagation element has two mutually opposed end faces and where either the beam propagation element or the optical focusing system can be deflected and/or twisted transversely to an optical axis. The at least one input optical wave guide is attached to a first end face of the beam propagation element, and the output optical wave guides are attached to a second end face.
Image processing apparatus and method for controlling the same
An image processing apparatus stores a database which includes first analytical information obtained by analyzing an image existing on a recording medium, a matching dictionary including information extracted from a camera dictionary with an identifier added to each subject, and file information relating information about each subject existing in the image file with the identifier, and checks consistency between the information in the matching dictionary and information in the camera dictionary, and reconstructs the database retrieve of the database is possible to be performed, in a case where any inconsistency is found as a result of the consistency confirming.
System and method to de-identify an acquired file
A system and method to process an image file from an image source before storage on a physical storage medium. The image file can include an image data and an identifier data of a person. The system can comprise a receiver connected in communication to receive the image file from the image source. The receiver can be configured to de-identify the identifier data from each part of the image file as presented to the receiver prior to being subsequently stored on the physical storage medium.
Video identification through detection of proprietary rights logos in media
Proprietary rights logos are detected in a video. The video is divided into a plurality of regions that are analyzed for generic proprietary rights logo features. A confidence mask is generated that comprises a plurality of scaling factors, each scaling factor corresponding to a region of the video and indicating a likelihood that the corresponding region of the video includes a proprietary rights logo. The scaling factors of the confidence mask are applied to the video data to generate an altered video. The altered video is analyzed to determine a confidence measure that the video includes a reference proprietary rights logo.
Method and apparatus for frame coding in vertical raster scan order for HEVC
A method and apparatus for frame coding in adaptive raster scan order. The method includes encoding at least one of image or video utilizing input frames and at least one of a data related to the input frame to produce bitstream with raster scan order information and displacement information for producing compressed video bitstream, at decoding time, decoding at least one of the encoded bitstream with raster scan order information and displacement information for producing compressed video bitstream.
Image processing apparatus, image processing method, and image forming apparatus
An image processing apparatus includes a detecting unit configured to detect different predetermined periods in parallel in image data line by line; a selecting unit configured to select a longest period in the periods that are acquired by the detecting unit through detection of the periods with respect to a piece of image data corresponding to one line; a dividing unit configured to divide the piece of image data corresponding to the one line into pieces of division data in accordance with the period selected by the selecting unit; a converting unit configured to convert each of the pieces of division data into a piece of intermediate data, the division data being obtained by dividing the piece of image data corresponding to the one line by the dividing unit; and an encoding unit configured to perform compression coding on the piece of intermediate data converted by the converting unit.
Microscopic vision measurement method based on adaptive positioning of camera coordinate frame
The present disclosure provides a microscopic vision measurement method based on the adaptive positioning of the camera coordinate frame which includes: calibrating parameters of a microscopic stereo vision measurement model (201); acquiring pairs of synchronical images and transmitting the acquired images to a computer through an image acquisition card (202); calculating 3D coordinates of feature points in a scene according to the matched pairs of feature points in the scene obtained from the synchronical images and the calibrated parameters of the microscopic stereo vision measurement model (203); and performing specific measurement according to the 3D coordinates of the feature points in the scene (204). With the method, the nonlinearity of the objective function in the microscopic vision calibration optimization is effectively decreased and a better calibration result is obtained.
Automatic story creation using semantic classifiers for digital assets and associated metadata
A method and system for automatically creating an image product based on media assets stored in a database. A number of stored digital media files are analyzed to determine their semantic relationship to an event and are classified according to requirements and semantic rules for generating an image product. Rule sets are applied to assets for finding one or more assets that can be include in a story product. The assets, which best meet the requirements and rules of the image product are included.
Method and apparatus for sequencing off-line character from natural scene
Disclosed is a method of sequencing character information in order to increase precision of character recognition. The method includes: a pre-processing that extracts character information from an image to binarize the extracted character information through a predetermined threshold and extracts and thins a center line of the binarized character information; normalizing the pre-processed character information to character information according to a predetermined criteria; and sequencing the normalized character information using structural features including an end point or a divergence point of the character information. The present invention suggests an angle normalization method of input character information, a structural feature position determining method, and a structural feature numeral string generating method to strongly recognize characters configured by various fonts obtained from a natural scene regardless of an angle or a size of the characters.
Bulk image retrieval
Embodiments of the invention are directed to systems, methods, and computer program products for capturing, processing, storing, and generating images of a check. In some embodiments, a system is configured to: receive, from a second apparatus, at least one request to retrieve an image of a first check and a second check; retrieve a first thumbnail version of the image of the first check; retrieve a second thumbnail version of the image of the second check; generate a document comprising the first thumbnail version and the second thumbnail version; transmit the document to the second apparatus.
Image processing apparatus
Image processing apparatus (100) for creating an overlaid presentation of a first input image (101) and a second input image (102) in an output image (108), the first input image comprising input values, the output image comprising vectors of output values, the vectors of output values representing colors of the output image, and the apparatus comprising an input (110) for obtaining the first input put image and the second input image, a rendering unit (140) configured for rendering the first input image in the output image by using a first mapping function for representing the input values in the vectors of output values, a predictor (120) configured for predicting the second input image from the first input image for obtaining a predicted second input image (104), a residual calculator (130) configured for calculating a residual image (106) from the second input image and the predicted second input image, the residual image comprising residual values representing prediction errors of the predicted second input image, and the rendering unit being further configured for rendering the residual image in the output image by using a second mapping function for representing the residual values in the vectors of output values, the second mapping function being different from the first mapping function for distinguishing the residual image from the first input image.
Single scan multi-procedure imaging
A method includes receiving a signal indicative of a single user selected imaging protocol for scanning a patient. The imaging protocol includes parameters for two or more of a bone mineral density, a fat composition, or an aortic calcium imaging procedures. The method further includes performing a single scan of the patient using the single user selected protocol. The method further includes generating a single set of image data for the two or more of a bone mineral density, a fat composition, or an aortic calcium imaging procedures.
System for motion compensated MR parallel imaging
An MR system compensates for patient movement by generating a magnetic field for acquiring, first data representing individual frequency components of a segment of a k-space storage array during a first time period and second data representing individual frequency components of the segment of the k-space storage array during a subsequent second time period. The first and second data comprise individual frequency components of different images of a portion of the anatomy of a patient. The system uses the first and second data in calculating a measure representing degree of patient related motion occurring between acquisition of the first data and second data and generates an image by excluding frequency components of the first data and second data in response to the calculated measure exceeding the predetermined threshold value.
Method for processing vascular structure images
A method (100) of processing clinical 3D imaging of blood vessels in order to enable an analysis of the shape of blood vessels of a person, a statistical analysis of the shape and properties of blood vessels in a group of individuals, and the detection and quantification of blood vessel diseases.
User interface for selecting paths in an image
A method, performed by a computer, of facilitating selection by a user of one path from a set of directed paths in an image, partly overlapping but not constituting a directed tree structure, each path beginning at a root and ending at an end point, the method comprising: a) receiving from the user an indication of a specified location in the image; b) identifying a specified path part that best matches the indication of the specified location; and c) suggesting primarily a single path chosen from among two or more paths in the set which include the specified path part, but do not all follow a same route before the specified path part, and at least one of which separates from another path somewhere along its length.
Model-based fusion of scanning probe microscopic images for detection and identification of molecular structures
In certain embodiments of the invention, a plurality of images of one or more subjects may be captured using different imaging techniques, such as different modalities of scanning probe microscopy. Parameters may be estimated from the plurality of images, using one or more models of known molecular structures to provide a model-based analysis. The estimated parameters may be fused, with further input from physical models of known molecular structures. The fused parameters may be used to characterize the subjects. Such characterization may include the detection and/or identification of specific molecular structures, such as proteins, peptides and/or nucleic acids of known sequence and/or structure. In some embodiments of the invention the structural characterizations may be used to identify previously unknown properties of a subject molecule.
Method for detecting object on an operation interface of a touchable device and touchable device using the same
A method for detecting an object and a touchable device are presented, which is capable of detecting an object having a fingerprint feature on an operation interface of the touchable device. An image sensor is used for acquiring acquiring an image on the operation interface, and the acquired image is converted into a signal denoted in a frequency domain by using a frequency conversion function. Signals at a medium-high frequency (MHF) signal region among the signals of the frequency domain are analyzed, so as to generate a first signal and a second signal according to a distribution of the signals of the frequency domain. The first signal indicates existence of the object on the operation interface, and the second signal indicates inexistence of the object on the operation interface.
Initialization for robust video-based structure from motion
An initialization technique that may, for example, be used in an adaptive reconstruction algorithm implemented by structure from motion (SFM) techniques. The initialization technique computes an initial reconstruction from a subset of frames in an image sequence. The initialization technique may be performed to determine and reconstruct a set of initial keyframes covering a portion of the image sequence according to the point trajectories. In the initialization technique, a set of temporally spaced keyframe candidates is determined and two initial keyframes are selected from the set of keyframe candidates. The two initial keyframes are reconstructed, and then one or more additional keyframes between the two initial keyframes are selected and reconstructed.
Robust character segmentation for license plate images
A method and system for achieving accurate segmentation of characters with respect to a license plate image within a tight bounding box image. A vehicle image can be captured by an image capturing unit and processed utilizing an ALPR unit. A vertical projection histogram can be calculated to produce an initial character boundary (cuts) and local statistical information can be employed to split a large cut and insert a missing character. The cut can be classified as a valid and/or a suspect character and the suspect character can be analyzed. The suspect character can be normalized and passed to an OCR module for decoding and generating a confidence quote with every conclusion. The non-character images can be rejected at the OCR level by enforcing a confidence threshold. An adjoining suspect narrow character can be combined and the OCR confidence of the combined character can be assessed.
