System for fabricating nanoscale probe and method thereof
Disclosed is a method for fabricating a nanoscale probe. A first conductor and a second conductor are immersed into an electrolyte contained in an electrolytic tank. The first conductor and the second conductor are connected to a power source respectively. An electrolytic reaction is established when an electrical circuit is established between the first conductor and the second conductor. The second conductor is configured to output electrons. The first conductor is configured to receive electrons. Therefore, the first conductor is etched when the electrical circuit is established between the first conductor and the second conductor. A necking portion is created at the first conductor approximately near the surface of the electrolyte. A nanoscale probe is fabricated when first conductor breaks at the necking portion.
Privacy control-adjustable vehicle monitoring system with a wild card mode
A novel privacy control-adjustable vehicle monitoring system and a related method of operation provide a dynamically-adjustable access grant or denial of privacy-sensitive vehicle information to a vehicle monitoring personnel based on a driver's response to an electronic request made by the vehicle monitoring personnel. In one embodiment, vehicle information is categorized into a mandatory disclosure dataset and a privacy-adjustable dataset, wherein the mandatory disclosure dataset is disclosed to the vehicle monitoring personnel at all times, while the privacy-adjustable dataset is accessible if the driver grants access via a driver's user interface on an onboard vehicle user interface, or on a mobile electronic device. Furthermore, a special wild card mode visible to the driver enables the vehicle monitoring personnel to access an entire set of vehicle information for a limited period per access and for a limited number of accesses per period, based on a pre-arranged consent with the driver.
Digital rights management (DRM) locker
Methods, apparatuses and storage medium associated digital rights management (DRM) using DRM locker is disclosed herein. In embodiments, a DRM locker is provided to a client device. The DRM locker may be configured to store a number of DRM licenses or keys for a number of DRM protected contents. The DRM locker, on presentation of an associated locker key, may respond to a request for one or more of the stored DRM licenses or keys, to enable consumption of the corresponding DRM protected contents using the client device. Other embodiments may be disclosed or claimed.
Comparing central time stamp bits from bus and client circuitry
This invention is time stamping subsystem of an electronic apparatus. A time stamp generator generates a multibit time stamp value including a predetermined number of least significant bits overlapping a predetermined number of most significant bits. Each client receives the least significant bits. Each client associates captured data with a corresponding set of the least significant bits in a message. A central scheduling unit associates most significant bits of the time stamp value with the least significant bits of the message. This associating compares overlap bits of the most significant bits and least significant bits. The most significant bits are decremented until the overlap bits are equal.
Method and apparatus for ensuring security of remote user interface session using out-of-band communication
A method and apparatus for ensuring security of a session. In the method, a first client selects a user interface related to a process in need of security from among user interfaces related to predetermined contents provided from a first server, and a first client or a second client communicates directly with a second server operated by a contents provider to perform the process in need of security and notifies the first server of the performing result. Thus, it is not required to transmit/receive security information via the first server.
Transforming unit tests for security testing
A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A first input parameter of the unit test is identified. A substitute parameter value is determined, wherein the substitute parameter value is associated with a security test for the one or more software units. A value of the first input parameter in the unit test is replaced with the substitute parameter value. The unit test including the substitute parameter value is implemented for the one or more software units. A first security issue associated with the one or more software units is identified, based upon, at least in part, replacing the first input parameter of the unit test with the substitute parameter value and implementing the unit test including the substitute parameter value.
Software module object analysis
In one implementation, an object analysis system identifies an object within a software module, and determines a size of the object based on at least one operation within the software module. The object analysis system identifies the object and determines the size of the object without reference to source code of the software module.
System and method for correcting antivirus records and using corrected antivirus records for malware detection
Disclose are system, method and computer program product for correcting antivirus records. In an example aspect, an antivirus application analyzes a software object for a presence of malware. The antivirus application includes an antivirus database and an antivirus cache. The antivirus application retrieves from the antivirus database an antivirus record associated with the analyzed object. The antivirus record indicates whether the object is clean or malicious and further includes at least a test antivirus record status indicator. The antivirus application checks at least in the antivirus cache for correction of the test antivirus record. The correction includes a change in the test status of the antivirus record. When a correction for the retrieved antivirus record is found in the antivirus cache, the antivirus application uses said correction for the antivirus record for a further processing of the software object.
Detecting malicious behaviour on a computer network
A malicious behavior detector (100) for detecting malicious behavior on a network, comprises a processor unit (120) and associated system memory (130) containing computer program code. The computer program code provides a signature matching module (132) to perform malicious partial signature detection by reading the contents of packets of data passing through the network to look for partial signatures associated with malicious programs; a Domain Name Service, DNS, request and/or response detection module (134) to monitor the requests made by hosts connected to the network and/or responses thereto; and an evidence assessment module (138) to analyze the results of the partial signature detection and the DNS monitoring make a determination of the suspected presence of malicious behavior on the network based upon the analysis of the results of both the partial signature detection and the DNS monitoring.
Generating and distributing a malware countermeasure
Embodiments include a system, an apparatus, a device, computer-program product, and a method. An embodiment provides a network device. The network device includes a countermeasure engine operable to generate a countermeasure useable in at least substantially reducing a harm caused by a malware (hereafter “malware countermeasure”). The network device also includes a decision module operable to determine if a criterion is met for distribution of the generated malware countermeasure to a plurality of networked nodes. The network device further includes a distribution module operable to transmit the generated malware countermeasure to a first set of nodes of the plurality of networked nodes if the criterion is met.
System and method for below-operating system trapping of driver loading and unloading
A system for protecting an electronic device against malware includes a memory, an operating system configured to execute on the electronic device, and a below-operating-system security agent. The below-operating-system security agent is configured to trap an attempted access of one or more resources of the operating system, access one or more security rules to determine whether the attempted access is indicative of malware, operate at a level below all of the operating systems of the electronic device accessing the one or more resources. The attempted access includes an attempted loading or unloading of a driver in the operating system.
Native code module security for arm instruction set architectures
Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure runtime environment. Finally, the system safely executes the native code module in the secure runtime environment by using a set of software fault isolation (SFI) mechanisms that constrain store instructions in the native code module. The SFI mechanisms also maintain control flow integrity for the native code module by dividing a code region associated with the native code module into equally sized code blocks and data blocks and starting each of the data blocks with an illegal instruction.
Router for communicating data in a dynamic computer network
A router and methods for its use are disclosed. The router includes input and output circuitry for receiving and routing data packets to computing devices connected to the network. The router also includes a memory configured to store a number of tables relating the destinations of particular packets with routes for the packets to follow. The router is capable of correctly routing data packets which specify false identity parameters. The router is also capable of dynamically varying routing protocols used to route data packets. The router is also capable of routing data packets to one of a number of output ports based on a comparison of at least one of the identity parameters that specifies false information to a table stored in the router's memory.
Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using return routability check filtering
A device receives an attack on a Session Initiation Protocol (SIP)-based device, determines a type of the attack, and applies, based on the determined type of the attack, a return routability check filter to the attack.
Image pattern unlocking techniques for touch sensitive devices
Techniques are disclosed for providing an image pattern unlock mode in electronic touch sensitive devices. The image pattern unlock mode can display an unlock screen to the user, prompting the user to arrange or create or otherwise select a specific image pattern in order to unlock the device. The customizable image pattern may include any uniquely identifiable unlocking pattern including a combination of images, or even a single image selected from an image group. The unlocking mechanism may include images gathered from the user's photo collection and/or one or more online profiles, and the unlock pattern could be a selection of such images. In other embodiments, a combination of color and images can also be used, such as matching colors to images. When the user has arranged the proper image pattern, the device unlocks and may be used. If the correct image pattern is not arranged, the device remains locked.
Leveraging biometrics for authentication and touch differentiation
Biometric authentication and touch differentiation embodiments are described which use a handheld mobile computing device having a signal injection site that injects a signal into a user's hand for a prescribed period of time, and at least one signal sensing site each of which captures a signal emanating from a finger of either of the user's hands that is touching the signal sensing site during at least the period of time the signal is injected. The captured signal or signals are analyzed to determine whether they match, to a prescribed degree, a pre-established signal model that is indicative of a signal or signals expected to be captured. The signal matching determination can be employed to authenticate a user, or identify which finger of a user's hand is touching the computing device.
Security device and display method thereof
A display method that is used for a security device installed with a camera module and a display module includes A. when the security device captured a preset image by the camera module, the security device displaying an interface for entering a password by the display module, and B. when the password is successfully matched, the security device displaying a predetermined object by the display module. By hiding the interface for entering a password, the invention improves the security capability of the device and meets the requirement of information security at present.
Lockable widgets on a mobile device
A software widget running on a user device may be designed to operate in a locked or an unlocked mode. In unlocked mode, the user has full interactivity with the widget. In locked mode, however, at least some of the interactivity with the widget is restricted, despite the fact that the widget still operates normally otherwise while in the locked mode. While in locked mode, user input may be compared against a predefined unlocking sequence to determine if the widget should be unlocked.
Method and system for securing data from a non-point of sale device over an external network
A data control system prevents non-point of sale devices (135, 155) from sending data over an external network (160) via a secure connection reserved for point of sale devices (125, 145), but allows non-point of sale devices (135, 155) to send data over the external network (160) other than via the secure connection. The secure connection is, for example, a virtual private network connection. The data control system may allow the data from non-point of sale devices (135, 155) to be sent only if it is not destined for a restricted destination. The restricted destination may be, for example, a payment host (170) or secure host (180) on the external network (160).
Authentication method and apparatus for detecting and preventing source address spoofing packets
An authentication apparatus for detecting and preventing a source address spoofing packet, includes a packet reception unit configured to receive a packet from a previous node or a user host; a self-assurance type ID generation unit configured to generate a self-assurance type ID of a source node of the received packet; and a self-assurance type ID verification unit configured to determine whether the source address of the received packet has been spoofed. Further, the authentication apparatus includes a white list storage unit configured to store a reliable source node; a black list storage unit configured to store an unreliable source node; and a packet transmission unit configured to transmit the packet whose source has been verified through the self-assurance type ID verification unit to a next network node.
A method and access node for preventing spoofing while connecting subscribers to an Ethernet network. The access node includes a filter mechanism for filtering packets destined to subscribers attached to the access node. The filter mechanism includes a database of allocated IP destination addresses and MAC addresses. The filter mechanism blocks any packet directed to a subscriber but containing an incorrect IP or MAC address. The mechanism prevents users from changing their address information to illegally appropriate packets from other users or to disguise their identity.
Device programmable network based packet filter
A method is provided for filtering unwanted packets in a communication system. The communication system includes a first network, a wireless network and at least one wireless communication device. An instruction to add an entry to a blocked list is received from a specific wireless device. The entry includes blocking criteria. A first packet is received from the first network. The first packet is destined for the specific wireless communication device. If the first packet exhibits the blocking criteria included in the blocked list, the first packet is discarded before it can be distributed by the wireless network.
Apparatus and security system for data loss prevention, and operating method of data loss prevention apparatus
Disclosed are a DLP security system and an operating method thereof. An operating method of a data loss prevention (DLP) apparatus, comprising: converting, into packets, Ethernet signals received from a fail over device that are transmitted and received between an external network and internal network; analyzing the packets to classify the packets into first packets required to be precisely judged and second packets not required to be precisely judged; distributing and allocating a judgment job about the first packet to at least one in-line instance according to a predetermined reference; and allocating the judgment job distributed to the in-line instance in which a fail occurs to the in-line instance which is normally operated when it is verified whether there is an in-line instance which is normally operated in the case where the fail occurs in the at least one in-line instance.
Security token for securely executing an application on a host computer
The invention relates to a security token comprising a communication interface adapted to communicate with a host computer; a security module, comprising encryption based security features; and a non volatile memory storing at least an application to be uploaded and executed in a host computer. The application makes use of the security features when executed in a host computer in communication with the communication interface. The security token is adapted to modify the content of the application as uploaded or its execution parameters at successive connections of the security token to a host computer.
Identity verification and authentication
In one embodiment, receiving, at a first computing device associated with a social-networking system and from a second computing device, a first request to verify an identity of a user of the social-networking system; sending, by the first computing device and to a mobile device associated with the user, a second request for information about the user; receiving, at the first computing device and from the mobile device, the information about the user; determining, by the first computing device, a confidence score indicating a probability that the identity of the user is true based on the information about the user received from the mobile device and information available to the social-networking system; and sending, by the first computing device and to the second computing device, the confidence score.
Method, apparatus and system for controlling access to computer platform resources
A manageability engine, and/or operations thereof, for controlling access to one or more resources of a computer device. In an embodiment, the manageability engine executes an authentication agent to perform authentication of a local user of a computer platform which includes the manageability engine. In another embodiment, the manageability engine includes a device driver to control an input/output device for the local user to exchange an authentication factor via a trusted path between the input/output device and the manageability engine.
A first application that is hosted by a first machine receives a login request from a user. The first application requests authentication verification from a second application that is hosted by a second machine. The first application authenticates the user if the user was authenticated by the second application, wherein the user can be authenticated by both the first application and the second application after having provided authentication credentials to one of the first application or the second application.
Delivering author specific content
Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and delivering updates about the author specific content to a user specified activity stream.
Adaptive strike count policy
An adaptive strike count management is implemented for securing resources. The method authorizes access to a resource if a security credential matches pre-stored security data. However, when the security credential does not match the pre-stored security data, the adaptive strike count management method denies access to the resource; assesses the risk level based on the security credential; increments a strike counter by a predetermined value based on the risk level; and disables further access attempts to the resource if the strike counter exceeds a threshold. The strike counter is incremented by a first value when the risk level is assessed to be a first level, a second value when the risk level is assessed to be a second level, and a third value when the risk level is assessed to be a third level.
Systems and methods of establishing a secure connection between a remote platform and a base station device
Systems and methods of establishing a secure connection between a remote platform and a base station device are disclosed. An example of a method includes registering a base station device with a cloud service. The method also includes requesting from the cloud service, a claim code for the base station device. The method also includes providing access from a remote platform to the base station device by the cloud service based on the registration of the base station device and the claim code.
Identity management via cloud
A system and method of maintaining a user profile for a handheld computer in a shared, scalable computing resource is described. The method includes receiving user profile data from the handheld computer at the shared, scalable computing resource, the user profile data comprising a user security factor. The user profile data is received via a secure wireless communication protocol having authentication of an identity of the handheld computer. The method includes storing the user profile data on the shared, scalable computing resource as a portion of a user profile, the user profile further comprising user preference data. The method further includes receiving the user security factor from a second computing device. The user security factor is received via a secure wireless communication protocol having authentication of an identity of the second computing device. The method further includes downloading user preference data to the second computing device.
Unlimited access to media and applications over wireless infrastructure
Methods, systems, and apparatus are presented for providing unlimited access to either or both of media content, such as music, and applications. A media server environment can be provided, which maintains an instance of each subscriber account, a central archive of media content, and an application catalog. Selected media content can be downloaded to, and stored locally at, a subscriber device, such as on a secure storage device. Also, selected applications can be locally installed on the subscriber device. Access to the local media content and locally installed applications can be controlled through the media server environment based on the status of the subscriber's account. If the subscriber's account becomes inactive, access to the downloaded media content and installed applications can be disabled. Once the subscriber's account is reactivated, access to the downloaded media content and applications can be restored.
Decrypting an encrypted virtual machine using asymmetric key encryption
Authenticating a user to access a virtual machine (VM) stored on a client computing device includes receiving user authentication credentials associated with a certificate, such as a PIN associated with a certificate housed on a smart card. The certificate is associated with a public key and a private key. The technique includes encrypting the VM to be decrypted with an unlock code, and generating a challenge string by encrypting the unlock code using the public key associated with the certificate. The challenge string is a result of encrypting of the unlock code, and the unlock code can be obtained by decrypting the challenge string using the private key. The technique further includes decrypting the challenge string using the private key to retrieve an unlock code associated with the VM, decrypting the VM with the unlock code, and causing the decrypted VM to be executed on the client computing device.
Method and apparatus for providing authentication between a sending unit and a recipient based on challenge usage data
A method, apparatus and/or system generates a challenge for user authentication, having a challenge data element from a stored pool of challenge data elements. The challenge is based on rule data and stored usage data associated with at least some of the challenge data elements in the stored pool of challenge data elements. The generated challenge is sent for use in an authentication of a user to a sender. A method, apparatus and/or system also generates sender authentication and corresponding location information, having a data element from a stored pool of challenge data elements. Selection of the data elements is based on rule data and stored usage data associated with at least some of the data elements in the stored pool of data elements.
Intelligent system for enabling automated secondary authorization for service requests in an agile information technology environment
A service request for a managed computer system is received and once a primary authorization for same has been given, a secondary authorization management system (SAMS) determines whether or not the service request requires secondary authorization. This determination is made according to a context of the managed computer system and an authorization profile for the received service request. If needed, the SAMS resolves the secondary authorization request and returns the resolution decision.
Method, system, and computer program product for facilitating communication in an interoperability network
Methods and apparatus are described for facilitating communication among a plurality of entities via an interoperability network. Each entity has policy data corresponding thereto governing interaction with the entity via the interoperability network. A message is transmitted from a first one of the entities to a second one of the entities. The first entity has first policy data corresponding thereto and the second entity has second policy data corresponding thereto. The transmitted message was handled in the network according to combined policy data representing a combination of the first and second policy data.
Dynamic identity context propagation
Techniques are provided for dynamically propagating identity context for a user in a Service-Oriented Architecture. Methods and apparatus are provided that include receiving a request to invoke a web service, retrieving first security claims from application identity context information pertaining to a user, generating second security claims at runtime, packaging the first and second security claims into an authentication token, and transmitting the authentication token to a second computer system in a service request. The second computer system can be configured to extract the first and second security claims from the authentication token, validate the extracted first and second security claims, generate identity context information based upon the extracted first and second security claims, and publish and propagate the identity content information in an identity context object. The second computer system can verify that the security claims conform to corresponding security claim schemas stored in a claims dictionary.
Collaborative structured analysis system and method
Methods, systems, and apparatus for providing compartmented, collaborative, integrated, automated analytics to analysts are provided. In a first aspect, the present invention provides a computer-implemented method for providing compartmented, collaborative, integrated, automated analytics to analysts including: selecting a computer-encoded project-specific workflow; determining a computer-encoded compartment manager, said computer-encoded compartment manager including computer-encoded information about the context of said project-specific workflow; retrieving said computer-encoded information about the context; selecting a computer-implemented automated analytic using said computer-encoded project-specific workflow; providing under control of said computer-encoded compartment manager said information about the context to said automated analytic; processing said computer-encoded information using said computer-implemented automated analytic, to generate thereby analytical information representing an outcome to said analysts; and processing said analytical information in accordance with said computer-encoded compartment manager and said computer-encoded project-specific workflow.
Systems and methods for exporting digital content using an interactive television application
The present invention relates to methods and systems for extracting digital content using an interactive television application. The interactive television application may allow the user to record programs on a set-top box. The interactive television application may also allow the user to extract the audio from one of the recorded programs and transfer the extracted audio to removable media (e.g., a CD-R). The interactive television application also be configured to perform a future transfer of digital content to removable media. The future transfer may occur without requiring any further user interaction.
Receiving device, receiving method, providing device, providing method, programs, and broadcasting system
This technique relates to a receiving device, a receiving method, a providing device, a providing method, programs, and a broadcasting system that can control operations of external devices connected to the receiving device in synchronization with progress of a show being received.When the application control type in an application control descriptor is 2, the receiving device receives command information contained in a digital broadcast signal, and acquires and starts a new information service application and the like in accordance with the received command information. When an external device is designated as the command destination device, the receiving device generates a command for the external device, and outputs the command to the external device. In accordance with the command from the receiving device, the external device acquires and starts the new information service application and the like. This disclosure can be applied not only to controlling the receiving device from the broadcasting side, but also to controlling external devices connected to the receiving device.
Method and device for ensuring reliability during transmission of television data in a television system based on internet protocol
A coding/transmitter device (11) includes a broadcasting module (12) in order to broadcast television to a plurality of STB receiver/decoder devices (15) via an IP/Internet network (14), so that the clients-subscribers are provided with a first UDP stream and a second UDP stream which includes identification data associated with data packets transmitted within the first UDP stream in order to provide functionalities such as reorganization of packets, detection of losses, requests for retransmission etc. without adding headers according to the RTP protocol, but with a reliability and capability of inserting additional data comparable to that provided by the RTP protocol.
Content processing apparatus and control method thereof for performing transmission and control of content through a communication path
An image processing apparatus includes a reception unit configured to receive a transmission request of information on a directory for managing contents from a display apparatus, a transmission unit configured to transmit a response to the transmission request received by the reception unit, and a notification unit configured to notify the display apparatus of a change in a predetermined directory, thereby causing the display apparatus to transmit a transmission request of information on the predetermined directory again. When a new directory is formed on the same layer as that of the directory for managing the contents as a result of addition of the contents in the storage medium, the notification unit notifies the display apparatus of a change in a directory located on a layer above the directory for managing the contents.
Delivery of digital content
A system and method for providing multimedia content through a cable, satellite television or other content server system is disclosed. A server facility which provides multimedia content divides formatted multimedia content into data chunks (e.g., collections of data corresponding to one minute lengths) prior to transmission to a user/subscriber receptor unit, and sends the divided data chunks according to a schedule which permits instantaneous starting and viewing of the multimedia content, such as movies, upon user/subscriber request. The user/subscriber receptor unit includes a cable box, video game device, or the like having a digital video recording capability and at least a memory capacity or disk space sufficient to store a complete unit of media content, such as full-length feature film. The invention does not require intensive interaction between the server facility and the receptor unit, but rather, only requires sending of content signals in the form of an interleaved media stream from the server facility to the receptor unit. Further, the invention requires the use of no more than six times the bandwidth of the original signal for operation.
Method and system for performance monitoring of network terminal devices
A method and system for performance monitoring of a multimedia content distribution network (MCDN) includes a probe device configured to capture input and output data with respect to a network terminal device at an MCDN client premises. The input data, representing network data sent to the MCDN client for display, may be buffered along with the output data, representing audio and video data generated using the input data. When an anomaly event, such as a display error, occurs, the probe device may record the buffered input and output data, including data acquired prior to the anomaly event. The input and output data may be analyzed to determine a source or origin of the anomaly event. The probe device may also certify that the MCDN and/or the network terminal device was operating normally.
Method for mapping between signaling information and announcement information and broadcast receiver
A method for mapping signaling information to announcement information and a broadcast receiver are disclosed herein. A method of providing a Non-Real-Time (NRT) service, the method comprises extracting identification information of first signaling information and second signaling information based upon a program specific information/program and system information protocol (PSI/PSIP) table, receiving the first signaling information and second signaling information based upon the extracted identification information, constructing and displaying a service guide using the received first signaling information, acquiring first content identification information as a content selected from the displayed service guide, accessing a File Delivery over Unidirectional Transport (FLUTE) session using the received second signaling information, acquiring second content identification information matched with the acquired first content identification information from the accessed FLUTE session and receiving and storing one or more file constructing corresponding content based upon the acquired second content identification information.
Analyzing internet protocol television data to support peer-assisted video-on-demand content delivery
A video-on-demand (VOD) server in an Internet protocol television (IPTV) network with a network of set-top boxes includes IPTV operational data and an analysis module that selects a content item. The VOD server divides the content item into sequential chunks, divides the chunks into stripes, pre-populates set-top boxes in a peering network with at least one stripe from each chunk, receives a request for the content item, and directs each set-top box to sequentially stream its stripes. A method includes selecting a content item based upon IPTV operational data, dividing the content item into sequential chunks, dividing the chunks into stripes, pre-populating set-top boxes in a peering network with at least one stripe from each chunk, receiving a request for the content item, and directing each set-top box to sequentially stream its stripes.
Locating points of interest using references to media frames within a packet flow
In one embodiment, a method comprises receiving a stream of transport packets encapsulating media packets, and generating a reference to the point-of-interest media packet relative to the location of the point-of-interest within the transport packet stream. The reference is generated for each media packet that is identified as a point-of-interest.
Home communication systems
Systems and methods are disclosed of a network including a primary device, a plurality of remote devices, and a shared peripheral device. The network allows the remote devices to operate the peripheral device, such as a DVD player, VCR, or camcoder, via the primary device and the network. The peripheral device is typically connected to the primary device and shared among all devices. The network also includes a splitter/isolation module (SIM) that routes the signals between the primary device and the plurality of remote devices.
Method and apparatus for reproducing content through integrated channel management
Provided are a method and apparatus for reproducing at least one piece of content received via at least one interface. The method includes classifying the at least one piece of content respectively received via the at least one interface according to a reference attribute, allocating the classified at least one piece of content to a virtual channel, and selecting a channel from among set channels that include the virtual channel and an occupied basic channel.
Digital television signal, digital television receiver, and method of processing digital television signal
A digital television (DTV) receiver for processing a DTV signal, a receiver to receive a digital television signal including a plurality of extended text table (ETT) instances that appear in transport stream packets with common PID values, the ETT instances having common table ID values, each ETT instance comprising a section header and a message body, the section header containing a table identification (ID) extension field that serves to establish uniqueness of each ETT instance, the message body containing an extended text message (ETM) which provides detailed descriptions of a virtual channel or an event associated with each ETT instance, wherein the section header further contains a protocol version field indicating a protocol version and a current next indicator field; a demodulator to demodulate the digital television signal; and an identifier to identify at least one pertinent ETT instance from the plurality of ETT instances.
Digital television signal, digital television receiver, and method of processing digital television signal
A method of processing a digital television (DTV) signal in a DTV receiver, receiving a digital television signal including a plurality of extended text table (ETT) instances that appear in transport stream packets with common PID values, the ETT instances having common table ID values, each ETT instance comprising a section header and a message body, the section header containing a table identification (ID) extension field that serves to establish uniqueness of each ETT instance, the message body containing an extended text message (ETM) which provides detailed descriptions of a virtual channel or an event associated with each ETT instance, wherein the section header further contains a protocol version field indicating a protocol version and a current next indicator field; demodulating the digital television signal; and identifying at least one pertinent ETT instance from the plurality of ETT instances.
System, method, and article of manufacture for a user interface for a network media channel
A user interface for a network media channel allows subscribers to share media files according to ad-hoc specification via kernels. The user interface may be accessed via a device and it may be utilized to create and/or modify media files and/or kernels and to transmit them to one or more networks including one or more servers that stores the media files according to the kernels. The user interface may be used further to receive one or more media files and to display them according to the kernels. The user interface may be used further to navigate thru the media files by clicking (activating) the media files.
Broadcast receiving device and method for searching channels thereof
A broadcast receiving device which automatically detects whether digital channels are scrambled according to a command and a method for searching channels thereof are provided. The broadcast receiving device includes a channel map storage unit which stores broadcast channel data regarding broadcast channel, an input unit which receives a command, and a channel searching unit which scans digital channels among the broadcast channel data according to the command and detects whether the digital channels are scrambled.
System and method of providing an interactive menu through streaming video
A method of providing a menu for video content is disclosed and may include delivering a looping video clip over a first video channel. The looping video clip may be configured to be displayed on a video plane. The method may also include delivering side channel data over a second video channel. The side channel data may include two or more navigable menu elements that may be configured to be displayed on a graphics overlay plane.
Internet-based submission of cable network content
A cable network content delivery system providing advertising information via a cable network and an advertising content interface are described. An advertiser submits advertising content over an internet which is then adapted for a cable network. A data gateway stores the advertising information. The system processes a user command received via the cable network, including an advertising information search command, and provides advertising information retrieved via the cable network.
Systems and methods for sharing video with advertisements over a network
A user can create a video segment or employ an existing video segment, upload the segment to a server, indicate an advertisement to be associated with the video, and then send it to a recipient over a computer network. The user provides an indication that one or more particular video segments and advertisements are to be shared over the network. An identifier for the video segment is automatically created and the segment and the identifier are automatically uploaded to a host computer over the network such as the Internet. The video segment, the identifier (optionally with other identifying material such as an identity of the sender, and an advertisement selected by the sender can be stored at the direction of the host computer.
Method and apparatus for providing parental control using a playlist
A method for providing parental control via a playlist is disclosed. A playlist is received from a control server. One or more channel change control messages are sent to a client in accordance with a playlist. The one or more channel change control messages include tuning information for tuning to one or more programs or channels at times indicated in the playlist.An apparatus for providing parental control via a playlist is disclosed. The apparatus may be a content delivery system headend. The content delivery system headend system may have a Switched Digital Video (SDV) manager for coordinating SDV sessions requested by subscribers over an access network. The headend may have an input for receiving content to be broadcast during the SDV sessions. The headend may also have a subscriber control unit for sending one or more channel change control messages to a client device in accordance with a playlist, the one or more channel change control messages including tuning information for tuning to one or more programs or channels at times indicated in the playlist.
Information processing apparatus, information processing method, and program
Provided is an information processing apparatus including a communication unit for receiving, from an external device, degree-of-attention information including information on a degree of attention, for each part of first content, calculated based on a state of viewing of a user, and a priority information generation unit for generating, using the degree-of-attention information, priority information including information on a priority for viewing for each part of second content. The communication unit transmits the priority information to the external device.
Computer system and method for preventing dynamic-link library injection attack
A computer system and method for preventing a Dynamic-Link Library (DLL) injection attack are provided. The computer system monitors an operation where a process attempts to dynamically link an executable code library to another process, and intercepts the dynamic link of the executable code library.
Method for executing hybrid web application and apparatus therefor
The device for executing a hybrid web application written in a web standard language including a system API call includes a web user interface layer that requests a process according to the system API call from a hybrid web application interface layer, and performs a process according to the web standard language, a hybrid web application interface layer that requests the process corresponding to the system API call from a cross platform system service interface layer in response to the request of the web user interface layer, receives a result of the process corresponding to the system API call from the cross platform system service interface layer, and transmits the received result to the web user interface layer, and a cross platform system service interface layer that performs a platform dependent operation corresponding to the system API based on the request of the hybrid web application interface layer.
Information processing device, information processing method, information processing program, and recording medium
In an information processing device adapted for performing an application program, a displaying unit causes a display device to display information related to a state transition of the application program. A generation unit receives an input updating request for updating information related to a displayed state transition, and generates an application program which realizes a state transition according to the updating request.
Method and apparatus for managing related drivers associated with a virtual bus driver
Provided are an apparatus and method for managing related drivers associated with a bus driver. In one embodiment, the apparatus may comprise a physical device object table configured to contain a plurality of entries, a child device associated with each of the plurality of entries, each of the child devices configured to have a name associated therewith, the name configured to provide information about the child device sufficient to allow user environment applications an doperating system drivers to directly access the child device, and a virtual bus driver configured to interface between the child devices and an adapter.
A method of handling events is described. The method comprises: receiving an event; transmitting the event to a remote management application; receiving a new event; ascertaining if the new event fulfills an event storm criterion; suppressing the new event if the new event fulfills the event storm criterion; and transmitting the new event to the remote management application if the new event does not fulfill the event storm criterion.
Information processing apparatus, electrical power control method, and computer product
An information processing apparatus includes a processor programmed to detect scheduled starting times of two events to be executed at a current time or thereafter; calculate a difference of the scheduled starting times of the two events, when the scheduled starting times of the two events have been detected; and correct, based on the calculated difference and to an extent that a restriction indicated in restriction information of an event to be corrected is observed, the scheduled starting time of at least any one of the two events, as the event to be corrected, such that an interval between the scheduled starting times of the two events is shortened.
Method and system for time-based correlation of events
A method includes receiving event information corresponding to an event associated with the operation of a system. The method also includes identifying related event information corresponding to a plurality of events that occurred before the event, wherein the event is related to the plurality of events. The method also includes storing the event information and the related event information as a group of events. The method further includes determining whether the group of events occurred within a first specified amount of time by identifying a time window ending at the occurrence of the event and beginning the first specified amount of time before the occurrence of the event and determining whether each event of the group of events occurred during the identified time window. The method further includes identifying an incident associated with the group of events upon determining that the group of events occurred within the first specified amount of time.
Name service object clustering
Methods and systems for load balancing of Common Object Request Broker Architecture (CORBA) object servers. A name service cluster is invoked. It is indicated to a user whether bind interceptors are in use. The user is provided with a class having relevant methods if bind interceptors are in use. The class that contains the most relevant methods is specified. Name service clusters are established for object servers where each name service cluster contains a unique object binding table containing object server reference bindings. Object server reference bindings having identical names are clustered into common clusters. A load balance is performed by having a name service select an object server located in an invoked cluster. A cluster component is appended to the invoked cluster to provide failover upon failover of the object server; and a selected object server reference binding is forwarded to a client upon completion of the load balance.
Lock free use of non-preemptive system resource
A computer-implemented method for lock-free use of a non-preemptive system resource by a preemptive thread, which may be interrupted. The method comprises registering a non-preemptive system resource and a first level reclaim handler for the non-preemptive system resource with the kernel of an operating system, registering a second level reclaim handler with the kernel, wherein the second level reclaim handler is included in an application program, and running the application program as a preemptive thread using the non-preemptive system resource. The first level reclaim handler is code that is a part of the implementation of the non-preemptive system resource in the kernel. The second level reclaim handler is code that is part of the application and is registered with the kernel before the application uses the non-preemptive system resource. The method enables a preemptive thread using a non-preemptive system resource to be preempted without crashing.
System, method and computer program product for scheduling a processing entity task by a scheduler in response to a peripheral task completion indicator
A system, computer program and a method for scheduling a processing entity task in a multiple-processing entity system, the method includes initializing a scheduler; receiving a task data structure indicative that a pre-requisite to an execution of task to be executed by a processing entity is a completion of a peripheral task that is executed by a peripheral; wherein the peripheral updates a peripheral task completion indicator once the peripheral task is completed; wherein the peripheral task completion indicator is accessible by the scheduler; and scheduling, by the scheduler, the task in response to the peripheral task completion indicator.
Providing object-level input/output requests between virtual machines to access a storage subsystem
A system includes a storage subsystem and a first virtual machine to manage access of the storage subsystem. A second virtual machine is coupled by a virtual machine channel to the first virtual machine. The second virtual machine has software to issue a object-level input/output (I/O) request to the first virtual machine over the virtual machine channel to access data in the storage subsystem.
Software signature discovery
In a method for determining and scoring signatures for a software package, a processor compares files on a clean computer system after installation of a software package to files on the clean computer system before the installation. The processor determines a signature of the software package. The signature includes files on the clean computer system after installation of the software package that were not present on the clean computer system before the installation.
System for remote loading of objects or files in order to update software
A system for remote loading of objects or files in order to update software includes operating system architecture that calls for different tasks to be broken down into software modules that are connected to one another by dynamic links or are composed of executable subroutines that have main dependence links to other parts of the operating system. Each of the modules is composed of object files or libraries that are represented by dynamic link libraries among themselves according to a number of dependence levels that are described in their respective attributes.
System and method for performing an in-service software upgrade in non-redundant systems
An information handling system is provided. The information handling system includes one or more devices coupled together to route information between the one or more devices and other devices coupled thereto based on routing information stored in the one or more devices. The one or more devices includes a routing processor, one or more line cards coupled to the routing processor, the one or more line cards receiving the routing information from the routing processor for routing data packets to a destination, and a memory coupled to the routing processor. The routing processor is configured to create an active image having a current state of the routing information and create a standby image having the current state of the routing information, wherein the standby image requests the current state of the routing information from the active image using a key that is calculated using a portion of the routing information.
Customization creation and update for multi-layer XML customization
Embodiments of the present invention provide techniques for customizing aspects of a metadata-driven software application. In particular, embodiments of the present invention provide (1) a self-contained metadata engine for generating customized metadata documents from base metadata documents and customizations; (2) a customization syntax for defining customizations; (3) a customization creation/update component for creating and updating customizations; (4) a customization restriction mechanism for restricting the creation of new customizations by specific users or groups of users; and (5) memory and caching optimizations for optimizing the storage and lookup of customized metadata documents.
Isolating tenants executing in multi-tenant software containers
Technologies are described herein for isolating tenants executing in a multi-tenant software container. Mechanisms for resource isolation allow tenants executing in a multi-tenant software container to be isolated in order to prevent resource starvation by one or more of the tenants. Mechanisms for dependency isolation may be utilized to prevent one tenant executing in a multi-tenant software container from using another tenant in the same container in a manner that requires co-tenancy. Mechanisms for security isolation may be utilized to prevent one tenant in a multi-tenant software container from accessing protected data or functionality of another tenant. Mechanisms for fault isolation may be utilized to prevent tenants in a multi-tenant software container from causing faults or other types of errors that affect other tenants executing in the same software container.
Transmission point pattern extraction from executable code in message passing environments
Processes in a message passing system may be launched when messages having data patterns match a function on a receiving process. The function may be identified by an execution pointer within the process. When the match occurs, the process may be added to a runnable queue, and in some embodiments, may be raised to the top of a runnable queue. When a match does not occur, the process may remain in a blocked or non-executing state. In some embodiments, a blocked process may be placed in an idle queue and may not be executed until a process scheduler determines that a message has been received that fulfills a function waiting for input. When the message fulfills the function, the process may be moved to a runnable queue.
Processors and compiling methods for processors
A compiling method compiles an object program to be executed by a processor having a plurality of execution units operable in parallel. In the method a first availability chain is created from a producer instruction (p1), scheduled for execution by a first one of the execution units (20: AGU), to a first consumer instruction (c1), scheduled for execution by a second one of the execution units (22: EXU) and requiring a value produced by the said producer instruction. The first availability chain comprises at least one move instruction (mv1-mv3) for moving the required value from a first point (20: ARF) accessible by the first execution unit to a second point (22: DRF) accessible by the second execution unit. When a second consumer instruction (c2), also requiring the same value, is scheduled for execution by an execution unit (23: EXU) other than the first execution unit, at least part of the first availability chain is reused to move the required value to a point (23: DRF) accessible by that other execution unit.In other compiling methods (FIG. 8), the object program includes a loop kernel block and a basic block preceding the loop kernel block, and the basic block includes a producer instruction (p1) and the loop kernel block includes a consumer instruction (c1, c2) requiring a value produced by the producer instruction. The loop kernel block is scheduled first, after which the basic block is scheduled. These methods can put additional move instructions between producer and consumer instructions in the basic block instead of the loop kernel block, or eliminate the move instructions altogether.
Processing code units on multi-core heterogeneous processors
A virtual machine can be extended to be aware of secondary cores and specific capabilities of the secondary cores. If a unit of platform-independent code (e.g., a function, a method, a package, a library, etc.) is more suitable to be run on a secondary core, the primary core can package the unit of platform-independent code (“code unit”) and associated data according to the ISA of the secondary core. The primary core can then offload the code unit to an interpreter associated with the secondary core to execute the code unit.
Method and system for converting a single-threaded software program into an application-specific supercomputer
The invention comprises (i) a compilation method for automatically converting a single-threaded software program into an application-specific supercomputer, and (ii) the supercomputer system structure generated as a result of applying this method. The compilation method comprises: (a) Converting an arbitrary code fragment from the application into customized hardware whose execution is functionally equivalent to the software execution of the code fragment; and (b) Generating interfaces on the hardware and software parts of the application, which (i) Perform a software-to-hardware program state transfer at the entries of the code fragment; (ii) Perform a hardware-to-software program state transfer at the exits of the code fragment; and (iii) Maintain memory coherence between the software and hardware memories. If the resulting hardware design is large, it is divided into partitions such that each partition can fit into a single chip. Then, a single union chip is created which can realize any of the partitions.
User interaction analysis of tracer data for configuring an application tracer
A tracing system may be updated to include, exclude, or modify tracing configurations for functions based on how a user consumes tracing results. The user's interactions with graphical representations, inspections of data, and other interactions may indicate which functions may be interesting and which functions may not be. The user's interactions may be classified by use, such as during debugging, performance testing, and ongoing monitoring, and multiple user's interactions with the same function, library, module, source code file, or other groups of functions may be combined to predict a user's interest in a function.
Identifying potential lock conditions in transactional software applications
Systems, and products for testing a transactional software application which interacts with a database structure. The software application includes a plurality of application units, which are adapted to be executed at least in part concurrently. Executing the software application includes executing a plurality of transaction operations on the database structure by a plurality of respective invocations of a database management system of the database structure by the respective plurality of application units. The system also includes computer program instructions for determining locks being applied by the database management system on elements of the database structure for each transaction operation executed by each application unit individually. The system also includes computer program instructions for identifying potential lock conditions of the software application in possible successions of application of the locks according to possible interleaving of the application units.
Facilitating the execution of web applications in the cloud
A facility for executing an application program in a cloud computing environment is described. The facility identifies dependencies of the application program, and identifies support software components that satisfy the identified dependencies. The facility then causes the application to be executed in conjunction with the identified support software components on the nodes of the cloud computing environment on which they were installed.
Techniques for debugging an application
Techniques for debugging applications are provided. Access to an application is controlled by a wrapper. The wrapper intercepts calls to the application and records the calls. The calls are then passed to the application for processing. The recorded calls form a log which may be analyzed or mined to detect error conditions or undesirable performance characteristics associated with the application independent of source associated with the application.
Capturing and displaying state of automated user-level testing of a graphical user interface application
In one embodiment, an automated user-level testing tool is enhanced to capture additional information about the state of the automated testing, beyond just a screenshot of the application-under-test. In another embodiment, an automated user-level testing tool is enhanced to capture testing state information for multiple points in time (referred to as “snapshots”), beyond just when the application-under-test crashes. This captured information from one execution of an automated test (one “test run”) is stored in one test log, which can then be viewed using a test log viewer. In one embodiment, the graphical user interface (GUI) for the test log viewer includes four areas: a screenshot area, a test script area, a stack trace area, and a timing area. The content shown in the screenshot area, the test script area, and the stack trace area is specific to a particular point in time during a test (e.g., a particular snapshot).
System for supporting collaborative activity
A system includes a processor which has access to a representation of model of activity, which includes workspaces. Each workspace includes domain hierarchies for representing an organizational structure of the collaborating users using the system, and initiatives hierarchies representing process structures for accomplishing goals. An interface permits users to view and modify the workspaces for which the user has access. Each user can have different access permissions in different workspaces. The domain and initiative hierarchies provide two views of the workspace objects without duplicating resources. A resource is a collection of shared elements defined by the users that give users associated with the workspace access to information sources. Users can define knowledge boards for creating reports based on information fields of the resources. The knowledge board is associated with a resource template from which the resource is created.
Systems and methods for integrated circuit C4 ball placement
Methods and systems for improving the reliability of C4 solder ball contacts performed at the design stage to reduce the incidence of thermally-induced failures, including those due to electromigration and thermal cycling.
Partitioning method and system for 3D IC
A method comprises: receiving a circuit design comprising networks of first devices fabricated by a first fabrication process; selecting second devices to be fabricated by a second process; substituting the second devices for the first devices in the networks of the circuit design; sorting the second devices within a selected one of the networks by device area from largest device area to smallest device area; and assigning each second device in the selected network to be fabricated in a respective one of a plurality of tiers of a 3D IC for which a total area of second devices previously assigned to that tier is smallest, the second devices being assigned sequentially according to the sorting.
System and method for testing stacked dies
Systems and methods are disclosed for testing a stack of dies and inserting a repair circuit which, when enabled, compensates for a delay defect in the die stack, particularly where the defect is located in the inter-die data transfer path. Intra-die and inter-die slack values are determined to establish which die or dies in the die stack would benefit from the insertion of a repair circuit.
Priority based layout versus schematic (LVS)
An approach for methodology, and an associated system, enabling a prioritizing of devices, circuits, and modules of interest is disclosed. Embodiments include: determining a first electrical layout indicating an electrical performance of a physical layout of an IC design, the first electrical layout indicating a plurality of devices of the physical layout; selecting a subset of the plurality of the devices based on one or more connections of the devices; and generating a second electrical layout indicating the electrical performance of the physical layout, the second electrical layout indicating the selected devices without at least one of the plurality of devices.
Finite-state machine encoding during design synthesis
Technology for finite-state machine (FSM) encoding during design synthesis for a circuit is disclosed. The encoding of the FSM may include determining values of a multi-bit state register that are to represent particular states of the FSM. These values may be determined based on possible states of the FSM, possible transitions between the states, probabilities of particular transitions occurring, amounts of false switching associated with particular transitions, area estimates for logic respectively associated with states of the FSM, and/or the like. The values may also be determined based on power considerations, such as estimated power consumption for the circuit. The design synthesis may include generation of a structural description of the encoded FSM.
Implementing a circuit using an integrated circuit including parametric analog elements
An environment and method are provided for designing and implementing a circuit comprising an integrated circuit (IC) including a number of parametric analog elements for which operating parameters can be set. Generally, the method comprises: specifying requirements for the circuit including physical properties to be sensed by the circuit and actions to be taken by the circuit; designing the circuit based on the specified requirements and resources available on the IC; and setting parameters of at least one of the parametric analog circuit elements of the IC based on the circuit design. In one embodiment, the specifying, designing, and setting parameters steps are performed using a computer executable code embodied in a computer readable medium on a server coupled to a client computer through an internet protocol network. Other embodiments are also provided.
Method and system for providing user interface representing organization hierarchy
Method and system for providing graphical user interface for displaying hierarchical charts. According to various embodiments, the present invention provides a graphical user interface where relational data are displayed as one or more hierarchical charts. A hierarchical chart includes a plurality of nodes that are organized according to the hierarchical chart. Each of the nodes is associated with a data record that contains multiple level of information. At different view level, different amount of information for the nodes are displayed. A view control function is provided for the graphical user interface. If none (or all) of the nodes are selected, each nodes display the same level of information based associated with a particular view level. If only few of the nodes are selected, only the selected nodes responds changes in view level when being displayed.
Disclosed is a method which, in one embodiment, enables a user to navigate the Harmonized Tariff Schedule (HTS). The method initially involves uploading a delimited HTS file, and using it to create a wizard which optionally allows the user to navigate a series of options menus, or alternatively, the entire menu hierarchy can be displayed on the same screen. The selections made at every menu is saved for future reference. The method also optionally enables the documentation of Export Control Classification Numbers, which are recorded along with applicable control information for the product.
System and method for editing interactive three-dimension multimedia, and online editing and exchanging architecture and method thereof
A system and method are provided to edit interactive three-dimensional multimedia. A user interface of the system is provided with an event level template that includes event series levels with multiple event developing points. Through the user interface, multiple interactive events related to a first character of the event developing point are edited. Through a three-dimensional engine, interactive relevances are built up between interactive events and multiple materials inside one or more database. When the interactive three-dimensional multimedia with multiple materials is output, the interactive events corresponding to the event developing points are performed according to a user command. An online editing and exchanging method integrated with the system and method is also provided to share pre-edited templates on an exchange server; each of the pre-edited templates is extracted from an interactive three-dimensional multimedia pre-edited by the system and method.
Graphical menu interface, implementing method thereof, and operating method thereof
A graphical menu interface, an implementing method thereof, and an operating method thereof are provided. In the implementing method of the graphical menu interface, m function groups are provided first, and each of the function groups has at least one function. Then, an operating frame related to each function group is obtained and used as the menu icon representing a corresponding function group in the graphical menu interface. Finally, there are n function groups displayed on the screen, and the corresponding operating frames are used as the menu icons of these n function groups in the graphical menu interface. As a result, users can infer the position of each function in the graphical menu interface more intuitively, and thus the convenience in operating the graphical menu is improved.
System and method for visualizing connected temporal and spatial information as an integrated visual representation on a user interface
A system and method for configuring the presentation of a plurality of presentation elements in a visual representation on a user interface, the presentation elements having both temporal and spatial parameters, the method comprising the steps of: defining a time bar with a time scale having time indicators as subdivisions of the time scale and having a first global temporal limit and a second temporal global limit of the time scale for defining a temporal domain of the presentation elements, defining a focus range of the time bar such that the focus range has a first local temporal limit and a second local temporal limit wherein the first local temporal limit is greater than or equal to the first global temporal limit and the second local temporal limit is less than or equal to the second global temporal limit; defining a focus bar having a focus time scale having focus time indicators as subdivisions of the focus time scale and having the first and second local temporal limits as the extents of the focus time scale, such that the focus time scale is an expansion of the time scale; and displaying a set of presentation elements selected from the plurality of presentation elements based on the respective temporal parameter of each of the set of presentation elements is within the first and second local temporal limits.
Method of converting digital data
A method is disclosed to convert digital data using a memory card operatively engaged with an apparatus such as a digital camera having control buttons but that does not have a keyboard or keypad. The memory card comprises a central processor, a conversion module and a storage module. The method includes placing the apparatus in a predetermined mode; activating the conversion module in the memory card; selecting at least one file stored in the memory card; and converting the selected at least one file.
Information management with non-hierarchical views
Information items in a file system are arranged into groups that are created according to a grouping component. A non-hierarchical view displays visual representations (e.g., icons, thumbnail images) of the information items arranged in visually delineated groups according to an arrange type that can be specified for each group. Various view formats are available including icon, list and column view formats. In each view format, a condensed mode can be selected for one or more groups, resulting in multiple visual representations of items being displayed in a fixed amount of screen space in the non-hierarchical view. In icon view, each condensed group includes a single row of visual representations that can be navigated separately from other groups in the non-hierarchical view.
Method and apparatus for visually indicating location probability
A method and apparatus are provided for visually indicating location probability, particularly in a multi-level, three-dimensional environment. In general, a method of a graphical user interface may be provided that displays the uncertain location of a device within an environment in an easily discernable format. A method may be provided that includes providing for transmission of a location request from a first location within an environment and receiving at least two potential locations that are within the environment. The method may further include providing for display of a graphical representation of the environment including visual indicators of the potential locations within the graphical representation of the environment and receiving an indication that a potential location corresponds to the first location. Each visual indicator may convey the accuracy confidence level for each respective location.
Dynamic creation of product structure
Systems and method for dynamic creation of product structure using a graphical user interface (GUI) are disclosed. A method for dynamic creation of products structures may include displaying information specifying a set of product items using the GUI. Input can be received via the GUI. The input may be indicative of one or more product levels within a product structure. A user may indent or otherwise manipulate the set of product items into one or more product levels. A product structure can then be generated based on the one or more product levels. In some embodiments, display of the set of product items can be updated to reflect the product structure.
Management of application programs on a portable electronic device
A method, system, and graphical user interface (GUI) for management of application programs on a portable electronic device (PED) is discussed. A management application program operating on a computing device can provide management of the application programs on the PED by presenting a GUI. The user can interact with the GUI to (i) manage (e.g., position applications, arrange applications, add applications, and the like) the application programs, and (ii) arrange application icons on the PED.
Systems and methods for performing geotagging during video playback
A method is implemented in a video playback system that includes a video editing interface for assigning geotagging data to a video. The method comprises receiving, by the video playback system, the video from a tangible storage medium. The method further comprises reading metadata associated with the video, selecting a frame from the video, providing a user interface with a map, displaying a default location of the selected frame on the map according to the metadata, receiving geotagging data via the user interface, and associating the geotagging data with the selected frame of the video to generate a geo-based timeline.
Metadata for providing media content
Providing digital media content is disclosed. A metadata file and a plurality of data files are received. The metadata file is used to process the plurality of data files. The processing of the plurality of data files using the metadata file is performed without human intervention to provide a downloadable digital media content asset.
Dynamic adjustment of video quality
A video quality module receives data indicating a visibility status of a tab of a web browser running on a user device. The video quality module determines, based on the data indicating the visibility status of the tab whether the tab of the web browser is currently visible to a user of the user device, the tab of the web browser comprising a streaming media player. If the tab of the web browser is not currently visible to the user, the video quality module decreases a quality of a video component of a streaming media file playing in the streaming media player.
Intelligent console for content-based interactivity
The intelligent console method and apparatus of the present invention includes a powerful, intuitive, yet highly flexible means for accessing a multi-media system having multiple multi-media data types. The present intelligent console provides an interactive display of linked multi-media events based on a user's personal taste. The intelligent console includes a graph/data display that can provide several graphical representations of the events that satisfy user queries. The user can access an event simply by selecting the time of interest on the timeline of the graph/data display. Because the system links together all of the multi-media data types associated with a selected event, the intelligent console synchronizes and displays the multiple media data when a user selects the event. Complex queries can be made using the present intelligent console. The user is alerted to the events satisfying the complex queries and if the user chooses, the corresponding and associated multi-media data is displayed.
Sound output setting apparatus, method, and computer-executable program
An apparatus, system, and method are disclosed for an information processing apparatus capable of allowing a user to select appropriate processing beforehand when an application program outputs sound in a state in which an audio device is silenced. The apparatus in one embodiment includes a silencing module for silencing audio information output from an audio device, a detection module for detecting a sound playback request from an application program while silencing is set, a display module for displaying a select screen for allowing a user to select processing when the sound playback request from the application program is detected by the detection module, and a processing module for executing the processing selected by the user on the select screen.
Print control program and method
A print control program according to the present invention makes an information processor control a printer. The printer is connected to the information processor and can do printing under the conditions set. The set conditions can reduce the consumption of printing media by the printer. The program includes a first step through a fourth step. The first step is to wait until an instruction is entered into the information processor to start printing under the set conditions. The second step is to analyze the set conditions if the information processor detects the entered instruction at the first step. The third step is to form a preview image representing an image or images as printed under the analyzed conditions at least one of which has been changed to further reduce the printing medium consumption. The fourth step is to display the formed preview image on the display of the information processor.
A transcript editor enables text-based editing of time-based media that includes spoken dialog. It involves an augmented transcript that includes timing metadata that associates words and phrases within the transcript with corresponding temporal locations within the time-based media where the text is spoken, and editing the augmented transcript without the need for playback of the time-based media. After editing, the augmented transcript is processed by a media editing system to automatically generate an edited version of the time-based media that only includes the segments of the time-based media that include the speech corresponding to the edited augmented transcript.
Document generation based on referral
A document machine may detect a request for provision of a document while that document is available for provisioning. The document machine may update a count of referrals to the document and, based on the count of referrals transgressing a threshold value, generate a substitute document based on the original document. This substitute document may then be provided in response to further requests for the original document after the original document is no longer available for provision. The updating of the count of referrals is based on the identifier of a network that referred a request detected while the first document was still available for provision. The document machine may then provide the substitute document in lieu of the original document in response to a further request for provision of the first document.
Communication system via cascade connection and communication device
A communication system having a main control portion (MCP) to transmit information destined to a device n cascade levels down, and create an error detection code (CRC code) for data that contains a count of remaining cascade levels until an n-th cascade level and the information. The code is transmitted to an upstream sub-control portion (USCP) with the data. The USCP creates a CRC code for the data, and compares the created and received codes. For a match, the USCP determines whether the information is destined to itself based on the remaining cascade level count. When the information is not so destined, the USCP creates new data with the remaining cascade level count reduced by 1, and a CRC code for the new data, and transmits the created code to a further device, with the new data.
Receiver with tap-coefficient adjustments
A receiver can include a sampler module for sampling a data-bearing input signal to extract data encoded in the data-bearing analog input signal. The sampling results in data-symbol sequences. The data-symbol sequences can be used to identify error events. The identified error events can be used as a basis for adjusting tap coefficients. The tap coefficients can be used in setting reference levels for the sampler module.
Forward error correction with parallel error detection for flash memories
Methods, systems, and devices are described for forward error correction for flash memory. Encoded data from flash memory may be used to generate a number of data streams. At each of a number of error detection sub-modules operating in parallel, a different one of the data streams is processed. Each error detection sub-module may detect whether a portion of the respective received stream contains an error, and forward the portion to an error correction module. The error correction module, physically separate from the error detection sub-modules, may correct the forwarded portions of the respective received streams containing an error. The age and error rate associated with the flash memory may be monitored, and a coding rate or other aspects may be dynamically adapted to account for these factors.
Apparatus and method for processing a physical layer convergence protocol header
Apparatus and method for processing a physical layer protocol convergence (PLCP) header. In one embodiment, a wireless device includes a PLCP header processor. The PLCP header processor is configured to: process a physical layer header, process a check value based on the physical layer header, and process an error correction code based on the physical layer header and the check value. A concatenation of the physical layer header, check value, and error correction code the PLCP header processor is configured to process consists of a number of information bits that is an integer multiple of a number of information bits per symbol used to encode the PLCP header.
Probabilistic error correction in multi-bit-per-cell flash memory
Data that are stored in cells of a multi-bit-per cell memory, according to a systematic or non-systematic ECC, are read and corrected (systematic ECC) or recovered (non-systematic ECC) in accordance with estimated probabilities that one or more of the read bits are erroneous. In one method of the present invention, the estimates are a priori. In another method of the present invention, the estimates are based only on aspects of the read bits that include significances or bit pages of the read bits. In a third method of the present invention, the estimates are based only on values of the read bits. Not all the estimates are equal.
Utilizing a dispersed storage network access token module to access a dispersed storage network memory
A method includes a DSN access token module retrieving one or more sets of at least a threshold number of dispersed storage (DS) error coding function slices from the DSN memory via the computing device. The method continues with the computing device and/or the DSN access token module decoding the one or more sets of the at least a threshold number of DS error coding function slices using a default DS error coding function to recapture a DS error coding function. The method continues with the computing device and/or the DSN access token module generating a plurality of sets of data access requests in accordance with the DS error coding function. The method continues with the computing device sending the plurality of sets of data access requests to the DSN memory.
Selective merge and partial reuse LDPC (low density parity check) code construction for limited number of layers belief propagation (BP) decoding
Selective merge and partial reuse LDPC (Low Density Parity Check) code construction for limited number of layers Belief Propagation (BP) decoding. Multiple LDPC matrices may be generated from a base code, such that multiple/distinct LDPC coded signals may be encoded and/or decoded within a singular communication device. Generally speaking, a first LDPC matrix is modified in accordance with one or more operations thereby generating a second LDPC matrix, and the second LDPC matrix is employed in accordance with encoding an information bit thereby generating an LDPC coded signal (alternatively performed using an LDPC generator matrix corresponding to the LDPC matrix) and/or decoding processing of an LDPC coded signal thereby generating an estimate of an information bit encoded therein. The operations performed on the first LDPC matrix may be any one of, or combination of, selectively merging, deleting, partially re-using one or more sub-matrix rows, and/or partitioning sub-matrix rows.
Method for performing error corrections of digital information codified as a symbol sequence
A method and system for making error corrections on digital information coded as symbol sequences, for example digital information stored in electronic memory systems or transmitted from and to these systems is described, provides the transmission of sequences incorporating a portion of error corrector code allowing the sequence which is more probably the original transmitted through the calculation of an error syndrome using a parity matrix to be restored when received. Advantageously according to embodiments of the invention, the error code incorporated in the original sequence belongs to a non Boolean group.
Detecting a memory device defect
A technique includes receiving data indicative of a time varying count of errors, which are attributable to at least one memory device. The technique includes filtering the indicated count and detecting a defect in the memory device(s), where the detecting includes selectively generating an indicator to represent that the memory device(s) is defective based at least in part on a result of the filtering.
Error detecting circuit and semiconductor apparatus including the same
An error detecting circuit of a semiconductor apparatus, comprising: a fail detecting section configured to receive 2-bit first test data signals outputted from a first block and 2-bit second test data signals outputted from a second block, disable a first fail detection signal when the 2-bit first test data signals have different levels, disable a second fail detection signal when the 2-bit second test data signals have different levels, and disable both the first and second fail detection signals when the 2-bit first test data signals have the same level, the 2-bit second test data signals have the same level, and levels of the 2-bit first test data signals and the 2-bit second test data signals are the same with each other.
Logical port and layer protocol test configuration resource manager
A test configuration resource manager and a method of managing test configuration resources in a network test system. A computer readable storage medium may store instructions that, when executed, cause a computing device to receive a user input identifying a portion of a first test configuration, store the identified portion of the first test configuration as a test configuration resource in a library of test configuration resources, receive a user input identifying a stored test configuration resource, retrieve the identified stored test configuration resource, and incorporate the retrieved test configuration resource into a second test configuration. The library of test configuration resources may include one or more of port resources, protocol resources, and traffic resources.
Identifying software responsible for changes in system stability
A computer program product includes computer usable program code for: detecting a stability change in a computer system; identifying a first set of at least one capability of the computer system that is affected by the stability change; identifying, in response to detecting the stability change, a software application that was installed or updated prior to the stability change; identifying a second set of at least one capability that is utilized by the identified software application; comparing the first set to the second set to determine a degree of similarity; comparing a first time that the stability change was detected to a second time that the identified software application was installed or updated to determine a temporal proximity; and identifying the likelihood that the identified software application is the cause of the stability change, wherein the identified likelihood is a function of the degree of similarity and the temporal proximity.
Redundancy for loss-tolerant data in non-volatile memory
A memory device includes a memory array including a plurality of memory sections characterized by a plurality of memory types and control logic integrated with and distributed over the memory array. The control logic is operable to selectively allocate redundant sections in the plurality of memory sections.
System and method for clock domain management
A source clock system clock domain is selected by communication of the desired clock domain from a receiver clock system through a clock line, such as through a clock differential pair. For instance, the source clock system signals available clock domains by selectively altering the polarity of a first clock line of the pair and the receiver clock system selects from the available clock domains by altering the polarity of a second clock line of the pair. Polarity is altered by selectively interfacing a resistor with the clock lines and then removing the resistor interface when the clock signal associated with the selected clock domain is sent by the source clock system.
Optimizing power usage by factoring processor architectural events to PMU
A method and apparatus to monitor architecture events is disclosed. The architecture events are linked together via a push bus mechanism with each architectural event having a designated time slot. There is at least one branch of the push bus in each core. Each branch of the push bus may monitor one core with all the architectural events. All the data collected from the events by the push bus is then sent to a power control unit.
Bidirectional inline power port
A method and apparatus for bidirectional provision of inline power over data telecommunications cabling permits power to be received at a local powered device (PD) from remote power sourcing equipment (PSE) via at least one conductor at a first time and power to be provided by the local device to a remote device or another device at a second different time.
Transitioning a performance state of a processor
A processing circuit independent of a processor determines a current utilization of the processor, based on events of an execution pipeline of the processor. According to the determined utilization, the processing circuit causes the processor to transition from a first of the plurality of performance states to a second of the plurality of performance states.
Apparatus and method for controlling transfer of power between energy storage devices through a converter
A power manager includes a converter and a controller. The converter is coupled between first and second energy storage devices, and the controller controls transfer of power between the first and second energy storage devices through the converter. The first energy storage device is to supply power to a first power subsystem of an electronic device, and the second energy storage device is to supply power to a second power subsystem of the electronic device. The subsystem may have different operating voltage requirements. When a level of the second battery falls below a first reference value, the controller controls the transfer of power from the first energy storage device to the second energy storage device. A transfer of power in a reverse direction may occur when a level of the first energy storage device falls below a second reference value.
Clamp circuits for power converters
A power converter comprises an input port configured to receive a source of power, an output port configured to provide output power, and a bridge circuit coupled to the input port. The bridge circuit comprises a first switch coupled in series with a second switch, and a third switch coupled in series with a fourth switch. A first clamp rectifier is coupled in series with a second clamp rectifier, and the first and second clamp rectifiers are coupled in parallel with the first and second switches. A first clamp capacitor is coupled between the first and second clamp rectifiers, with the first clamp capacitor operative to reduce power loss in the first and second clamp rectifiers. A first resonant inductor is coupled between the first and second switches. The power converter also includes a transformer operatively coupled to the bridge circuit, with the transformer comprising a primary winding and at least one secondary winding. A current rectifying circuit is operatively coupled to the secondary winding of the transformer and the output port.
Method and apparatus for allocation of power consumption of a computer storage system to its tenants
Example embodiments of the present invention provide a method, an apparatus, and a computer program product for determining power consumption of a computer storage system attributable to an application. The method includes obtaining metadata relating to power consumption of a computer storage system and obtaining metadata relating to storage configuration of the computer storage system. Storage utilization of the computer system attributable to an application is then determined and a transformation is performed according to the metadata relating to power consumption of the computer storage system, the metadata relating to storage configuration of the computer storage system, and the storage utilization of the computer storage system attributable to the application.