Person detection device and person detection method
Provided is a person detection device with which it is possible to estimate a state of a part of a person from an image. A person detection device (100) comprises: an evaluation unit (430) which acquires a prescribed outline of a person from an evaluation image; and a shoulder position calculation unit (440) and an orientation estimation unit (500) which estimate a state of a prescribed part of a person which is included in the evaluation image from the prescribed outline of the person which is acquired from the evaluation image, on the basis of an estimation model which denotes a relation between the prescribed outline and the state of the prescribed part of the person.
Traffic line creation device and traffic line creation method
The traffic line creation device which creates the traffic line representing a motion trace of the tracking target comprising: an object detection unit which detects the tracking target from an image frame to create detection result information including a detected area of the tracking target; a state determination unit which determines a state of the tracking target based on the detection result information; a reference point creation unit which creates a reference point of the tracking target by using the detected area with a method corresponding to the state determined at the state determination unit; and a traffic line creation unit which creates the traffic line representing a motion trace of the tracking target by connecting a plurality of the reference points created for a plurality of the image frames.
Tracking image origins
Methods, systems, apparatus, and computer program products, including accessing first data that defines a first image, generate a first value by applying a mathematical function to the first data, generating a second image from the first data of the first image, the second image being a version of the first image and defined by second data that is different from the first data of the first image, associating the first value of the first image with the second image, generating a third image from the second data of the second image, the third image being a version of the second image and defined by third data that is different from the second data of the second image, and associating the first value of the first image with the third image.
Automatic photo album creation based on social information
A social photo curation system is used to automatically identify a subset of photos for an album to provide to a viewing user. The album and its photos are associated with metadata indicating information about the photos, such as individuals tagged in the photos, locations where the photos were taken, keywords or concepts associated with the photos, and the quality and variety of the photos. The social photo curation system uses this metadata to score and select the photos for a particular viewing user. The scoring and selection of photos for the album may be independent of the viewing user, or it may be customized based on the viewing user's interests and connections to other users in a social networking system.
Moving part and electrodynamic transducer provided with such a moving part
The invention relates to a moving part for an electro-dynamic transducer, including at least one mandrel supporting a winding of at least one coiled wire. The mandrel includes at least one first element rigidly connected inside at least one second element for guiding the moving part inside the transducer. The first element has a winding support for the coiled wire so that the coil is located inside the mandrel, as well as vibration transmitter, such as a diaphragm, the vibration being generated by the movement of the coil induced by the flow of current in the coil wire. The invention also relates to an electro-dynamic transducer including such a moving part.
Speaker magnet assembly with included spider
A magnet assembly for a audio speaker provides a gap through which a voice coil assembly passes. A magnetic member, a yoke, and a pole piece form a magnetic circuit that focuses magnetic energy in the gap. A spider movably supports the voice coil assembly. The spider is coupled to one of the magnetic member or the yoke by forming the one of the magnetic member or the yoke in two parts and joining the two parts with a portion of the spider between the two parts. The spider may be formed from a thin film thermoplastic, such as polyetheretherketone (PEEK), and may be less than 10 microns thick. The portion of the spider that is between the two parts may be shaped such that a portion of the two parts are in direct contact with one another.
Micro electro-mechanical system (MEMS) microphone device with multi-sensitivity outputs and circuit with the MEMS device
A MEMS device includes substrate having a cavity. A dielectric layer is disposed on a second side of substrate at periphery of the cavity. A backplate structure is formed with the dielectric layer on a first side of the substrate and exposed by the cavity. The backplate structure includes at least a first backplate and a second backplate. The first backplate and the second backplate are electric disconnected and have venting holes to connect the cavity and the chamber. A diaphragm is disposed above the backplate structure by a distance, so as to form a chamber between the backplate structure and the diaphragm. A periphery of the diaphragm is embedded in the dielectric layer. The diaphragm serves as a common electrode. The first backplate and the second backplate respectively serve as a first electrode unit and a second electrode unit in conjugation with the diaphragm to form separate two capacitors.
Support apparatus for microphone diaphragm
A microphone includes a diaphragm assembly supported by a substrate. The diaphragm assembly includes at least one carrier, a diaphragm, and at least one spring coupling the diaphragm to the at least one carrier such that the diaphragm is spaced from the at least one carrier. An insulator (or separate insulators) between the substrate and the at least one carrier electrically isolates the diaphragm and the substrate.
Channel divider, sound reproducing system including the channel divider, and method for setting crossover frequency of the channel divider
A channel divider that can suitably set a crossover frequency when a biwiring-connectable multiway speaker system including network circuits are used is provided. The channel divider includes a low-pass filter LPF and a high-pass filter HPF for dividing a band of a sound signal into a first output signal and a second output signal so as to output the signals, and a control circuit for controlling the filters. The channel divider has a sound output mode in which the control circuit sets a cutoff frequency fcL of LPF to a value higher than fc0 by about ⅙ to 1 Oct., sets a cutoff frequency fcH of HPF to a value lower than fc0 by about ⅙ to 1 Oct., and outputs the first output signal and the second output signal including frequency bands fcL to fcH when any crossover frequency fc0 for defining the band division is specified.
Stethoscope, stethoscope attachment and collected data analysis method and system
A device for converting acoustic data collected by a stethoscope into digital data for transmission to a processor for storage and/or comparison with data stored in a database, and to optionally provide computer generated suggestions for diagnosis, is provided in the form of an in-line device interposable between a head of the stethoscope and an acoustic transmission portion of the stethoscope, or is integral with the head, and advantageously has the appearance of an icon of pleasing appearance, for example, a butterfly, in which are incorporated the structural requisites of a functioning stethoscope and/or capabilities for receiving and transmitting to a diagnostician, audio signals gathered from patient examination, and optionally also other data collected at examination and/or following the examination. The butterfly-shaped device, includes a central body advantageously serving as a conduit for transmitting sound received from the patient to the physician or a remote system for analysis and diagnosis.
Stereo signal processing circuit
A noise level of an output signal is maintained low. An adjacent interference detecting unit compares a signal level of a wide band signal which is a desired station signal of a relatively wide band and a signal level of a narrow band signal which is a desired station signal of a relatively narrow band, and judges that adjacent interference has occurred when the signal level of the narrow band signal is less than or equal to a predetermined level even though the signal level of the wide band signal is greater than or equal to a predetermined level. A variable amplifier (36) attenuates an L−R signal and forms a monophonic signal when the signal level of the narrow band signal is lower than a predetermined level. With this process, when there is adjacent interference, a signal level of the narrow band signal at which the attenuating unit starts attenuating the L−R signal is changed to a relatively high value.
Encrypted communication system, transmitter and receiver using same
High-security communications against information leakage as well as high-speed communications are realized using present optical fiber networks. The methods are as follows: (1) A seed key is shared between a transmitter and a receiver in advance. Random numbers are transmitted using carrier light accompanied by fluctuations and bases that are decided by random numbers. The transmitter and receiver compare a shared basis that is determined by the seed key with the random basis, and decompose the random numbers superimposed on each bit into two sequences, based on whether the shared basis coincides with the random basis or not. Error correction is processed for each sequence in the receiver, and then the random numbers are shared between the transmitter and the receiver. (2) The amount of the random numbers shared between the transmitter and the receiver is reduced to secret capacity through privacy amplification, and the resultant random numbers are used as a secret key. (3) Real data are encrypted with the obtained secret key, and they are transmitted and received.
Communication apparatus, image input apparatus, image output apparatus, wireless communication circuit, method for controlling apparatus, and program
After connection to another communication apparatus using the first communication-parameter set fails, and thereafter, connection to the other communication apparatus using the second communication-parameter set is successfully established, the connection to the other communication apparatus using the first communication-parameter set is attempted again.
System and method for real-time geographical call display of automatic call distributor calls
In a call center, a caller's geographical position may be mapped together with a geographical position of a call agent allocated to handle the call. A map may display tags depicting the respective positions of the caller and the call agent with a visual link indicating the call connection. The call agent may be selected dependent on the relative proximity to the caller.
Systems and methods for dynamic pay for performance advertisements
Methods and apparatuses to dynamically determine the performance event of a listing based on the progress levels of responses received in response to a presentation of the listing. One embodiment includes: providing a listing on behalf of an entity for presentation to a user; identifying an event from a set of predetermined events based on communications made by the user responsive to a presentation of the listing; and charging the entity a fee per the event identifying from the set of predetermined events.
Mass-scale, user-independent, device-independent voice messaging system
A mass-scale, user-independent, device-independent, voice messaging system that converts unstructured voice messages into text for display on a screen is disclosed. The system comprises (i) computer implemented sub-systems and also (ii) a network connection to human operators providing transcription and quality control; the system being adapted to optimize the effectiveness of the human operators by further comprising 3 core sub-systems, namely (i) a pre-processing front end that determines an appropriate conversion strategy; (ii) one or more conversion resources; and (iii) a quality control sub-system.
File management system, method and computer program
A file management system that transmits a record file of voice data or image data created by a local device to a center device over a network and manages the record file in the center device. The center device receives attribute information about the record file, including the ID of the record file, which is created in the local device, further acquires extended attribute information associated with the attribute information from a PBX, call control server, or customer server, stores management table including the attribute information and the extended attribute information. The extended attribute information of the record file suggests frequency of the reference for the record file in the local device. The center device decides the timing of the upload request for the record file based on the extended attribute information of the record file.
Gantry image guided radiotherapy system and related treatment delivery methods
Systems, methods, and related computer program products for image-guided radiation treatment (IGRT) are described. Provided according to one preferred embodiment is an IGRT apparatus including a barrel-style rotatable gantry structure that provides high mechanical stability, versatility in radiation delivery, and versatility in target tracking. Methods for treatment radiation delivery using the IGRT apparatus include conical non-coplanar rotational arc therapy and cono-helical non-coplanar rotational arc therapy. A radiation treatment head (MV source) and a treatment guidance imaging system including a kV imaging source are mounted to and rotatable with a common barrel-style rotatable gantry structure, or alternatively the MV and kV sources are mounted to separate barrel-style rotatable gantry structures independently rotatable around a common axis of rotation. Methods for intra-fraction target tracking in a gantry-style IGRT system based on comparisons between a pre-acquired planning image and intrafraction x-ray tomosynthesis images and/or intrafraction cone beam CT (CBCT) images are also described.