Performance improvements in a wireless client terminal using assistance from a proxy device
Various features are provided to improve communication performance and power conservation in a client terminal by relying on the assistance of a proxy device. For instance, rather than reporting channel measurements via a primary communication channel to a network, the client terminal may be adapted to perform (a) channel measurement feedback using out-of-band signaling via the proxy device and/or (b) active synchronization with assistance of a proxy device. In this manner, the client terminal may be able to disable or reduce power consumption over a primary communication interface for the primary communication channel while utilizing a secondary communication interface to communicate with the proxy device.
Pairing of angle sensor and electronic control unit
Various embodiments relate to a tamper-proof vehicle sensor system and a related method for sending secure packets between components. A sensing unit may include an angular sensor, such as an anisotropic magnetoresistive (AMR) sensor, which determines the angular position of a magnetic field and produces related angle sensor data. The sensing unit may place the angle sensor data in a packet and may encrypt the packet using a selected encryption key. The sensor may append an encryption key identifier (ID) associated with the selected encryption key onto the packet and send the secure, unidirectional packet to an electrical control unit (ECU). The ECU may then use the appended encryption key ID to retrieve the selected encryption key to decrypt the packet. The ECU may then extract the angle sensor data from the packet to modify the configuration of the vehicle.
Method, system and integrated circuit for enabling access to a memory element
A system comprises signal processing logic that is operably coupled to at least one memory element and is arranged to enable access to the at least one memory element. The signal processing logic is arranged to receive a security key, generate a system key using the received security key and a system specific seed, perform a comparison of the generated system key to a reference key stored in an area of memory of the at least one memory element. The signal processing logic is also arranged to configure a level of access to the at least one memory element based at least partly on the comparison of the generated system key to the reference key stored in memory.
Securing implementation of a cryptographic process having fixed or dynamic keys
In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against attack by protecting the round keys by (1) combining several cipher operations using a pair of sub-keys (round keys) into one table look-up, or (2) a key masking process which obscures the round keys by providing a masked version of the key operations for carrying out encryption or decryption using the cipher. This approach is especially advantageous in an insecure “White Box” environment where an attacker has full access to execution of the cipher algorithm, including the algorithm's internal state during its execution.
Hardware driver integrity check of memory card controller firmware
A memory system comprises an encryption engine implemented in the hardware of a controller. In starting up the memory system, a boot strapping mechanism is implemented wherein a first portion of firmware when executed pulls in another portion of firmware to be executed. The hardware of the encryption engine is used to verify the integrity of at least the first portion of the firmware. Therefore, only the firmware that is intended to run the system will be executed.
Securing the implementation of a cryptographic process using key expansion
In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against an attack by protecting the cipher key by means of a key expansion process which obscures the cipher and/or the round keys by increasing their lengths to provide an expanded version of the keys for carrying out encryption or decryption using the cipher. This is especially advantageous in a “White Box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful where the key is derived through a process and so is unknown when the software code embodying the cipher is compiled. This is typically the case where there are many users of the cipher and each has his own key, or where each user session has its own key.
File tamper detection
This disclosure relates generally to methods and systems for determining when a file has changed. According to one aspect of the present disclosure, a method of determining if contents of a file have changed can include determining if a digital signature created as a function of contents of the file has changed, and when the digital signature has changed, overlaying the contents of the file with a first mark that indicates the contents have changed and blocks a view of the contents of the file.
Lightweight group signature system and method with short signature
A lightweight group signature system and method with short signatures according to the exemplary embodiments of the present invention can provide security characteristics similar to group signature mechanisms providing the existing known controllable linkability but can make a revocation method simple by outputting a short signature and providing excellent operation efficiency at the time of signature generation, signature verification, and revocation on smart terminals, and can be widely applied to various anonymity-based application environments, making by making operation efficiency excellent at the time of signature generation and verification and outputting very short signature lengths.
Method for author verification and software authorization
Embodiments of the present invention are directed to a computer-implemented method for author verification and authorization of object code. In one embodiment, program object code is linked with a plurality of data blocks to create linked object code and a MAP file. Thereafter, author verification is performed by executing a plurality of comparisons between the linked object code and the MAP file. In another embodiment, a digital signing procedure is performed on linked object code by creating a signature data block. The signature data block is then encrypted and written to the linked object code to create digitally-signed object code. In another embodiment, an application program embodied in linked object code generates a data packet. The data packet is then compared to a previously-generated signature data packet from the linked object code to determine if the linked object code is authorized.
Pairwise temporal key creation for secure networks
A system and method for establishing a pairwise temporal key (PTK) between two devices based on a shared master key and using a single message authentication codes (MAC) algorithm is disclosed. The devices use the shared master key to independently compute four MACs representing the desired PTK, a KCK, and a first and a second KMAC. The Responder sends its first KMAC to the Initiator, which retains the computed PTK only if it verifies that the received first KMAC equals its computed first KMAC and hence that the Responder indeed possesses the purportedly shared master key. The Initiator sends a third message including the second KMAC to the Responder. The Responder retains the computed PTK only if it has verified that the received second KMAC equals its computed second KMAC and hence that the Initiator indeed possesses the purportedly shared master key.
Signature generation apparatus, signature method, non-transitory computer readable medium storing signature generation program
A signature generation apparatus includes basic operation execution units each executing a basic operation included in a signature generation procedure; and a whole operation controller connected to the basic operation execution units to control operations in the basic operation execution units and monitor operation states of the basic operation execution units, in which when there is a basic operation execution unit among the basic operation execution units which is executing a secret operation which uses data to be concealed as an argument, the whole operation controller causes basic operation execution units other than the basic operation execution unit to simultaneously execute a random number operation which uses a random number originally used for signature generation as an argument.
Credentials management in large scale virtual private network deployment
Techniques for credentials management in large scale virtual private network (VPN) deployment are disclosed. In some embodiments, credentials management in large scale VPN deployment includes generating a public/private key pair and a certificate signing request at a satellite device; automatically communicating the certificate signing request to a portal over a public, untrusted network to authenticate the satellite device using a serial number associated with the satellite device, in which the certificate signing request and the serial number are verified by the portal; and receiving a certificate from the portal for using to establish VPN connections and configuration information for the satellite device, in which the certificate includes a credential signed by a trusted certificate authority, and the configuration information includes gateway configuration information identifying a plurality of gateways to which the satellite device is configured to connect using VPN connections.
Method and system for secret communication between nodes
The present invention discloses a method and system for secret communication between nodes in a wired Local Area Network (LAN). The method of secret communication between nodes in the wired LAN includes the following steps: 1) a sharing key is established; 2) the route probe is exchanged; 3) the data communication is classified; 4) the secret communication is processed among the nodes. According to the different communication situations among the nodes, the method of secret communication between nodes provided in the present invention can process the classification and select an appropriate secret communication strategy; compared with per-hop encryption, the calculation load of the exchange equipment is reduced, and the transmission delay of data packets is shortened; compared with the method that inter-station keys are established in pairs of nodes in order to protect the communication secret, the key number is reduced, and the key management is simplified.
Keyless challenge and response system
A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared between the sender and the receiver. Rather than sending a challenge and then waiting for a response, the challenge and response are both sent by the sender of the information. The information sent comprises an index with a challenge and a response from the Challenge-Response Table. Upon receiving the coded information, the receiver uses the Challenge-Response Table to decode the information by using the index to locate the challenge and its valid response. Upon determining that the challenge and the response are correct, a first decoded answer is determined. Upon determining that either the challenge or the response, or both, are incorrect, a second decoded answer is determined.
Large-scale data processing cloud computing system
A cloud computing system includes a native client; and a platform system providing distributed resources and dynamic resource allocation, for receiving raw data uploaded by the native client and returning computed results, including: a data extracting module for receiving the raw data; an encrypting and decrypting module, wherein only a single user is permitted to simultaneously invoke the data extracting module and the encrypting and decrypting module and process the raw data; the encrypting and decrypting module generates a key during encrypting and returns the key to the user for keeping and the computed results to the native client after receiving the key inputted by the user; and a data computing module, for computing raw data encrypted by the encrypting and decrypting module and returning results to the encrypting and decrypting module, wherein the data computing module is shared by all users and can be invoked simultaneously by several users.
Data security and integrity by remote attestation
This invention includes apparatus, systems, and methods to ensure the security and integrity of data stored, processed, and transmitted across compute devices. The invention includes a system comprising at least one of said devices, application software installed on said devices and coupled to the device's hardware and software stack to execute data encryption and remote attestation, and said devices coupled with an attestation server through a communication network. The invention includes a process to configure said devices for data encryption and remote attestation and performing an initial inventory and content scan of the device's hardware and software stack with results transmitted across a communication network to the attestation server. The invention includes periodic inventory and content scans of the device's hardware and software stack with results transmitted again to the attestation server via the communication network. The attestation server stores said results in a database for comparison to subsequent results sent by devices. The attestation server notes any differences in the most recent results and sends an alert to the device if the device is configured differently based on the previous scan, or configured the same if no differences were noted.
System and method for assigning quality to cryptographic identities used in a digital transaction
A method of assessing risk in an electronic transaction involves assignment of quality attributes to cryptographic identities presented in a digital transaction. The quality assignment supports assessment of risk in the transaction. The evaluation of risk in the transaction is made by assessing machine readable attributes of the digital identities along with transaction details. The digital identity attributes may be constructed using extensions of existing standards. A guarantee against risk of loss may be obtained by procuring insurance on the transaction before execution. Third party insurers may analyze the risk of loss in a transaction by assessing the attributes of digital identities along with transaction details and may provide a requestor with an insurance premium quote. Based on the value of the quote, the transaction participants may decide whether or not to execute the transaction.
Enabling packet handling information in the clear for MACSEC protected frames
Techniques are provided to append packet handling information “in the clear” ahead of security related information in a packet to be routed over a network to optimize wide area network deployments of security-configured equipment. In one form, at a network device that performs connectionless secure communication and network routing of packets, data is received from a source device to be sent through a network to a destination device. Packet handling information is inserted in a packet that is to be used to transport the data. The packet handling information is configured to enable controlled handling of the packet in the network and is inserted in an unprotected portion of the packet. Encrypted payload data is generated from the data received from the source device. The encrypted payload data and security information are inserted in a protected portion of the packet and the packet is sent to the network.
Digital content access control having improved transmission bandwidth
Control of access to at least one digital content is managed as a function of at least one access criterion. The digital content is transmitted to at least one terminal in the form a data stream. The access criterion is stored in the terminal as a function of an identifier. The terminal receives the data stream in association with a control message indicating the identifier. It then retrieves the stored access criterion as a function of the identifier received in the control message. Finally, it verifies whether the stored access criterion is satisfied in order, where appropriate, to authorize access to the content.
Personalization of shared electronic devices
The described embodiments include an electronic device that performs configuration operations. During operation, an administrative electronic device receives an indication that an electronic device that is presently checked out to a user is to be checked in. The administrative electronic device then requests a backup file with information from the electronic device, wherein the information comprises information about one or more changes made to the electronic device since the electronic device was checked out. Next, the administrative electronic device receives the backup file from the electronic device. The administrative electronic device then restores the electronic device to an initial state, wherein, in the initial state, changes made to the electronic device since the electronic device was checked out are reversed to return the electronic device to the initial state.
Operating system switching method in information processing system including a switcher checking wakeup status in the processor
An OS switching method for switching an OS within several seconds in an information processing system is provided. In the information processing system which includes a processor, a main memory, a nonvolatile memory, and a plurality of input/output apparatuses, an OS switcher is executed when power is applied to the information processing system. When a first OS acquires an OS switch command that indicates a switch to a second OS while the first OS is activated and running, the first OS stores identification information of the second OS and information indicating an OS switch in the nonvolatile memory, and performs STR. The OS switcher switches an OS from the first OS to the second OS after the STR is completed. Accordingly, in the system, one OS can be quickly switched to another OS within several seconds, and a previous working environment can be maintained.
Dynamically redirecting boot to another operating system
Various embodiments provide an ability to automatically boot a computing device with an operating system stored on a portable storage device when the portable storage device is detected to be present. The computing device can be configured to dynamically boot from the portable storage device when the portable storage device is detected, and revert to a programmed boot order in its associated boot module when the portable storage device is not detected. In some embodiments, the operating system is fully encapsulated on the portable storage device, such as the operating system being completely separate from an operating system initially booting the computing device.
Dynamic selection of execution stage
Methods and apparatus relating to dynamic selection of execution stage are described. In some embodiments, logic may determine whether to execute an instruction at one of a plurality of stages in a processor. In some embodiments, the plurality of stages are to at least correspond to an address generation stage or an execution stage of the instruction. Other embodiments are also described and claimed.
Systems and methods for handling instructions of in-order and out-of-order execution queues
Processing systems and methods are disclosed that can include an instruction unit which provides instructions for execution by the processor; a decode/issue unit which decodes instructions received from the instruction unit and issues the instructions; and a plurality of execution queues coupled to the decode/issue unit, wherein each issued instruction from the decode/issue unit can be stored into an entry of at least one queue of the plurality of execution queues. The plurality of queues can comprise an independent execution queue, a dependent execution queue, and a plurality of execution units coupled to receive instructions for execution from the plurality of execution queues. The plurality of execution units can comprise a first execution unit, coupled to receive instructions from the dependent execution queue and the independent execution queue which have been selected for execution. When a multi-cycle instruction at a bottom entry of the dependent execution queue is selected for execution, it may not be removed from the dependent execution queue until a result is received from the first execution unit. When a multi-cycle instruction at a bottom entry of the independent execution queue is selected for execution, it can be removed from the independent execution queue without waiting to receive a result from the first execution unit.
Instruction fetching following changes in program flow
This application is concerned with a device and method for fetching instructions from a data store for processing by a data processor. The device comprises: a register for storing an address of an instruction to be processed by said data processor; a fetch unit responsive to an address input to said fetch unit to fetch an instruction stored at said address; an adder for adding a predetermined amount to said address stored in said register prior to sending said address to said fetch unit, said predetermined amount determining a position in a program flow said fetched instruction has with respect to said instruction addressed in said register; said adder being responsive to detection of a change in program flow to reset said predetermined amount to an initial value, and to increase said predetermined amount for subsequent fetches by an amount equal to the separation between addresses such that consecutive addresses are fetched up to a maximum predetermined amount.
State machine for monitoring a trace port and verifying proper execution of a secure mode entry sequence instruction
A method and system of verifying proper execution of a secure mode entry sequence. At least some of the exemplary embodiments may be a method comprising delivering an instruction from a memory to a processor across an instruction bus (the instruction at least partially configures the processor for secure mode of operation different that privilege modes of the processor), verifying delivery of the instruction across the instruction bus, and checking for proper execution of the instruction using a trace port of the processor.
Reducing number of processing units generating calculation result when communication time to another node takes longer than calculation time
A management unit causes a plurality of processing units to execute a calculation process. A determining unit determines whether a communication time for a communication process of exchanging a calculation result obtained from the calculation process is longer than a calculation time for the calculation process, the communication process being executed between a first computational node including the processor and a second computational node being a different computational node from the first computational node. A control unit limits number of processing units when the determining unit has determined that the communication time is longer than the calculation time.
Performing a deterministic reduction operation in a parallel computer
A parallel computer that includes compute nodes having computer processors and a CAU (Collectives Acceleration Unit) that couples processors to one another for data communications. In embodiments of the present invention, deterministic reduction operation include: organizing processors of the parallel computer and a CAU into a branched tree topology, where the CAU is a root of the branched tree topology and the processors are children of the root CAU; establishing a receive buffer that includes receive elements associated with processors and configured to store the associated processor's contribution data; receiving, in any order from the processors, each processor's contribution data; tracking receipt of each processor's contribution data; and reducing, the contribution data in a predefined order, only after receipt of contribution data from all processors in the branched tree topology.
Optimizing large page processing
Embodiments of the disclosure include a method for optimizing large page processing. The method includes receiving an indication that a real memory includes a first page. The first page includes a plurality of smaller pages. The method also includes determining a page frame table entry associated with a first smaller page of the first page and storing data associated with the first page in the page frame table entry associated with the first smaller page. The page frame table entry associated with the first smaller page of the first page is a data repository for the plurality of smaller pages of the first page.
On-access predictive data allocation and reallocation system and method
A method for predictively allocating space in a database system includes detecting an access request for a data set, evaluating a growth rate of the data set to determine a predicted increase in size of the data set, and in response dynamically altering an attribute of an allocation for the data set. Attributes altered include the size of volumes and the number of volumes comprising the data set. The method may include setting a flag indicating an instruction to rewrite the data set if the evaluation indicates that rewriting is needed to accommodate the predicted increase in size. The method may include rewriting the data set from a lower address space of a volume to a higher address space of the volume if the size of the data set is equal to or greater than an allocation increment of the upper address space. A corresponding apparatus and computer program product are also disclosed herein.
Lightweight random memory allocation
In response to a memory allocation request received from an application thread, a random number is obtained (e.g., from a random number list previously populated with multiple random numbers). A starting location in at least a portion of a bitmap associated with a region including multiple blocks of the memory is determined based on the random number. A portion of the bitmap is scanned, beginning at the starting location, to identify a location in the bitmap corresponding to an available block of the multiple blocks, and an indication of this available block is returned to the application thread.
Information processing system
An information processing system includes: CPUs; storage devices; switches; dummy storage devices which are with respective storage devices and each of which sends, when receiving an identifying information request, its own identifying information back to a sender of the identifying information request; and dummy CPUs which are associated with respective CPUs and each of which tries to, when receiving an instruction for acquiring identifying information from a dummy storage device, acquire the identifying information of the dummy storage device by transmitting the identifying information request, and sends the identifying information as response information back to a sender device of the acquiring instruction.
Memory management method, computer system and computer readable medium
It is provided a memory management method for releasing an unnecessary area in a memory area used by a program stored in the memory and executed by the computing device. The memory management method including the step of: setting in the memory, a first memory area which is used to execute the program; setting in the memory, a second memory area which can be operated by the program; setting a utilized area in the second memory area based on an instruction from the program; storing objects including data in the utilized area of the second memory area based on an instruction from the program; determining whether the program uses the objects stored in the utilized area within the second memory area; and releasing, by the computing device, the utilized area occupied by an object that is not used by the program among the objects stored in the utilized area.
Computer system, storage management computer, and storage management method
A memory stores first configuration information indicating a plurality of logical storage areas and a first condition defining a state of a storage apparatus as a trigger for the storage apparatus to move data. A CPU acquires: a second condition defining a state of a computer as a trigger for the computer to move a first object, which is stored in a first logical storage area among the plurality of logical storage areas and performed by the computer, to another one of the plurality of logical storage areas; second configuration information associating the first object and the first logical storage area; first state information indicating a state of the plurality of logical storage areas; and second state information indicating a state of the first object. If a state of performing data movement is set, the CPU identifies a cause of the state of performing the data movement.
Shared and managed memory unified access
A managed memory in which multiple computing entities each have a corresponding entity-specific portion that is subject to garbage collection. An immutable buffer is located outside of managed memory. For a given computing entity, the corresponding managed memory portion contains entity-specific objects that can be accessed by a specific computing entity, but not by the other multiple computing entities. For one or more of the entity-specific managed memory portions, the portion also includes a reference to shared memory, such as an immutable buffer. The reference is structured to be ignored by the garbage collector, though the reference may appear just as a normal object in the managed memory portion. Thus, a unified memory access model is made possible in which the methods for a computing entity to access a regular object in managed memory is similar to how the computing entity accesses shared memory.
Wireless communication device
In this wireless communication device, a storage unit stores writing identification information relating to permission and prohibition of writing. An acquisition unit acquires device identification information that uniquely specifies an arbitrary wireless communication device from the arbitrary wireless communication device. A determination unit determines permission or prohibition of writing to a recording medium on the basis of the device identification information acquired by the acquisition unit and the writing identification information stored in the storage unit when a communication protocol of a session layer that performs writing to and readout from the recording medium in sector units is selected. A recording medium control unit controls permission and prohibition of writing to the recording medium on the basis of a result determined by the determination unit.
Method and system for hijacking writes to a non-volatile memory
A method and system for accessing enhanced functionality on a storage device is disclosed. A hijack command is sent to the storage device that includes an identifier (such as a signature or an address). The storage device determines whether to hijack one or more subsequently commands by analyzing the subsequently commands using the identifier. For example, the storage device may analyze the subsequently received commands to determine whether the signature is in the payload of the subsequently received commands. As another example, the storage device may compare the address in the subsequently received commands with the address in the hijack command to determine whether to hijack the subsequently received commands.
Distributed snapshot process
Systems and methods for providing an efficient partitioned resource server are disclosed. The partitioned resource server includes a plurality of individual servers, and the individual servers support a storage service. The systems and methods provide archiving processes for partitioned resources. To this end, the systems and process include a snapshot process operating on a server and capable of coordinating with other snapshot processes operating on the other servers for generating state information representative of the state of the partitioned resources.
Processing a write request in a dispersed storage network
A method begins by a processing module receiving a write request regarding an encoded data slice and determining whether the write request pertains to deleting the encoded data slice from a memory space. The method continues with the processing module storing a deletion marker regarding the encoded data slice when the write request pertains to deleting the encoded data slice. The method continues with the processing module determining when to delete the encoded data slice based on the deletion marker and in accordance with the deletion scheme.
Memory management storage to a host device
Systems and methods of memory management storage to a host device are disclosed. A method is performed in a data storage device with a non-volatile memory and a controller operative to manage the non-volatile memory and to generate management data for managing the non-volatile memory. The method includes performing, at a given time, originating at the controller data management transfer to a host device or originating at the controller data management retrieval from the host device.
Elastic cache of redundant cache data
An apparatus for elastic caching of redundant cache data. The apparatus may have a plurality of buffers and a circuit. The circuit may be configured to (i) receive a write request from a host to store write data in a storage volume, (ii) allocate a number of extents in the buffers based upon a redundant organization associated with the write request and (iii) store the write data in the number of extents, where (a) each of the number of extents is located in a different one of the buffers and (b) the number of extents are dynamically linked together in response to the write request.
Storage processor managing NVME logically addressed solid state disk array
A method of writing to one or more solid state disks (SSDs) employed by a storage processor includes receiving a command, creating sub-commands from the command based on a granularity, and assigning the sub-commands to the one or more SSDs and creating a NVMe command structure for each sub-command.
Storage device trimming
In an embodiment, a command that specifies a logical block to trim in a storage device is acquired. An entry in a logical-to-physical address (L2P) table that contains a physical address that corresponds to the logical block may be set to point to an invalid address. A trim token that specifies the logical block may be generated. The trim token may be stored in a non-volatile storage contained in the storage device.
Memory device, memory system and mapping information recovering method
Disclosed is a memory device which comprises a data storing part having plural physical storage spaces; and a control part for storing data in the data storing part, wherein each of the physical storage spaces comprises a main area for storing user data at a write operation and a spare area for storing additional data other than the user data, the additional data including a logical address corresponding to a physical storage space and a link value indicating a physical storage space to be accessed next.
Automated system and control device for identifying a connecting element
The invention relates to an automated system in which a targeted search may be made for connecting terminals without having to actuate a load connected thereto. For this purpose, the automated system has a communication network, a programmable control unit, and at least one modular bus subscriber which are connected to the communication network. The modular bus subscriber has multiple groups of connecting elements, a display element being associated with each group of connecting elements. An evaluation and control unit is also provided which actuates at least one selected display element in response to signaling information originating from the programmable control unit. The programmable control unit is designed to provide this type of signaling information.
Emulation of an input/output advanced programmable interrupt controller
Embodiments of systems, apparatuses, and methods for emulating an input/output Advanced Programmable Interrupt Controller are disclosed. In one embodiment, an apparatus includes a first interrupt controller having a first programming model, and emulation logic to emulate a second interrupt controller having a second programming model that is different from the first programming model. The emulation logic is also to mask one of a plurality of interrupt requests to the first interrupt controller for each of the plurality of interrupt requests handled by the emulation logic.
Providing real-time interrupts over Ethernet
In one embodiment, a method includes sending a request to one or more distributed fabric protocol (DFP) system members in order to retrieve one or more events from the one or more DFP system members, wherein the one or more events are received as data encapsulated in a packet(s), receiving one or more acknowledgements to the request from the one or more DFP system members at a local network switch of the DFP system master, upon receipt of the at least one packet: decoding the at least one packet to retrieve details of the one or more events using a dedicated processor of the DFP system master, creating and sending a message signaled interrupt (MSI) comprising the details of the one or more events to a local processor of the DFP system master using the dedicated processor, and reading the MSI using the local processor of the DFP system master.
Data processing method and data processing unit using the same
A data processing unit includes a main controller configured to receive data requirement information from a host and to generate processing information based on the data requirement information; a pre-processing unit configured to pre-process n types of data output from the main controller according to the processing information and to generate n types of pre-processed data where n is an integer equal to or greater than 2; and a pre-processed data storing unit configured to store the n types of pre-processed data and to output the n types of pre-processed data in an output order determined based on the processing information, wherein the processing information includes information about at least one of type, format, order, size and transmission mode of the n types of pre-processed data.
Method and apparatus for inputting/outputting virtual operating system from removable storage device on a host using virtualization technique
A method and apparatus for inputting and outputting data by using a virtualization technique are provided. The method includes generating a virtual operating system (OS) for the external device, which is connected to a host, based on OS information stored in the external device, setting a partial area of a storage of the host as virtual storage for the external device, and storing the data in the virtual storage or a memory of the external device in response to a request for inputting and outputting the data from the virtual OS.
Virtual pipe for wire adapter communications
A wire adapter in a Wireless Universal Serial Bus configuration includes endpoints bound to communication constructs for communicating with discrete identified endpoints of downstream devices. A Virtual Pipe system is provided for the wire adapter to manage the communications pathways between a host and a downstream device connected to the wire adapter. The system provides for establishing data pathways through previously unused endpoints in the wire adapter.
Data transfer apparatus and data transfer method
A data transfer apparatus includes a plurality of input ports, a plurality of output ports and a switch unit between the plurality of input ports and the plurality of output ports. Each input port includes an input buffer configured to store input data including destination information indicating destinations of respective pieces of the input data, a first buffer monitoring unit configured to monitor a first usage rate of the input buffer, and a first frequency control unit configured to control a first operating frequency of the input buffer on the basis of the first usage rate. Each output port includes an output buffer configured to store output data, a second buffer monitoring unit configured to monitor a second usage rate of the output buffer, and a second frequency control unit configured to control a second operating frequency of the output buffer on the basis of the second usage rate.
Communication control apparatus, network, and network system
A memory access request is received from a first lower-level device among a plurality of lower-level devices and, when an address of the memory access request is an address in a given range, the memory access request is converted into a setting request from the upper-level device to a second lower-level device among the lower-level devices, the second lower-level device corresponding to the address of the memory access request.
System method for bi-directional tunneling via user input back channel (UIBC) for wireless displays
This disclosure describes a method of establishing a bi-directional user interface back channel (UIBC) to a computing device, receiving encapsulated peripheral data from the computing device using the UIBC, and decapsulating the peripheral data, as well as a method of establishing a bi-directional user interface back channel (UIBC) to a computing device, receiving peripheral data, encapsulating the peripheral data, and transmitting the encapsulated peripheral data to the computing device using the UIBC.
Systems, methods, and articles of manufacture to stream data
Systems and methods for streaming data. Systems allow read/write across multiple or N device modules. Device modules on a bus ring configure at power up (during initialization process); this process informs each device module of its associated address values. Each ringed device module analyzes an address indicator word, which identifies an address at which a read/write operation is intended for, and compares the address designated by the address indicator word to its assigned addresses; when the address designated by the address indicator word is an address associated with the device module, the device module read/writes from/to the address designated by the address indicator word. Memory controller (ring controller or master bus) is not required to ‘know’ which memory chip/device module in a daisy chain the address command word is intended for. Therefore, system embodiments allow streaming without consideration of a number of memory chips/device modules on bus. The bus isolates modules like object oriented programming.
Unobtrusive content compression in a telecommunications network
A telecommunications network policy enforcing point operable to route IP datagrams in a two-way communication between a first endpoint in a telecommunications network and a second endpoint in the telecommunications network and operable to compress, in accordance with a data compression policy, IP datagrams of a response transmitted by the second endpoint to the first endpoint. The response is of a layer 7 protocol that supports compression, a layer level being an Open Systems Interconnection, OSI, layer in an OSI Reference Model, and each IP datagram of the response comprises a sequence of bytes of data and a header defining a sequence number of the first byte of data in the IP datagram.
Client-side management of domain name information
An exemplary method includes booting a computing device, in response to the booting, accessing a file that includes domain names and resolving at least one of the domain names by issuing a request to a server where the resolving occurs as a background process. An exemplary method includes receiving a notice to invalidate client DNS resolver cache information for a domain name, accessing a list of client subscribers to an invalidation service for the domain name and issuing an instruction to the client subscribers to invalidate their respective client DNS resolver cache information for the domain name. An exemplary method includes receiving a request to resolve a domain name, resolving the domain name and transmitting information for the resolved domain name and additional information for at least one other domain name. Other methods, devices and systems are also disclosed.
Method and system for providing a priority-based, low-collision distributed coordination function
A method for providing a priority-based, low-collision distributed coordination function in a wireless network that includes a plurality of stations is provided. The method includes determining a priority for a first station and selecting a back-off time for the first station based on the priority.
Technique for dynamically restoring original TE-LSP attributes for interdomain TE-LSPs
A technique dynamically restores original attributes of a Traffic Engineering Label Switched Path (TE-LSP) that are provided in a source domain for a destination domain when traversing one or more intermediate domains that may translate the TE-LSP attributes in a computer network. According to the novel technique, a head-end node requests an interdomain TE-LSP having one or more original TE-LSP attributes (e.g., priority, bandwidth, etc.) using a signaling exchange. The head-end node may also request restoration of the original TE-LSP attributes upon entrance into the destination domain. Intermediate domains (e.g., border routers of the domains) receiving the request may translate the original TE-LSP attributes into corresponding intermediate domain TE-LSP attributes. When the request reaches the destination domain, the intermediate domain TE-LSP attributes of the requested TE-LSP are restored into the original TE-LSP attributes.
Portable data carrier comprising a CAT interpreter
The invention relates to a method on a portable data carrier (10). In said method, a web server (62) of the data carrier (10) preferably receives command information from a terminal (100) connected to the data carrier (10), the command information relating to at least one CAT command (“Card Application Toolkit” command). The at least one CAT command is then executed by a CAT interpreter (64) of the data carrier (10). The command information is embedded in an HTTP command request message of an HTTP client (110) of the terminal (100), and the web server (62) extracts the embedded command information from the HTTP command request message before relaying it to the CAT interpreter (64) of the data carrier (10) for execution of the at least one CAT command. In this manner there is enabled a flexible and resource-saving interaction between the web server (62) and the CAT interpreter (64).
System and method for media content streaming
In accordance with an embodiment, a method includes electronically receiving a media presentation description (MPD) from a network. The MPD describes multimedia content that includes alternative representations of a plurality of media types, and the MPD includes information indicative of how the alternative representations are encoded. The method also includes selecting one of the plurality of alternative representations for at least one of the plurality of media types based on information included in the MPD, requesting the selected one of the plurality of alternative representations piece-by-piece, and electronically receiving a piece of media data.
Systems and methods for updating firmware over a network
Firmware is updated over a network by providing an update server having a number of stored firmware files and a list file, the list file including entries uniquely identifying the identity and location of each of the firmware files. One networked device (e.g., a media player device) determines the current firmware version of a second networked device (e.g., a placeshifting device) via communication over the network and queries the update server as to the most recent version of the firmware file associated with the second networked device. If the most recent version is newer than the current firmware version, the first networked device downloads the most recent version of the firmware file and then uploads it to the second networked device.
Method and/or apparatus for certifying an out of band management application in an external storage array
A method for configuring a storage array, comprising the steps of (A) configuring the storage array with a minimal number of components for initial testing; (B) sending a first symbol call command to the storage array to initiate a test of a structure of the storage array; (C) receiving a response from the storage array; and (D) determining whether the test passed in response to the response.
Managing session data of a composite service session in a communication network
The present invention relates to a method for managing session data of a composite service session in a communication network, the composite service session originating from executing a composite service. The method comprises determining (101) a subset of the session data which will likely be used for executing the composite service at a certain execution state of the composite service session, and transmitting (103) the subset of the session data over the communication network towards a certain session node, the certain session node being involved in executing the composite service at the certain execution state.
Seamless hand-off of combined unified communications and virtual desktop infrastructure sessions
A host device receives from a user at a first client device a first login request for hosted virtual desktop (HVD) services. A first virtual desktop infrastructure (VDI) session is started upon receiving a valid first login request. A first unified communications (UC) session is established between the first client device and an endpoint device. A second login request is received from the user at a second client device, the second login request configured to request HVD services. A second VDI session is started to mediate an HVD session for the user upon receiving a valid second login request. A second UC session is established between the second client device and the endpoint device. A media communication session associated with the first UC session is transferred from the first client device to the second client device after the second VDI session is started and the second UC session is established.
Method of distinguishing a plurality of UEs sharing one PUID and a device thereof
The present invention provides with a method of distinguishing a plurality of calling UEs sharing a PUID in a calling S-CSCF of IMS network and the device thereof. When a calling UE using a shared PUID in the calling-party network requests to establish a session with some called UE in the called-party network, the calling S-CSCF adds a extension identification corresponding to the calling UE into the session request message from the calling UE and sends the session request message with the extension identification added therein to the called UE in the called-party network, such that the called UE may realize which one is the actual calling UE according to the extension identification in the session request message and the shared PUID used by the calling UE. Therefore, after completion of such session, the called UE may re-establish a session with the calling UE according to the extension identification of the calling UE and the shared PUID thereof.
License redistributing method, moderator and license controlling system thereof
The present invention provides a method for redistributing the license tokens to the traffic nodes to make the license tokens can be efficiently distributed to the traffic node. The method including: collecting usage information of each of the traffic nodes; determining a set of license tokens for each of the traffic nodes; and commanding a first group of traffic node(s) to release license tokens and commanding a second group of traffic node(s) to request license tokens based on the usage information and the set of license tokens. A moderator, used in a license controlling system which can efficiently redistribute the license tokens among the traffic nodes, is provided and a controlling system which including this moderator is also provided.
Policy-based scaling of computing resources in a networked computing environment
Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. It will then be determined whether the set of computing resources are sufficient to process the workload request. If the set of computing resources are under-allocated (or are over-allocated), a resource scaling policy may be accessed. The set of computing resources may then be scaled based on the resource scaling policy, so that the workload request can be efficiently processed while maintaining compliance with the resource scaling policy.
Management of a communication in a heterogeneous network
A communication of a first terminal is managed in a communication network comprising subnetworks. The first terminal can communicate with at least one second terminal and at least one subnetwork of the network is accessible via this second terminal. At the level of the first terminal, information relating to resources of the subnetwork which is accessible via the second terminal is received from the second terminal. On the basis of this information, a subnetwork is selected for the communication of the first terminal from among a set of subnetworks of the network comprising at least this subnetwork accessible via the second terminal.
Virtual machine address management
Apparatus, systems, and methods may operate to receive reports at a server node, the reports indicating a change in virtual machine status for virtual machines hosted on a virtual machine host node; and to allocate/de-allocate addresses to the virtual machines based on the change in virtual machine status and one or more policies. Some embodiments may operate to detect, at a virtual machine host node, a change in virtual machine status for virtual machines hosted on the host node; and to transmit reports to a server node from the host node, the reports indicating the change in virtual machine status, to enable the server node to allocate/de-allocate addresses to the virtual machines based on the change in virtual machine status and one or more policies. Additional apparatus, systems, and methods are disclosed.
Accessing a policy server from multiple layer two networks
A network device, such as a policy server, supports a plurality of different layer two (L2) networks. The network device receives a request to initiate a communication session from an endpoint device, selects an L2 network to which to assign the endpoint device, and assigns the endpoint device to the selected L2 network, selects one of a plurality of L3 network addresses for the policy server based on the selected L2 network, and sends the L3 network address to the endpoint device. The network device also includes a monitoring module that monitors activities of the endpoint device, and a plurality of L2 network interfaces, wherein each L2 network interface is associated with at least one L2 network. The L2 networks may be virtual local area networks.
System and method for real-time analysis of network traffic
A mirrored live-data flow of the live-data flow passing through a selected point within a network is monitored at a first processing node. The live-data flow comprises data that is in active transmission between endpoints in the network and prior to exit from the network and onward storage of the data in a database. Each packet within the mirrored data flow is decoded at the first processing node according to each protocol associated with a packet. Packets having a plurality of protocols associated therewith are decoded in parallel with each other. Each of the decoded packets are compared at the first processing node to a set of predetermined or deduced conditions. A predetermined or deduced response is executed based upon detection of a predetermined or deduced condition within the decoded packets. At least a portion of the decoded packets of the live-data flow causing execution of the predetermined or deduced response are processed at a second processing node to determine a manner for controlling an operation of the network at a same time the live-data flow is in active transmission between the endpoints in the network. The operation of the network is controlled in response to the processing step.
Network communication method and system
A network communication method for use in a system kernel where a network data transceiver thread and a listening socket are created. The method includes steps of: associating the network data transceiver thread with the listening socket and adding the listening socket into an epoll queue; listening, by the listening socket, events in the epoll queue and performing, when sensing an event requiring to transmit/receive data, a specific operation corresponding to the event and sending a notification to the network data transceiver thread associated with the listening socket; and transmitting/receiving, by the network data transceiver thread, a network data according to the notification from the listening socket. A network communication system is also provided.
Method and apparatus for submitting data
Various examples provide a method and an apparatus for submitting data. The method includes: a user terminal sends a webpage visiting request to a server, scans received webpage information returned by the server in response to the webpage visiting request, adds a mark pointing to a statistic server into the webpage information; parses the webpage information, and sends user visiting data to the statistic server by using the mark.
Method and system for tracking a cumulative number of identifiable visitors to different objects
A method for uniquely identifying an initial exposure of a visitor to an advertisement campaign is provided. The method includes causing a web browser to call an overlap server upon serving of an advertisement of the advertisement campaign; storing, by the overlap server, an overlap data structure in any one of the web browser and a web server, wherein the overlap data structure is coded to identify the advertisement campaign, a host website through which the visitor is exposed to the advertisement campaign, and an indication as to whether the advertisement campaign was previously visited by the visitor of the web browser; and processing, by the overlap server, the overlap data structure to determine the initial exposure of the visitor to the advertisement of the advertisement campaign and the host website through which the visitor was exposed to the advertisement campaign.
Selective logging of network requests based on subsets of the program that were executed
In an embodiment, in response to detecting a request by a program to access a network, if the request is the first time that the program requests to access the network, a subset of instructions is replaced in the program with supervisor call instructions. The supervisor call instructions cause respective interrupts of execution of the program. In response to each of the respective interrupts of execution of the program, the supervisor call instructions that caused the respective interrupts are replaced with the respective swapped instructions, and if a number of the respective interrupts of execution exceed a trap threshold, all remaining of the respective swapped instructions are stored to the program.
Automatically addressing performance issues in a distributed database
A database performance monitor monitors performance of a distributed database, identifies a database performance issue for the distributed database, determines from a distributed virtual network mechanism which physical networks are related to the database performance issue, determines a potential solution to the database performance issue that changes configuration of the distributed database, and applies the potential solution by automatically changing configuration of the distributed database without intervention of a user to address the database performance issue.
Application and network-based long poll request detection and cacheability assessment therefor
Systems and methods for application and network-based long poll request detection and cacheability assessment therefore are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a distributed proxy and cache system, including, determining relative timings between a first request initiated by the application, a response received responsive to the first request, and a second request initiated subsequent to the first request also by the application. The relative timings can be compared to request-response timing characteristics for other applications to determine whether the requests of the application are long poll requests.
Method and apparatus for managing an interactive network session
Methods for controlling online session inactivity timeouts between a user terminal and a server involves the server polling the user's local terminal to determine whether the user presence at the terminal can be confirmed if there is a period of inactivity within the session. If so, or if the server can otherwise confirm that the terminal is secured from use by other users, then the user session is maintained. Otherwise, the user session is allowed to timeout due to inactivity. The server may issue an alert to the user whenever a timeout is imminent, and may restore any information entered by the user prior to the timeout, if the user later returns and validates his identification.
Agreement compliance controlled electronic device throttle
Controls electronic devices and/or throttles electronic devices and/or information for electronic devices based on agreements or events or any combination thereof. An agreement includes one or more conditions to satisfy the agreement, such as one or more tasks or activities to be performed by an agreement performer or events that may be detected, and actions performed to enforce or assert the agreement such as controlling the electronic device and/or enabling or disabling or otherwise limiting, reducing or increasing the amount or type of information allowed with respect to any or all electronic devices associated with the agreement performer. For example, the system controls the electronic device and/or enables, disables or limits the amount or type of information on an electronic device, e.g., telephone, computer, game, television, vehicle based on whether the child has finished assigned homework, chores or extracurricular activities as specified as conditions of the agreement.
Method and system for synchronizing user access to information presented in two or more media formats
Information is generated in two or more media versions and provided to a user through a multi-media monitoring, mapping, and synchronization interface. The user's activity in either media version of the information is then monitored and mapped to the other media version of information and the two media versions are synchronized. Consequently, a user can transfer between two media versions of the same information easily and relatively seamlessly so that the information can be accessed and utilized in either media version efficiently and effectively without significant user action and at the appropriate location in either media version.
Determination apparatus and determination method to analyze traffic between a client device and a server group
A determination apparatus includes a processor and a storage unit. The processor acquires through a communication network a request packet transmitted from a client device to a server device group or a reply packet transmitted from the server device group to the client device. The server device group includes a first server device and one or more second server devices. The first server device is connected to the client device through the communication network. The storage unit stores configuration information for determining a source of the acquired reply packet. The processor determines whether the source of the acquired reply packet is the first server device or one of the second server devices on the basis of the configuration information stored in the storage unit.
Network appliance with integrated local area network and storage area network extension services
Techniques and a network appliance apparatus are provided herein to extend local area networks (LANs) and storage area networks (SANs) beyond a data center while converging the associated local area network and storage area network host layers. A service flow is received at a device in a network. It is determined if the service flow is associated with storage area network or with local area network traffic. In response to determining that the service flow is storage area network traffic, storage area network extension services are performed with respect to the service flow in order to extend the storage area network on behalf of a remote location. In response to determining that the service flow is local area network traffic, local area network extension services are performed with respect to the service flow in order to extend the local area network on behalf of the remote location.
Scalable policy deployment architecture in a communication network
Aspects describe using a Policy Access Gateway to facilitate scalability within a communication network and to provide a solution to deploy an enhanced policy gateway. The Policy Access Gateway can enhance standard defined Diameter Routing Agent (DRA) functions with session binding mechanisms. Further, the Policy Access Gateway is scalable and can be deployed in a very large network that supports hundreds of millions of users. Further, the Policy Access Gateway can provide additional policy information to enable policy information consolidation and caching capabilities.
Uniform service access system and access method
A uniform service access system is provided by the present invention, comprising: service providing means; a PARLAY state machine, configured to trigger an application service of the service providing means according to service request information and to generate call control information according to the application service information; a PARLAY adapter, configured to realize the conversion of the information transmission formats between the PARLAY state machine and a network state machine; the network state machine, configured to send uplink call generating service request information to the PARLAY adapter and to send downlink call control information to a network protocol adapter, the network protocol adapter, configured to realize a conversion of information transmission formats between the network state machine and a service switch equipment; the service switch equipment configured to trigger the application service according to a terminal call and to control a call according to the call control information from the network protocol adapter. An access method is further provided correspondingly. The present invention can realize an intelligent service supporting different network access.
System and method for facilitating capacity monitoring and recommending action for wireless networks
A method and apparatus for facilitating capacity monitoring and recommending action for a wireless network is provided. The method may comprise: obtaining data associated with one or more capacity attributes and one or more key performance indicators (KPIs) associated with a network, calculating network level values for the one or more KPIs from the obtained data, generating performance data graphs by plotting a first of the one or more KPIs against a second of the one or more KPIs, analyzing the one or more performance data graphs to determine at least one alarm threshold, and monitoring the one or more capacity attributes to determine if any of the at least one alarm thresholds has been triggered.
Methods and systems for performing a prefetch abort operation for network acceleration
The present invention relates to systems, apparatus, and methods of determining whether to abort a prefetch operation. The method includes receiving a prefetched object downloaded from a content server, and checking the prefetched object to determine the prefetched object's size. The method further includes determining a probability of use of the prefetched object, checking a link between a server and a client to determine the link's bandwidth, and checking the link between the server and the client to determine the link's latency. In addition, the method includes, based on at least one of the size of the prefetched object, the probability of use of the prefetched object, the bandwidth of the link, and the latency of the link, determining whether to forward the prefetched object to the client.
Error detection and reporting
System and method for detecting and reporting an error in communications with customer premise equipment. A preferred embodiment comprises monitoring the communications link between an access device and customer premise equipment located on customer premises. If a communications link fails, or some other condition occurs, an error signal is transmitted to the access network to notify downstream network elements of the error condition. In one embodiment, an access device is communicatively coupled to a demarcation device via an Ethernet link. If a loss of link occurs on the Ethernet link, an error signal, such as an alarm indicator signal, is transmitted through the network.
Providing a common management console for managing the operation of a server computer
A method, system, apparatus, and computer-readable medium for providing a common management console for managing the pre- and post-operating system operation of a computer system are provided. The method includes: receiving, at a management appliance, first and second requests from one or more remote management consoles to manage first and second server computers, respectively; receiving first and second remote console data formatted according to first and second remote console protocols from the first and second server computers, respectively; converting, at the management appliance, the received first and second remote console data to first and second converted remote console data, respectively, in a common format in accordance with a common protocol capable of expressing the first and second remote console protocols; and transmitting the first and second converted remote console data in the common format to the remote management console for display.
Managing service specifications and the discovery of associated services
Various embodiments manage service labels for association with service specifications in a service-oriented environment. In one embodiment at least one candidate service label is received from a user associated with a service domain of a distributed federated service-oriented environment. The candidate service label includes at least one of a service type and a set of terms characterizing a service. The candidate service label is sent to a community of users associated with one or more service domains in the distributed federated service-oriented environment. One of a vote for accepting the candidate service label and a vote for rejecting the candidate service label is received from each of a plurality of users in the community of users. The candidate service label is stored as an accepted service label in the service domain based on a number of votes for accepting the candidate service label being above a given threshold.
Identity migration apparatus and method
An identity migration program provides interfaces for a user to manage operations for migrating locally-managed identities to centrally-managed identities. The provided interfaces include a project management interface, an identity selection interface, a migration rule editor interface, and a project scheduling interface. In certain embodiments, the identity migration program includes a communication module that provides interfaces for managing communication between the identity migration program and locally-managed and centrally-managed servers. Interfaces may also be provided to manage identity group migration and migration error resolution. A migration process management interface enables the user to halt, roll back, or resume a migration project.
System and method for managing information technology infrastructure
A system for developing and managing information technology infrastructure management and operations has been developed. The system includes establishing a remote system help desk to clear IMO problems based on severity. Also, a remote network operations center (NOC) is established to monitor system equipment and provide IMO incident management and remediation. Additionally, a staging center is established to perform setup, configuration and testing of system upgrades and new equipment installations. Finally, a report for system status and performance for storage in an electronic media is generated.
End-to-end communication service monitoring and reporting
A system for end-to-end communication service monitoring is provided. The system comprises a processor, a memory, and a monitoring application stored in the memory. The memory also stores a resource dependency matrix, wherein the resource dependency matrix describes dependencies between a plurality of network and functional resources. When executed by the processor, the application registers a first client device for periodic notifications of a status of a network resource, monitors a metric associated with a first component of the network resource and monitors a metric associated with a second component of the network resource, determines a status of the network resource based on the metric associated with the first component, based on the metric associated with the second component, and based on the resource dependency matrix, and publishes a notification of the first status.
Integrated proximity routing for content distribution
A domain name server includes a processor configured to receive a request from a requester for an edge cache address, identify a first edge cache serving content requests to an anycast address from the requester, and determine a load of first edge cache. The processor is further configured to provide unicast address of an alternate edge cache to requester in response to the request when the load exceeds a threshold or to provide anycast address to requester in response to request when the load is below the threshold.
Use of temporarily available computing nodes for dynamic scaling of a cluster
Techniques are described for managing distributed execution of programs, including by dynamically scaling a cluster of multiple computing nodes performing ongoing distributed execution of a program, such as to increase and/or decrease computing node quantity. An architecture may be used that has core nodes that each participate in a distributed storage system for the distributed program execution, and that has one or more other auxiliary nodes that do not participate in the distributed storage system. Furthermore, as part of performing the dynamic scaling of a cluster, computing nodes that are only temporarily available may be selected and used, such as computing nodes that might be removed from the cluster during the ongoing program execution to be put to other uses and that may also be available for a different fee (e.g., a lower fee) than other computing nodes that are available throughout the ongoing use of the cluster.
Managing replication of computing nodes for provided computer networks
Techniques are described for providing managed computer networks, such as for managed virtual computer networks overlaid on one or more other underlying computer networks. In some situations, the techniques include facilitating replication of a primary computing node that is actively participating in a managed computer network, such as by maintaining one or more other computing nodes in the managed computer network as replicas, and using such replica computing nodes in various manners. For example, a particular managed virtual computer network may span multiple broadcast domains of an underlying computer network, and a particular primary computing node and a corresponding remote replica computing node of the managed virtual computer network may be implemented in distinct broadcast domains of the underlying computer network, with the replica computing node being used to transparently replace the primary computing node in the virtual computer network if the primary computing node becomes unavailable.
Systems and methods for extension of server management functions
Systems and methods that may be implemented to provide a plug-in architecture framework to allow extension of server management functionalities in a unified extension firmware interface (“UEFI”) environment using available remote access controller memory space. The disclosed systems and methods may be implemented to provide a hardware and software interface to allow use of a plug-in framework in the embedded system management that may be run under the BIOS firmware and the UEFI environment. The disclosed systems and methods may also be implemented to provide a server management architecture that may be modified and enhanced over time, and/or that may also be employed to extend availability of the server management framework to third parties, as well as to extend support to original equipment manufacturer (“OEM”) servers.
Architecture of networks with middleboxes
Some embodiments provide a system for implementing a logical network that includes a set of end machines, a first logical middlebox, and a second logical middlebox connected by a set of logical forwarding elements. The system includes a set of nodes. Each of several nodes includes (i) a virtual machine for implementing an end machine of the logical network, (ii) a managed switching element for implementing the set of logical forwarding elements of the logical network, and (iii) a middlebox element for implementing the first logical middlebox of the logical network. The system includes a physical middlebox appliance for implementing the second logical middlebox.
Remote management of TV viewing options in a media exchange network
A system supporting the remote management of options related to media consumption in a media exchange network. A system may comprise a set top box communicatively coupled to a television display and storage. The set top box may be used for the consumption of media via a communication network. In such a system, server software may enable the remote modification, via a communication network, of options related to the consumption of media by a user of the set top box. The media consumed may be one or more of digital audio, a digital still image, digital video, and digital data. Other aspects may be seen in a personal computer monitor and personal computer circuitry, communicatively coupled to a storage and a communication network. A system may also enable the modification of TV viewing options via a telephone voice response system.
Processing data and operating a communications device
Processing data in a communications system comprising a plurality of servers is provided. First data received from a communications device is directed to a given server in the plurality of servers. A server identifier identifying the given server is transmitted to the communications device. Subsequent data is received from the communications device. The subsequent data comprises the server identifier and a further parameter. The given server is selected on the basis of at least the server identifier and some of the subsequent data received from the communications device is directed to the given server. In the event of a need to redirect subsequent data to a server other than the given server, a different server is selected on the basis of at least the further parameter and further of the subsequent data received from the communications device is directed to the selected different server.
Information processing system and method providing a composed service
An information processing system providing a composed service to a user device is provided. The system includes: a service acquisition unit configured to acquire descriptions defining raw services; a capability information acquisition unit configured to acquire capability information; a composition unit configured to compose the acquired descriptions to create a description which defines a composed service to be supported by the user device based on the acquired capability information; a presentation unit configured to present the created description to the user device; a request acquisition unit configured to acquire a request for the composed service from the user device; a specifying unit configured to specify raw services composing the requested composed service; a processing unit configured to gather responses from the specified raw services composing the requested composed service, and to create the composite response; and a response unit configured to respond the composite response to the user device.
Multiple virtual machines in a mobile virtualization platform
Systems and methods are described for embodiments of a mobile virtualization platform (MVP) where in some aspects a wireless mobile device including multiple virtual machines (VMs) may receive data from a remote content provider and process/execute the data using an appropriate virtual machine. In some examples, the MVP may facilitate communication between and coordination among different virtual machines in the MVP, such as to facilitate optimization of data processing/execution.
Providing of link information between various application information and using the link information
The invention provides link information between various application information. One method according to the invention creates a first type of information to be provided through a first information service, creates link information specifying a second type of information associated with the first type of information within a second information service different from the first information service, creates a transfer message of the first information service including the first type of information and the link information, and provides the transfer message for a terminal. The user can then easily check associated information of the second information service if needed while he or she is using the first information service.
Communication apparatus, information processing apparatus, and method for controlling communication apparatus
A communication apparatus including: a receiving portion that receives alignment specifying information, the alignment specifying information indicating which of main memories included in a first information processing apparatus and a second information processing apparatus to align the requested data; a division location calculating portion that calculates a divisional location of the requested data so that the divisional location of the requested data becomes an alignment boundary on the main memory included in any one of the first and the second information processing apparatuses specified by the received alignment specifying information, the alignment boundary being integral multiples of a given data width; and a transmitting portion that divides the requested data stored into the main memory in the second information processing apparatus based on the calculated divisional location, and transmits the divided data to the first information processing apparatus.
Approach for automatically setting the device instance of a BACnet device
An approach for automatically setting the device instance of a device such as a unitary controller without reliance on a router and/or global controller, or something like a special extension to an associated router and/or global controller. The approach may be implementable entirely by logic in the unitary controller.
Reranking of groups when content is uploaded
Systems and methods for the forming of user device groups are presented. Logical relationship information describing logical relationships among a plurality of users is accessed and potential membership of a first user in a first group of users is determined based on the logical relationship information, by selecting the first group from a plurality of possible groups, the selecting being based on scores generated, for each of the plurality of possible groups, by a candidate scorer module, the first group of users containing a plurality of users, including one or more users who are not logically connected to the first user in the logical relationship information. Then, in response to the receiving of content, scores for each of the plurality of possible groups are generated based on the content, and the first user is added or removed from a second group of users selected from the plurality of possible groups based on the regenerated scores.
Device dependent user notification
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a device aware social graph. In one aspect, a method includes deciding to send a message to a user, the user being associated with devices. The method also includes selecting a user device from among the devices. The method also includes determining a message method. The method also includes obtaining an identifier associated with the user and the message method. The method also includes sending a message to the device using the message method and the identifier.
Method, system, and server for processing point to multipoint push message
Embodiments of the present invention relate to a method, a system and a server for processing a Point to Multipoint (PTM) Push message. The method includes: receiving a Push message, in which the Push message includes indication information and push content; mapping address information of target terminals that correspond to the indication information; and sending, according to the address information of the target terminals, the push content to the target terminals that correspond to the indication information. In the embodiments of the present invention, the Push message is sent, according to the indication information included in the received Push message, to the target terminals that correspond to the indication information, and it is unnecessary to carry a large amount of the address information of the target terminals in the Push message, thereby saving network resources.
Electronic communication device and method for processing messages
According to embodiments described in the specification, an electronic communication device and method for processing messages are provided. The method comprises receiving message data at a processor of the computing device, the message data comprising one or more of an address, a subject and a body; receiving a state indicator at the processor, the state indicator being an indication of a state of the message data; storing the message data and the state indicator in a memory of the computing device, the state indicator being stored in association with the message data; determining, at the processor of the computing device, if the state indicator indicates that the message data is in a draft state; and when the determination is affirmative, preventing transmission of the message data.
Methods and devices for maintaining sessions based on presence status information
Sessions, such as on-line gaming sessions, are maintained by proxy agents on behalf of users even when the users are inactive. The agents, along with other components, form a novel “always-on” architecture that greatly reduces the time it takes to initiate and carry out sessions.
System and method for determining a presence state of a person
A computer system is coupled to a plurality of subscribers via a network. The computer system obtains first presence information that corresponds to a first calendar of a user and obtains second presence information that corresponds to a second calendar of the user that is different from the first calendar. The computer system determines one or more presence states of the user including determining, based on presence information for the user that includes the first presence information and the second presence information, a first presence state of the user. The computer system provides the respective presence state of the user, selected from the one or more presence states of the user, to the subscribers via the network.
Method and apparatus for call proceeding in call control of application server
The invention discloses a method for call proceeding in call control of an application server, comprising: the application server sending an Offer message to a second party after making a media consultation with a first party; the application server receiving an Answer message sent from the second party, and transforming the Answer message into the Offer message and then sending to the first party, wherein, the Offer message carries a confirmation request for a Precondition state of the first party; the application server receiving the Answer message sent from the first party, wherein, the Answer message carries a confirmation response to the Precondition state from the first party; when determining that the Answer message meets a condition for transforming the Answer message, the application server transforming the Answer message into the Offer message and then sending to the second party.
Image, audio, and metadata inputs for name suggestion
A system, method, and computer-readable medium, is described that implements a domain name registration suggestion tool that receives one or more inputs, extracts information from the inputs into a submission string, submits the submission string to a domain name suggestion tool, and receives domain name suggestions based on the submission string. Inputs types may include images, audio clips, and metadata. The inputs sources may be processed to extract information related to the image source to build the submission string.
Computer-readable medium storing system visualization processing program, method and device
A device carries out a receiving process to receive a message transmitted or received by a server from a communication device connected to the server. The device stores the message in a message storing unit in connection with a time when the receiving process is carried out. The device extracts a message for synchronization from the message storing unit. The device produces log data including identification data to identify the message for synchronization and a time when the message for synchronization is received. The device produces log data including a time when a message other than the message for synchronization is received. The device stores the log data in a log data storing unit. The device transmits the log data stored in the log data storing unit to a log data processing device connected to a network on an opposite side of a firewall connected to the communication device.
System and method for logging a scheduler
A computer system including instructions recorded on a non-transitory computer-readable storage medium and readable by at least one processor, the system including a logging module, a receiving module, and a transmission module. The logging module is configured to log information associated with a scheduler. The receiving module is configured to receive a request for information associated with the scheduler. The transmission module is configured to transmit information associated with the scheduler.
Managing forwarded electronic messages
Communicating between electronic devices involves sending messages between the electronic devices. An original message having an original source indicator and an intended destination indicator identified is sent. A reply to that original message is sent by the recipient of the original message. The reply message has a reply source indicator and a reply destination indicator. A communication based on the reply message is sent. The communication based on the reply message has a reply source indicator that is the same as the intended destination indicator identified by the sender of the original message. In one example, a message is sent from computer operating an instant messaging program and forwarded to a mobile telephone. The reply sent from the mobile telephone is provided to the sender of the original message without revealing the telephone number of the mobile telephone to which the original instant message was forwarded.
Eager block fetching for web-based data grids
Techniques for improving scrolling performance in a web-based data grid. In one set of embodiments, when a user scrolls through a data grid rendered in a viewport of the user's web browser, client-side code executing in the web browser can detect whether a scroll event has occurred that requires a portion of the viewport to be filled/refreshed with data from a server. The client-side code can further determine whether the scroll event is a short scroll or a long scroll, and can send a request to the server that indicates the type of scroll event. If the scroll event is a short scroll, the server can determine a first amount of data to fetch based on one or more first parameters. If the scroll event is a long scroll, the server can determine a second amount of data to fetch based on one or more second parameters.
Processing event instance data in a client-server architecture
A process analysis system (1-300) processes event data describing real-world processes (1-100). The process analysis system performs the following acts: importing event instance data sets from an information management system (1-200), each set comprising one or more attributes describing an event instance in the real-world process (1-100); for each event instance, determining a corresponding process instance based on at least the attributes; determining event order attribute(s) for each imported event instance data set based on other event instance data sets corresponding to the same process instance; forming an analysis result set based on at least the event instance data sets and at least one first or second attribute; the client(s) presenting an analysis utilizing the analysis result set.
Service delivery framework
Implementations include receiving service information regarding one or more services provided by one or more service providers, the services being executed by one or more service computing devices, storing the service information on a computer-readable storage device that is in communication with the one or more broker computing devices, receiving user input at the one or more broker computing devices, the user input being transmitted to the one or more broker computing devices from one or more consumer computing devices over a service channel that corresponds to a service being accessed by a service consumer, transmitting the user input to the one or more service computing devices, receiving service output from the one or more service computing devices, the service output generated based on processing of the user input using the service, and transmitting the service output to the one or more consumer computing devices over the service channel.
Integrated client for use with a dispersed data storage network
An integrated client computer for accessing a dispersed data storage network is disclosed. A client program operating on the client computer accepts commands from a user and in response, issues network messages to a plurality of slice servers implementing a dispersed data storage network. Data slices can be read, written or modified using the disclosed integrated client computer.
Computer network scanning
A computer network scanning system and method for fulfilling a scan order using at least one scanner node on a computer network. The computer network scanning includes at least one computer terminal adapted to receive input for the creation of the scan order, at least one order entry server computer configured to create and distribute the scan order, and at least one scanner node, each scanner node configured to process scan orders set to or received by the scanner node. The computer network scanning method includes the steps of creating a can order, submitting he scan order to a scanner node, processing he scan order at the scanner node, and updating the computer network scanning system of the completion of the scan order.
Server apparatus and client apparatus in presence display system
The presence display system of the present invention displays presences and distances between buddies.The mobile station 11 performs poling to the user data section 26 at predetermined time intervals, transmits location information of the mobile station 11 to the presence server 27, receives buddies state information and information indicating the proximity between the user and the buddies, and displays the presence of the buddies by means of an icon with a size that corresponds with the proximity. The buddy list server 28 calculates the distance between the user and the buddies from the location information of the mobile station 11 and the location information of the requested buddies in accordance with the poling by the mobile station 11, determines the proximity by comparing the distance with a threshold value that is set by the user, and transmits the proximity to the mobile station 11.
Control and communication system including an engineering unit
A control and communication system including a number of automation units which are adapted to process signals in function plans within the automation unit and which are connected in the same level to a common communication bus for providing a peer-to-peer communication between the automation units, further includes an engineering unit being connected to the communication bus and being adapted to provide functions allowing at least one automation unit to exchange signals to a function plan which is attributed to another automation unit.
Systems and methods for sample rate tracking
Systems and methods for sample rate tracking are provided. An example method includes computing an actual latency associated with an output sample from an output sample stream. The actual latency is calculated using a phase and a phase increment (conversion rate ratio). A measured latency is determined using an internal clock using a presentation time of the output sample, or an input sample from an input sample stream, or both. The measured latency is compared to the actual latency to generate a latency error. A successive phase increment can be determined based on the latency error by using a low-pass or adaptive filter to adjust the latency error.
File list generation method, system, and program, and file list generation device
A file list generation device creates, at high speed, a list of added, changed, or deleted file data by acquiring the directory URLs of search target files from a first storage, counting the number of directories in each layer through analysis of the directory URLs, and, based on the result of the counting, determines a dividing policy to divide a scan target directory scanning operation, which is to be performed with a distributed server cluster. Directories of the search target files are divided in accordance with the determined dividing policy, and a snapshot of a current directory tree is acquired.
Automated selection of functions to reduce storage capacity based on performance requirements
A plurality of functions to configure a unit of a storage volume is maintained, wherein each of the plurality of functions, in response to being applied to the unit of the storage volume, configures the unit of the storage volume differently. Statistics are computed on growth rate of data and access characteristics of the data stored in the unit of the storage volume. A determination is made as to which of the plurality of functions to apply to the unit of the storage volume, based on the computed statistics.