System for inertially compressing a fusion fuel pellet with temporally spaced x-ray pulses
Systems for enhancing preignition conditions of a fusion reaction are disclosed. A first system includes a target chamber for receiving a fusion fuel, and energy driving means oriented to direct plasma confinement structure onto to the fusion fuel to facilitate ignition of a controlled fusion reaction of said fusion fuel. A plurality of electron sources provides electron beams of a predetermined energy and one of fluence and quantity, directed onto and illuminating, a fusion fuel-derived plasma for controlling the ratio of ion temperature and electron temperature of the plasma. A second system comprises a central target chamber for receiving a spherical pellet of fusion target material and at least first and second pluralities of energy drivers oriented to supply temporally-staged X-ray pulses to the fusion target material in a 3-dimensionally symmetric manner about said pellet. A third system combines aspects of the first and second systems.
Sampling position tuning
An apparatus generally relating to a receiver is disclosed. In this apparatus, the receiver includes a phase interpolator, a detector and a slicer. The slicer is coupled to the phase interpolator to provide a sampling signal for a sampling position of the phase interpolator. The detector is coupled to the slicer to receive the sampling signal. The detector is configured to adjust a code of the phase interpolator to adjust the sampling position iteratively in response to the sampling signal to tune the sampling position of the receiver toward an optimum therefor.
Demodulation in VAMOS receivers
A desired signal and interfering signal are transmitted in the same timeslot and on the same frequency using an Adaptive Quadrature Phase Shift Keying (AQPSK) modulated carrier. When the Subchannel Power Imbalance Ratio (SCPIR) for the AQPSK modulated carrier is large and favors the interfering signal, SIC is used to cancel the interfering signal from the received signal. Following interference cancellation, the desired signal is demodulated using two different estimates of the channel and the demodulated soft bits from demodulated soft bits from each demodulation process are combined to obtain a combined estimate.
Wireless communication system with direct conversion mechanism and method of operation thereof
A method of operation of a wireless communication system includes: tuning a receiver front end for receiving a radio-frequency signal; correcting, with an in-phase/quadrature (I/Q) compensation module, an I/Q imbalance from the receiver front end including estimating by a linear minimum mean-square error (LMMSE) module; and processing by a base band receiver for digitizing an output of the I/Q compensation module for generating a receiver data.
A receiver that selectively samples a received signal in order to suppress an interference component of the signal while recovering a desired component. The selective sampling may be accomplished by low cost, low complex analog or digital circuitry. The receiver includes a first input that receives a first signal, including a desired signal component and an interference signal component and a second input that receives a second signal including the interference component only. The first and second signals are then provided to the sampling circuitry. First, the phase of the interference component of the both the first and second signals is aligned. Next, the points in a wave cycle that the second signal is at a power minimum are detected. Finally, first signal is sampled close to the point when the second signal is at the power minimum to recover the desired signal component and suppress the interference component.
Selectable interference cancellation in a communications receiver
Method and apparatuses are disclosed to substantially compensate for various unwanted interferences and/or distortions within a communications receiver. Each of these apparatuses and methods estimate the various unwanted interferences and/or distortions within the communications receiver. Each of these apparatuses and methods remove the estimates of the various unwanted interferences and/or distortions within the communications receiver from one or more communications signals within the communications receiver to substantially compensate for the various unwanted interferences and/or distortions.
Method and apparatus for detecting a set up signal used for data communication over a communication network
A method of detecting a set up signal having a predetermined frequency and used for data transmissions over a communication network comprises comparing an energy level of a filtered received signal with a first predetermined value and providing a first detect signal, comparing an energy level of a component of the received signal at a predetermined frequency with a second predetermined value and providing a second detect signal. In addition, an autocorrelation function is performed on the received signal to discriminate between the set up signal and other signals in the received signal, and a check signal is provided when the autocorrelation function identifies the set up signal. The set up signal in the received signal is detected in response to the first and the second detect signals and the check signal. A method of detecting phase reversals in the set up signal is also disclosed.
Method and apparatus for soft symbol processing in a communication receiver
In one aspect, the present invention improves Turbo equalization and/or soft interference cancellation processing in communication receivers by providing an efficient and accurate technique to compute the second moment of a received symbol, e.g., an interfering symbol, as a function of the expected bit values of only those bits in the symbol that are magnitude-controlling bits according to a defined modulation constellation. Advantageously, the expected bit values in at least one embodiment are computed using a LUT that maps bit LLRs to corresponding hyperbolic tangent function values. Further, the expected symbol value is computed as a linear function of terms comprising the expected bit values and the soft symbol variance is efficiently computed from the second moment and the expected symbol value squared. This simplified processing reduces receiver complexity, particularly in the context of modulation constellations having non-constant magnitudes, and thus saves power and/or improves design economics.
Method of demodulating modulation signals
A method of demodulating a plurality of multiplexed modulation signals is provided, including: i) inputting the plurality of multiplexed modulation signals, each of which being outputted from a plurality of outputs of a communication partner, wherein each modulation signal in the multiplexed modulation signals includes a pilot symbol sequence consisting of a plurality of pilot symbols used for demodulation, ii) estimating respective channels of the multiplexed modulation signals based on one or more of the pilot symbol sequences; and iii) demodulating each modulation signal in the plurality of multiplexed modulation signals based on the channel estimation. Each of the pilot symbol sequences is inserted at a same temporal point in each modulation signal among the multiplexed modulation signals. The pilot symbol sequences are orthogonal to each other with zero cross correlation among the modulation signals in the multiplexed modulation signals, and each pilot symbol has a non-zero amplitude.
A demodulation method for a pseudo-heterodyne signal, wherein the pseudo-heterodyne signal has a phase-modulated carrier signal and the pseudo-heterodyne signal is digitally sampled. A demodulation method at least partially avoids the disadvantages known from the prior art is implemented according to the invention in that the digitally sampled pseudo-heterodyne signal is subjected to a discrete Fourier transformation and at least one output Fourier coefficient featuring an amplitude and a phase is determined, an atan2 function (11) is applied on exactly one output Fourier coefficient of the discrete Fourier transformation and the atan2 function (11) provides the phase of the one output Fourier coefficient as a result.
Signal processing circuit and method
A signal processing circuit for providing a modulated analog transmit signal on the basis of a digital transmit data signal is disclosed. The signal processing circuit includes one or more digital circuit components and one or more analog circuit components, and is configured to vary a bias voltage or a supply voltage of at least one of the one or more digital circuit components or at least one of the one or more analog circuit components in dependence on a detected or predefined parameter when providing the modulated analog transmit signal. The detected or predefined parameter includes a parametric or environmental condition associated with the signal processing circuit.
Distortion-compensated RF transmitter and method therefor
An RF transmitter (10) includes an RF amplifier (28) that generates an amplified RF signal (36) including a linear RF signal (92) and a spurious baseband signal (94). The spurious baseband signal (94) interacts with bias feed networks (56, 66) to cause the RF amplifier (28) to generate an unwanted RF distortion at or near the allocated RF bandwidth. A baseband compensation signal (98) is generated and equalized in an adaptive equalizer (102) then fed to the RF amplifier (28). A feedback signal (46) is obtained from the RF amplifier (28) and used to drive the adaptive equalizer (102). A feedback loop causes the adaptive equalizer to adjust a baseband signal (24, 32) supplied to the RF amplifier (28) so that the RF distortion is minimized.
Telecommunications method and system
A method for encoding data for transmitting over a telecommunications network comprising: embedding at least one control or pilot data block within a plurality of real data blocks in the frequency domain; transforming real data in the real data blocks with control or pilot data in the control or pilot data blocks; and modulating the real data blocks and control or pilot data block with one or more transmission sub-carrier signals.
Data encoding method and apparatus
The invention provides a method of puncturing an encoded data bit stream, and an equivalent apparatus. The method applies one or more puncturing patterns to puncture the encoded data bit stream to reduce the number of transmitted bits. In one aspect there is provided a method of puncturing an encoded data bit-stream in a wireless transmitter, the encoded data bit-stream including one or more information bits, the method including receiving the encoded data bit-stream, puncturing a first group of encoded data bits and a second remaining group of encoded data bits in the encoded data bit stream using a first puncturing code rate and a second puncturing code rate respectively, wherein the first puncturing code rate is predefined, and the second puncturing code rate is determined based on the number of data bits in the second remaining group of encoded data bits.
Statistical joint precoding in multi-cell, multi-user MIMO
A network node jointly precodes multi-user (MU) multiple-input multiple-output (MIMO) transmissions simultaneously sent from geographically distributed base stations to a plurality of mobile terminals over associated downlink MU-MIMO channels. The node receives feedback that describes statistics of the downlink MU-MIMO channels, including channel mean and covariance. The node then computes, based on the channel means and covariances, uplink input covariances for the mobile terminals that would collectively maximize a first or second-order approximation of the ergodic capacity of dual uplink MU-MIMO channels, subject to a global transmit power constraint that comprises the sum of individual transmit power constraints for the base stations. Notably, the node adjusts the uplink input covariances as needed to satisfy the individual transmit power constraints for the base stations, maps the uplink input covariances to corresponding downlink input covariances, and jointly precodes MU-MIMO transmissions sent over the downlink MU-MIMO channels based on those downlink input covariances.
Virtual multicarrier design for orthogonal frequency division multiple access communications
Embodiments of the present invention provide a virtual multicarrier design for orthogonal frequency division multiple access communications. Other embodiments may be described and claimed.
Creation of composite images from a plurality of source streams
One system described herein, among others, comprises receiving a plurality of slice groups created by converting a plurality of video stream using flexible macroblock ordering (FMO); compositing a plurality of slice groups to create a sequence of composite pictures, wherein the sequential progression of compositing pictures from the source video streams is according to pictures having a presentation time within a time interval corresponding to the composition operation; adding pad slice groups to the source slice groups to create a composite image compatible with a video standard, wherein the pad slice groups are added to create a rectangular composite picture size compatible with an output display format, and wherein the pad slice groups are keyed with a distinct pattern indicative of padding for the composite pictures; and transmitting a single composite output stream comprised of reordered source slice groups and pad slice groups.