Method and apparatus for facilitating answering a query on a database
A method and apparatus for facilitating answering a query on a database. Example embodiments include: accessing a database tree having a plurality of nodes; receiving a set of input variable values, a non-empty set of output variables, and information indicative of a node in the database tree; determining a traversal cost based on the node and the set of input variable values; determining a lower bound based on the node and the set of input variable values, wherein the lower bound corresponds to an upper-bound probability estimate based on one or more of the plurality of nodes and the set of input variable values; pruning one or more of the plurality of nodes based on the traversal cost, the lower bound, and a pruning bound; and returning a result including a non-empty set of output variable values based on the set of input variable values, the node, the traversal cost, and the lower bound.
Automated content scheduler and displayer
A method of sequencing and scheduling web resources, via a software application that collects URLs and feeds them to a Web browser, so that the amount of clicks and decisions are reduced when browsing the Internet. The method begins after a computer user with Net-access encounters a URL that leads to a collection of other URLs that the software application has arranged to be presented in a continuous, show manner. This collection of resources then plays automatically, going from one resource to the next without the user being required to make a decision or click. The decision-making process is not inhibited, it is made optional. A method of inserting full-screen advertising, public service announcements, news, etc. has been developed. The server software application module described herein allows a publisher to stream URLs to a user who does not have the client-side software. The publishing module allows a user to format resources to a particularly desirable size and characteristic that promotes readability during a show viewing session. This same module can publish collections of nodes for others to view as a whole sequence, accessible via e-mail, screen saver or as a web resource.
Data management and indexing across a distributed database
In one embodiment, a distributed database system supporting flexible configuration of data clusters is disclosed. The system includes a cluster manager, an index, and a dataset distributed over one or more database clusters. Where the nodes of the clusters may report ownership of a particular range, the index contains an alternate range. The cluster manager receives requests to access a range of data within database and queries the index to determine the appropriate nodes and/or clusters with which to connect. The cluster manager then directs the requestor to connect to the specified nodes and/or clusters.
Distributing and sharing content in a network
A method may include receiving, from a first user device associated with a user profile, a first request for a media file and streaming the media file over a network to the first user device in a first format appropriate for the first device. The method may also include stopping the streaming of the media file and associating a stop time with the stopping, wherein the stop time indicates a position in the media file and receiving, from a second user device different from the first user device, a second request for the media file, the second user device being associated with the user profile. The method may also include streaming, starting at the stop time, the media file over the network to the second user device in a second format appropriate for the second device and different than the first format.
Decomposed query conditions
A method, article of manufacture and apparatus for decomposing an initial query into smaller conditional groups for execution on a database is disclosed. A separate database query may be generated for each of the conditional groups, and the results of executing these separate database queries may be combined and returned as the result of the initial query. Typically, the initial query may be decomposed because it is otherwise too large and/or too complex to be executed directly.
Assisted filtering of multi-dimensional data
Interactive and dynamic exploring of filter criteria for large amounts of numerical data having multiple dimensions is described. Exploration occurs without excessive amounts of computation or querying of a database based on a data set summary that may be obtained from a server in a search system and applied by a client device. A data set is summarized so as to capture relationships between distributions of items in the data set along multiple dimensions. To explore filter criteria, a user may interactively adjust a range of values that act as a filter criteria along a dimension and determine an effect on a distribution of items along another dimension. The client device may apply the data summary in reverse to determine, based on user input specifying aspects of a distribution along one dimension, filter criteria for another dimension that would result in the specified distribution.
Geographic data structuring and analysis
Geographic data structuring and analysis is described. In one embodiment, a method for geographic data structuring and analysis is described, including parsing a set of geographic objects into groups of geographic objects, and assigning one or more attributes to the parsed geographic objects. The method may further include accessing a database of geographic object feature data and assigning certain features to certain attributes of the geographic objects, rendering one or more of the geographic objects in relation to geospatial topology information, and analyzing the rendered geographic objects. In certain aspects, systems and methods described herein provide functions attributable to Geographic Information Systems using rendering processors and engines that would otherwise be unable to achieve such functions.
Discovering relationships between data processing environment components
A method, system, and computer program product for discovering relationships between data processing environment components are provided in the illustrative embodiments. Whether a log entry in a set of log entries references a combination of the data processing environment components is detected. The combination of components includes a first component and a second component present in the data processing environment. A type of the log entry is determined. A weight is assigned to the log entry according to the determined type. the weight of the log entry is combined with a second weight of a second log entry to form a cumulative weight. A strength level for which the cumulative weight qualifies is determined. The strength level is assigned to a relationship between the combination of components.
System and method for determining exact location results using hash encoding of multi-dimensioned data
Aspects of the present invention are directed to system and methods for optimizing identification of locations within a search area using hash values. A hash value represents location information in a single dimension format. Computing points around some location includes calculating an identification boundary that surrounds the location of interest based on the location's hash value. The identification boundary is expanded until it exceeds a search area defined by the location and a distance. Points around the location can be identified based on having associated hash values that fall within the identification boundary. Hashing operations let a system reduce the geometric work (i.e. searching inside boundaries) and processing required, by computing straightforward operations on hash quantities (e.g. searching a linear range of geohashes), instead of, for example, point to point comparisons.
Progressive indexing for improved ad-hoc query performance
The invention progressively indexes a database by building partial indexes over subsets of the data are built as the data is scanned, i.e., traversed, during execution of ad-hoc queries. Indexes are built as ad-hoc queries “touch” the data. This permits ad-hoc queries to utilize partial indexes built by other ad-hoc queries. If an ad-hoc query scans more data during execution than was previously indexed, the ad-hoc query will utilize the existing partial indexes to the extent they are relevant while adding to them or building additional partial indexes as the query executes.
Optimizations for live event, real-time, 3D object tracking
Techniques for indexing multimedia data simultaneous with its capture to convert a real world event into an accessible database in real time are provided. The present invention introduces a new paradigm of converting a real world event in real time into a rich multimedia database by processing data from multiple cameras observing the event. Real time analysis of the camera data, coupled with domain knowledge, results in instant indexing of multimedia data at capture time itself. This yields the semantic information to answer complex queries about the content, and the ability to extract portions of data that correspond to complex actions performed in the real world.
Intelligent product feedback analytics tool
A method for improving the usability of product feedback data can begin with the receipt of product feedback search parameters by an intelligent product feedback analytics tool. The product feedback search parameters can represent a product or a group of products. Product feedback search results having a rating value and/or textual feedback content can be obtained for the product feedback search parameters. For each product in the search results, a composite rating value can be synthesized from the rating values contained in the search results. For each product in the search results, the product feedback search results can be analyzed for analytic parameters using natural language processing techniques. An analytic parameter can represent a commonality within a subset of the search results. The product feedback search results, composite rating values, and analytic parameters can be presented within a user interface, providing context for the composite rating value.
Document clustering system, document clustering method, and recording medium
In the provided document clustering system (100), a concept tree structure accumulation unit (11) stores a concept tree structure that represents a hierarchical relationship among concepts represented by each of a plurality of words. For any two words, a concept similarity computation unit (12) obtains a concept similarity, which is an index indicating how close the concepts represented by the two words are. Using concept similarities for words that appear in two documents in a document set, an inter-document similarity computation unit (13) obtains an inter-document similarity, which indicates how similar the two documents are semantically. A clustering unit (14) uses inter-document similarities to cluster the documents in the document set.
In some embodiments, techniques for determining a reputation associated with an electronic document may include determining an identity associated with the electronic document; determining an identity reputation associated with the identity, and determining a document reputation using the identity reputation.
Bi-temporal user profiles for information brokering in collaboration systems
Systems, methods, and other embodiments associated with bi-temporal user profiling are described. An event is detected that occurs at a valid event time. In response to the event, a repository is accessed that stores data describing one or more user profiles that include a profile record valid time period specifying a time at which the given profile record is valid. A prior user profile record is retrieved that has a profile record valid time period that overlaps with the valid event time. An updated user profile record is created based, at least in part, on the event. The updated user profile record is saved with the valid event time demarcating the start of a profile valid time period. The prior user profile with the valid event time demarcating the end of the profile record valid time period is also saved for subsequent processing.
Systems and methods for searching an index
Embodiments of the invention form an information set from the current set of index information available by the operations of the pre-search and runtime Search components of the search engine. A search request that contains search terms and/or other search criteria (e.g. date or file type) is entered by a user through an input interface. The search terms and the information set are worked through the search engine modules to provide the actual results sought by the user. These results are provided to the user via an output interface. Embodiments involve converting a search request into a format of an index of documents, and then comparing the converted search request and the index for matches.
Transcoding and serving resources
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transcoding and providing resources. A query is received. A resource is generated, and the resource, when processed by a client device, causes the client device to perform various operations. The operations include displaying a search result having an associated landing page and detecting user interaction with the search result. The operations include, in response to detecting user interaction with the search result, displaying a first portion of the landing page that is embedded within the resource and requesting, over a network, a second portion of the landing page. The operations include receiving the second portion of the landing page, and loading the second portion of the landing page. The generated resource is provided in response to the query.
Apparatus and method for automatic assignment of industry classification codes
A system and methods for automatically assigning of classification codes to a business based on information about the business collected from the Internet are provided in which data extracted from trawling the Internet is compared to a node structure based on a taxonomy of a selected business classification code system.
Dynamic aggregation of users
While using an online application, information received or selected by a user is associated with a context. For example, a search query is received from a user and the search query is associated with a context. The user is provided with a recommendation to join a discussion forum that corresponds to the context, thereby dynamically aggregating users. The recommendation may be provided conditionally, if predefined criteria are satisfied. Alternately, in some embodiments a recommendation may be made unconditionally.
Identifying query formulation suggestions for low-match queries
Systems, methods and computer-storage media are provided for identifying low-match search queries and determining comparable item matches to suggest to the user in response to a low-match query. “Low-match queries” are queries for which an insufficient number of exact item matches are available. In embodiments, exact and/or comparable item matches may be determined via semantic analysis. Also provided are systems, methods and computer-storage media for informing the user, by way of a presented indicator, or the like, that a presented item was selected for presentation based upon a similarity metric rather than being determined an exact match for the input query.
Systems and methods for generating a web page based on search term popularity data
Methods and systems for displaying popular internet searches on a webpage are provided. Popularity data is received which includes a plurality of search terms, and each of the search terms has an associated popularity index. A determination is made as to whether any of the search terms is an approved term by referencing the search terms against a list of approved terms. If any of the search terms is an approved term, then that search term's corresponding entry in the list of approved terms is updated with that search term's associated popularity index. The search terms that are not approved terms define a set of unclassified search terms. The unclassified search terms are classified by updating the list of approved terms to include the unclassified search terms and their associated popularity indices. The most popular search terms in the list of approved search terms is determined based upon the popularity index. A webpage is generated including images associated with each of the most popular search terms.
Measuring and altering topic influence on edited and unedited media
Methods and arrangements for measuring and utilizing media topic influence. A publically disseminated media transmission is received. Public influence of the media transmission is measured via: identifying one or more media sources used to disseminate the media transmission; and obtaining one or more predetermined influence values associated with the one or more media sources.
Optimizing data transfer time on graphics processor units
Disclosed are methods and systems for optimizing data transfer time in a graphics processor unit. The methods and systems involve receiving a user request to perform online analytical processing computation, the user request comprising axes dimensions and filter dimensions associated with a visualization for an online analytical computation cube, identifying one or more slices of the online analytical processing cube based on the user request, transferring the one or more identified slices to a second memory, performing the online analytical processing computation for the one or more identified slices at the graphics processor unit and retrieving a result of the online analytical processing computation from the second memory.
Concurrency control in database transactions
To achieve long running batch updates, a transaction aggregator layer and one or more data aggregation queues, such as a command queue, are placed between one or more clients and a database. Writes go to the database aggregator layer and are enqueued in the appropriate data aggregation queue, which may be allocated by transaction. Committing the transaction drains the queue and writes the contents of the queue in one transaction-like update to the database. By using the transaction logic in the transaction aggregator layer, transaction-like behavior may be achieved that allows both updates and transactions to scale with less impact on database servers.
Robust hashing of digital media data
A robust hashing method is applied to media data (e.g., video, image, and/or audio data), producing a hash output that is robust with respect to at least one attribute of the media data. A histogram is generated for the media data and the histogram is hashed using a weighted hashing procedure. The histogram can be derived from a plurality of randomized versions of the media file, each randomized version of the media file altered to a random extent with respect to the attribute. The histogram can also be derived from a plurality of feature descriptors computed for the media data that are coarsely encoded with respect to the attribute. The weighted hashing procedure includes assigning a weight to components of the histogram and applying a plurality of hash functions to a number of versions of each component, the number of versions based on the assigned weight.
System and method for creating deduplicated copies of data by tracking temporal relationships among copies using higher-level hash structures
Systems and methods are disclosed for forming deduplicated images of a data object that changes over time using difference information between temporal states of the data object. The method includes organizing the content of the data object for a first temporal state as a plurality of content segments and storing the content segments in a data store; creating an organized arrangement of hash structures to represent the data object in its first temporal state; receiving difference information for the data object; forming at least one hash signature for the changed content; and storing the changed content that is unique in the data store as content segments. The method also includes determining, subsequent to receiving the changed content at the deduplicating content store, whether the changed content should be stored by searching for the hash signature for the changed higher-level hash structure in the global cache of the deduplicating content store.
Methods and apparatus for network efficient deduplication
Mechanisms are provided for performing network efficient deduplication. Segments are extracted from files received for deduplication at a host connected to a target over one or more networks and/or fabrics in a deduplication system. Segment identifiers (IDs) are determined and compared with segment IDs for segments already deduplicated. Segments already deduplicated need not be transmitted to a target system. References and reference counts are modified at a target system. Updating references and reference counts may involve modifying filemaps, dictionaries, and datastore suitcases for both already deduplicated and not already deduplicated segments.
Method of and system for merging, storing and retrieving incremental backup data
A method of managing backup data. The method includes accessing, via a backup manager, index data of an initial snapshot and accessing, via the backup manager, index data of a subsequent snapshot. The method further includes determining, via the backup manager, whether the index data of the subsequent snapshot is different from the index data of the initial snapshot. Responsive to a determination that the index data of the subsequent snapshot is different from the index data of the initial snapshot, creating an updated index data and creating an updated snapshot with the updated index data.
Proactive data object replication in named data networks
The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
Automatic synchronization conflict resolution
A determination is made at a first computing device of whether there is a synchronization conflict between a change to a first synchronized item at the first computing device and a change to a second synchronized item at a second computing device. If a synchronization conflict exists, rule-based conflict resolution is performed to automatically resolve the synchronization conflict. The rule-based conflict resolution is based at least in part on a type of the change made to the first synchronized item, a type of the change made to the second synchronized item, and a set of multiple rules. A notification of the resolution is then sent to the second computing device.
Data collection framework
A common data collection framework accesses data collected by an electronic commerce system in a format specific to the electronic commerce system. The common data collection framework determines a type of the data and identifies, from among multiple types of common data objects, a common data object that is independent of the electronic commerce system and that is defined to store data corresponding to the determined type. The common data collection framework stores the data collected by the electronic commerce system in an instance of the common data object and provides, to an analytics system, the instance of the common data object to enable the analytics system to perform analytics on the data collected by the electronic commerce system using the common format that is different than the format specific to the electronic commerce system and that accommodates multiple, different types of electronic commerce systems.
Rules execution platform system and method
Methods, mediums, and systems are described for providing a platform coupled to one or more rules engines. The platform may provide runtime rule services to one or more applications. Different rules engines may be used for different types of rules, such as calculations, decisions, process control, transformation, and validation. Rules engines can be added, removed, and reassigned to the platform. When the platform receives a request for services from an application, the platform selects one of the rules engines to handle the request and instructs the selected rules engine to execute the rule. The rules engine may be selected automatically. The platform may be implemented through a service-oriented architecture.
Mode determination for multivariate time series data
Embodiments relate to mode determination for multivariate time series data. An aspect includes determining first within-mode and first cross-mode parameters for a first number of modes, each mode comprising one or more time periods in the multivariate time series. Another aspect includes determining a first likelihood of the at least one multivariate time series based on the first sets of within-mode parameters and first set of cross-mode parameters. Another aspect includes determining second within-mode and second cross-mode parameters for a second number of modes. Another aspect includes determining a second likelihood of the at least one multivariate time series based on the second sets of within-mode parameters and second set of cross-mode parameters. Another aspect includes based on the first likelihood being higher than the second likelihood, selecting the first number of modes to model the at least one multivariate time series.
Discovering and classifying situations that influence affective response
Described herein are systems for identifying situations. The system receive samples, each comprising a temporal window of token instances to which a user was exposed and an affective response annotation. One embodiment uses a clustering algorithm to cluster the samples into a plurality of clusters utilizing a distance function that computes a distance between a pair comprising first and second samples. Another embodiment utilizes an Expectation-Maximization approach to assign situation identifiers. And another embodiment involves training, utilizing the samples, a machine learning-based classifier to assign situation identifiers.
Learning method of neural network circuit
A neuron circuit in a neural network circuit element includes a waveform generating circuit for generating a predetermined pulse voltage, and a first input signal has a waveform of the predetermined pulse voltage. For a period having a predetermined duration of the predetermined pulse voltage generated within the neural network circuit element including the variable resistance element which is applied with the first input signal from another neural network circuit element, the first input signal is permitted to be input to the control electrode of the variable resistance element, to change the resistance value of the variable resistance element due to an electric potential difference generated between the first electrode and the control electrode which occurs depending on an input timing of the first input signal with respect to the period during which the first input signal is permitted to be input to the control electrode.
Multivariate transaction classification
Embodiments relate to classification of transactions based upon analysis of multiple variables. For a purchase transaction, such variables can include but are not limited to: buying location, source system, line of business, cost center, functional area, supplier capabilities, item description, account description, organization, department, custom parameters, and others. Embodiments may rely upon one or more classification schemes, such as statistical classification, semantic classification, and/or knowledge base classification, taken alone or in combination. In a purchase transaction, classification based on multivariate analysis facilitates identification of a purchased item or service, and hence accuracy in classifying and assigning a central classification code. Particular embodiments may include a feature allowing user review/revision of category assignments via a feedback loop linked to past classification. This revision feature may add clarity to a current transaction, allow modification of future classification for ongoing improvement, and provide a user-driven measure of system performance.
System and method for effective caching using neural networks
Systems and methods for selecting an appropriate caching algorithm to be used when temporarily storing data accessed by an executing application using a neural network may dynamically and/or iteratively replace an initial caching algorithm being used for the application. An input layer of the neural network may gather values of performance related parameters, such as cache hit rates, data throughput rates, or memory access request response times. The neural network may detect a pattern or change in a pattern of accesses, or a change in a workload, a hardware component, or an operating system parameter. Dependent on these and/or other inputs, the neural network may select and apply a caching algorithm likely to improve performance of the application. Other inputs to the neural network may include values of hardware configuration parameters and/or operating system parameters. The neural network may perform a training exercise or may be self-training, e.g., using reinforcement learning.
Selection of most effective machine learning kernel from a training set of documents
A server computing system selects a machine learning kernel from a plurality of machine learning kernels using a plurality of training documents. The server computing system identifies a plurality of testing documents from a plurality of electronic discovery documents based on the plurality of training documents. For each of the plurality of machine learning kernels and for each testing document in the plurality of testing documents, the server computing system determines a class of the testing document using a default value for each of a plurality of parameters for the machine learning kernel and evaluates a goodness of fit of the machine learning kernel for the testing document. The server computing system selects a machine learning kernel from the plurality of machine learning kernels and determines a value for at least one of the plurality of parameters for the selected machine learning kernel using a goodness of fit test.
Evaluating commodity conditions using aerial image data
Various tools, strategies and techniques are provided for evaluating the condition of one or more commodities in one or more regions of interest. Collection of image data associated with the commodities can be facilitated through use of an aircraft traveling a predetermined travel route over the regions of interest. The collected image data may be analyzed to evaluate the condition of the commodities, forecast commodity production, and/or to perform other tasks.
Restricted printing of postage with layout constraints in a browser
The present invention is directed to systems and methods which restrict the use of Value Bearing Indicia (VBI) such that a general purpose interface application can be used to securely and/or precisely print VBI. A method and/or system of embodiments of the invention, includes a general purpose interface application being operated on a general purpose processor to request VBI, and in response to that request, receiving a content object comprising both the VBI and defined parameters which are controlled such that the general purpose interface application's use of the VBI is restricted.
Print to e-book conversion
A method for processing a print work. A first entity's ownership of a print work that is lawfully owned by the first entity is recorded. The print work is a physical copy of an original copyrighted work. A disablement of the print work is recorded. While the disablement exists, a digital copy of the original work is generated or received. After initiation of generating or receiving the digital copy: (i) a digital association linking the digital copy with both the recorded ownership and the recorded disablement is generated; and (ii) the digital association is recorded in the digital copy and/or in hardware storage units. Another entity may generate the digital copy and a unique identifier of the digital copy which associates the digital copy with a unique identification of the print work.
Selecting and providing items in a media consumption system
An item-providing system supplies items to a user device for consumption at the user device via communication infrastructure. The device may correspond to a book reader device or other type of device. In one illustrative case, the item-providing system includes reliable fulfillment functionality for ensuring that the user device receives items in a reliable manner. The item-providing system includes other provisions to facilitate selecting items in various contexts.
Method and system for delivering and accessing files
A method and system for delivering and accessing files. The method and system may include the generation of a file for a first party by a second party. The file may be encoded in a machine readable format and may be may have its availability made known to the first party. The first party may then provide a payment to the second party via the web portal that allows them access to the document.
Virtual world reversion rights
A method and system provides transactions and arrangements in virtual world environments. A user can participate in transactions to acquire virtual property and related virtual rights. In some implementations, real-world and virtual parties can be involved in possible transfers and/or transfer revocations involving various types of virtual objects and virtual rights.
Brokering and payment optimization for cloud computing
A system includes a receiving module to receive a purchase inquiry for a cloud computing service from a consumer in a first currency. A pricing module is used to price-out the cloud computing service from a provider where the cloud computing service is provided in a second currency. A reconciliation module reconciles the purchase of the cloud computing service in the consumer's geographical location and currency with the provider's location and currency.
Provision of support services as a service
A method of providing support services as a service is presented. For example, the method includes providing to a service provider one or more service modules operative to provide the support services to the service provider. The one or more service modules are provided by one or more suppliers of the support services and include instruction code operative to be performed on a processor device and one or more application programming interfaces operative for programmatic access to the one or more service module. The service modules may further include one or more user interfaces operative for interactive access to a respective service module. The one or more service modules may include, for example, one or more of a profile service module, an offering service module, a customer service module, a process service module, a user interface service module and a revenue service module.
Reading, organizing and manipulating accounting data
A financial reporting system for reading, organizing and manipulating any accounting data and producing financial reports that may be customized to the preferences of the user. In one embodiment there is an organizational data structure for accounting data, including a trial balance data structure having a plurality of trial balance data structure elements containing accounts of the accounting data, wherein the trial balance data structure elements are linked by a distinct doubly linked list of trial balance data structure elements pointers, further comprising sub-lists of trial balance data structure elements pointers to group the accounts of the accounting data into financial statement items.
Requesting reimbursement for transactions
Various embodiments are directed to systems and methods for generating and delivering a reimbursement request from a customer of a financial institution. According to various embodiments a transaction list may be displayed to a customer. The transaction list may comprise transactions on the customer's account at the financial institution. An indication of a transaction to be reimbursed selected from the list, an indication of a recipient of the reimbursement request, an indication of the reimbursement request amount, and a text message may be received from the customer. The reimbursement request may be generated by packaging an indication of the customer, a description of the transaction to be reimbursed, the indication of the recipient, the indication of the reimbursement request amount and the text message into a message format. The reimbursement request may be transmitted to the recipient.
Explosions of bill-of-materials lists
In a parallel explosion unit of a parallel explosion apparatus, a processing unit extracts an end product, extracts an assembly directly constituting the end product, and an determines whether or not a BOM tree having the assembly as a vertex is already broken down. When the BOM tree of the assembly is not yet broken down, the processing unit registers the number of units of each component constituting the assembly in an explosion result list and generates a tree-specific list in which the number of units of each component and a registration position of the component in the explosion result list are recorded. When the BOM tree of the assembly is already broken down, the processing unit adds the number of units of each component recorded in the tree-specific list to the number of units at the registration position of the component likewise recorded in the explosion result list.
Method of and system for fact checking flagged comments
A fact checking system verifies the correctness of information and/or characterizes the information by comparing the information with one or more sources. The fact checking system automatically monitors, processes, fact checks information and indicates a status of the information.
Readable indicia for fuel purchase
Embodiments of the invention are directed to purchasing fuel for a vehicle from a fuel station. An exemplary apparatus is configured to: initiate a fuel purchase application; determine identification information associated with a fuel pump that will be used for fueling the vehicle; and transmit a purchase authorization request to an external server based on the identification information.
Method for authorization of a transaction with the use of mobile phone
A method for transaction authorization with the use of a mobile phone, comprising the steps of receiving (102, 202) from the user (UR), by the communication server (CS) a voice call establishment request, to establish a voice connection to a telephone number which identifies a transaction; authorize the transaction by verifying (112, 206) the credentials of the user (UR); accepting (106, 214) or rejecting (108, 216) the voice call; sending a request (116, 220) to the user (UR) to enter necessary transaction parameters; entering (118, 222) the requested transaction parameters; verifying (120, 224), by the authorization system (AS), the validity of the entered parameter; determining (122, 226) whether the user (UR) has entered all necessary transaction parameters, including user's authorization to fund the transaction and, preferably, a password authorizing the transaction; accepting the transaction funding by the transaction party responsible for it (124, 228), and, if the amount has been accepted, sending a message with instruction to reserve sufficient funds (126, 230) in the transaction funding party account to settle the transaction; determining (128, 232) whether the authorization system (AS) has been provided with all necessary the transaction parameters; storing (130, 234) the transaction for further processing or forwarding it (132, 236) for settlement.
Markup assistance apparatus, method and program
According to one embodiment, a markup assistance apparatus includes an acquisition unit, a first calculation unit, a detection unit and a presentation unit. The acquisition unit acquires a feature amount for respective tags, each of the tags being used to control text-to-speech processing of a markup text. The first calculation unit calculates, for respective character strings, a variance of feature amounts of the tags which are assigned to the character string in a markup text. The detection unit detects a first character string assigned a first tag having the variance not less than a first threshold value as a first candidate including the tag to be corrected. The presentation unit presents the first candidate.
Structured models of repetition for speech recognition
Described is a technology by which a structured model of repetition is used to determine the words spoken by a user, and/or a corresponding database entry, based in part on a prior utterance. For a repeated utterance, a joint probability analysis is performed on (at least some of) the corresponding word sequences as recognized by one or more recognizers) and associated acoustic data. For example, a generative probabilistic model, or a maximum entropy model may be used in the analysis. The second utterance may be a repetition of the first utterance using the exact words, or another structural transformation thereof relative to the first utterance, such as an extension that adds one or more words, a truncation that removes one or more words, or a whole or partial spelling of one or more words.
Differential dynamic content delivery with text display in dependence upon simultaneous speech
Differential dynamic content delivery including providing a session document for a presentation, wherein the session document includes a session grammar and a session structured document; selecting from the session structured document a classified structural element in dependence upon user classifications of a user participant in the presentation; presenting the selected structural element to the user; streaming presentation speech to the user including individual speech from at least one user participating in the presentation; converting the presentation speech to text; detecting whether the presentation speech contains simultaneous individual speech from two or more users; and displaying the text if the presentation speech contains simultaneous individual speech from two or more users.
Digital voice memo transfer and processing
Systems, methods, apparatuses, and computer programs for transfer of recorded digital voice memos to a computing system and processing of the transferred digital voice memos by the computing system or another computing system are disclosed. A recording device is configured to record a voice memo from a user and store the voice memo. The recording device is also configured to transfer the recorded voice memo to a computing system. The computing system is configured to translate the transferred voice memo into a computer-readable format and parse the translated voice memo. The computing system is also configured to determine a type of software application to which the voice memo pertains via a preamble, a keyword, or a keyphrase in the translated voice memo. The computing system is further configured to create an item in the determined software application based on the translated voice memo.
Audio signal de-noising utilizing inter-frame correlation to restore missing spectral coefficients
In the field of audio encoding/decoding technologies, a signal de-noising method is provided. The method includes: selecting, according to a degree of inter-frame correlation of a frame where a spectral coefficient to be adjusted resides, at least two spectral coefficients having high correlation with the spectral coefficient to be adjusted; performing weighting on the at least two selected spectral coefficients and the spectral coefficient to be adjusted to acquire a predicted value of the spectral coefficient to be adjusted; and adjusting a spectrum of a decoded signal by using the acquired predicted value, and outputting the adjusted decoded signal. A signal de-noising apparatus corresponding to the signal de-noising method and an audio decoding system using the signal de-noising apparatus are also provided.
Acoustic data communication device
An audio data processing system is a client-server system including an audio data communication device and an audio data processing device which are linked together via a communication network. The audio data communication device includes an acoustic generator, a control device, a transmitter and a receiver in connection with first and second storage areas. The transmitter sequentially transmits a time series of unprocessed data DA[n] stored in the first storage area, while the receiver sequentially receives a time series of processing-completed data DB[n] from the acoustic data processing device so that processing-completed data are stored in the second storage area and sequentially reproduced. When specific processing-completed data is not stored in the second storage area, the control device designates and reproduces specific unprocessed data, which is unprocessed acoustic data corresponding to specific processing-completed data. Alternatively, the control device designates and reproduces cross-faded acoustic data, combining unprocessed data and processing-completed data.
Text prediction using environment hints
Provided are techniques for text prediction using environment hints. A list of words is received, wherein each word in the list of words has an associated weight. For at least one word in the list of words, an environment weight is obtained from an environment dictionary. The associated weight of the at least one word is updated using the obtained environment weight. The words in the list of words are ordered based on the updated, associated weight of each of the words.
Filtering prohibited language formed inadvertently via a user-interface
Some embodiments of the inventive subject matter are directed to detecting that a text string is subject to an algorithmic function that would modify one of more parts of the text string to be at least one proposed text substring for presentation via a user interface, wherein the at least one proposed text substring is a portion of the text string. Some embodiments are further directed to evaluating the at least one proposed text substring against one or more prohibited text strings prohibited for presentation via the user interface and detecting, in response to the evaluating of the at least one proposed text substring against the one or more prohibited text strings, that the at least one proposed text substring is one of the one or more prohibited text strings. Some embodiments are further directed to modifying the at least one proposed text substring, in response to detecting that the at least one proposed text substring is one of the one or more prohibited text strings.
Steering device design assisting apparatus and steering device design assisting method
A design assisting apparatus of a steering device arranges a coordinate of a handle position reference point, a coordinate of a first universal joint reference point, a coordinate of a second universal joint reference point, and a coordinate of a steering gear reference point in a three-dimensional space, calculates a reference axis passing through the second universal joint reference point from the first universal joint reference point, calculates a phase angle which is an angle between a straight line from the handle position reference point to the first joint reference point when viewed along the reference axis and a straight line from the second joint reference point to the steering gear reference point when viewed along the reference axis, and determines success or failure of a condition in which the allowable range of the phase angle allowable error is included in the allowable range of the allowable torque variation rate.
Context aware surface scanning and reconstruction
A system for generating and updating a 3D model of a structure as the structure is being constructed or modified is described. The structure may comprise a building or non-building structure such as a bridge, parking garage, or roller coaster. The 3D model may include virtual objects depicting physical components or other construction elements of the structure. Each construction element may be associated with physical location information that may be analyzed over time in order to detect movement of the construction element and to predict when movement of the construction element may cause a code or regulation to be violated. In some cases, a see-through HMD may be utilized by a construction worker while constructing or modifying a structure in order to verify that the placement of a construction element complies with various building codes or regulations in real-time.
Ultrasensitive biological and chemical detection using surface plasmon resonance
A device, including sample and reference channels through which first and second solutions flow, respectively, the first solution including an analyte, the channels having a metal film in contact with the first and second solutions, the metal film configured with a linker to selectively bind the analyte; a light source whose output is modulated by an optical system, so that light is directed from the optical system alternately towards the sample and reference channels, surface plasmons within the metal film being created; a first photodetector that monitors the strength of the output from the light source; a second photodetector that collects optical signals reflected from the metal film; electronics that monitors output from the first and the second photodetectors, thereby detecting a noise-compensated difference in signals from the two channels; and a computer processor that determines, from analysis of the noise-compensated difference, presence of the analyte in the first solution.