Image encoding device, image decoding device, image encoding method, and image decoding method
An image encoding device include a predicting unit for adaptively determining the size of each motion prediction unit block according to color component signals, and for dividing each motion prediction unit block into motion vector allocation regions to search for a motion vector, and a variable length encoding unit for, when a motion vector is allocated to the whole of each motion prediction unit block, performing encoding in mc_skip mode if the motion vector is equal to an estimated vector and a prediction error signal 5 does not exist, and for, when each motion vector allocation region has a size equal to or larger than a predetermined size and a motion vector is allocated to the whole of each motion vector allocation region, performing encoding in sub_mc_skip mode if the motion vector is equal to an estimated vector and a prediction error signal does not exist.
Extraction of video fingerprints and identification of multimedia using video fingerprinting
A video fingerprinting algorithm extracts characteristic features from regions of interest in a media object, such as a video signal. The regions of interest contain the perceptually important parts of the video signal. A fingerprint may be extracted from a target media object, and the fingerprint the target media content may then be matched against multiple regions of interest of known reference fingerprints. This matching may allow identification of complex scenes, inserts, and different versions of the same content presented in different formats of the media object.
Video coding device and video coding method
A video coding device includes a buffer simulation unit that calculates an occupation amount of a virtual buffer to be used for controlling a coding amount, by using, for each picture, (a) a code length of a code that is an intermediate result of compression coding and (b) a code length of a compressed code that is a final result of the compression coding. This means that, for a picture that has not yet processed by an arithmetic coding unit, an occupation amount of the virtual buffer is calculated by using a code length of codes provided from a binarization unit.
Transcoding system using encoding history information
The present invention provides a transcoder having a MPEG decoder and a MPEG encoder, for changing a GOP structure and the bit rate of an encoded bitstream obtained as a result of an encoding process. The MPEG encoder receives a past encoding parameters generated at a past encoding process as a history information, and performs a present encoding process by using the past encoding parameters selectively so that the present encoding process is optimized. Furthermore, the encoder describe the past encoding parameters into the encoded bitstream as the history information so as to reuse the history information in advance encoding process. The picture quality of the video data does not deteriorate even if decoding and encoding processes are carried out repeatedly by the transcoder.
Systems and methods for video and audio data storage and distribution
Data compression and decompression methods for compressing and decompressing data based on an actual or expected throughput (bandwidth) of a system. In one embodiment, a controller tracks and monitors the throughput (data storage and retrieval) of a data compression system and generates control signals to enable/disable different compression algorithms when, e.g., a bottleneck occurs so as to increase the throughput and eliminate the bottleneck.
Method and apparatus for controlling a video surveillance display
A method and apparatus for controlling a video surveillance display comprising receiving an MPEG video stream comprising video data in I-frames and P-frames, storing the MPEG video stream in an input buffer, displaying the stored MPEG video stream in full-motion video, monitoring the amount of video data stored in the input buffer; and displaying only the I-frames of the stored MPEG video stream when the amount of video data stored in the input buffer is greater than a predetermined amount.
Simultaneous reception of multiple modulation schemes
A multichannel radio receiver is configured to define at least two channel plans, each channel plan having at least one channel. The channel plans may differ due to channel bandwidths, channel locations, channel number and/or channel spacings. At least a portion of a radio spectrum may be common to at least two of the channel plans. At least two decoders may operate simultaneously to decode different modulation schemes on each of the at least two channel plans. In one example, two channel plans overlap portions of the radio spectrum. Two different and complementary modulation schemes are used on the two channel plans, respectively. The complementary modulation schemes reject signals associated with the other. Accordingly, portions of the radio spectrum are used simultaneously by at least two channel plans and at least two modulation schemes, respectively.
Soft handoff with interference cancellation in a wireless frequency hopping communication system
Techniques are provided to support soft handoff in a frequency hopping OFDMA system. Each sector concurrently supports “non-handoff” users and “soft-handoff” users. A non-handoff user communicates with only one sector, and a soft-handoff user communicates with multiple sectors simultaneously. Non-handoff users are assigned traffic channels by their sole sectors, and soft-handoff users are assigned traffic channels by their “serving” sectors. For each sector, the traffic channels assigned to the non-handoff users are orthogonal to one another and may or may not be orthogonal to the traffic channels assigned to the soft-handoff users. Each sector processes its received signal and recovers the data transmissions from the non-handoff users of that sector. Each sector then estimates the interference due to the non-handoff users and cancels the interference from the received signal. Each sector further processes its interference-canceled signal to recover the data transmissions from the soft-handoff users.
Method and network for data transmission between a plurality of radio stations
A method is provided for transmitting data between a plurality of radio stations of one same network, each station having a transmitter and a receiver. The method includes a first transmission mode in which the network operates with frequency hopping in a first frequency plan, the frequency used for data transmission being maintained for a FH dwell time, and changing from one FH dwell time to another as per a law of frequency change; a second transmission mode in a second frequency plan in which a transmitter station (A) transmits data on a fixed frequency to a receiver station (B), the second mode comprising a step (120) to determine the fixed frequency, the determination step comprising the transmission of a test word on each frequency of the second plan for a respective test dwell time. The duration of the test dwell time is equal to the duration of the FH dwell time multiplied by an integer factor of value between 1 and 6.
A vertical cavity surface emitting laser (VCSEL) configured to operate in a gain switching regime includes a cavity that is terminated by reflectors at both ends for enabling a standing wave of optical radiation therebetween. The cavity comprises at least one quantum well, each of the quantum wells located at a position where a value of a standing wave factor for each quantum well is between zero and one, 0<ξ<1.
Laser interlock system
A method and device for providing a laser interlock having a first optical source, a first beam splitter, a second optical source, a detector, an interlock control system, and a means for producing dangerous optical energy. The first beam splitter is optically connected to the first optical source, the first detector and the second optical source. The detector is connected to the interlock control system. The interlock control system is connected to the means for producing dangerous optical energy and configured to terminate its optical energy production upon the detection of optical energy at the detector from the second optical source below a predetermined detector threshold. The second optical source produces an optical energy in response to optical energy from the first optical source. The optical energy from the second optical source has a different wavelength, polarization, modulation or combination thereof from the optical energy of the first optical source.
Bidirectional translation of network edge virtualization encapsulation to core network virtualization encapsulation
A method, system and computer readable medium for bidirectional translation of edge network virtualization encapsulation and core network virtualization encapsulation are described. The method can include receiving a customer data frame and removing an edge network virtualization encapsulation header (e.g., VXLAN, NVGRE or VLAN header) and adding a core network virtualization encapsulation header (e.g., a MAC-in-MAC header). The customer data frame can be forwarded in a core network (e.g., an SPBm network) utilizing the core network virtualization encapsulation header, which can be translated back to an edge network virtualization encapsulation header at a receiving switch.
Techniques for reducing communication errors in a wireless communication system
A technique for operating a wireless communication device includes transmitting a scheduling request from the wireless communication device and receiving, following the scheduling request, an uplink grant that assigns an uplink channel to the wireless communication device. A time period between the scheduling request and the uplink grant is determined. Only channel quality information is transmitted in the uplink channel when the uplink grant requests the channel quality information and the time period is less than a predetermined time period.
Reactive and proactive routing protocol interoperation in low power and lossy networks
In one embodiment, a border node between a reactive routing network and a proactive routing network may receive an inter-domain route request (RREQ) from a requestor for a destination, and determines whether it knows the destination. In response to knowing the destination, the border node responds to the requestor. However, in response to not knowing the destination at the border node, when the border node is ingressing the inter-domain RREQ into the proactive routing network, it sends the inter-domain RREQ to each other border node of the proactive routing network. Alternatively, when the border node is ingressing the inter-domain RREQ into the reactive routing network, it sends the inter-domain RREQ into the reactive routing network.
Network systems and methods for efficiently dropping packets carried by virtual circuits
The present disclosure generally pertains to network systems and methods that efficiently drop packets carried by virtual circuits. In one exemplary embodiment, a packet network has at least a first node having a first port that is coupled directly to a second port of a second node. A virtual circuit is established such that a virtual connection exists between the two ports. The first node communicates with the second node to determine whether the second node is provisioned such that the second port is a member of the virtual circuit. If the second node is not provisioned such that the second port is a member of the virtual circuit, then the first node drops the data packets that (1) are carried by the virtual circuit and (2) are to be forwarded to the first port, as indicated by virtual circuit (VC) mapping data in the first node. Thus, the dropped packets are prevented from usurping capacity that otherwise could be used to transmit other packets between the two nodes.
Accelerated MAC address resolution for IPv6 traffic with IS-IS protocol
A method is executed by a router for improved Intermediate System to Intermediate System (IS-IS) protocol and Neighbor Discovery (ND) protocol execution to avoid dropped data traffic caused by Media Access Control (MAC) address resolution for next hops of routes determined by the IS-IS protocol. An IS-IS adjacency is established between the router and a neighbor router over a link, where a MAC address for the neighbor router is received from the neighbor router. A routing information base (RIB) is updated to include the neighbor router as a next hop for at least one destination address by the IS-IS process. The MAC address of the neighbor router is provided to an ND process to update the RIB, a forwarding information base (FIB) or L2 forwarding table of at least one line card of the router to include the MAC address of the neighbor router in response to the providing of the MAC address to the ND process.
Methods and apparatus to determine an alternate route in a network
Methods and apparatus to determine an alternate route in a network are disclosed. Example methods disclosed herein include processing a label stack of a data packet at a first node to determine whether the data packet is undergoing alternative routing to a destination. Such example methods also include, in response to determining that the data packet is undergoing alternative routing, processing the label stack to determine multiplicity values for neighbor nodes of the first node, respective ones of the multiplicity values representing respective numbers of times the data packet has been routed to respective ones of the neighbor nodes while undergoing alternative routing to the destination. Such example methods further include updating the label stack to increase a respective multiplicity value associated with the first node prior to routing the data packet from the first node to a first one of the neighbor nodes selected based on the multiplicity values.
Terminal-to-terminal communication connection control method using IP transfer network
Both a connection server and a relay connection server are installed in an IP transfer network; a function similar to a line connection control of a subscriber exchanger is applied to a connection server; a function similar to a line connection control of a relay exchanger is applied to the relay connection server; and a terminal-to-terminal communication connection control method with using the IP transfer network is realized in such a manner that a telephone set and a terminal such as an IP terminal and a video terminal transmit/receive an initial address message, an address completion message, a call pass message, a response message, a release message and a release completion message, which can be made in a 1-to-1 correspondence relationship with line connection control messages of the common line signal system. Furthermore, while an address administration table is set to a network node apparatus of an IP transfer network, means for registering addresses of the terminals into this address administration table is employed, so that an IP packet communication by a multicast manner can be realized with improving information security performance.
Data center switch
A method of transferring data in a network is provided. Data is received at a sub-switch of a first bundled switch having a plurality of sub-switches, the sub-switch being configured to only couple to connections external to the first bundled switch. The method also includes transferring the data from the first bundled switch using a multi-lane cable coupled to a second bundled switch, a first end of the multi-lane cable coupled to a sub-switch in the first bundled switch and a second end of the multi-lane cable coupled to at least two sub-switches in the second bundled switch.
Managing telephony services using multiple users within a telephony control point in a home network
A method for operating a telephony server in a home network is provided, comprising: receiving a first registration action from a first telephony control point in the home network, the first registration action including an identification of a first user within a first telephony control point; supplying a first authentication identifier to the first telephony control point, wherein the first authentication identifier is bound to both the first telephony control point and the first user; receiving an invoked action granting a telephony action from the first telephony control point, wherein the invoked action includes an authentication identifier; determining if the authentication identifier received in the invoked action matches the authentication identifier bound to the user which the telephony action involves; and executing the telephony action if the authentication information received in the invoked action matches the authentication identifier bound to the user which the telephony action involves.
Routing of web-based contacts
A method of providing access to a network of contact centers comprises providing contact links on one or more web pages which when activated initiate contacts to the contact centers. The network addresses associated with the links and to which the contacts are automatically directed are dynamically specified in the web pages and are obtained from a database. The database is dynamically updated in response to statistical updates received periodically or continually from the individual contact centers. In this way the contacts can be directed in advance to the most appropriate destination without having to evaluate each contact as it enters the contact center network, thereby reducing processing time and delays. Alternatively one or more remote session initiation protocol (SIP) proxy servers can be updated periodically with network addresses from the database, whereby SIP requests are directed by the proxy server to the contact center or agent most suitable to handle the contact, as determined in advance of the request from the statistical information.
Distributed SIP-based transfer feature
In one embodiment, a method can include: (i) routing a primary call from a transferor to a transferee; (ii) routing a consultation call from the transferor to a transfer target; and (iii) forwarding a sequence of session initiation protocol (SIP) messages to a third-party device for SIP media renegotiation for transferring between the transfer target and the transferee.
Method and apparatus using cell-specific and common pilot subcarriers in multi-carrier, multi-cell wireless communication networks
A multi-carrier cellular wireless network (400) employs base stations (404) that transmit two different groups of pilot subcarriers: (1) cell-specific pilot subcarriers, which are used by a receiver to extract information unique to each individual cell (402), and (2) common pilots subcarriers, which are designed to possess a set of characteristics common to all the base stations (404) of the system. The design criteria and transmission formats of the cell-specific and common pilot subcarriers are specified to enable a receiver to perform different system functions. The methods and processes can be extended to other systems, such as those with multiple antennas in an individual sector and those where some subcarriers bear common network/system information.
Uplink synchronization method between terminal and base station
Disclosed is an uplink synchronization method of a base station according to the present invention includes receiving an initial access signal from a terminal; obtaining an uplink synchronization using the received initial access signal; informing the terminal about obtainment of the uplink synchronization; and receiving a data signal from the terminal. According to the present invention, a marine wireless communication system may efficiently perform uplink synchronization between the base station and the terminal, and may efficiently operate wireless resources.
Wireless communication device, wireless communication system, wireless communication method and program
Provided is a wireless communication device which includes a function information transmitting unit for transmitting, via a wireless communication network, function information relating to a function of the wireless communication device, a function information receiving unit for receiving function information transmitted from another device, a function information comparison unit for comparing the function information of the wireless communication device and the function information received from such other device, and a function determination unit for determining which of the wireless communication device and such other device is to play a function of an access point, based on a result of the comparison by the function information comparison unit.
Methods and systems for exploitation of well-connected nodes in peer-to-peer wireless networks
Certain embodiments of the present disclosure relate to a method for increasing a capacity in a peer-to-peer (P2P) wireless network. A scheme has been proposed in which well-connected nodes of the P2P wireless network can be exploited in a manner that increases the overall connectivity of all the nodes in the network.
Method for re-assignment of S-CSCF services to registered IMS users of a home subscriber servers HSS
Re-assigning Serving Call Session Control Function, S-CSCF, services to a user of a Home Subscriber Server, HSS (200), in a Third Generation Partnership Program, 3GPP, telecommunications network is provided. In the case that S-CSCF services to the user including a registration procedure are previously assigned and access by the user to the S-CSCF services is erroneously lost, the proposal is to provide a method and means to re-assign those services. First, dynamic registration information (204) is uploaded from S-CSCF to the HSS (200) during the registration procedure. Then, the dynamic registration information (204) is stored from HSS (200) to S-CSCF (203) during a re-assignment procedure of the user.
Dual SIM dual active subscriber identification module with a single transmit chain and dual or single receive chain
A method, an apparatus, and a computer program product are provided. The apparatus may be configured to establish a first call for a first subscription, and accept a second call for a second subscription while maintaining the first call. A single RF transmit chain may be scheduled for uplink transmissions associated with the first call and uplink transmissions associated with the second call. A timesharing schedule for the transmit chain may determine timing for the uplink transmissions associated with the first call is transmitted and when the uplink transmissions associated with the second call is transmitted on the transmit chain. Downlink transmissions associated with the first and second calls may be received using different receive chain. Downlink transmissions associated with the first and second calls may be received using the same receive chain.
Maintaining time alignment with multiple uplink carriers
Maintaining time alignment with multiple carriers is contemplated. A group of uplink carriers (UL CC sets) that operate with a single Timing Advance (TA) may be determined, and a TA value may be applied to a specific UL CC set. A wireless transmit/receive unit's (WTRU) capability of using multiple TAs may define a group index of a few bits for each UL CC set. A TA Command received in a Random Access Response message may be used to apply the TA value to each UL carrier of the UL CC set. The WTRU may determine which UL CC set the TA value applies to based on which DL carrier the command was transmitted from. The WTRU may determine which UL CC set the TA value applies to based on the Group Index being explicitly provided in the command. The WTRU may release multi-CC configurations upon Time Alignment Timer (TAT) expiry.
Method and system for connection establishment bias for wireless networks
A method at a user equipment, and the user equipment, configured for establishing a connected mode with a first network node within a wireless network, the method receiving, at the user equipment, a connection establishment bias; applying the connection establishment bias at the user equipment, while the user equipment is in an idle mode, to at least one network node power level value, thereby creating biased power level values; and connecting to the first network node based on the biased power level values.
Offloading mobile traffic from a mobile core network
In general, the invention is directed to techniques for offloading mobile data traffic from a mobile core network to a broadband network. For example, as described herein, a breakout gateway forwards a service request from a mobile device and addressed to a service node. The service node designates an access point name (APN) for offload such that data traffic associated with service requests specifying the designated APN is to be offloaded to an offload network. The service node receives the service requests from the breakout gateway and, if the service request specifies the designated APN, the service node sends a request to the breakout gateway. The breakout gateway receives the request and assigns a routable PDP address to the mobile device. An offload module on the breakout gateway redirects mobile data traffic to the offload network when the source PDP address of the traffic is the previously assigned PDP address.
Deregistration with context retention for inter-RAT operations
A method to perform deregistration with context retention is presented. In one embodiment, the method includes storing a context associated with a mobile station in response to a deregistration request from the mobile station. The method includes determining whether or not to accept the deregistration request with context retention and sending a deregistration command message to the mobile station if the deregistration request with context retention is allowed.
Mobile station with a semi-active mode
In a mobile station for use in a cellular radio system, the mobile station is adapted to increase radio measurements relating to the currently best cell at times when the user is preparing to set up a call in order to increase the likelihood that a mobile station is camping in the correct cell when setting up a call. This is obtained by adding a third mode to the already existing idle and active modes. The additional mode provides for an increased amount of idle mode measurements compared to the conventional idle mode.
Neighboring cell signal measurement and reporting
Example embodiments of methods and apparatus for neighboring cell signal measurement and reporting are disclosed. An example method includes operating a first wireless communication cell in accordance with a first radio access technology (RAT). The example method further includes transmitting, to one or more mobile devices in the first wireless communication cell, information regarding one or more neighboring wireless communication cells. The one or more neighboring wireless communication cells are operated in accordance with a second RAT. The example method also includes establishing an active communication channel in the first wireless communication cell with a mobile device of the one or more mobile devices. The example method still further includes receiving capability information of the mobile device, the capability information including an indication if the mobile device is compatible with the second RAT. The example method additionally includes, in the event the mobile device is compatible with the second RAT, providing instructions to the mobile device regarding whether or not to provide measurement reports for signals received from the one or more neighboring cells.
Power control method and base station
An embodiment power control method includes obtaining, by a base station, a bit error rate (BER) of a physical uplink control channel (PUCCH) of a UE at a subframe i, and sending a transmit power control command δ′PUCCH(i−km) having a value related to a transmit power control command obtained by the base station at a subframe i−km and that is determined according to the relationship of the BER to a bit error rate reference value. An embodiment base station includes a second obtaining unit configured to obtain a BER of a PUCCH of a UE at a subframe i and a second sending unit configured to send a transmit power control command δ′PUCCH(i−km) having a value related to a transmit power control command obtained by the base station at a subframe i−km and that is determined according to the relationship of the BER to a bit error rate reference value.