Universal performance monitor for power generators
The invention broadly encompasses a system including a communications network, a plurality of remotely located data sources to provide power data, the power data including quantitative and qualitative data of one or more power generation units, and a performance monitor in communication with the plurality of remotely located data sources through the communications network, the performance monitor including a communications unit to extract the power data from the plurality of remotely located data sources, a data conversion unit to transform the power data into a common data format, a data store to store the transformed power data, and a user interface unit to display the transformed power data on one or more client devices through the communications network.
Analyzing power consumption in mobile computing devices
Techniques pertaining to analyzing power consumed by a processing unit in a mobile computing device caused by execution of certain modules are described herein. A power trace is generated that indicates an amount of power consumed by the processing unit over time, and the power trace is aligned with an execution log. Spikes are extracted from the power trace, and computing operations are performed over the spikes to acquire data pertaining to power consumed by the processing unit that are attributable to modules in the execution log.
Carbon emission tracker and tracking system
A carbon emission tracker is disclosed. The carbon emission tracker includes a main body, a power input interface, a power output interface, a power detecting unit, a communication unit, a memory unit, and a processing unit. The power detecting unit is configured to detect an electricity usage of an electrical appliance. The processing unit is configured to aggregate power consumption data over a time period and to store the power consumption data for the time period to the memory unit. The processing unit transmits the power consumption data of the memory unit to a data center through the communication unit. The power consumption data further includes identification data of the electrical appliance.
Method and apparatus for testing at least one temperature sensor in a vehicle
An apparatus and method for testing a temperature sensor in a vehicle is provided. The apparatus includes a power device. The power device is configured to receive a power signal and to filter the power signal to generate a filtered power signal. The power device is further configured to compare the filtered power signal to a first threshold and to test the temperature sensor based on the comparison of the filtered power signal to the first threshold.
A control and measurement system for a coriolis flowmeter having a flowtube, a driver adapted to vibrate the flowtube, and a pair of sensors adapted to generate signals indicative of movement of the flowtube when it is being vibrated by the driver, wherein the sensors are positioned relative to one another so the signals from the sensors are indicative of a mass flow rate of fluid through the flowtube. A digital drive signal generator is adapted to generate a variable digital drive signal for controlling operation of the driver. The digital drive signal generator can be adapted to cause the driver to resist motion of the flowtube during a first time period and amplify motion of the flowtube during a second time period. The digital drive signal generator can also be adapted to initiate motion of the flowtube by sending one or more square wave signals to the driver.
A diagnostic mechanism includes: a flow rate control part configured to control an opening degree of a flow rate control valve provided in a flow passage so that a measurement flow rate value outputted from a flow rate sensor becomes a target flow rate value; an inspection value output part configured to output an inspection value related to a time integral of the measurement flow rate value in a diagnostic period which is defined in correspondence with a part of a period from a time point of closing the flow passage upstream of the flow rate sensor to a time point of expiration of a state that the measurement flow rate value and the target flow rate value are substantially nearly equal; and a diagnosing part configured to compare the inspection value and a predetermined specified value to diagnose whether an abnormality relating to the flow rate sensor is present.
Method for the treatment of acquired lymphedema
The present invention identifies genes whose gene products are differentially expressed in lymphedema tissues, particularly cutaneous tissue involved in whole organ response to lymphedema. The invention provides methods for diagnosing or assessing an individual's susceptibility to lymphedema. Also provided are therapeutic methods for treating a patient or methods for prophylactically treating an individual susceptible to lymphedema. Additionally, the invention describes screening methods for identifying agents that can be administered to treat individuals that have or at risk of developing lymphedema.
Formation resistivity measurements using multiple controlled modes
Disclosed is an apparatus for estimating a property of an earth formation penetrated by a borehole. The apparatus includes a plurality of electrodes disposed downhole and configured to inject an electrical current into the earth formation using an applied voltage and/or measure electrical current resulting from an injection of the electrical current. The apparatus also includes a processor configured to perform a series of formation measurements that include injecting current into the earth formation using a unique subset of electrodes in the plurality of electrodes and measuring current in the earth formation using one or more electrodes not used for the current injecting. The processer sums the measured currents for the electrodes wherein the sum of electrical currents for at least one electrode that measured electrical current is substantially in phase with the applied voltage; and uses the sum of in phase currents to estimate the property.
System and method for automatic detection and analysis of borehole breakouts from images and the automatic generation of alerts
Disclosed is a method for detecting a pair of opposing breakouts in a borehole penetrating an earth formation. The method includes: conveying a downhole tool configured to perform measurements of a property of the earth formation; producing an image of the earth formation from the measurements, the image comprising a plurality of sectors; dividing the sectors into radial segments, each segment corresponding to an opposite segment; rotating the segments at least one sector at a time until a specified angle is achieved; calculating an average value for the measurements associated with each segment for each rotation of the segments; stacking the average values for opposing segments to produce stack values; determining a maximum or minimum stack value; determining if the maximum or minimum stack value exceeds a threshold value; and detecting the first breakout and the second breakout if the maximum or minimum stack value exceeds the threshold value.
Providing navigation instructions while operating navigation application in background
A method of displaying navigational instructions when a navigation application is running in a background mode of an electronic device is provided. The method displays a non-navigation application in the foreground on a display screen of the electronic device. The method displays a navigation bar without a navigation instruction when the device is not near a navigation point. The method displays the navigation bar with a navigation instruction when the device is near a navigation point. In some embodiments, the method receives a command to switch from running the navigation application in the foreground to running another screen view in the foreground. The method then runs the other screen view in the foreground while displaying a navigation status display on an electronic display of the device.
Hierarchical floating car data network
A hierarchical floating car data network comprises a central server, an egress point network, and a participating vehicle network. The egress point network is in communication with the central server. The egress point network comprises a plurality of egress points. The participating vehicle network comprises a plurality of participating vehicles. At least some of the plurality of participating vehicles are in direct communication with each other. At least some of the plurality of participating vehicles are in communication with at least some of the plurality of egress points. Furthermore, at least some of the plurality of participating vehicles may be in communication with the central server. A geographic database is formed from content communicated between the elements of the hierarchical floating car data network.
Geocoded data detection and user interfaces for same
A system, method and computer-readable medium are disclosed that can detect an address, geographic coordinates or business name in text displayed on a device and geocode or reverse geocode, respectively, the address/business name or geographic coordinates to provide geocoded data. The detecting and geocoding/reverse geocoding can be performed automatically. The geocoded data can be displayed in-place with the text in a user interface of the device or be provided to another application.
Satellite navigation/dead-reckoning navigation integrated positioning device
Even when inertial navigation is performed, whether or not the correction of a value detected by an external sensor is appropriate can be judged, so that a dramatically degraded positioning result is prevented from being outputted. A navigation device (100) comprises a GPS receiver (11), an acceleration sensor (12) for detecting at least two-axis accelerations in an X-axis direction that is the front-back direction of a moving body and a Y-axis direction that is the right-left direction of the moving body, and a at least one-axis angular velocity sensor (13) for detecting the angular velocity in an azimuth direction around a Z-axis orthogonal to the X-axis direction and the Y-axis direction. A sensor detection value appropriate correction judgment module (22) of an integrated calculation module (30) having a CPU or the like finds the product of the value (velocity) obtained by integrating the acceleration detection value in the X-axis direction and the angular velocity detection value in the azimuth direction, acquires the error between the value of the product and the acceleration detection value in the Y-axis direction, and judges whether or not corrections made by the acceleration sensor and the angular velocity sensor are appropriate by judging whether or not the error exceeds a predetermined threshold value.
Field device communications
The present invention is a system and method for caching data in mobile devices to improve field assessment capabilities in a relief management system. The system analyzes captured geolocation information associated with one or more mobile field devices to identify a set of data to be cached by a mobile field device. The system then communicates the set of data to be cached to the mobile field device. The data cached is predicated upon the predicted likely location of field assessment operations and the data includes server-side image tiles.
Systems and methods for providing improved TCAS bearing measurement
Systems and methods for improving bearing accuracy in a Traffic Collision Avoidance System (TCAS) environment. An interrogation signal is transmitted from an array of antenna elements. A response to the transmitted interrogation signal from a target is received at a first pair of elements of the array. The first pair of elements is separated by at most ½λ of the response signal. A processor determines coarse bearing of the received response. A second pair of elements of the array of antenna elements receives a response to the interrogation signal. The second pair of elements is separated by approximately Nλ of the response signal. N is an integer not equal to zero. A first bearing value to the target is determined based on the determined coarse bearing and the received response at the second pair of elements. The array is mounted on an aircraft or on a ground installation.
Computationally efficient intersection collision avoidance system
A back-propagating intersection collision avoidance system is provided. The system can include a first vehicle and a second vehicle, the first and second vehicles each operable to approach an intersection at a definable velocity and acceleration. In addition, the intersection can have a collision zone in which the first and second vehicles will collide if they are present there at the same time. The first vehicle can have a processing unit with a controller and a microprocessor, the microprocessor having an algorithm with a disturbance model. The processing unit is operable to back-propagate from the collision zone a capture set as a function of a disturbance for the first and second vehicles.
Estimation of roadway travel information based on historical travel data
A system for navigation along a desired route on a desired future date may include a map interface operable to display a traffic condition and a travel time received via a communication network, and an automobile navigation network communicatively coupled to the communication network. The automobile navigation network may estimate the traffic condition and the travel time for travel along the desired route on the desired future date based on historical travel information, current traffic information and current weather information. Information regarding the estimated travel conditions may be automatically communicated to the map interface. The traffic condition may include geographic location information and/or route information. The historical travel information may include historical traffic information.
Method and system for automatically selecting and displaying traffic images
Software, at a networked central computer or at a wireless mobile user device, uses GPS coordinates of a mobile user device's current location to determine a polygon in which the GPS coordinates lie. Upon determining the polygon that surrounds the current location, the software can perform a task related to the polygon. Examples of tasks include: determining traffic camera images to display on the mobile user device based on the location, speed, and heading of the user device. The images can include advertisements that pertain to the general vicinity, or demographics of those typically in the vicinity, of the cameras' coverage area. Another task includes associating performance data from a vehicle, and stored in a table, for a given location with a corresponding polygon that surrounds the location; processing the data; and assigning a risk value to the polygon based on the corresponding performance data.
Air-fuel ratio imbalance determining apparatus among cylinders for an internal combustion engine
An air-fuel ratio imbalance among cylinders determining apparatus according to the present invention obtains an output Vabyfs of an air-fuel ratio sensor disposed at a portion downstream of an exhaust gas aggregated portion of an exhaust gas passage, and obtains a second-order differential value d2AF (a change rate of a change rate of a detected air-fuel ratio abyfs) of a detected air-fuel ratio abyfs represented by the air-fuel ratio sensor output Vabyfs. The imbalance determining apparatus determines that an air-fuel ratio imbalance state among cylinders is occurring when a detected air-fuel ratio second-order differential corresponding value (for example, a second-order differential value d2AF per se) obtained in accordance with the second-order differential value d2AF is larger than a first threshold value.
Fuel injection control apparatus for internal combustion engine and method for controlling internal combustion engine
A fuel injection control apparatus includes a first injection timing setting device, a target second injection timing setting device, a reference injection timing calculator, and a second injection timing setting device. The reference injection timing calculator is configured to calculate, as a reference injection timing, a timing at which a second-injection boosting operation is to be completed. The second-injection boosting operation is to re-boost a reduced voltage which has been reduced because of an execution of a first injection operation by using a booster circuit. The second injection timing setting device is configured to set, as a second injection timing at which a second injection operation is to be started, a later one of a target second injection timing set by the target second injection timing setting device and the reference injection timing calculated by the reference injection timing calculator.
Control apparatus for engine
A first calculation device is provided that calculates a ratio of a target torque equivalent value of an engine to a maximum torque equivalent value of the engine, as a pressure ratio equivalent value. A second calculation device is also provided that calculates a flow velocity of air to flowing through a throttle valve in the engine, based on the pressure ratio equivalent value calculated by the first calculation device. A third calculation device is further provided that calculates a target throttle valve opening, based on the flow velocity calculated by the second calculation device. With this configuration, the target opening of a throttle valve corresponding to the requested engine torque, without using the pressures before and after the throttle valve section.
Speed control for a fixed pitch ram air turbine
A system of speed control for a ram air turbine of an aircraft includes a power electronics controller, at least one routing device in communication with the power electronics controller, at least one secondary load in serial communication with the at least one routing device and the power electronics controller, and a ram air turbine (RAT) in communication with the power electronics controller, wherein the power electronics controller is configured to apply the secondary load to the RAT through the at least one routing device in response to a transient speed increase of the RAT.
Shift control method for vehicle having DCT
A shift control method for a vehicle having a double clutch transmission may include determining whether or not a speed change may be between transmission gears which may be allocated to a same input shaft, determining whether or not a gear of the input shaft may be released, when the gear of the input shaft may be released, engaging working parts of a clutch of the input shaft with each other in a range before synchronization of a final target transmission gear starts.
Transmission and straddle-type vehicle
A transmission includes a dog clutch type transmission mechanism, a clutch actuator that drives a clutch, a shift actuator that moves a movable gear of the transmission mechanism, and a delay time setting section that sets a delay time which is a time period between start of disengagement of the clutch and start of movement of the movable gear. When an engagement force between dog portions to be disengaged from each other is a first engagement force, the delay time setting section sets the delay time to a first delay time. When the engagement force is a second engagement force smaller than the first engagement force, the delay time setting section sets the delay time to a second delay time shorter than the first delay time.
Control system and method for the transmission of a vehicle
A control system for the transmission of an agricultural vehicle or an industrial off-highway vehicle, wherein the system comprises a controller of the clutch, connected thereto to supply an operating signal, a plurality of sensors suitable for measuring a plurality of characteristic quantities of the transmission and connected to the controller to supply a plurality of signals proportional to the quantities, a torque processor suitable for calculating a reference torque and connected to the controller to supply thereto a signal proportional to the reference torque, and a thermal load managing device suitable for receiving at least some of the plurality of quantities and for receiving the reference torque in order to calculate at least one operative datum on which the thermal power exchanged in the clutch is dependent. The control system is suited to process the operative datum to operate the transmission so as to limit the temperature in the clutch.
Method and system for automated control of transmission ratio change
The present invention relates to a method and system for automated control of transmission ratio change which balances the requirements for power with energy efficiency. A plurality of sensors detect environmental conditions of a vehicle. An environmental conditions analysis unit analyzes the environmental conditions to determine whether the detected environmental conditions indicate a likelihood of a transmission ratio increase. When the detected environmental conditions indicate the likelihood of the transmission ratio increase, an automatic transmission changes in operation from a normal state to a prepared state. However, after a predetermined amount of time, the automatic transmission changes from the prepared state back to the normal state when there is no user indication that the transmission ratio should be increased.
System and method of controlling shifting for vehicle
A system and a method of controlling shifting for a vehicle includes a data detector detecting data for a shift control, a road condition determiner determining a road condition based on the data, a short term driving tendency determiner determining a short term driving tendency of a driver based on the data, and a long term driving tendency determiner determining a long term driving tendency of the driver based on the short term driving tendency of the driver. An optimal driving mode determiner determines an optimal driving mode based on the road condition, the short term driving tendency of the driver, and the long term driving tendency of the driver, wherein the system controls shifting according to the optimal driving mode determined by the optimal driving mode determiner.
Method and system for preventing herbicide application to non-tolerant crops
A method controlling an agricultural sprayer includes identifying an herbicide to be sprayed using the agricultural sprayer, determining a geoposition associated with the agricultural sprayer within a field, determining if crop planted at the geoposition is tolerant to the herbicide using as-planted data, and if the crop is not tolerant of the herbicide, preventing herbicide spraying operations while the agricultural sprayer is at the geoposition. An agricultural sprayer adapted for performing the method is also provided.
System and method for speed adaptive steering override detection during automated lane centering
One or more vehicle steering measurements of a vehicle may be measured. One or more expected vehicle steering measurements may be calculated, each calculated expected vehicle steering measurement corresponding to one of the measured vehicle steering measurements. At least one difference between one of the measured vehicle steering measurements and its corresponding calculated expected vehicle steering measurement may be calculated. A speed of the vehicle may be measured. One or more current threshold values may be calculated based on the measured speed, each of the current threshold values corresponding to one of the measured vehicle steering measurements and its corresponding calculated expected vehicle steering measurement. An automatic vehicle control system may be deactivated when one or more of the calculated differences exceeds its corresponding current threshold value.
Suspension control apparatus
[Object]The present invention provides a suspension control apparatus that allows miniaturization of a solenoid valve.[Solution]When a controller is started up by a power source controller (a power source unit), the controller switches a control current from 0 ampere to a maximum current value I6 at the same time as the startup. After that, the control shifts to normal control. As a result, even if a hysteresis of a damping force characteristic is large relative to the control current, it is possible to promptly move a solenoid valve to a position to be used in the normal control.
Driving pattern recognition and safety control
Systems and methods are provided for controlling a vehicle. A safe envelope driving pattern is determined to control the vehicle in an autonomous mode. User identification data and sensor data are received from one or more sensors associated with the vehicle. A driver-specific driving pattern is determined based on the received sensor data and the user identification data. Operation of the vehicle is controlled in the autonomous mode based on the identification of the user in the driver's seat, the safe envelope driving pattern, and the user-specific driving pattern.
Systems and methods for controlling movement of unmanned vehicles
Control units (10) for use with unmanned vehicles (12) include an input device (50) that moves in response to a user input, sensors (70) coupled to the input device (50), and a controller (16). The sensors (70) generate outputs related to the movement of the input device (50). The controller (16) determines a target displacement of the unmanned vehicle (12) based on the outputs of the sensors (70), and generates a control input related to the target displacement. The control input, when received by the unmanned vehicle (12), causes the unmanned vehicle (12) to substantially attain the target displacement. The position of the vehicle (12) is thus controlled by directly controlling the displacement of the vehicle (12).
Methods and systems for reducing gear lash noise
Systems and methods for improving operation of a hybrid vehicle are presented. In one example, driveline gear lash gear tooth to gear tooth impact may be reduced via adjusting operation of an electric machine. For example, gear tooth to gear tooth impact may be reduced by operating the electric machine in a speed control mode to manage torque during driveline torque transition from a negative torque to a positive torque.
A hybrid vehicle is provided in which after a determination is made as to whether the remaining capacity is higher than a first threshold value, any one of a first running mode, a second running mode, and a third running mode is selected depending on first speed, second speed, or third speed so that the vehicle runs in the mode, whereby the vehicle can run by easily selecting an appropriate series hybrid mode or an appropriate parallel hybrid mode in each range depending on whether the remaining capacity is higher than the first threshold value, and running control can be made stable and easy.
Aerological phenomena alert device for an aircraft
An aerological phenomena alert device for an aircraft, which comprises onboard equipment capable of detecting meteorological phenomena, comprises: a module for collecting and storing meteorological data originating from the onboard equipment capable of detecting the meteorological phenomena, a module for creating a report from the collected meteorological data, a module for sending the report, a module for receiving reports sent by surrounding aircraft, a module for processing and consolidating the reports received, and for generating alerts when a report signals an aerological phenomenon, and a module for merging the data originating from aircraft and from meteorological stations, situated in a station on the ground and comprising a ground/air communication module for sending meteorological reports adapted to each aircraft according to its position in relation to an aerological phenomenon.
Passive entry and passive start system with operator walking detection
A passive entry passive start (PEPS) vehicle security system configured to activate a vehicle function when an activation signal is received. The system includes a nomadic device configured to detect a change of a magnetic field relative to the nomadic device, and emit an activation signal only if the change corresponds to walking by an operator carrying the nomadic device.
Methods for managing power consumption for a hands-free dispenser
Methods for managing power consumption of a battery-powered device such as a fluid dispenser are disclosed. One method includes setting a duty cycle of a sensor used by the device to a first range and setting a timer upon detection of a triggering event and also setting the duty cycle to a triggering event and also setting the duty cycle to a second range. The method continues by checking for another triggering event during the second range. The checking step is repeated if the timer has not lapsed, but if the timer has lapsed the process returns to the setting step. Related methods may be used to adjust the duty cycle based upon a detected characteristic such as light, sound, motion or time.
Hybrid three-phase power flow analysis method for ungrounded distribution systems
A method for a three phase power flow analysis of an ungrounded power distribution system partitions a topology of the power distribution system into a mainline system and a set of tap systems, wherein the mainline system is formed by mainline buses connecting a swing bus and a set of constant active power and voltage magnitude (PV) buses, wherein the tap system is formed by one or many tap buses, such that a root bus of each tap system corresponds to a mainline bus. Next, the method determines voltages of the mainline buses based on a function of a total load of each tap system; and determines voltages of tap buses based on a voltage of the corresponding root bus of the mainline and load of each tap bus.
Regenerating electric power distribution switching plans based on changing power distribution network conditions
A method for regenerating switching plans based on changing power distribution network conditions includes updating a power distribution network model in response to a power distribution network event, identifying areas of the power distribution network affected by the power distribution network event, identifying switching plans that are impacted by the power distribution network event and regenerating the switching plans that are impacted by the power distribution network event.
Radiant heating controls and methods for an environmental control system
Embodiments of the invention describe thermostats that use model predictive controls and related methods. A method of controlling a thermostat using a model predictive control may involve determining a parameterized model. The parameterized model may be used to predicted ambient temperature values for an enclosure. A set of radiant heating system control strategies may be selected for evaluation to determine an optimal control strategy from the set of control strategies. To determine the optimal control strategy, a predictive algorithm may be executed, in which each control strategy is applied to the parameterized model to predict an ambient temperature trajectory and each ambient temperature trajectory is processed in view of a predetermined assessment function. Processing the ambient temperature trajectory in this manner may involve minimizing a cost value associated with the ambient temperature trajectory. The radiant heating system may subsequently be controlled according to the selected optimal control strategy.
HVAC controller with device scheduling program
A controller is provided for HVAC equipment. The controller has a processor, memory, and a RF module for a home automation network, and is operable to regulate operation of the HVAC equipment based upon a scheduling program stored in memory. The scheduling program includes at least one usage periods and at least one set point associated with each usage period. The controller is also operable to regulate operation of remote electrical devices over the home automation network; and to create a device scheduling program for the remote electrical devices, the device scheduling program including at least one device period and an operational state associated with each device period.
Masterless control system methods for networked water heaters
Disclosed is a masterless control system for controlling a plurality of fluidly and operably connected water heaters to meet a hot water demand such that overall efficiency is maximized and usage disparity between water heaters is minimized. There is further disclosed a method for detecting a small system demand in said network by adjusting the setting of each flow limiting valve of each water heater. There is still further disclosed a method for enabling seamless addition or removal of a heater in service and heating load distribution to water heaters.
A real-time method for controlling a system, the system including a plurality of controlling means each having at least one variable parameter (q) and a controlled element having a trajectory which is controlled by the controlling means, wherein the trajectory is related to the variable parameters by a variable matrix, the method comprising defining a control transfer matrix (K) relating the variable parameters dq to the trajectory dx, and using a feedback loop in which a feedback term is computed that is dependent on an error (e) which is the difference between the desired trajectory (dxd) which can have an arbitrary dimension specified as (m) and a current trajectory (dx).
User interfaces for robot training
In accordance with various embodiments, a user-guidable robot appendage provides haptic feedback to the user.
Method for controlling an automated work cell
A method for controlling an automated work cell which includes at least one robot arm having at least three degrees of freedom controlled according to a plurality of control axes; a control center; a device for controlling the robot arm which includes a plurality of motor controllers each controlling operation of one motor and suitable for operating at least one portion of the robot arm; and a communication bus between the control center and the device for controlling the robot arm; wherein the method includes steps of: a) sending instructions emitted by the control center to control the control axes to a single arithmetic unit belonging to the device for controlling the robot; b) determining, within the arithmetic unit and according to instructions received from the orders for each of the motors controlled by a motor controller; and c) sending each motor controller an order, determined in step b), for the motor controlled by each motor controller.
Method for controlling the walking motion of a mobile robot, and robot implementing said method
A computer program and a system for controlling walking of a mobile robot, notably a humanoid robot moving on two legs. Conventionally, control was guided by driving a zero moment point. Such driving was performed within a fixed coordinate system connected to a progression surface and assumed knowledge of the characteristics of said surface and the creation of a provisional trajectory. Such driving encountered significant limitations due to the nature of the progression surfaces on which walking can effectively be controlled and an obligation to have a perfect knowledge of their geometry; and also in respect to the necessary computing power, and the appearance of the walk which bore little resemblance to an actual human walk. The invention overcomes such limitations by providing a walk which includes a pseudo-free or ballistic phase, an impulse phase imparted by the heel of the robot, and a landing phase.
Brick laying system
A brick laying system where an operator such as a mason works proximate a moveable platform having a robotic arm assembly, a mortar applicator with a mortar transfer device, and a brick transfer device to build structures. The robotically assisted brick laying system may also contain a stabilizer having a disturbance sensing and a disturbance correcting component that provides compensation for disturbances caused by load shifting, movement of the platform, wind, operator movement, and the like. In addition, the robotically assisted brick laying system has a sensing and positioning component for controlling placement of the moveable platform and robotic arm assembly. The interoperability of the system with a mason or skilled operator removes much of the manual labor component of brick laying, allowing the mason more time to focus on craftsmanship and quality, thus improving the end product and the overall working conditions of the mason.
System and method for remotely dispensing media discs
A system for dispensing media discs includes a storage system comprising a plurality of shelves for storing the media discs, a dispense system for dispensing the media discs to consumers, a disc transfer system for moving the media discs from the disc storage system to the dispense system, a control system operably connected to the disc transfer system to selectively activate the disc transfer system to move the media discs from the disc storage system to the dispense system, and a user interface system operably connected to the control system. The shelves are configured to store uncovered media discs.
Method and computer program product for distinguishing and sorting seeds containing a genetic element of interest
In various embodiments, the present invention comprises associating a marker with at least some of the seeds containing a genetic element of interest of the bulk sample, exciting the seeds using an photonic emitting device, evaluating at least some of the seeds of the bulk sample for the presence or absence of the marker, and sorting the seeds containing a genetic element of interest based on the presence or absence of the marker. In various other embodiments, the method may comprise associating a red fluorescent protein marker with at least some of the seeds containing a genetic element of interest of the bulk sample, evaluating at least some of the seeds of the bulk sample for the presence of the red fluorescent protein marker using an evaluating device, and sorting the seeds containing a genetic element of interest based on the presence of the red fluorescent protein marker.
High throughput parcel handling
A high throughput parcel unloading system includes a robotic arm arrangement, including a cluster of robotic arms having grouping mechanisms. A conveyor system is also provided onto which parcels are placed by the robotic arm system. An image recognition system determines the position and arrangement of parcels within a container, and a control system is configured to receive image information from the image recognition system and control operation of the robotic arm system and conveyor system.
Automated warehousing using robotic forklifts
A system for automated inventory management and material handling removes the requirement to operate fully automatically or all-manual using conventional vertical storage and retrieval (S&R) machines. Inventory requests to place palletized material into storage at a specified lot location or retrieve palletized material from a specified lot are resolved into missions for autonomous fork trucks, equivalent mobile platforms, or manual fork truck drivers (and their equipment) that are autonomously or manually executed to effect the request. Automated trucks plan their own movements to execute the mission over the warehouse aisles or roadways sharing this space with manually driven trucks. Automated units drive to planned speed limits, manage their loads (stability control), stop, go, and merge at intersections according human driving rules, use on-board sensors to identify static and dynamic obstacles, and human traffic, and either avoid them or stop until potential collision risk is removed.
System and method of solving supply chain campaign planning problems involving major and minor setups
A system including a computer solves supply chain campaign planning problems involving major and minor setups. The computer is configured to execute a major campaign for two or more of a plurality of major product families and fix an optimal major product family to a major time period on a planning horizon, based at least on aggregated major productivity fractions and calculated second moments of a plurality of two or more major product families. The computer is further configured to execute a minor campaign for two or more minor product families associated with the optimal major product family, obtain a minor productivity fraction of a campaignable resource for the minor product family over at least a portion of a major time period and fix an optimal minor product family from the two or more minor product families to a minor time period based at least on the minor productivity fraction.
Progressive encoding of audio
The present disclosure includes processing a signal to generate a first sub-set of data, transmitting the first sub-set of data for generation of a reconstructed audio signal, the reconstructed audio signal having a fidelity relative to the signal, processing the signal to generate a second sub-set of data and a third sub-set of data, the second sub-set of data defining a second portion of the signal and comprising data that is different than data of the first sub-set of data, and the third sub-set of data defining a third portion of the signal and comprising data that is different than data of the first and second sub-sets of data, comparing a priority of the second sub-set of data to a priority of the third sub-set of data, and transmitting one of the second sub-set of data and the third sub-set of data over the network for improving the fidelity.
System and method for a demand driven lean production control system
A system and method is disclosed providing visualization of a production control framework. The system includes a storage medium stored therein one or more user interfaces providing a visual representation of one or more graphical elements representing one or more entities, the one or more entities comprising one or more work centers, wherein the one or more work centers each comprise one or more user interfaces. The system further includes a storage medium stored therein a job queue display within the one or more user interfaces and a plurality of tasks for each of a plurality of parts produced by the one or more entities.
Methods and apparatus for state limiting in a control system
A method for operating a controlled device. A feedback signal is received from a controlled device, the feedback signal indicating actual system dynamics of the controlled device. A predefined limit is applied to the actual system dynamics to create limited system dynamics. A modulation parameter is calculated by a processor based at least in part on the limited system dynamics and the actual system dynamics. Desired system dynamics for the controlled device are generated by the processor based at least in part on the modulation parameter and an external command.
Active rejection of MRI gradient signals in an implantable medical device
Active rejection techniques are used to cancel MRI gradient signals in an implantable medical device. An active component placed in an input channel of the implantable medical device actively rejects MRI gradient signals received on the input channel. A sensing circuit that senses an external MRI gradient signal generates a control signal that controls the active component. For example, the control signal may be the inverse of the external MRI gradient signal. An active component that receives an input signal including a desired signal component (e.g., a cardiac signal) and an undesired MRI gradient signal component may thus use this control signal to reject the undesired MRI gradient signal component.
Automatic determination of the threshold of an evoked neural response
Automatically analyzing neural activity. The method comprises: applying electrical stimulation to a target neural region at an initial current level that approximates a typical threshold-Neural Response Telemetry (NRT) level; recording an NRT measurement of neural activity within the target neural region in response to the stimulation; and utilizing a machine-learned expert system to predict, based on one or more features of the neural activity, whether the NRT measurement contains a neural response.
Device and method for applying a transcutaneous electrical stimulation to the surface of a section of the human ear
The invention relates to a device for applying a transcutaneous electrical stimulation stimulus to the surface of a section of the human ear, which comprises a retaining element which is mountable on or in the ear and a number of electrodes which are arranged on or in an electrode carrier, wherein the device comprises a control apparatus which controls or regulates the generation of a potential difference between the electrodes. In order to permit an improved and safer transcutaneous stimulation the invention proposes that at least three electrodes are arranged on or in the electrode carrier, wherein the at least three electrodes are located in one plane, wherein the position of at least one of the at least three electrodes is adjustable on the electrode carrier and wherein the at least one electrode of which the position is adjustable is mounted such as to be displaceable in a translational manner in the plane. Furthermore, the invention relates a method for the operation of such a device.
System and method for treatment of pain related to limb joint replacement surgery
It has been discovered that pain felt in a given region of the body can be treated by stimulating a peripheral nerve at a therapeutically effective distance from the region where pain is felt to generate a comfortable sensation (i.e., paresthesia) overlapping the regions of pain. A method has been developed to reduce pain in a painful region following limb joint replacement by stimulating a peripheral nerve innervating the painful region with an electrode inserted into tissue and spaced from the peripheral nerve. This method may be used to help alleviate postoperative pain in patients following total knee arthroplasty surgery or other limb joint replacement surgeries.
Systems, methods and devices for a skull/brain interface
Systems, methods and devices are disclosed for directing and focusing signals to the brain for neuromodulation and for directing and focusing signals or other energy from the brain for measurement, heat transfer and imaging. An aperture in the skull and/or a channel device implantable in the skull can be used to facilitate direction and focusing. Treatment and diagnosis of multiple neurological conditions may be facilitated with the disclosed systems, methods and devices.
Connector assemblies for implantable stimulators
Exemplary systems include a stimulator configured to be implanted within a patient, the stimulator having a body defined by at least one side surface disposed in between distal and proximal end surfaces, and a connector assembly configured to be coupled to the stimulator and extend parallel to the at least one side surface of the stimulator. The connector assembly is further configured to facilitate removable coupling of a lead having one or more electrodes disposed thereon to the stimulator.
Controlling a personal medical device
Medical monitoring and treatment apparatus, which is controlled by a plurality of control sources, includes a “personal medical device” (PMD) or an “implantable medical device” (IMD), respectively carried by, or implanted in, a patient. The PMD/IMD is alternatively self-controlled or controlled by one or more local external control stations, at or near the location of the patient, and/or one or more remote external control stations, remote from the patient. Either or both of the local and remote stations may be operated by a person, such as the patient, a patient facilitator and/or a medical professional, or the stations may operate automatically. Since the device is controlled by multiple sources, hierarchies are used to select the source of control.
System and method for selection of pacing vectors
Various techniques are disclosed for quickly and efficiently determining cardiac pacing vectors that minimize phrenic nerve stimulation.
Fault tolerant pacing
Methods and/or devices may be configured to monitor the performance of pacing therapy and provide fault-tolerant operation to provide therapy in the event of certain failure modes occurring in the pacing delivery circuits, leads, and/or lead/tissue interfaces. Generally, the methods and/or devices may provide fault-detection, fault-recovery and fault-handling to, e.g., handle potential faults.
Utilization of morphology discrimination after undersensing determination for underlying rhythms in the therapy zone
A medical device and method for detecting and classifying cardiac rhythm episodes that includes a sensing module to sense cardiac events, a therapy delivery module, and a detection module configured to determine intervals between the sensed cardiac events, determine a predetermined cardiac episode is occurring in response to the determined intervals, determine whether a ventricular rate is greater than an atrial rate in response to the determined intervals, determine whether undersensing is occurring in response to the ventricular rate being greater than the atrial rate, perform a supraventricular tachycardia (SVT) discrimination analysis in response to undersensing occurring, and control the therapy delivery module to deliver therapy in response to the SVT discrimination analysis.
Systems and methods for treating supraventricular arrhythmias
In various method embodiments, a supraventricular arrhythmia event is detected, and a supraventricular arrhythmia treatment, including neural stimulation to elicit a sympathetic response, is delivered in response to a detected supraventricular arrhythmia event. Some embodiments detect a precursor for a supraventricular arrhythmia episode, and deliver prophylactic neural stimulation to avoid the supraventricular arrhythmia event. Some embodiments detect a supraventricular arrhythmia episode, and deliver therapeutic neural stimulation for the supraventricular arrhythmia event.
Wearable defibrillator with audio input/output
A wearable defibrillator and method of monitoring the condition of a patient. The wearable defibrillator includes at least one therapy pad, at least one sensor and at least one processing unit operatively connected to the one or more therapy pads and the one or more sensors. The wearable defibrillator also includes at least one audio device operatively connected to the one or more processing units. The one or more audio devices are configured to receive audio input from a patient.
Method and apparatus for personalized physiologic parameters
Methods and apparatus combine patient measurement data with demographic or physiological data of the patient to determine an output that can be used to diagnose and treat the patient. A customized output can be determined based the demographics of the patient, physiological data of the patient, and data of a population of patients. In another aspect, patient measurement data is used to predict an impending cardiac event, such as acute decompensated heart failure. At least one personalized value is determined for the patient, and a patient event prediction output is generated based at least in part on the personalized value and the measurement data. For example, bioimpedance data may be used to establish a baseline impedance specific to the patient, and the patient event prediction output generated based in part on the relationship of ongoing impedance measurements to the baseline impedance. Multivariate prediction models may enhance prediction accuracy.
Implantable electronic therapy device
An implantable electronic therapy device, having a therapy unit, a heart rate capturing unit, a contractility determination unit, and an evaluation and control unit. The therapy unit delivers an antitachycardiac therapy. The heart rate capturing unit determines a ventricular heart rate from an input signal, and the contractility determination unit generates from an input signal, a contraction signal reflecting a contractility of a ventricle. The evaluation and control unit is connected to the therapy unit, the heart rate capturing unit, and the contractility determination unit actuates the therapy unit to administer an antitachycardiac therapy when the heart rate capturing unit detects an increase in the heart rate above a specified threshold value and the contractility determination unit supplies a contraction signal which is not physiologically adequate for the increase in the heart rate.
Body worn physiological sensor device having a disposable electrode module
A body-worn patient monitoring device includes providing a substrate that supports one or more electrical connections to a patient's body. The method further includes determining a print pattern and thickness of a first material having a first resistivity to be printed on the substrate, determining a print pattern and thickness of a second material having a second resistivity to be printed on the substrate, printing the first material onto the substrate, and printing the second material onto the substrate wherein at least part of the second the material overlays the first material.
Method and determination of cardiac activation from electrograms with multiple deflections
A method and system for determining activation times for electric potentials from complex electrograms to identify the location of arrhythmic sources or drivers. The method includes counting a number deflections in a recorded cardiac electrogram signal from at least one electrode for a predetermined amount of time. A deflection time is identified for each of the counted number of deflections. A most negative slope is identified between each of the identified deflections times. Each of the identified most negative slopes is correlated to a possible activation time. Each possible activation time is associated with a corresponding electrode from the at least one electrode. A spatial voltage gradient at each corresponding electrode is calculated for each possible activation time. The greatest spatial voltage gradient is identified. The greatest spatial voltage gradient is correlated to an activation time.
Method for evaluating blush in myocardial tissue
Vessel perfusion and myocardial blush are determined by analyzing fluorescence signals obtained in a static region-of-interest (ROI) in a collection of fluorescence images of myocardial tissue. The blush value is determined from the total intensity of the intensity values of image elements located within the smallest contiguous range of image intensity values containing a predefined fraction of a total measured image intensity of all image elements within the ROI. Vessel (arterial) peak intensity is determined from image elements located within the ROI that have the smallest contiguous range of highest measured image intensity values and contain a predefined fraction of a total measured image intensity of all image elements within the ROI. Cardiac function can be established by comparing the time differential between the time of peak intensity in a blood vessel and that in a region of neighboring myocardial tissue both pre and post procedure.
Process, system and software arrangement for measuring a mechanical strain and elastic properties of a sample
A system, process and software arrangement are provided to determining data associated with at least one structural change of tissue. In particular, a first optical coherence tomography (“OCT”) signal which contains first information regarding the tissue at a first stress level, and a second OCT signal which contains second information regarding the tissue at a second stress level are received. The first and second information are compared to produce comparison information. The data associated with the at least one structural change is determined as a function of the comparison information and further information associated with (i) at least one known characteristics of the tissue and/or (ii) characteristics of an OCT system. Further, at least one optical coherence tomography (“OCT”) signal which contains information regarding the tissue can be received, and the modulus of the tissue may be determined as a function of the received at least one OCT signal.
CAS system for condyle measurement
A computer assisted surgery system for conducting orthopedic surgery on a knee joint includes a condyle digitizer having a posterior condyle abutment surface defining a first plane and a distal condyle abutment surface defining a second plane perpendicular to the first plane, and a trackable member which is locatable and trackable in three dimensional space by the computer assisted surgery system to define at least orientation of the condyle digitizer in real time. A computer determines a most remote reference point of the femur of the knee joint lying within at least one of the first and second planes when the condyle digitizer is abutted against condyles of the femur such that the posterior condyle abutment surface abuts a posterior side of the condyles and the distal condyle abutment surface abuts a distal side of the condyles.
Biosensor with electrodes and pressure compensation
A biosensor is described which can obtain physiological data from an individual. The biosensor may collect electrodermal activity, skin temperature, and other information. The biosensor may be attached to the body through the use of a garment which may be fastened in multiple locations on the human body. The biosensor has replaceable electrodes which may be interchanged. The electrodes contact the body without having any wires or leads external to the sensor.
Analyte monitoring device and methods
Method and system for determining real time analyte concentration including an analyte sensor having a portion in fluid contact with an interstitial fluid under a skin layer, an on-body electronics including a housing coupled to the analyte sensor and configured for positioning on the skin layer, the on-body electronics housing including a plurality of electrical contacts, on the housing; and a data analysis unit having a data analysis unit housing and a plurality of probes, on the housing. Each of the probes configured to electrically couple to a respective electrical contact when the data analysis unit is positioned in physical contact with the on-body electronics. The one or more signals on the probes correspond to one or more of a substantially real time monitored analyte concentration level (MACL), MACL over a predetermined time period, or a rate of change of the MACL, or combinations thereof, are provided.
Tissue imaging system and in vivo monitoring method
An in vivo monitoring method in a laparoscope system is provided. An object image is sequentially created with expression of a surface color of an object in a body cavity. A lock area (specific area) is determined within the object image, the lock area being movable by following motion of the object. A monitor image including a graph of oxygen saturation is generated according to a part image included in the object image and located in the lock area. The monitor image is displayed. Preferably, the oxygen saturation of the lock area is acquired according to two spectral data with respect to wavelengths of which an absorption coefficient is different between oxidized hemoglobin and reduced hemoglobin in data of the object image. The object is constituted by a blood vessel.
Medical sensor for reducing motion artifacts and technique for using the same
A sensor for pulse oximetry or other applications utilizing spectrophotometry may be adapted to reduce motion artifacts by fixing the optical distance between an emitter and detector. A flexible sensor is provided with a stiffening member to hold the emitter and detector of the sensor in a relatively fixed position when applied to a patient. Further, an annular or partially annular sensor is adapted to hold an emitter and detector of the sensor in a relatively fixed position when applied to a patient. A clip-style sensor is provided with a spacer that controls the distance between the emitter and detector.
Method and apparatus for spectrophotometric based oximetry
A near infrared spectrophotometric (NIRS) sensor assembly for non-invasive monitoring of blood oxygenation levels in a subject's body is provided that includes a pad, at least one light source, a near light detector, a far light detector, and a cover. The light source is operative to emit near infrared light signals of a plurality of different wavelengths. The near light detector is separated from the light source by a first distance that is great enough to position the first light detector outside of an optical shunt field extending out from the light source. The far light detector is substantially linearly aligned with the near light detector and light source, and is separated from the near light detector by a second distance, wherein the second distance is greater than the first distance.
Tissue profile wellness monitor
A tissue profile wellness monitor measures a physiological parameter, generates a tissue profile, defines limits and indicates when the tissue profile exceeds the defined limits. The physiological parameter is responsive to multiple wavelengths of optical radiation after attenuation by constituents of pulsatile blood flowing within a tissue site. The tissue profile is responsive to the physiological parameter. The limits are defined for at least a portion of the tissue profile.
Oxide superconductor cabling and method of manufacturing oxide superconductor cabling
Disclosed are an oxide superconductor tape and a method of manufacturing the oxide superconductor tape capable of improving the length and characteristics of superconductor tape and obtaining stabilized characteristics across the entire length thereof. A Y-class superconductor tape (10), as an oxide superconductor tape, comprises a tape (13) further comprising a tape-shaped non-oriented metallic substrate (11), and a first buffer layer (sheet layer) (12) that is formed by IBAD upon the tape-shaped non-oriented metallic substrate (11); and a second buffer layer (gap layer) (14), further comprising a lateral face portion (14a) that is extended to the lateral faces of the first buffer layer (sheet layer) (12) upon the tape (13) by RTR RF-magnetron sputtering.
Superconducting rotating electrical machine and manufacturing method for high temperature superconducting film thereof
The present disclosure relates to a superconducting rotating electrical machine and a manufacturing method for a high temperature superconducting film thereof. The superconducting rotating electrical machine includes a stator, and a rotor rotatable with respect to the stator, the rotor having a rotary shaft and a rotor winding. Here, the rotor winding includes tubes disposed on a circumference of the rotary shaft and each forming a passage for a cooling fluid therein, superconducting wires accommodated within the tubes, and a cooling fluid flowing through the inside of the tubes. This configuration may allow for direct heat exchange between the superconducting wires and a refrigerant, resulting in improvement of heat exchange efficiencies of the superconducting wires.
Mobile terminal and control method thereof
A mobile terminal and a method of controlling the mobile terminal may be provided. The mobile terminal may display an application on a home screen and execute the application upon shifting to a page of the home screen on which the application is arranged. The mobile terminal may change display characteristics of an item arranged on the home screen in response to a drag input for the item.
Protective cushion cover for an electronic device
Disclosed is a protective case for an electronic device. The protective case has two layers, an inner cushion cover that surrounds a portion of the electronic device and an outer rigid shell. The outer rigid shell has curved flexible arms that engage and hold the cushion cover 104 on the electronic device. The cushion cover has reduced thickness portions so that the curved flexible arms are embedded in the cushion cover and provide a protective case having a substantially smooth exterior. The cushion cover is capable of absorbing shocks from impacts on the rigid outer shell. Coring on the inner portion of the cushion cover provides additional softness and the ability of the cushion cover to absorb shocks while using a higher density material, which is able to conform to the electronic device.
A basestation, for use in a cellular communications network, is adapted to provide a cellular communications service in at least one active cellular communications network by transmitting signals on system downlink channels of the active network and by receiving signals on system uplink channels of the active network. The basestation is also adapted to receive signals on system downlink channels of the active network. Further, the basestation is adapted to receive signals on system downlink channels of at least one additional network, although it is unable to transmit signals on system downlink channels of the additional network. The additional network may operate in accordance with a different cellular standard from the active network, and/or may be operated by a different cellular network operator from the active network. For example, where the active cellular communications network is a UMTS network, the additional network may be a GSM network, such that said basestation is adapted to receive signals on system downlink channels of the GSM network and is unable to transmit signals on system downlink channels of the GSM network.
Method for realizing user interface using camera and mobile communication terminal for the same
A method for realizing a user interface using a camera module and a mobile communication terminal for the same. If a user makes a predetermined motion in a state in which the camera module of the mobile communication terminal is activated, the mobile communication terminal performs a predetermined action according to the motion pattern by recognizing the user motion and patterning the motion. In this case, the action performed according to the motion pattern corresponds to mouse control in a mouse mode, game control in a game mode, and character input in a character input mode.
Location based network selection
A mobile network system includes a number of mobile network base stations and a mobile station. The mobile station includes a mobile station antenna and a location determination device for identifying a geographic location of the mobile station. A mobile transceiver is also included and is configured to transmit and receive mobile communication signals from the mobile network base stations via the antenna. A microprocessor controls the transmission and reception of the mobile communication signals and communicates with the location determination device. Further, a spatial database identifies geographic positions related to the mobile networks. The microprocessor compares the geographical location of the mobile station with the geographic positions of the mobile networks to determine a preferred mobile network system.
TV white space database assisted locationing for TV band devices
A method and system for obtaining an available white space channel for wireless communication using a white space device (WSD) are described. The WSD scans signals of TV transmitters, determines the received signal strength (RSSI) for those signals, and records TV data, including TV designations and corresponding RSSIs, for signals that exceed a predetermined threshold. The WSD sends TV data for at least three TV transmitters to an enhanced TV white space database (EnTVDB). The EnTVDB uses the TV data and information in its database to determine the geo-coordinates of the WSD. The EnTVDB uses the geo-coordinates of the WSD to identify available white space. The EnTVDB sends at least one channel of available white space to the white space device for its wireless communication.
Antenna selection method and device
An antenna selection method includes respectively utilizing each antenna of a plurality of antennas to receive a plurality of transmission signals from a plurality of stations to generate a plurality of reception signals, respectively estimating a plurality of signal quality indicators corresponding to the plurality of stations according to the plurality of reception signals for each of the plurality of antennas, calculating a weighted sum of the plurality of corresponding signal quality indicators to generate a calculation result for each of the plurality of antennas, and selecting a receiving antenna from the plurality of antennas according to the corresponding calculation result of each of the plurality of antennas.
Wireless resource setting method, wireless communication system, wireless base station, and program
A wireless base station (100) calculates a first transmission rate when performing transmission to a wireless terminal with communication path quality by a first transmission power in a first candidate band selected as a candidate from first wireless bands including a neighboring priority band, calculates a second transmission rate when performing transmission to the wireless terminal (200) with the communication path quality by a second transmission power in a second candidate band selected as a candidate from second wireless bands that do not include the neighboring priority band, and sets, out of a first wireless resource including the first transmission power and the first candidate band and a second wireless resource including the second transmission power and the second candidate band, a wireless resource for a higher transmission rate obtained by the calculation as a wireless resource allocatable to the wireless terminal (200). It is therefore possible to maximize the throughput of the wireless terminal existing in the local station communication area while implementing suppression of interference to the neighboring cell.
Fine-grain and backward-compliant resource allocation
There is provided fine-grain and backward-compliant resource allocation, including allocating, to a control channel, one of a first plurality of bandwidths being standardized for a first radio access standard, and allocating, to a data channel, one of a second plurality of bandwidths being standardized for a second radio access standard, the second bandwidths plurality exceeding the first bandwidths plurality in terms of at least one of granularity and range. The thus disclosed resource allocation may exemplarily be applied on a downlink.
Location, time, and context-based deferred notifications on a mobile device
A method and system for a first user to provide a future notification (referred to as a deferred notification) on second user's mobile device based on the second user's location are disclosed.
Methods and apparatus for supporting inter-frequency measurements
The invention relates to methods and devices for supporting configuration of a measurement gap pattern for a user equipment (91) requiring measurement gaps for performing an inter-frequency measurement. A radio network node (81) receives an indication (85) from the user equipment (91) that the user equipment (91) is going to perform an inter-frequency measurement for positioning, which inter-frequency measurement requires measurement gaps. The radio network node (81) may determine a measurement gap pattern for performing the inter-frequency measurement and may signal, to the user equipment (91), information (86) to initiate use of the determined measurement gap pattern in the user equipment (91). Alternatively the user equipment (91) configures the measurement gap pattern itself based on a set of pre-defined rules.
Locating a wireless local area network associated with a wireless wide area network
An apparatus and method are disclosed in connection with a mobile device locating a wireless local area network (WLAN) associated with a wireless wide area network (WWAN). These concepts involve obtaining and recording maximum and minimum geometric time differences (GTDs) for a pair or pairs of transmitters in the WWAN while coverage is provided by the WLAN, and using these differences to later compare a contemporaneous GTD to determine whether the mobile device is more likely within the coverage area of the WLAN.
System and method for disseminating user location information
A computer-implemented method for disseminating user mobile device location information is provided. The method includes enabling a first request for location information of a mobile device based on at least one of a particular schedule and a particular criterion. Mobile device location information is received responsive to the first request. The mobile device location information received responsive to the first request is stored. A second request for the mobile device location information is received from a requester. Responsive to the second request, the requester is provided the location information received responsive to the first request, and at least one user-visible consequence is initiated responsive to the second request, wherein the at least one user-visible consequence is not initiated responsive to the first request.
Concurrent geofences with shared measurements
A system and method for a mobile device to efficiently use a geofence capability without draining its battery, and to allow flexibility in specifying various parameters related to geofencing, such as the latency and confidence in determining when or where a geofence breach occurs, and reducing the probability of not detecting a geofence breach.
Location system, method, server and terminal
This document discusses a location system, method, server and terminal. A location information server provides a Secure User Plane for Location, SUPL, Enabled Terminal, SET, with location information regarding the SET in a form of reference; the SET provides a Secure User Plane for Location, SUPL, server with the location information reference regarding the SET via an SUPL message; the SUPL server obtains the location information regarding the SET from the location information server according to the location information reference transmitted by the SET.
Disabling wireless telephone use while in vehicle
A method includes determining that a wireless telephone is in a moving vehicle using, e.g., speed as calculated by the telephone using GPS signals or co-location of the telephone with a vehicle as might be determined by receiving the vehicle's position via Bluetooth. Use of the telephone is selectively denied if it is determined that the telephone is in a vehicle.
Mobile traffic categorization and policy for network use optimization while preserving user experience
Systems and methods of mobile traffic categorization and policy implementation for network use optimization are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of detecting an activity state of an application on a mobile device to which traffic is originated from or directed to, detecting a time criticality of data contained in the traffic to be sent between the mobile device and the host server, determining a timing with which to allow the traffic to pass through, based on the activity state or the time criticality and/or controlling radio use on the mobile device based on the timing with which the traffic is allowed to pass through. The method may further include selecting a network configuration in the wireless network for use in passing traffic to and from the mobile device.
Methods, systems, and computer readable media for dynamic toggling of synchronization signaling to provide access control and free up resources
System and methods for switching operating modes of a radio access node to increase data throughput for a user-equipment device are described. The radio access node can detect operating conditions to trigger switching from one operating mode to another. In a first operating mode, the radio access node can transmit non-bearer data, such as synchronization signals, to a UE device using a particular forward-link air interface resources. In response to detecting the defined condition(s), the radio access node can switch to a second operating mode in which the radio access node begins transmitting bearer data using the particular forward-link air interface resources used to transmit the non-bearer data while operating in the first operating mode. Upon detecting other operating condition(s), the radio access node can switch back to operating in the first operating mode. The radio access node can be configured as an eNodeB.
Channel information feedback reduction in communication network
Techniques are disclosed for reducing channel information feedback in communication networks. For example, a method comprises the following steps. A set of mobile terminals and a set of base stations designated to participate in a coordinated multipoint transmission protocol in a communication network are identified. One or more unique downlink communication resource blocks are assigned to each designated mobile terminal that is located in a given first sector of a designated base station. As such, each designated mobile terminal in the first sector of the designated base station: (i) performs a channel state estimation process in response to respective signals received from the designated base stations in the one or more unique downlink communication resource blocks assigned to that designated mobile terminal; and (ii) transmits resulting channel state information back to at least one of the designated base stations.
Fast efficient resource distribution in long term evolution communication network scheduling
A method and system for determining, for a transmission time interval (TTI), an amount of resource units to be allocated to each cell served by at least one module in a wireless communication network are disclosed. The allocation is based on an estimated resource consumption of each cell, a resource limit of each cell and resource limits of the at least one module. For each TTI, a prioritized list of queues having information to be transmitted is determined, where each queue belongs to a cell of the plurality of cells. Also, for each TTI, in an order of priority of the queues, a number of resource units to be consumed by a queue is determined based at least in part on a number of resource units required to empty the queue.
Providing femtocell access via personal communication devices
A personal communication device may operate as a femtocell providing femtocell accessibility and services to a plurality of communication devices that are communicatively coupled to the personal communication device via one or more cellular connections. The personal communication device may connect to one or more broadband networks, via a plurality of wired and/or wireless interfaces, to enable the communication of packets when providing the femtocell accessibility and/or services. The personal communication device may support direct communications via the personal communication device when providing femtocell services. Signal strength may be boosted in the personal communication device when providing femtocell servicing via a signal booster that may be integrated within the personal communication device or may be externally attached to it during femtocell operations. The personal communication device may receive compensation for providing femtocell services to one or more of the plurality of communication devices.
Base station and radio parameter-adjustment method
A base station forming a cell based on a value of a radio parameter includes a reception unit configured to receive a signal transmitted from a mobile terminal communicating with the base station, and a processor configured to adjust a value of a radio parameter of the base station based on first and second reception qualities of the mobile terminal, where the first reception quality is a value of a reception quality of a transmission signal of the base station and the second reception quality is a value of a reception quality of a transmission signal of another base station.
Assigning traffic channels to a wireless communication device based on traffic channel utilization
A RAN may receive a call establishment request, on a first frequency, seeking to establish a call involving a WCD. In response to receiving the request, the RAN may select a plurality of wireless coverage areas, each defined using the first frequency. The RAN may determine that utilization of a first wireless coverage area of the selected wireless coverage areas meets a utilization threshold. In response, the RAN may determine that a strength at which the WCD receives signals from the first wireless coverage area exceeds the strengths at which the WCD receives signals from other wireless coverage areas in the plurality of wireless coverage areas by at least a signal strength differential value. Accordingly, the RAN may assign, to the WCD, a traffic channel from a second wireless coverage area, defined using a second frequency, for supporting the call.
Systems and methods for assigning regional wireless communications handovers utilizing ancillary cell feedback
A networked computing system for assigning regional wireless communications based on ancillary device feedback. The network computing system includes a radio communications controller, one or more transceiver device(s), user equipment, and data communications network facilitating data communications amongst the wireless communications devices of the networked computing system. The radio communications controller may be configured to receive a feedback communication from a network transceiver device capable of detecting ancillary wireless communications, and then determine whether an alternate service provider resource exists for providing wireless data communications service to the user equipment within the data communications network, based on the received feedback communication.
Mobile terminated call establishment during inter radio access technology (IRAT) re-direction
Mobile terminated call establishment during inter radio access technology (IRAT) re-direction. Handovers between different respective radio access technologies (RATs) may be performed (e.g., IRAT redirection procedure) such that a given wireless communication device may be in communication with a given RAT cell, and then switch from that RAT cell to another RAT cell (e.g., a target RAT cell). This transition may be from a 3G cell to a target 4G cell. During such a redirection procedure, there may be some instances in which the target RAT cell may not be available immediately, and a device can check back with the first/original RAT cell during the search for the target RAT cell. That is to say, there may be some duration of time during the search for the target RAT cell in which that particular cell may not be available, and the device checks for pages in the first/original RAT cell.
Selecting a command node in a heterogeneous communication system
The present invention provides a method involving at least one mobile node and a heterogeneous network comprising a plurality of access nodes. One embodiment of the method includes providing at least one first message including information indicative of a selected access node. The access node is selected to provide command services to the at least one mobile node.
Policy control for a carrier-aggregation network
A method, system, and medium are provided for regulating the allocation of radio-frequency (RF) channels in a carrier-aggregation network. A base station that is part of the carrier-aggregation network receives a registration request from a mobile station subscribing to services offered by a first wireless-telecommunications network within the carrier-aggregation network. The base station communicates the registration request to the first network and receives a set of policy parameters from the first network. The base station receives a service request from the mobile station. Based on the policy parameters and the service request and without communicating with the first network, the base station determines a set of RF channels available to the mobile station. The base station sends a resource assignment to the mobile station specifying the set of available RF channels.
A user device obtains a device profile corresponding to a primary wireless network at a current location of the user device, reprograms a modem of the user device using the device profile corresponding to the primary wireless network at the current location of the user device, and establishes a network connection using the device profile corresponding to the primary wireless network at the current location of the user device.
Methods and apparatus for prefix filtering of international mobile subscriber identity (IMSI) wildcard application
A method and apparatus for network accessing configured to prefix filtering one or more wildcard identity for an International Mobile Subscriber Identity (“IMSI”) application is disclosed. Upon receiving a request of a new rule with system identification (“SID”) for network access, a process of wildcard prefixing is able to identify a wildcard in a predefined field of the SID. The SID, in one example, is an IMSI. After retrieving a specific prefix in accordance with the wildcard, the wildcard is replaced with the specific prefix in the predefined field of the SID to form a modified rule. The predefined field of the SID can be a field for mobile country code (“MCC”), mobile network code (“MNC”), or mobile subscriber identification number (“MSIN”). The process subsequently inserts the modified rule into a memory structure.
Handling radio link failure in a radio communications network
Embodiments herein relate to a method in a radio base station for enabling a user equipment to establish a connection in a radio communications network The user equipment is served in a first cell controlled by the radio base station. The radio base station is comprised in the radio communications network. The radio base station detects a failure of a radio link between the user equipment and the radio base station. The radio base station then forwards a user equipment context of the user equipment to a circuitry controlling a second cell when the failure is detected. The user equipment context enables the circuitry controlling the second cell to serve the user equipment and thereby enables the user equipment to establish the connection in the radio communications network.
Playback pause before signal loss of a mobile device
One embodiment described herein may take the form of a system and/or method for monitoring a position of a mobile device and pausing play or recording a multimedia presentation when the mobile device enters or approaches a zone where a wireless signal may be degraded or lost. In one embodiment, the mobile device may utilize a global position system (GPS) signal to determine the location of the mobile device. Further, the mobile device may be configured to display one or more multimedia presentations and may, in response to the mobile device being located near or within a dark zone, pause play of the multimedia presentation until the mobile device returns to a zone of sufficient wireless signal coverage. In this manner, the mobile device may prevent the user from losing or missing portions of the multimedia presentation due to lost or degraded wireless signal of the mobile device.
Sharing mobile applications between callers
Systems and methods for sharing of mobile applications between callers are provided. A telephone call connection may be provided between a first mobile device and a second mobile device. A selection may be received from a user of the first mobile device that indicates at least one application previously enabled for sharing. It may be detect that the second mobile device has also enabled sharing of the same application. The application may be executed on the first mobile device and the second mobile device. Further, any updated data related to the application may be automatically exchanged between the first mobile device and the second mobile device.
Method and apparatus of providing a mobile phone notification service
A method and apparatus are disclosed for transmitting notifications to customers. One example method may include identifying a notification event associated with a customer via a customer management module and retrieving a customer record. The method may also include identifying a customer's mobile device via a voice channel preference indicating the mobile device in the customer preference record, and transmitting the notification event to the customer's mobile device based on the voice channel preference.
Apparatus for transmitting media using social intimacy and method thereof
Disclosed is an apparatus and method for transmitting media data using social intimacy. The apparatus and method can calculate a social intimacy level for a plurality of previously stored terminal information, request at least one terminal of transmitting terminal information according to a media transmission request, and when receiving the requested terminal information from at least one terminal, transmit the media data to a terminal where the terminal information equals the received terminal information among terminal information having higher social intimacy, thereby sharing the media data with people forming a higher social intimacy with a user.
Security key based authorization of transceivers in wireless communication devices
Systems, methods, and software for operating communication systems and wireless communication devices are provided herein. In one example, a method of operating a wireless communication is provided. In security circuitry of the wireless communication device, the method includes receiving a request from processing circuitry for an application to access a first communication network with a first communication transceiver, and processing the request and a security key to authorize the application to use the first communication transceiver to access the first communication network. In the first communication transceiver, the method includes exchanging communications over the first communication network for the application responsive to the authorization. In the security circuitry, the method also includes identifying that the application is using a second unauthorized communication transceiver, and in response, terminating the authorization for the application to use the first communication transceiver to access the first communication network.
Network access control methods and apparatus
Methods and apparatus that provide user access control within wireless networks such as those having both fixed and portable nodes. In one embodiment, the network comprises a 3G cellular network or Interworking WLAN (iWLAN), and the portable nodes comprise Home Node B (HNB) base stations. The HNB is configured to authenticate new users, and provide network access while still maintaining user privacy. The portable nodes also may operate in a number of different operating modes which provide different functional control over user access. In one variant, an easy-to-use owner-assigned ID based access control mechanism with a reliable unambiguous user ID is utilized. Methods for providing access control across differing network architectures and protocols, such the aforementioned iWLAN, and business methods, are also described.
Quantifying mobility of mobile devices via a privacy preserving mobility metric
Embodiments of the invention generate metrics quantifying the mobility of a mobile device without persisting information related to the device's specific location at any given time. Specifically, at multiple intervals, a value of a mobility metric is computed based on the distance between the current location of the mobile device and a previously identified origin location of the mobile device. The values of the mobility metric computed over a period of time quantify the overall mobility of the mobile device. The mobility metric does not provide any information regarding the specific location of the mobile device at any given time.
Detector of uplink frequencies with feedback
An apparatus and method for detection of uplink frequencies from a mobile device, such as a cell phone, may be used as an alarm for people not to use their mobile device, or may signal security personnel when an unauthorized mobile device is being used. The apparatus and method may measure the uplink frequency band and use feedback with the downlink frequencies to gain a better reading of the distance the mobile device being used is from the detection device The apparatus and method has more precision of distance compared to conventional detectors, as the uplink RF power of a mobile device changes depending where it's located from the cell tower transmitting the downlink data to the mobile device monitored.