Channel allocations in a communications system
Systems and techniques for communications include forming a data packet, selecting a plurality of transmission parameters for the data packet, generating information having one of a plurality of codes identifying the transmission parameters, and transmitting the data packet on a first channel and the information on a second channel. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims.
Method and system for managing information among personalized and shared resources with a personalized portable device
A user's request via a portable or handheld wireless communication device (HWCD) to process data may result in discovery of one or more networked resources capable of handling the processing. One or more communication routes may be established between one or more discovered network resources and one or more of the HWCD and a networked terminating device. The portable HWCD may be configured as a gateway. The user's identity may be determined and the user's personal networking preferences may be acquired. Based user's preferences, a route may be established between discovered networked resources and one or more of the HWCD and the networked terminating device. The user's identity may be authenticated. Data may undergo rate and/or format conversion. The data may be protected by secure operations. One or more of the HWCD and the networked terminating device may consume or render the requested data.
Method and apparatus for transmitting and receiving control channels by restricting a set of the control channels in a wireless communication system
A method and apparatus are provided for transmitting control information in a base station for a wireless communication system. The method includes transmitting, to a terminal, information associated with a number of Control Channel Elements (CCEs) included in control channels, determining a set of control channel candidates based on an IDentifier (ID) of the terminal and the information associated with the number of CCEs; selecting at least one control channel candidate from among the set of control channel candidates; and transmitting the control information to the terminal through the selected at least one control channel candidate.
Improvements to short-range wireless networks
The invention relates to a wireless network of devices including a network device and a coordinator; the coordinator comprising transmission and reception means for wireless communication; and the network device comprising transmission means and reception means for wireless communication; and control means operable to selectively cause the device to communicate according to two different channel access schemes, a higher throughput scheme and a lower throughput scheme; wherein a trigger is provided in the network for a switch from the lower throughput scheme to the higher throughput scheme, wherein the trigger is determined taking into account the network device's transmission requirements. The transmission requirements may be based on a network according to the present invention, wherein the transmission requirements are defined based on one or more of the following factors: data waiting in the network device's buffer, emergency status of a device, urgency status of a device and battery level.
Devices for reconfiguring a subframe allocation
An evolved Node B (eNB) for reconfiguring a subframe allocation is described. The eNB includes a processor and instructions stored in memory that is in electronic communication with the processor. The eNB determines whether to adjust a subframe allocation. If it is determined to adjust the subframe allocation, then the eNB determines whether to adjust the subframe allocation with a radio resource control (RRC) reconfiguration or a physical (PHY) layer reconfiguration. The eNB also adjusts the subframe allocation for the PHY layer reconfiguration. The eNB further adjusts the subframe allocation according to a standard configuration for the RRC reconfiguration.
Downlink subchannelization scheme for 802.16M
Two novel subchannelization methods are disclosed, for use in a 802.16m system. A downlink subchannelization method supports both localized and distributed sub-carriers, different modulation modes, and supports a variety of different fractional frequency reuse (FFR) partition allocations.
Acknowledgment transmissions under cross-subframe resource allocation in LTE-A
In release 8 of the LTE standard (“Rel-8”), downlink data transmissions of one or more user equipments (UEs) in one subframe may be scheduled by control channels of different subframes. The resources for use in acknowledging whether or not a downlink data transmission was successfully received by a UE may be based on a starting control channel element (CCE) of a corresponding control channel. Two or more control channels of different subframes may have the same starting CCE, which may lead to acknowledgment resource collisions between the one or more UEs. Therefore, certain aspects of the present disclosure provide techniques to avoid acknowledgment resource collisions between the one or more UEs.
Radio communication base station device and control signal mapping method
Provided is a radio communication base station device which can reduce the number of judgment times for a control signal in a mobile station, thereby suppressing power consumption by the mobile station. The radio communication base station device (100) includes: a mapping setting unit (122) which sets a mapping method in a mapping unit (102); the mapping unit (102) which maps a control signal to respective mobile stations to any of subcarriers constituting the OFDM symbol according to the mapping method set by the mapping setting unit (122); an MCS setting unit (121) which references a mapping table in which correlation between a plurality of MCS having different MCS levels and mapping methods is set according to the judgment result of the mapping setting unit (122) and sets MCS in encoding/modulation units (101-1 to 101-n).
Systems and methods for wireless communication of packets having a plurality of formats
Systems and methods for communicating packets having a plurality of formats are described herein. In some aspects, a signal (SIG) field in the preamble of a packet may indicate whether an extension field, such as an extension SIG field or SIG-B field, is included in the packet. In another aspect, one or more detectors may be used to auto-detect packets formatted as one of at least two different formats based on a short training field (STF) of a received packet. In some aspects, along training field (LTF) in the preamble of a packet may indicate whether the payload is repetition coded.
Method and apparatus for enabling access to a packet data network
A network element for a cellular communication network comprises gateway router logic. The gateway router logic is arranged to receive a request to create a packet data context for enabling a mobile communication device to access a packet data network; obtain an address for a gateway logic module for the packet data network, the gateway logic module being located within a femto radio network subsystem; and forward the request to create a packet data context to the obtained address for the gateway logic module.
MAC layer packet data units for wireless communications
Technologies for wireless communications can include communicating connection information that specifies one or more parameters of a connection between a base station and a wireless device. The connection information can be indicative of one or more of: a station identifier, whether data packets associated with the connection include a cyclic redundancy check, and whether data packets associated with the connection include encrypted information. These technologies can include constructing, based on the connection information, a media access control (MAC) protocol data unit (PDU) that includes a header at a beginning portion of the MAC PDU. The header can include one or more of: a first flag that indicates a header type, a second flag that indicates whether there is a subheader inclusion following the header in the MAC PDU, a flow identifier that, together with the station identifier, identifies the connection, and a length value.
Mobile wireless communications device to receive advertising messages based upon keywords in voice communications and related methods
A communications system may include an advertising server for sending advertisement messages based upon keywords. The communications system may further include at least one mobile wireless communications device having a processor cooperating with at least one audio transducer and a wireless transceiver for recognizing keywords in voice communications. The processor may cooperate with the advertising server to receive advertisement messages therefrom based upon the keywords.
Apparatus and methods for relay-assisted uplink communication
A terminal device is arranged to communicate with a base station via a relay device in a wireless communications system. The terminal device comprises: a transmitter arranged to transmit an access request message to the base station, wherein the access request message comprises one from a set of access preambles that indicate relay device uplink assistance is required; a receiver arranged to receive an access request grant response from the base station; and a control processor operably coupled to the transmitter and receiver and arranged to: process the access request grant response and determine from a timing advance part thereof transmit power control (TPC) information for transmitting to the base station via the relay device.
Wireless communication system and method for mapping of control messages on the un-interface
An LTE mobile communication system in which relays RN (14), each in communication with a donor eNB (13) are used to improve the coverage of high data rates, the cell-edge throughput and/or to increase system throughput. The problem addressed is that in the RN←→DeNB (13) Un interface, all the S1-AP and/or X2-AP messages with different QoS requirements (for example different S1-AP/X2-AP messages that have different time criticalities) have to be delivered in a limited number of Data or Signalling Radio Bearers. A multiplexing mechanism enables the categorization of different types of S1-AP and/or X2-AP messages and the mapping of these to a limited number of Radio Bearers over the Un radio interface.
Data transmission method for wireless communication system involving relay
Provided are an uplink transmission method and downlink transmission method in a mobile communication network including a relay. In the uplink and downlink transmission methods, frame structures and transmission timings of a backhaul downlink and a backhaul uplink are determined in consideration of at least one of a time for the relay to switch between transmission and reception and a signal transmission time. Accordingly, in a wireless communication system including a relay, it is possible to effectively perform data transmission and reception between the relay and a base station.
Method and apparatus for uplink network MIMO in a wireless communication system
Systems and methodologies are described herein that facilitate generation and processing of control signaling to support uplink network multiple-in-multiple-out (N-MIMO) communication in a wireless communication system. As described herein, respective network nodes associated with an uplink N-MIMO framework can generate channel state information (CSI) corresponding to an uplink channel from a designated network user to the respective nodes. Generated CSI can subsequently be communicated to an uplink anchor node for the network user in order to facilitate rate assignment, scheduling, and/or other operations with respect to the network user. As described herein, CSI generated and reported by respective cells can include channel profiles, carrier/interference profiles, estimated supported uplink rates, or the like. As additionally described herein, supplemental information such as observed interference levels, demodulation indicators, or the like can be communicated to an anchor node and utilized in rate assignment and/or scheduling.
Methods and apparatus for power efficient broadcasting and communication systems
A method and apparatus for content multicasting and broadcasting and data unicasting in a broadband multicarrier wireless communication system. A base station is configured to transmit, and a mobile station is configured to receive, a sequence of consecutive frames. The frames comprise two types: frames containing time-frequency resources for content multicasting and broadcasting via a single frequency network, and frames containing time-frequency resources for data unicasting without the use of a single frequency network. The two types of frames are intermixed in accordance with an intermixing configuration pattern. The intermixing configuration pattern is indicated by a bit-map contained in a scheduling signal.
Detecting a WLAN signal using a bluetooth receiver during bluetooth scan activity
A BT receiver RF front end receives RF energy in a sequence of BT scan windows. Throughout a scan window, the front end is tuned to one hop frequency. Before and after the window the front end is in a disabled state. A WLAN energy detector processes an output of the front end during the window and determines whether more than a predetermined amount of RF energy was received onto the front end during the window. A BT baseband processor attempts to demodulate the output of the front end. If the WLAN energy detector determines that the predetermined amount of RF energy was received and if a BT signal could not be demodulated, then a WLAN wake-up signal is asserted, thereby causing a WLAN transceiver to be powered up to receive WLAN signals. BT scan intervals are varied in duration to facilitate a BT scan window overlapping a WLAN beacon.