Remote monitoring system and method utilizing wireless network
A remote monitoring system and method that packages, transmits, receives, decodes, stores, and distributes data sent from remote monitoring devices via a wireless network and that provides manufacturers with reduced wireless manufacturing expenses, data collection costs, dissemination costs, and wireless network access fees.
Method, device and system for sending and receiving messages
A method, a device, and a system for sending and receiving messages are provided. The method for sending messages includes: receiving, by a Mobility Management Entity (MME), an Earthquake and Tsunami Warning System (ETWS) message; setting an information change identifier if the received ETWS message is different from the ETWS message stored by the MME; and sending the received ETWS message and the information change identifier. In the embodiments of the present disclosure, the MME decides whether to send the ETWS message to the eNB. Therefore, the eNB needs only to transmit the received message to the UE transparently, and does not need to judge the content of the ETWS message, thus simplifying the process of the eNB sending the ETWS message and reducing the load of the access network device.
Enabling emergency call back to a user device
Emergency call backs may be placed to a user device in a manner that bypasses certain features (e.g., call forwarding) that may be enabled by the device. A method may include receiving an emergency call from a user device; and creating, in response to the emergency call, an emergency session associated with the user device, where the creating includes forwarding the call to a public safety access point (PSAP) server that handles emergency calls. The method may further include receiving a call, such as an emergency call back call, destined for the user device; determining that the emergency session has not expired when an elapse time associated with the emergency session is less than a threshold; and forwarding, to the user device, the call, as a return call from the PSAP server, based on the determination that the emergency session has not expired.
Method and arrangement for enabling improved receiver quality for noise limited uplink signals
In a method for enabling improved quality for noise limited uplink signals in a radio base station in a telecommunication system, said radio base station comprising a plurality of transceiver units, each comprising at least one receiver unit, adaptively allocating (S10) available transceiver units to enable parallel processing of an identified noise limited signal on at least two separate receiver units in the radio base station. And, combining (S20) the parallel processed noise limited calls to provide a received signal with improved signal to noise ratio.
Methods and devices for reducing radio frequency interference
Devices and methods for selectively reducing interference in wireless signals through field nulling and signal cancelling by signal agnostic, intrinsically stable, analytic means.
Dynamic RFI detection
Provided herein are different embodiments for performing radio frequency interference (RFI) detection in electronic devices such as mobile computing systems.
RF AGC control
Embodiments of the present invention may provide a signal processor with a wide gain range. The signal processor may comprise at least a discrete step gain stage and a continuous variable gain amplifier (VGA) stage. The discrete step gain stage may comprise a programmable gain amplifier (PGA) (e.g., low noise amplifiers 1 and 2 (LNA1 and LNA2)). The VGA stage may provide a continuous range to compensate the LNAs gain steps. In one embodiment, the AGC controller enables an inherent hysteresis with the AGC step change if required.
Impedance circuit and method for signal transformation
An impedance circuit includes an input terminal, a first and a second capacitive arrangement and an output terminal coupled to the input terminal by a network. The network includes the first and the second capacitive arrangement. The first capacitive arrangement includes a varactor circuit having a varactor and at least one series circuit. The at least one series circuit includes a capacitor and a switch in series connection and is coupled parallel to the varactor circuit. The second capacitive arrangement comprises an additional capacitor.
Enhanced radio systems and methods
An enhanced radio system is disclosed that provides for the capture and playback of one or more radio stations. A user may tune to a station, scan through stations, rewind through missed content (even while the system is off), and fast-forward through undesired content, while downloading and uploading audio content, and sending content to another user. A user may rate content, and be notified when that content is played on any station, with undesirable content skipped and desirable content saved, or station recommendations made. Support for multiple sets of configuration information to allow use by multiple listeners and in multiple locations may be provided. Optionally provided are security features to prevent the unauthorized downloading, uploading, and saving of copies of content, other radio related and content related information, a karaoke mode, integration with a telephone with the radio, or reporting of usage information to a collection facility.
Modular frequency divider and mixer configuration
A transmitter including a first mixer, a first frequency divider to divide a frequency of an input signal to generate a first signal, and a plurality of second frequency dividers to divide the frequency to respectively generate a plurality of second signals, and a control module. In response to the transmitter being turned on, the control module turns on the first frequency divider, turns off the plurality of second frequency dividers, and drives the first mixer with the first signal. Subsequently, in response to determining that a transmit power of the transmitter is to be increased, the control module sequentially turns on and connects each of the plurality of second frequency dividers in parallel to the first frequency divider. Upon a second frequency divider being connected to the first frequency divider, the control module also drives the first mixer using the second signal generated by that second frequency divider.
Cryogenic high power filters for high frequency shipboard applications
Systems and methods are disclosed relating to transmission of communications via high frequency antenna systems employing high-temperature superconductor filters and/or amplifiers. In certain embodiments, a comb linear amplifier combiner may be modified with, for example, cryogenically cooled and/or high-temperature superconductor components, such as matching units of bandpass filters. A computer control unit may be coupled to the transmission circuit to control operation of one or more of the low-power transmitters, filters, and/or amplifiers.
Input interface for a transmit/receive station and station comprising same
The input interface for a transmit/receive radio station includes an input for receiving a signal either with a variable voltage over a pre-determined voltage range, or an open collector signal having a voltage (0V) corresponding to the low logic state; a first output for the variable voltage signal, and a second open collector output. The first and second outputs are connected to the same input and the input is connected to a reference potential through a first voltage divider bridge, the middle point of which is connected to the positive terminal of an open loop comparator, the output of which is connected to the second output.
Asymmetrical multicarrier interference avoidance
Asymmetrical multicarrier interference avoidance in a communication from a network to a subscriber device is provided. The asymmetrical multicarrier interference avoidance technique comprises measuring signal-to-noise ratio interference values and sorting the measured values into two tables for selecting an anchor and a non-anchor frequency carrier pairs. The system is self-tuning based on changes in the network, the subscriber and the surrounding environment.
Communication of avionic data
An example avionic data communication method includes establishing a plurality of available channels using a channel controller. The channel controller also establishes a quality of service for each of the plurality of available channels. The channel controller then selects one of the available channels. The quality of service of the selected channel is not less than the quality of service of another channel within the plurality of available channels. The method then communicates a type of data using the selected channel.
System and method for mitigating the effects of interferers while performing conditional device scan
A method, a personal area network device operating as a slave, and a short range communications device operating as a slave are disclosed. A data storage 208 may store at least one protocol-specific channel criterion for a connection with a master short range communication device 104. A short range transceiver 108 may execute a preliminary device scan of a scanning set of communication channels for radio frequency energy. A processor 204 may decide to execute a full device scan based in part on the protocol-specific channel criterion.
Inquiry response event control
A system for selectively expediting connection establishment between apparatuses. In at least one example implementation, an apparatus may comprise at least a control entity and a communication entity. The control entity may transmit a command to the communication entity, the command instructing the communication entity to set certain operational parameters. The communication entity may then send a response to the command, and the control entity may determine if the certain operational parameters have been set in the communication entity based on the response. If the certain operational parameters have been set, the control entity may initiate a first device discovery mode in the apparatus. Alternatively, a second device discovery mode may be initiated by the control entity if it is determined that the certain operational parameters have not been set in the communication entity.
Facilitating positioning through Bluetooth low energy wireless messaging
A system for providing positioning-related information within wireless communication signals. For example, an apparatus (e.g., acting as a tracker) may receive one or more messages advertising the presence of another apparatus (e.g., acting as a target). The advertisement messages may further comprise information indicating the availability of positioning-related information from the target apparatus. The tracker device may then determine, based on the received information, that positioning-related interaction with the target apparatus is available. If determined to be available, the tracker and target may interact with each other in order to initiate positioning-related information transmission. After receiving at least one message comprising positioning-related information from the target apparatus, the tracker apparatus may then determine at least one of a relative direction towards or from the target apparatus based on the received positioning-related information.
Mobile device with near field communication module and secure chip
A mobile device provided with a secure chip and a short-range wireless RF communication module, which can be used for contactless transactions with external short-range wireless RF communication devices, for example at a point of sales. The mobile device is provided with user selectable activity levels of the secure chip to reduce security risks/concerns associated with such a terminal. The user selectable activity levels may include levels in which the secure chip is deactivated by default, and only temporarily activated upon user confirmation or the entry of a password or PIN.
Recovering data in a near field communications apparatus
A communications device is disclosed that includes an antenna circuit with coupling connections that are used interchangeably as a receive coupling connection and a transmit coupling connection for an RF signal. A driver maintains a constant voltage or a constant current on a first coupling connection of the antenna circuit based on a drive signal that includes an output voltage and an output current. A demodulator extracts modulation from the RF signal based on a fluctuating voltage or a fluctuating current on a second coupling connection of the antenna circuit.
Session continuity in wireless local area networks with internet protocol level mobility
A device may receive a request from a mobile device to create a socket connection between the mobile device and the device. The request may be associated with linking information that links the socket connection with a previous socket connection with the mobile device. The request may be received from the mobile device after the mobile device disconnects from a first wireless local area network and reconnects to a second wireless local area network. The device may identify, based on the linking information, a socket connection between the device and a server device, the socket connection between the device and the server device having been created when the mobile device was connected to the first wireless local area network. The device may relay communications between the mobile device and the server device, using the socket connections.
Blade member, cleaner and image forming apparatus
A blade member having; a contact layer in contact with a surface of an image carrier; and a support layer superimposed on the contact layer, wherein a first curve indicating a relation between loss tangent and temperature of the contact layer and a second curve indicating a relation between loss tangent and temperature of the support layer intersect with each other in a temperature range of not lower than 25° C. and not higher than 45° C.
Fixing member, method of producing fixing member, and fixing device
When filler particles are added to a surface layer of a fixing member in order to enhance a toner releasing property, if the filler particles are randomly oriented, chemical affinity between the surface layer of the fixing member and toner is enhanced and a sufficient effect cannot be accomplished. Therefore, whisker-shaped filler particles are added to the surface layer of the fixing member, and the filler particles are oriented to approximately follow a rotation direction of the fixing member.
Image heating apparatus
An image heating apparatus includes a rotatable endless belt, an opposing member forming a nip together with an outer surface of the belt, and a non-rotatable pressure applying member that contacts an inner surface of the belt and is pressed toward the opposing member. A recording paper carrying an image is nipped and conveyed through the nip to be heated and pressed. The pressure applying member has a metal slide contact portion against which the inner surface of the belt slides. Rz, the ten-point average roughness, of the slide contact portion in a belt movement direction is 0.29 μm or smaller and smaller than that in a direction perpendicular to the belt movement direction. Rz of the inner surface of the belt in the belt movement direction is 1.3 μm or larger and larger than that in a direction perpendicular to the belt movement direction.
Fixing device including a guide member for guiding a sheet to a fixing area and image forming apparatus including the same
A fixing device includes a pair of fixing members and a guide member. The guide member includes a guide plate having a guide surface, a back surface when the guide surface is defined as a front surface, and holes that are spaced apart from each other in a widthwise direction of the sheet and that extend through the guide surface and the back surface; and sheet receiving members that are disposed in correspondence with the holes, each sheet receiving member including a body and an insertion portion that protrudes from the body and that is inserted into the corresponding hole, the insertion portions being inserted into the corresponding holes and being moved along the guide surface, so that the sheet receiving members are mounted to the guide plate while the bodies protrude from the guide surface.
Image forming apparatus
An image forming apparatus includes an image carrier, a transfer unit to transfer the image onto a recording medium, a torque limit unit to transmit drive force to the transfer unit at a torque less than the torque for transmitting drive force, and drive the transfer unit to rotate at a circumferential velocity higher than that of the image carrier when the image carrier and the transfer unit are in contact with each other, and a drive unit to output drive force to drive the transfer unit such that the transfer unit rotates at a circumferential velocity lower than that of the image carrier when the image carrier and the transfer unit are separate from each other, and the transfer unit rotates at a circumferential velocity higher than that of the image carrier when the image carrier and the transfer unit are in contact with each other.
Image forming apparatus
An image forming apparatus includes an image bearing member unit including a toner image carrying member, a transfer unit including a movable endless belt for transferring the toner image from the carrying member onto a transfer material, a plurality of stretching members for stretching the endless belt, and a supporting portion, provided at an end portion with respect to a widthwise direction, for supporting the stretching members. In addition, a main assembly frame is provided at a position opposing the supporting portion and includes a positioning portion for determining positions of the plurality of stretching members, wherein the supporting portion is movable relative to the main assembly frame.
Development device, and image forming apparatus and process cartridge incorporating same
A development device includes a developer bearer to carry by rotation developer to a development range facing a latent image bearer and a developer regulator to adjust an amount of developer transported to the development range by the developer bearer. The developer bearer includes a developer carrying range having surface unevenness; and a surface of the developer bearer is coated with a coating material including a resin material and particles to roughen the surface.
Developing device and image forming apparatus
A developing device includes a first developing roller including a first transport member that transports magnetic developer by rotating while being close to a latent-image carrier rotating in one direction and a first magnet member, a second developing roller including a second transport member that transports the developer by rotating while being close to the latent-image carrier at a position on a downstream side of the first developing roller in the one direction, and a second magnet member, and a regulation member that regulates transport amounts of the developer distributed to the first and second developing rollers to required transport amounts, and opposes the developing rollers with predetermined distances therebetween. The first and second developing rollers are spaced from each other. The regulation member is movably supported in an area closer to the latent-image carrier than a closest position between the first and second developing rollers.
Image forming apparatus, optical print head, and process cartridge with plates for positioning image bearing member and developing member
An image forming apparatus having an image bearing member, an optical print head to irradiate the image bearing member with light to form a latent image thereon, a developing device to develop the latent image with a developing agent to obtain a visual image, and front and rear plates that sandwich at least the image bearing member and the developing device from opposite directions to position at least the image bearing member and the developing device thereof, the plates having focus direction position determining reference surfaces and sub-scanning direction position determining reference surfaces the optical print head contacts to position the optical print head.
Developing apparatus, process cartridge and method for assembling developing apparatus
A developing device for an image forming apparatus, comprising a frame provided with a developer accommodating chamber accommodating a developer, and a development opening for supplying the developer from an inside of the developer accommodating chamber to an outside; a first sealing member sealing the development opening, the first sealing member being dismountable from the development opening by being pulled out through a pulling opening provided in the frame; and a second sealing member for sliding on the first sealing member to prevent the developer from leaking to an outside of the frame through the pulling opening when the first sealing member is pulled through the pulling opening, wherein the second sealing member is integrally molded on the frame by injecting a thermoplastic elastomer into a space between the first sealing member and an edge of the pulling opening.
Development device and image forming apparatus
A development device includes a case, a developer carrier, an antiscattering part and a movement mechanism. The case has a supply port supplying developer to an image carrier in which an electrostatic latent image is formed. The developer carrier is rotatably positioned in the case, and develops the electrostatic latent image through the supply port by the developer. The antiscattering part prevents the developer from scattering from the supply port. The movement mechanism makes the developer carrier movable, in the case, between a developing position adjacent to the supply port and a housing position at a depth side from the developing position with respect to the supply port. The antiscattering part is moved, in conjunction with movement of the developer carrier, between an opening position adjacent to the developing position and a withdrawal position far from the opening position, while separating from the developer carrier.
Power supply system and image forming apparatus having the power supply system
A power supply system includes: capacitors connected to an alternating current power supply; a rectification circuit connected to the capacitors and rectifying an alternating current voltage applied to the capacitors; a signal generation circuit connected to an output line of the rectification circuit and configured to generate a detection signal corresponding to a zero cross point of an alternating current output; an electricity storage unit connected to the output line of the rectification circuit; a backflow regulation element provided on the output line of the rectification circuit and configured to regulate backflow of current; a current limit element configured to limit current flowing from the output line of the rectification circuit towards the electricity storage unit, and a control unit that is connected to the output line of the rectification circuit, and is configured to detect a zero cross point of the alternating current output.
Image forming apparatus and method of controlling power thereof
An image forming apparatus includes a power supply unit to generate DC power, a plurality of function units to perform the functions of the image forming apparatus, a control unit to control the operation of a plurality of function units, a switching unit to receive DC power of the power supply unit and switch power provided to the control unit and each of a plurality of function units, and a power management unit to receive DC power of the power supply unit and to control a switching operation of the switching unit according to an operation mode of the image forming apparatus.
Positioning device to position a first member relative to a second member and image forming apparatus incorporating same
A positioning device to position a first member relative to a second member includes two convex parts disposed on a side of the first member and apart from each other; and positioning portions disposed on a side of the second member so as to contact the convex parts, each of which is disposed apart from each other and opposed to the two convex parts. The positioning portions includes two planar portions disposed substantially perpendicularly relative to a direction to allow the first member to approach the second member; and a slanted portion disposed in the vicinity of one of the two planar portions and angled with respect to a direction to allow the first member to approach the second member. The second member is an endless belt, on which an image pattern for detection is formed, and the first member is a sensor to detect the image pattern formed on the endless belt.
A fixing device includes a rotatable fuser member, a rotatable pressure member, a heater, and a controller. The rotatable fuser member is subjected to heating. The rotatable pressure member is disposed opposite the fuser member. The pressure member presses against the fuser member to form a fixing nip therebetween, through which multiple recording media, each spaced apart from each other by an interval distance in a conveyance direction, are sequentially conveyed at a conveyance speed. The heater is disposed adjacent to the fuser member to heat the fuser member. The controller is operatively connected to the heater to control power supply to the heater through a series of on-off switching control cycles, each including an on-time during which the heater power supply is on, and an off-time during which the heater power supply is off, in synchronization with conveyance of the recording medium.
Fixing unit controlling apparatus and image forming apparatus including the same
A fixing unit controlling apparatus that includes a switching unit of a power supplier to supply power to a fixing unit according to a power supply controlling signal to control a temperature of the fixing unit, and a switching unit of a power shutter to shut off power supplied to the fixing unit when the fixing unit controlling apparatus operates abnormally, wherein the switching units of the power supplier and the power shutter are both connected to a snubber circuit of the power shutter.
Image forming apparatus having a developing device including two electrode members, and further including a detection mechanism for detecting a capacitance between the two electrode members
An image forming apparatus includes a holding unit configured to change a developing device to first and second orientations. Whether a developer in the developing device is unevenly distributed in a longitudinal direction of the developing device is detected based on a capacitance C1 between first and second electrode members in the first orientation and a capacitance C2 between the first and second electrode members in the second orientation.
Receiver and cross phase modulation reduction method
A receiver includes: an extraction circuit to extract a phase fluctuation component common to phase data of two polarization components that are separated in a coherent reception of a polarization multiplexing phase modulation optical signal; and a correction circuit to correct the phase data of the two polarization components in accordance with the phase fluctuation component.
Reconfigurable optical add/drop multiplexer and procedure for outputting optical signals from such multiplexer
A reconfigurable optical add drop multiplexer (ROADM) includes local interfaces at which optical signals of different wavelengths are locally input into the ROADM, and a network interface configured to connect the ROADM to a network from which multiplexed optical signals of different wavelengths are transmitted to the network. In a first configuration, the ROADM is configured to transmit from the network interface to the network multiplexed signals of different wavelengths having a first minimum frequency difference. In a second configuration, the ROADM is configured to transmit from the network interface to the network multiplexed signals of different wavelengths having a second minimum frequency difference. The second minimum frequency difference is greater than the first minimum frequency difference. This arrangement reduces the power of four wave mixing cross products produced when optical signals of three wavelengths are multiplexed and transmitted from the ROADM to NZDSF or DSF fiber types.
Repeater, relay method and optical transmission system
There is provided a repeater to relay an optical signal transmitted/received between an optical line terminal (OLT) and at least one optical network unit (ONU), the repeater including: a first port configured to receive an optical signal input from the at least one ONU; a converter circuit configured to convert an optical signal of a first transmission rate into an optical signal of a second transmission rate higher than the first transmission rate, the optical signal of the first transmission rate to be converted being included in optical signals received at the first port; and a second port configured to output the optical signal converted by the converter circuit to the OLT.
Superimposing optical transmission modes
A method of superimposing N optical transmission modes for collective transmission along a multimode optical fiber is provided where each of the N optical signals comprises N distinct superimposed transmission modes (M1, M2, . . . ) and a portion of each of the N propagating optical signals is sampled at a receiving end of the data transmission network. N2−1 distinct measurement conditions are derived from a transmission matrix T and a special unitary matrix group SU(N) corresponding to the superimposed transmission modes (M1, M2, . . . ) at the receiving end of the data transmission network and N2−1 measurements are extracted from the sampled signals. The extracted N2−1 measurements are used to solve a matrix equation corresponding to the generated SU(N) matrices and the output matrix transposed and used to generating principal state launch conditions from the eigenvectors of the transposed output matrix to form a principal state in each of the N optical signals.
Information communication method
An information communication method is provided that transmits a signal using a change in luminance. The information communication method includes determining a pattern of the change in luminance by modulating the signal to be transmitted, and transmitting the signal by a display, which is a light emitter, changing in luminance according to the determined pattern. The method also includes detecting, by a sensor, a person within a viewing angle of the display or a person near the viewing angle. Further, in the transmitting of the signal, the signal is transmitted by changing in luminance by a larger change amount in the case where the person near the viewing angle is detected than in the case where the person within the viewing angle is detected.
Optical memory expansion
Various embodiments of the present invention are directed to optical-based methods and expansion memory systems for disaggregating memory of computer systems. In one aspect, an expansion memory system comprises a first optical/electronic interface in electrical communication with a processor, a memory expansion board configured with memory, and a second optical/electronic interface attached to the memory expansion board. The first interface converts optical signals into electronic signals that are sent to the processor and converts electronic signals produced by the processor into optical signals. The second interface converts optical signals into electronic signals that are sent to the memory and converts electronic signals produced by the memory into optical signals. The optical signals are exchanged between the first and second interfaces. Embodiments also include methods for sending and receiving data in an expansion memory system.
System and method of analog to digital conversion without phase ambiguity
A system and method of digitizing an analog signal without an amplitude channel is disclosed. The system and method includes receiving an analog signal comprising a voltage v(t) and a frequency f1, producing a series of optical pulses at a sampling frequency f2 with a pulsed laser, splitting the series of optical pulses into a first optical signal and an optical reference signal, phase modulating the first optical signal with the analog signal to produce a sampled optical signal such that phase shifts between adjacent samples in the sampled optical signal does not exceed π radians, and receiving the sampled optical signal and the optical reference signal at a photonic signal processor.
Multi-channel optical device
The multi-channel optical device includes a demultiplexer in a laser cavity. The demultiplexer is configured to demultiplex a multi-channel light beam into a plurality of channels. The demultiplexer limits the wavelengths of the channels that are output from the laser cavity. The gain element includes quantum dots as the gain medium.
Method and device for inserting/extracting optical subband into multiband optical OFDM signal
A device for inserting/extracting at least one optical subband into an optical channel consisting of a plurality of optical subbands. The device includes an extraction means that is capable of extracting a first optical subband belonging to the optical channel, a suppression means that is arranged so as to obtain a filtered optical channel from the optical channel wherein at least one second subband is suppressed, and a coupling means that is capable of inserting a replacement optical subband in place of the second subband in the filtered optical channel so as to obtain a modified optical channel. The device moreover relates to an optical insertion/extraction switcher, using one or more insertion/extraction devices, and to the corresponding insertion/extraction methods.
Method, apparatus and system for detecting connection status of optical fiber jumper
A method, an apparatus and a system for detecting a connection status of an optical fiber jumper are provided in the embodiments of the present invention. The method for detecting a connection status of an optical fiber jumper includes: judging a connection status of a second port and a first port according to whether an optical signal sent by the first port to the second port through a first optical fiber is received, wherein the first optical fiber is connected to two ends of an optical fiber jumper, and the two ends of the optical fiber jumper are connected to the first port and the second port respectively; and obtaining a port identification corresponding to the first port according to the optical signal if the optical signal is received.
Shake compensation apparatus, shake compensation control method, and image capturing apparatus and control method thereof
A shake compensation apparatus includes a shake compensation unit configured to compensate the shake by moving non-parallel to an optical axis; a driving unit configured to drive the shake compensation unit based on a drive indication signal; a position detection unit configured to detect the position of the shake compensation unit to output a position detection signal; and a compensation amount calculation unit configured to detect translational shake component in the shake of the apparatus from the movement of the shake compensation unit such that the drive indication signal and the position detection signal serve as input, and calculate the compensation amount of the shake compensation unit from the shake amount of the apparatus including the translational shake component to output it as a drive indication signal.
There is provided a camera module including: a housing; a lens unit mounted in the housing; a hand shake correction unit correcting a movement of the lens unit with respect to the housing; and a damping member disposed between the housing and the lens unit to thereby reduce the movement of the lens unit through the hand shake correction unit.
Video-recording/reproducing apparatus and video-recording/reproducing method
A video-recording/reproducing apparatus and a video-recording/reproducing method making it possible to grasp the outline of a content in a frame using caption data are provided. A storage unit for storing content data containing video data and caption data correlated with each other by time information, a caption string acquisition unit for acquiring a caption string contained in the caption data, a time acquisition unit for acquiring time information corresponding to the caption string, a video acquisition unit for acquiring sequentially video information, from the video data, corresponding to the time information of the caption string acquired by the time acquisition unit, and a display control unit for displaying by thumbnails the video information acquired by the video acquisition unit in time series in a frame on a display unit are included.
Broadcast program recording overrun and underrun scheduling system
A broadcast program recording overrun and underrun scheduling system provides a system for adjusting the start and end times of a broadcast program's recording schedule that has a start and end broadcast time. The viewer selects a particular broadcast program to record from the program guide using a remote input device. The system schedules the broadcast program to be recorded by inserting the program's information such as program identifier, start and end times, and storage duration into a recording schedule database. The system allows the viewer to adjust the scheduled start and/or end recording times for a broadcast program by specifying the time increment to add or subtract from the start and/or end recording times of a specific program or series of programs.
Automatic announcer voice attenuation in a presentation of a broadcast event
A method of automatic announcer voice removal from a televised sporting event. A sound processing circuit divides an audio input signal of a televised sporting event into multiple audio segments. The audio input signal includes crowd noise and announcer commentary. If an audio segment does not exceed a pre-defined amplitude threshold, a voice removal utility adds the audio segment to a recent crowd noise library and stores the segment in an output buffer. If the amplitude of a segment exceeds the threshold, the utility adds the segment to a recent announcer voice library. The sound processing circuit generates an attenuated version of the segment and blends the attenuated version with one or more mixed segments from the recent crowd noise library. The voice removal utility stores the attenuated and blended segment in the output buffer and outputs one or more audio segments from the buffer in a chronological order.
Systems and methods for converting interactive multimedia content authored for distribution via a physical medium for electronic distribution
Systems and methods for converting interactive multimedia content authored for distribution via a physical medium for electronic distribution are disclosed. One embodiment of the invention includes building an object model of interactive multimedia content authored for distribution via a physical medium using a content authoring system, automatically authoring a user interface based upon the object model using the content authoring system, and packing the transcoded multimedia content into at least one container file.
Systems and methods facilitating the generation of automatic transitions in video
Systems and methods for facilitating automatic transitions in video are provided. In one embodiment, a system includes a memory that stores computer executable components, and a microprocessor that executes the computer executable components stored in the memory. The components can include a video editing component that generates an augmented video. The video editing component can include a video transition component that: accesses a first video having a marker; receives information indicative of a selection of the first video and a second video; correlates the marker with a marker of the second video; and augments the second video with the first video based, at least, on the correlating.
Program information display device, program information output device, and program information display method
A program information display device includes: an identification unit which obtains identification information for identifying a video program and a video program scene included in the video program which are being displayed in a television; a program information obtainment unit which obtains program information including first program information and second program information which are relevant to the video program identified by the identification information and are different in content from each other; a display unit which displays the program information obtained by the program information obtainment unit; and a control unit which, in the case where the video program scene identified by the identification information transitions from a non-CM scene to a CM scene, switch the program information being displayed in the display unit, from the first program information to the second program information according to the transition from the non-CM scene to the CM scene.
Method and apparatus for retrieving metadata for managing video data
A method and an apparatus for retrieving information for managing video data involving link information associating metadata with the video data. A metadata indicator is used to indicate that metadata exists in a stream with the linking information. Link information also associates the metadata with location information to identify where additional information on the video data, which is described by the metadata, may be found. Using the method or apparatus, a single metadata unit is able to be associated with a plurality of video data units, or a plurality of metadata units are able to be associated with a single video data unit, in order to provide more information on the video data.
Multimedia stream processing system
A multimedia signal processing system allows a user to store selected programs while simultaneously watching or reviewing another. The system includes an input section and an output section. Across all configurations, the output section remains substantially the same, while the input section varies according to the signal type and the source. The system receives a digital stream and simultaneously processes the digital stream for display and stores the digital stream on at least one storage device. The system further simultaneously processes a previously recorded digital stream for display while processing the digital stream for display.
Optical device using a hollow-core photonic-bandgap fiber
An optical device includes a hollow-core photonic-bandgap fiber, wherein at least a portion of the hollow-core photonic-bandgap fiber is adjustably axially twisted.
Ge-P co-doped multimode optical fiber
According to at least one embodiment a graded index multimode fiber comprises: (i) a silica based core co-doped with GeO2 and 1 to 12 mole % P2O5; the core having a dual alpha, α1 and α2, where 1.8≦α1≦2.4 and 1.9≦α2≦2.4 at the wavelength (λ) range between 840 and 1100 nm; and (ii) a silica based cladding region surrounding the core, wherein the fiber has a numerical aperture NA and 0.185≦NA≦0.25 (more preferably 0.185≦NA≦0.23). Preferably, the silica based cladding region surrounding the core has refractive index lower than that of pure silica.
Optical semiconductor device and optical waveguide
A core of an optical waveguide and a core of a waveguide type optical device are adjacently disposed, and a layer is continuously formed at one end of the core of the waveguide type optical device, wherein an effective refractive index of the layer decreases toward a long axis direction of the optical waveguide stripe.
A projection display 210 arranged to display an image to an observer 212 use waveguide techniques to generate a display defining a large exit pupil at the point of the observer 212 and a large field of view, while using a small image-providing light source device. The projection display 210 uses two parallel waveguides 214, 216 made from a light transmissive material. One waveguide 214 stretches the horizontal pupil of the final display and the other waveguide 216 stretches the vertical pupil of the final display and acts as a combiner through which the observer 212 views an outside world scene 220 and the image overlaid on the scene 220. In a color display, each primary color is transmitted within a separate channel R, G, B.
Mixed media reality recognition using multiple specialized indexes
An MMR system for searching across multiple indexes comprises a plurality of mobile devices, a pre-processing server or MMR gateway, and an MMR matching unit, and may include an MMR publisher. The MMR matching unit receives an image query from the pre-processing server or MMR gateway and sends it to one or more of the recognition units to identify a result including a document, the page and the location on the page. The MMR matching unit includes a segmenter for segmenting received images by content type, a distributor for distributing the images to corresponding content type index tables, and an integrator for integrating recognition results. The result is returned to the mobile device via the pre-processing server or MMR gateway. The present invention also includes a number of novel methods including a method for processing content-type specific image queries and for processing queries across multiple indexes.
System for enhancing content
A system and method for enhancing a content file is disclosed. The system comprises a histogram module, a contrast stretching module and a brightness module. The histogram module generates a histogram including data that describes one or more pixel intensities for one or more channels included in a content file. The contrast stretching module adjusts the one or more pixel intensities for the one or more channels included in the content file based at least in part on the histogram. The brightness module is communicatively coupled to the contrast stretching module for determining whether a brightness level for the content file is within a range describing one or more acceptable brightness levels. The brightness module adjusts the brightness level for the content file responsive to determining that the brightness level for the content file is outside the range.
Method and device for classifying a light object located ahead of a vehicle
A method for classifying a light object located ahead of a vehicle, the method including a determination of a brightness curve assigned to the light object via at least two images which depict the light object at different times and a combination of the brightness curve with a characteristic brightness curve, in order to classify the light object.