Wireless communication apparatus and electronic device
A wireless communication apparatus includes a transmitter circuit whose transmission power is set variably, a wireless communication section having a receiver circuit, and a processing section that executes a control of the wireless communication section. The processing section sets the transmission power of the transmitter circuit to a first transmission power when it executes normal data communication and sets the transmission power of the transmitter circuit to a second transmission power smaller than the first transmission power when it executes a pairing process.
Internet SIP registration/proxy service for audio conferencing
To enable internet softphone users to join to calls hosted at an audio conferencing bridge, a SIP Invite may be received at a bridge interface layer of an audio conferencing system. Parameters of the SIP Invite may be extracted, e.g. from one or more X-header fields and processed to enable the internet softphone to be joined to an audio conferencing bridge. The bridge interface layer may receive a SIP Refer message from the audio conferencing bridge that indicates a second audio conferencing bridge external to the system. The bridge interface layer may forward the SIP Invite to the second audio conferencing bridge and the RTP media may be established through the session border controller (SBC) of the audio conferencing system.
Methods, systems, and computer readable media for switching office trigger induction by an intermediate signaling node
Methods, systems, and computer readable media for inducing the activation of a service trigger at a switching office in a communications network are disclosed. According to one method, a call setup message associated with a call is received. It is then determined whether service trigger induction is required for the call. In response to determining that service trigger induction is required for the call, the call setup message is modified to include service trigger induction information and the modified call setup message is directed to a destination switching office. At the destination switching office, a service trigger is activated based on the service trigger induction information in the modified call setup message.
Resilient cache-based topology detection of a dynamic cluster
The constituency and topology of a dynamic network cluster comprising a plurality of hosts and a plurality of Level 2 network switches is automatically detected and mapped at selected intervals of time to provide current real time topology mappings. Network connections are determined by identifying the MAC addresses of host interfaces of hosts that a part of the cluster and the MAC addresses of the particular host interfaces connected to the switch ports of each switch. Resiliency to account for changes to the cluster between intervals is provided by caching cluster mapping and constituency information, and using the cached information from a previous update round to supplement information detected during a current round.
Monitoring broadcast and multicast streaming service
A method of monitoring broadcast or multicast streaming service in a communications network comprising collecting (102) quality feedbacks related to the streaming service, determining (106) a maximum distance to a neighbor in a cluster and a minimum number of values required to form a cluster (106). The method further comprises grouping (108) collected values from the feedbacks into clusters based on the maximum distance to a neighbor in a cluster and the minimum number of values required to form a cluster and then mapping (112) the clusters onto topology of the network and determining (114) location of a problem causing degradation of the service.
Multi-network type coordinator for a single physical layer
A coordinator for coordinating the use of a physical layer between a first network operating using a first network protocol and a second network operating using a second network protocol different from the first network protocol, the network protocols being non-interoperable and supporting centralized management of nodes by a master device in each network respectively, including a receiver, a transmitter, a coordinator first network type device (CNTD1) and a coordinator second network type device (CNTD2), both coupled with the receiver and the transmitter, and a synchronizer and coordinator (SAC) coupled with the CNTD1 and CNTD2, the SAC including a required resources determinator, for determining the required resources of both networks for the next transmission cycle and for providing the required resources of one network to the other, wherein the master device of one network allocates resources to the other network and vice-versa.
Distributed node migration between routing domains
In one embodiment, a device connected to a network receives at a network interface a first network size indicator for a first network and a second network size indicator for a second network. A difference between the first network size indicator and the second network size indicator is determined and a switching probability is calculated if the difference between the network size indicators is greater than a predetermined network size difference threshold. The device may then migrate from the first network to the second network based on the switching probability.
Method and system for aligning each dispatching service in optical transfer networks
The present invention discloses a method for aligning each scheduling service in an optical transport network. When a cross scheduling unit in a cross board sends service data to each service board, inserts a frame header indication signal into the sent service data, data frames in the sent service data are aligned according to the frame header indication signal, each service board performs a delay to the above service data according to a service delay time when receiving the service data and extracting the frame header indication signal, after the delay time is up, encapsulates the service data to be scheduled and sends to the cross broad to be cached, aligned and scheduled. The present invention also discloses a system for aligning each scheduling service in an optical transport network.
Power control method to mitigate interference for in-device coexistence
A power control method to mitigate in-device coexistence (IDC) interference is provided. A wireless communication device (UE) is equipped with a first LTE radio module and a second co-located WiFi/BT/GSNN radio module. Upon detecting coexistence or IDC interference, the UE applies power control method to mitigate the interference. In a first embodiment, the LTE radio module adjusts its power parameters locally without informing the serving eNB. In a second embodiment, the LTE radio module adjusts its power parameters and implicit informs the eNB through existing PHR reporting. In a third embodiment, the LTE radio module changes its power or power class and explicitly informs the eNB through UE capability or new RRC message or MAC CE. Power control can be used as a low cost and lightweight solution before applying other heavyweight solutions that either require more resource or control overhead, or have higher impact on throughput.
Downlink inter-cell interference coordination method and eNB
Embodiments of the present invention disclose a downlink Inter-Cell Interference Coordination (ICIC) method and relate to the wireless communication field. The method includes: obtaining information about multiple carriers in a current cell; obtaining, according to the information about the multiple carriers, a downlink ICIC parameter corresponding to each carrier of the multiple carriers; and sending the downlink ICIC parameter corresponding to each carrier to a neighboring cell of the current cell so as to enable the neighboring cell to perform, according to the downlink ICIC parameter, downlink interference coordination with the first cell. The embodiments of the present invention are applicable to downlink ICIC in a multi-carrier system.
Method, terminal and network system for reporting buffer status report
The present invention discloses a method, a terminal and a network system for reporting a buffer status report. The method comprises: a terminal triggers a buffer status report (BSR) and obtains radio resource information of uplink component carriers in a radio network; one or more BSR data units are constructed based on information of buffer data volume to be transmitted; one or more uplink component carriers are selected from the uplink component carriers with available radio resources, and the BSR data unit(s) is/are transmitted on the selected uplink component carrier(s) to a network side. The present invention fully takes advantages of wide bandwidth of a long term evolution-advanced (LTE)-A system, and can realize high-efficiency-and-quality transmission of BSR data unit(s).
Method and passive optical network system for managing uplink burst overhead parameters
A method for managing upstream burst overhead parameters includes: an Optical Line Terminal (OLT) or an Optical Network Unit (ONU) detects transmission quality of a downlink between the OLT and the ONU; the OLT or the ONU determines the upstream burst overhead parameters suitable for the ONU according to the transmission quality; and the ONU starts to use the upstream burst overhead parameters suitable for the ONU after the switching time determined by the ONU itself or indicated by the OLT. The present invention also provides an ONU and an OLT for managing the upstream burst overhead parameters. The present invention can improve the bandwidth utilization rate and decrease the complexity of indicating the upstream burst overhead parameters in PON system, so that the ONU and the OLT are enabled to flexibly and simply select the upstream burst overhead parameters.
Method and device for data processing
A method and a device for data processing. The data processing method utilizes at least two probing coefficients in a canceller and/or precompensator in combination with SNR feedback to process data in the canceller and/or in the precompensator.
Method and apparatus for discovering, negotiating, and provisioning end-to-end SLAs between multiple service provider domains
Domains (multiple collaborating service providers) create service offerings between pairs of edge nodes that interconnect with other domains in the network. The service offerings may specify the available bandwidth, quality of service, reliability, available security, price, subscriber and service contextual specific and other SLA information. When a new service is to be created, the service definition is used along with information about the available service offerings to determine a set of networks to implement the service. Information associated with the service offerings may be flooded to all other networks. Alternatively, the service offering information may be provided to a trusted third party (SLA broker) which may provide SLA services on the network to select sets of domains to implement inter-domain services, and may also proxy to set up the service for the SLA requesting party. A hybrid approach may also be used wherein some SLA information is flooded and other information is retained in secret and provided only to the SLA broker.
Hierarchical anomaly localization and prioritization
Methods, apparatus and articles of manufacture for hierarchical anomaly localization and prioritization are disclosed. An example method disclosed herein comprises obtaining reported status for a plurality of nodes of a hierarchical topology, the reported status for a particular node being at least one of normal, abnormal or indeterminate, and determining a subset of root cause abnormal nodes, a root cause abnormal node included in the subset of root cause abnormal nodes having a total number of abnormal direct descendent nodes and indeterminate direct descendent nodes that is greater than a number of normal direct descendent nodes of the root cause abnormal node.
Mesh network connecting wireless routers
A communication routing arrangement includes two or more wireless routers coupled to a communication network, and a user device adapted to couple with the communication network through a communication path including at least one of the two or more wireless routers. The communication path between the user device and the communication network is selected based on available resources of the two or more wireless routers.
Apparatus and a method of receiving and storing data packets controlled by a central controller
An assembly and a method where a number of receiving units receive and store data in a number of queues de-queued by a plurality of processors/processes. If a selected queue for one processor has a fill level exceeding a limit, the packet is forwarded to a queue of another processor which is instructed to not de-queue that queue until the queue with the exceeded fill level has been emptied. Thus, load balancing between processes/processors may be obtained while maintaining an ordering between packets.
Apparatus and method for identifying, based on an alternating pattern, a port to which a cable is connected
A switch includes a connector, a port, and an indicator. The connector is configured to connect via a cable to a computer. The port is attached to the connector. While the connector is connected to the computer via the cable, the port is configured to: transmit a command signal from the switch to the computer via the cable, wherein the command signal requests identification of the port; and detect a response to the command signal as received from the computer. The indicator is connected to the port. The indicator is configured to identify the port based on an alternating pattern of the response to the command signal.
Method and apparatus for enhancements for de-prioritization by RRC connection reject in LTE
A method and apparatus for enhancements for de-prioritization by RRC connection reject, where the enhancements relate, in one aspect, to faster cell reselection to prevent possible service outages. In a further aspect the enhancements relate to release, suspension or resumption of de-prioritization upon PLMN selection. In a further aspect, the enhancements relate to conflict handling with a CSG cell priority. In a further aspect, the enhancements relate to connected mode UE handling. In a further aspect, the enhancements relate to cancellation of a de-prioritization request.
Multi-threaded packet processing
A system is disclosed for concurrently processing order sensitive data packets. A first data packet from a plurality of sequentially ordered data packets is directed to a first offload engine. A second data packet from the plurality of sequentially ordered data packets is directed to a second offload engine, wherein the second data packet is sequentially subsequent to the first data packet. The second offload engine receives information from the first offload engine, wherein the information reflects that the first offload engine is processing the first data packet. Based on the information received at the second offload engine, the second offload engine processes the second data packet so that critical events in the processing of the first data packet by the first offload engine occur prior to critical events in the processing of the second data packet by the second offload engine.
Circuit switched fallback procedure
A CS fallback procedure handles conflict that may arise when handover operations occur during CS fallback. If CS fallback is initiated for an access terminal and handover of that access terminal is then initiated before the CS fallback completes, the target for the handover is informed of the CS fallback so that the target may perform the appropriate CS fallback operations.
Transmit diversity processing for a multi-antenna communication system
For transmit diversity in a multi-antenna OFDM system, a transmitter encodes, interleaves, and symbol maps traffic data to obtain data symbols. The transmitter processes each pair of data symbols to obtain two pairs of transmit symbols for transmission from a pair of antennas either (1) in two OFDM symbol periods for space-time transmit diversity or (2) on two subbands for space-frequency transmit diversity. NT·(NT−1)/2 different antenna pairs are used for data transmission, with different antenna pairs being used for adjacent subbands, where NT is the number of antennas. The system may support multiple OFDM symbol sizes. The same coding, interleaving, and modulation schemes are used for different OFDM symbol sizes to simplify the transmitter and receiver processing. The transmitter performs OFDM modulation on the transmit symbol stream for each antenna in accordance with the selected OFDM symbol size. The receiver performs the complementary processing.
MBS with outer coding and adjusted frame reference
The subject matter disclosed herein provides methods and apparatus for providing MBS (multicast broadcast service) with outer coding and adjusted frame reference indexing. In one aspect, there is provided a method. The method includes receiving data packets from a network, dividing the data packets into one or more data streams, applying outer encoding on the one or more data streams and providing the one or more encoded data streams to an air interface for transmission to a user equipment over a wireless communication system.
Light source and recording apparatus
There is provided a light source including a mode-lock laser unit that includes a semiconductor laser and an external resonator unit and emits a laser beam having a predetermined frequency, the semiconductor laser including a saturable absorber unit that applies a reverse bias voltage and a gain unit that applies a gain current, a semiconductor optical amplifier that performs amplification modulation on the laser beam emitted from the mode-lock laser unit, a laser clock generating unit that generates a laser clock synchronized with the laser beam based on a signal detected from the saturable absorber unit when the laser beam oscillates in the mode-lock laser unit, and a modulating unit that generates a driving current synchronized with the laser clock and applies the driving current to the semiconductor optical amplifier.
An electronic timepiece includes: a timekeeping section which counts time; a time display section which displays time; an illuminating section which performs illumination; a wireless communication section which performs wireless communication by transmitting/receiving a wireless signal intermittently; and a drive control section which performs duty drive of the illuminating section when a period in which wireless communication is conducted by the wireless communication section and a period in which the illuminating section is driven overlap with each other.
System and method for fish finding using a sonar device and a remote computing device
The present invention generally relates to a fish finding sonar system. Specifically, this invention relates to a sonar device pairing with a remote computing device to provide information to an angler about what is under the surface of the water. Embodiments of the present invention include a sonar device and a remote computing device configured to allow the sonar device to wirelessly communicate with the remote computing device and the remote computing device to connect to a database to register and receive information about real-time fishing hotspots.
Memory device and method for sensing a content of a memory cell
A memory device to sense a content of a memory cell includes: a pair of bit-lines; a memory cell coupled between the bit-lines; and a sensing circuit. The sensing circuit has at least two inputs for receiving respective currents from a current conveyor, and senses, when operating in a sensing mode, a difference between output currents. The difference between the output currents represents a content of the memory cell. The sensing circuit includes an output for outputting an output signal that represents the content of the memory cell. The current conveyor isolates the sensing circuit from the bit-lines, when the current conveyor is operated in an isolation mode, and has at least two outputs for providing, to the sensing circuit, output currents representing bit-lines currents; and equalizing the output currents before the current conveyor starts to operate in a current conveying mode.
Nonvolatile memory device, method of operating the same and electronic device including the same
A nonvolatile memory device and a method of operating the same are provided. The method includes performing a plurality of program operations on a plurality of memory cells each to be programmed to one of a plurality of program states, performing a program-verify operation on programmed memory cells associated with each of the plurality of program states, the program-verify operation comprises, selecting one of the plurality of offsets based on a noise level of a common source line associated with a programmed memory cell, using the selected offset to select one of a first verify voltage and a second verify voltage higher than the first verify voltage, and verifying a program state of the programmed memory cell using the first verify voltage and the second verify voltage.
Semiconductor memory device and method of operating the same
A semiconductor memory device is operated by, inter alia: precharging a bit line, providing a first voltage to a coupling circuit for coupling the bit lines and cell strings of a plurality of memory cells, providing a program voltage to a selected word line coupled to a memory cell on which a program operation will be performed among the plurality of memory cells, providing a pass voltage to unselected word lines, providing a second voltage lower than the first voltage to the coupling circuit, discharging the bit line by loading program data, and providing a third voltage lower than the second voltage to the coupling circuit.
Memory element and programmable logic device
To provide a memory element where a desired potential can be stored as data without an increase in the number of power source potentials. The memory element stores data in a node which is brought into a floating state by turning off a transistor a channel of which is formed in an oxide semiconductor layer. The potential of a gate of the transistor can be increased by capacitive coupling between the gate and a source of the transistor. With the structure, a desired potential can be stored as data without an increase in the number of power source potentials.
Method and system for programming non-volatile memory cells based on programming of proximate memory cells
A multi-level non-volatile memory device programs cells in each row in a manner that takes into account the coupling from the programming of cells that are proximate the row to be programmed. In one example of the invention, after the row has been programmed, the proximate cells are verified by read, comparison, and, if necessary, reprogramming operations to compensate for charge added to proximate memory cells resulting from programming the row. In another example of the invention, a row of memory cells is programmed with charge levels that take into account the charge that will be added to the memory cells when proximate memory cells are subsequently programmed.
Dual-port semiconductor memory and first in first out (FIFO) memory having electrically floating body transistor
Multi-port semiconductor memory cells including a common floating body region configured to be charged to a level indicative of a memory state of the memory cell. The multi-port semiconductor memory cells include a plurality of gates and conductive regions interfacing with said floating body region. Arrays of memory cells and method of operating said memory arrays are disclosed for making a memory device.
Semiconductor integrated circuit device, method of manufacturing the same, and method of driving the same
A semiconductor integrated circuit device, a method of manufacturing the same, and a method of driving the same are provided. The device includes a semiconductor substrate, an upper electrode extending from a surface of the semiconductor substrate; a plurality of switching structures extending from both sidewalls of the upper electrode in a direction parallel to the surface of the semiconductor substrate, and a phase-change material layer disposed between the plurality of switching structures and the upper electrode.
Balanced method for programming multi-layer cell memories
Improved methods for programming multi-level metal oxide memory cells balance applied voltage and current to provide improved performance. Set programming, which transitions the memory cell to a lower resistance state, is accomplished by determining an appropriate programming voltage and current limit for the objective resistance state to be achieved in the programming and then applying a pulse having the determined set electrical characteristics. Reset programming, which transitions the memory cell to a higher resistance state, is accomplished by determining an appropriate programming voltage and optionally current limit for the state to be achieved in the programming and then applying a pulse having the determined electrical characteristics. The algorithm used to determine the appropriate set or reset programming voltage and current values provides for effective programming without stressing the memory element. The electrical characteristics for programming pulses may be stored in a data table used in a table look up algorithm.
Magnetoresistance effect device and method of production of the same
A magnetoresistance effect device including a multilayer structure having a pair of ferromagnetic layers and a barrier layer positioned between them, wherein at least one ferromagnetic layer has at least the part contacting the barrier layer made amorphous and the barrier layer is an MgO layer having a highly oriented texture structure.
Method and apparatus for forming a contact in a cell of a resistive random access memory to reduce a voltage required to program the cell
A cell of a resistive random access memory including a resistive element and an access device. The resistive element includes (i) a first electrode and (ii) a second electrode. The access device is configured to select and deselect the cell. The access device includes (i) a first terminal connected to a first contact and (i) a second terminal connected to a second contact. The second contact is connected to the second electrode of the resistive element via a third contact. The third contact includes (i) a first surface in contact with the second contact and (ii) a second surface in contact with the second electrode. The first surface defines a first surface area, and the second surface defines a second surface area. The first surface area is greater than the second surface area.
Methods and apparatuses using a transfer function to predict resistance shifts and/or noise of resistance-based memory
Two or more workload indicators affecting a memory cell of a resistance-based, non-volatile memory are measured. The two or more workload indicators are applied to a transfer function that predicts a resistance shift and/or resistance noise variance in response to the two or more workload indicators. A result of the transfer function is applied to shift and/or determine a threshold resistance used for at least one of a program operation and a read operation affecting the memory cell. An error rate of the memory cell is reduced as a result.
Semiconductor memory device, semiconductor device and method of manufacturing semiconductor memory device
In a case where a DRAM and a ReRAM are mounted together, a manufacturing cost thereof is reduced while maintaining performance of a capacitance element and a variable resistance element. A semiconductor memory device includes a variable resistance element and a capacitance element. The variable resistance element has a cylinder type MIM structure with a first depth, and is designed for a variable resistance type memory. The capacitance element has a cylinder type MIM structure with a second depth deeper than the first depth, and is designed for a DRAM.